Skip to main content

Posts

Showing posts from January, 2022

E-Voting and Privacy

Elections are the founding stone of healthy democracy ensuring the rights of Citizens to elect their representatives as per their wish and will. Based on the opinion of the general public, representatives are elected to serve the needs of the people. The voting process must be transparent, reliable and fair as it determines the future of any Country by entrusting huge responsibilities on elected representatives to govern the people. With the increase in population, the traditional form of election involving ballot paper and manual counting of votes found to be insufficient as it involves lengthier procedure, costlier, delay in time and suffers from risk of bias. Thus e-voting replaced the traditional form of elections ensuring transparency, faster procedure, economically cheaper and protecting privacy, security of the voters in today’s modern World. E-voting or electronic voting is a system of conducting elections through an electronic medium. It is suitable for conducting large scale

Analysis of Legal Framework of Online Gaming

The term online gaming can be divided into 3 categories namely E-Sports, Casual Gaming, and Fantasy sports for better understanding. Betting and Gambling are illegal in India and it is a matter of state government to make laws and regulations on the issue. However, there is an inconsistency in the laws and regulations due to the emergence of the Internet as it overtook the jurisdiction of the state laws. Due to the lack of national laws on the subject matter, it overlaps the regulation of games of skill with the game of chance. The game of skill is nowhere to be recognized as gambling or betting under the gambling laws. There is no specific criterion or procedure to determine gaming as a game of skill and there itself the conflict arose over the point on considerably of Gaming as a Game of skill. This leads to confusion and puts the industry in a dilemma on determining the category of game (whether Skill-based or Chance-based). By far there are two regulatory models in India, one where

Advantages and disadvantages to have Bitcoin as a Legal Tender

  Bitcoin may be a decentralized online currency, without a financial organization or single administrator which will be sent from one user to another user on the peer-to-peer bitcoin network without the requirement for intermediaries. Benefits of Bitcoin Now that we've got seen a quick overview of what bitcoin is, we are able to better understand how this leading crypto currency provides potential benefits to its users. Bitcoin has user autonomy regular fiat currencies are subject to multiple restrictions and risks as an example, banks are liable to boom and bust cycles within the economy. Sometimes, these situations can end in bank runs and crashes, as has occurred numerous times within the past. This implies that users aren't really au fait of their money. Theoretically, at least, bitcoin promises user autonomy because its price isn't linked to specific government policies. This suggests that users and owners of the crypto currency are up to speed of their money. Bitcoi

Firmware Cyberattack: All you need to know!

  Firmware can be regarded as the basis of the hardware of a computer. “It is software that is lodged into every piece of hardware on your device. Its main task is to facilitate communication with the software we install on our computer and ensure that the hardware can execute commands accurately” . Some of the firmware are usually specific to the model of the computer it’s installed on, therefore it can be rewritten, removed, or uninstalled.  How does this happen? Microsoft published a report in March 2021 named ‘Security Signal report’. In this report, Microsoft surveyed over 1000 organisations around the globe and around 80 percent of the organisations said that they had faced at least one firmware attack in the last two years.  Firmware weakness gives the hackers access to our system and we would not even know about it. The reason for this is that firmware hacking compromises the system before it has even booted up and gives hackers access to the hardware of the system. Let us unde