profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — The Reverse Vending MachineIntegrating physical devices with IOTA — The Reverse Vending MachineClass features provided by SolidityClass features provided by SolidityThis article discusses class features provided by Solidity, the defacto smart contract language for the Ethereum blockchain.Continue reading on Coinmonks »Integrating physical devices with IOTA — The Track&Trace AppIntegrating physical devices with IOTA — The Track&Trace AppIntegrating physical devices with IOTA — Zigbee editionIntegrating physical devices with IOTA — Zigbee editionHow to install and use Oyente — a smart contract analyzerHow to install and use Oyente — a smart contract analyzerOP PUSH TXOP_PUSH_TXStateful Smart Contracts on Bitcoin SVStateful Smart Contracts on Bitcoin SVLayer 1 Tokens on Bitcoin SVLayer 1 Tokens on Bitcoin SVCreating Your first DAPP: Beginner’s GuideCreating Your first DAPP: Beginner’s Guide

How to Redirect Feed Links to follow.it using .htaccessHow to Redirect Feed Links to follow.it using .htaccessFeedburner used to a powerful tool for RSS feeds publishing and subscriber management. However, feedburner will unlikely leave its maintenance mode because there has been no new features yet less features for quite some years. But RSS feed is still an important part of the Web supported by many software such as WordPress. follow.it is […] The post How to Redirect Feed Links to follow.it using .htaccess is from SysTutorials. How to make Grub2 boot to older kernel version in Ubuntu 20.04How to make Grub2 boot to older kernel version in Ubuntu 20.04In a Linux system, we may have multiple kernels installed. Usually, it is the latest kernel configured to be the default one the system boot loader will use during automatic boot if there is no manual kernel choosing. In many cases, such as there is no driver ready yet for some devices in newer kernels, […] The post How to make Grub2 boot to older kernel version in Ubuntu 20.04 is from SysTutorials. How to Add Inline Comments for Multi-line Command in Bash ScriptHow to Add Inline Comments for Multi-line Command in Bash ScriptIn Bash script, it is common that multiple small commands run together connected by pipes (|) and the whole command is quite long. For clarity, we may write the command in multiple lines. How to add comments for these long multi-line commands? In Bash, the content after # in a line is the comment. Using […] The post How to Add Inline Comments for Multi-line Command in Bash Script is from SysTutorials. How to Match Multiple Lines using Regex in Perl One-linersHow to Match Multiple Lines using Regex in Perl One-linersPerl one-liners with perl’s regular expression statement can be a very powerful text processing tools used as commands in a terminal or a script. By default, the input to the perl one-liner with -p or -n options is passed line by line. However, when we want to match multiple lines, it gets us some trouble. […] The post How to Match Multiple Lines using Regex in Perl One-liners is from SysTutorials. How to Query Transaction By ID in Hyperledger Fabric 2.0How to Query Transaction By ID in Hyperledger Fabric 2.0Querying transaction content out from a blockchain network is a common practice used by common scenarios like exploring the blockchain history or verifying the blockchain transaction content from a known ID. In Hyperledger Fabric, the transaction can be queried using a special system chaincode QSCC (Query System Chaincode) which is for ledger and other Fabric-related […] The post How to Query Transaction By ID in Hyperledger Fabric 2.0 is from SysTutorials. Blockchain Platforms Introduced, Each in One SentenceBlockchain Platforms Introduced, Each in One SentenceThis post lists some general- and special-purpose blockchains nowadays available with a short description in one sentence. Readers can have a quick understanding of what a blockchain network is built for and what uniqueness that blockchain has. I also give links to beginner friendly resources as learn materials. General purpose blockchains Blockchains for general purpose […] The post Blockchain Platforms Introduced, Each in One Sentence is from SysTutorials. How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04Hyperledger Fabric is a consortium blockchain system. It’s performance is relatively good and its modular architecture enables it to be usable in many scenarios. Hyperledger Fabric itself has rich documents and samples of test networks. For beginners, deploying a new network for trying and testing still consumes quite some time. In this post, we will […] The post How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04 is from SysTutorials. How to Grep 2 Lines using grep in Linux?How to Grep 2 Lines using grep in Linux?grep is excellent to match patterns from STDOUT/text files in command line or scripts. It’s handy. Sometimes, our problem is more complex than finding a keyword from a file. On a first thought, it may sound impossible using grep for such complex problems. But grep can be quite powerful than we thought. Today, let’s check […] The post How to Grep 2 Lines using grep in Linux? is from SysTutorials. How to Install Go 1.13.x on Ubuntu 18.04How to Install Go 1.13.x on Ubuntu 18.04In Ubuntu 18.04 LTS, the default Go lang version is 1.10. For compatibility reason, the Ubuntu LTS will usually keep the major release version numbers for packages. However, many applications, such as Hyperledger Fabric 2.0, require a newer version of Go. In this post, let’s take a look at how to install a system level […] The post How to Install Go 1.13.x on Ubuntu 18.04 is from