NEW

Rogue Money and the Underground Economy: An Encyclopedia of Alternative and Cryptocurrencies, 1st Edition

  • John C. Edmunds
  • Published By:
  • ISBN-10: 144086456X
  • ISBN-13: 9781440864568
  • DDC: 330
  • 288 Pages | eBook
  • Original Copyright 2020 | Published/Released February 2020
  • This publication's content originally published in print form: 2020

  • Price:  Sign in for price

About

Overview

The world of cyber currency has experienced explosive growth in recent years, accompanied by numerous controversies and misunderstandings about what it is, how it works, and how it relates to the underground economy and illegal activities such as money laundering, tax evasion, and human trafficking. Many illegal or malicious activities are paid for with cyber currencies, and this book covers those applications. But cyber currencies also have many legitimate, constructive applications, which are explained in clear, plain English, without embellishment or exaggeration. An authoritative and thought-provoking reference for readers seeking a greater understanding of all aspects of alternative cyber currencies, this encyclopedia discusses economic history, international trade, current controversies, and the impact on the wider underground economy. It peels back layers of jargon and obfuscation, giving each topic individual attention to show how it works and contributes to the whole.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Contents.
Alphabetical List of Entries.
Introduction.
1: Adware.
2: Air Drop.
3: Alpha Version.
4: Anonymity.
5: ASICs (Application-Specific Integrated Circuits).
6: Assassination Market.
7: Asynchronous Arbitrage.
8: Austrian School.
9: Avatar.
10: Backdoor.
11: Baltic Money Laundering Scandals.
12: Bancor.
13: Beta version.
14: Blockchain.
15: Bots.
16: Brute Force Attack.
17: Burning a Coin.
18: Buterin, Vitalik.
19: Central Bank.
20: Checksum.
21: Collision and Collision-Resistant.
22: Conflict Minerals.
23: Counterparty Risk.
24: Cybercurrency, International Response.
25: Cybercurrency Exchanges.
26: Cybercurrency Mining Farms.
27: Cybercurrency Programming Languages.
28: Cybercurrency Slang and Acronyms.
29: Dark Web.
30: Decentralization.
31: Decentralized Application.
32: Decentralized Exchange.
33: Decentralized News Service (DNN).
34: Degree of Difficulty Adjustment.
35: Digital Signature.
36: Dogecoin (DOGE).
37: Double Spend Problem.
38: Drug Trafficking.
39: Eavesdropping.
40: Elliptic Curve Cryptography.
41: Encryption.
42: Ether.
43: Ethereum Classic (ETC).
44: Ethereum Virtual Machine.
45: Fashion and the Arts.
46: Feint.
47: Fiat Money.
48: 51% Attack.
49: Financing Terrorist Organizations.
50: Fork.
51: Fractional Reserve Banking.
52: Front-Running.
53: Genesis Block.
54: Gold Standard.
55: Golem.
56: GPU Mining.
57: Great Depression.
58: Great Recession.
59: Hack.
60: Hardware Wallets.
61: Hash and Hashing.
62: Identity Theft.
63: Information Sources.
64: Invoice Fraud.
65: Le Numeraire.
66: Libra.
67: Malware.
68: Mining.
69: Mining Puzzle.
70: Monero.
71: Monetary Rule.
72: Money Laundering.
73: Mt. Gox Hack.
74: Multisig.
75: Orphan Transactions.
76: Ostracism.
77: Panama Papers.
78: Parity Bit.
79: Public Key/Private Key.
80: Pump and Dump.
81: Random Number Generator.
82: Repositories.
83: Ripple (XRP).
84: Scripting Language.
85: Sex Trade.
86: SHA-256.
87: Side Chains.
88: Silk Road.
89: Single Point of Failure.
90: Smart Contracts.
91: Sock Puppet.
92: Software Wallets.
93: Specie.
94: Stellar (XLM).
95: Tether (USDT).
96: Token.
97: Transaction Fees.
98: Trapdoor Function.
99: Trolling.
100: TRON.
101: Trustless.
102: Turing Complete Programming Language.
103: Underground Economy.
104: VeChain (VET).
105: Virus.
106: Wallets.
107: Wash Trades.
108: Watering Hole Attack.
109: Wildcat Banking.
110: Wildlife Trafficking.
111: Worm.
112: Zombie Computer.
About the Editor and Contributors.
Index.