Monero's Lead Developer to Create Tari Protocol

New protocol, built on Monero's network may include loyalty points, concert tickets and in-game items
23 May 2018   1078

Based of the Monero network, a new protocol for digital assets called Tari will be created soon, CoinDesk reports.

According to the authors of the new protocol, Tari will focus on tokens with unique characteristics that contain information about ownership rights (for example, loyalty points or virtual goods). Also, developers note that their protocol will allow issuers of digital assets to participate in the secondary market.

Leading developer at Monero Ricardo Spagni will take part in Tari development. The project website noted that the new protocol will "support any kind of digital assets" and is capable of processing "many thousands of transactions per second".

If you have a decentralized distributed trustless system that supports non-fungible tokens that enforces the rule sets around digital assets, that changes the game because now you have an opportunity for consumers to trade those digital assets. We don't want to make a lot of future statements, we just want to prove ourselves along the way and we think that's a great way to build trust and build our community. 
 

Naveen Jain

Tari

He believes protocols and networks looking at specific use cases may be more useful than general-purpose ones.

BlackSquid Hidden Miner to Attack US & Thai PCs

The malware is distributed through malicious websites, compromised web servers, network drives, and USB drives; it uses different exploits and vulnerabilities
05 June 2019   196

Trend Micro researchers have discovered a new malware that mines the Monero cryptocurrency on users' devices, reports ZDNet.

Most of all, a new malware miner called BlackSquid is popular in Thailand and the United States. The maleware is distributed through malicious websites, compromised web servers, network drives, and USB drives. BlackSquid uses EternalBlue, DoublePulsar, server vulnerabilities CVE-2014-6287, CVE-2017-12615, CVE-2017-8464 and errors in the ThinkPHP web application.

BlackSquid uses various tricks to keep the program unnoticed. For example, if a program detects that it was running in a virtualization environment, or finds debugging tools, then the malicious functions will not be activated.

Unnoticed, the malware installs the XMRig mining script. The attack does not end there - the program also scans the system for the a video card in order to extract coins more efficiently. After infecting one computer on the network, the virus tries to spread to other systems.