SysTutorials. GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleGCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleWe know compilers like gcc can do lots smart optimization to make the program run faster. Regarding functions call optimization, gcc can do tail-call elimination to save the cost of allocating a new stack frame, and tail recursion elimination to turn a recursive function to non-recursive iterative one. gcc can even transform some recursive functions […] The post GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length Example is from SysTutorials. Dynamics 365 Developer Extension is Now Working in Visual Studio 2017Dynamics 365 Developer Extension is Now Working in Visual Studio 2017I don’t know why Jason Lattimer’s D365DeveloperExensions no more working after VS 2017 release? It seems D365DeveloperExtensions anymore supported for newer Visual Studio version. I am pretty much sure, some of you may be still struggling with installing Dynamics 355 Developer extension for your Visual Studio 2017 community or professional edition. Not sure why this tool has been […] The post Dynamics 365 Developer Extension is Now Working in Visual Studio 2017 is from SysTutorials. Bash Learning MaterialsBash Learning MaterialsBash (GNU Bourne-Again SHell) the default shell for many Linux distributions. It is very common for scripting languages in Linux. Bash is easy and straightforward for writing small tools. However, as most tools, it has its grammars that could easily cause bugs if they are not used correctly. Here I summarize a list of good […] The post Bash Learning Materials is from SysTutorials. How to Install Wine 32-bit on CentOS 8How to Install Wine 32-bit on CentOS 8Since version 7, RHEL and CentOS only have 64 bit versions. For some reasons, it’s better to run many Windows applications under 32 bit wine. Like How to Install Wine 32-bit on CentOS 7, this post introduce how to install 32-bit Wine on CentOS 8. Most of the mechanisms are similar yet there are differences. […] The post How to Install Wine 32-bit on CentOS 8 is from SysTutorials. How to Convert Integers to Strings and Strings to Integers in PHPHow to Convert Integers to Strings and Strings to Integers in PHPConversion from integer to string and from string to integer are common operations in most applications such as C++. PHP has its uniqueness in language and standard library design. In this post, we will check methods to convert integers to strings and vice versa. Convert string to int in PHP You can cast a string […] The post How to Convert Integers to Strings and Strings to Integers in PHP is from SysTutorials. How to list and start VirtualBox VMs in command line in Linux?How to list and start VirtualBox VMs in command line in Linux?VirtualBox is a nice open source virtual machine software. It works nicely on Linux and is supported by many Linux distros like Ubuntu in their official package repositories, so it is quite easy to set it up on Linux. The VMs can also be managed in command line using the vboxmanage command line tool provided […] The post How to list and start VirtualBox VMs in command line in Linux? is from SysTutorials. A StoneWall Solution in C++A StoneWall Solution in C++StoneWall is an interesting problem that requires some brain cycles yet not too complex. It is good software engineer interview question. Here is a C++ solution whose complexity is O(N). #include <stack> int solution(std::vector<int> &H) { int stones = 0; std::stack<int> heights; for (auto h: H) { while (!heights.empty() && h < heights.top()) { heights.pop(); […] The post A StoneWall Solution in C++ is from SysTutorials. How to add Gmail SMTP in ThunderbirdHow to add Gmail SMTP in ThunderbirdGmail’s authentication is secured by rejecting access from less secure apps. By default, adding Gmail SMTP in Thunderbird with your Google account password as SMTP authentication password will not work. And Google is beginning to shut off Google Account access to less secure apps. To solve this, the method is to use OAuth2 authentication instead […] The post How to add Gmail SMTP in Thunderbird is from SysTutorials. How to synchronize OneDrive and OneDrive for Business files in Linux using InsyncHow to synchronize OneDrive and OneDrive for Business files in Linux using InsyncOneDrive is one of the good cloud storage services available and there is a business version called OneDrive for Business. Microsoft’s Office 365 plan is widely used including Exchange Email service and OneDrive for Business. However, there is no official client released yet for Linux users. Insync is a third party cloud storage syncing software […] The post How to synchronize OneDrive and OneDrive for Business files in Linux using Insync is from SysTutorials. How to list all commits in a git repositoryHow to list all commits in a git repository`git log` only list all the commits in the current working branch. For some cases, we may want to list all the commits in a git repository. The `git log` command does not do this. But there are other supports in `git` that can do so. The command to list all commits is git rev-list […] The post How to list all commits in a git repository is from SysTutorials. How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux? To generate an RSA private key: openssl genrsa -out private.pem 2048 To generate the RSA public key from the RSA private key: openssl rsa -in private.pem -outform PEM -pubout -out public.pem The post How to generate a pair of RSA private and public key in Linux? is from SysTutorials.

Prerequisites to Deploy your smart Contract with IBM BlockChain Platform VS Code extensionPrerequisites to Deploy your smart Contract with IBM BlockChain Platform VS Code extensionHyperledger Fabric 2.0 Network Setup in Windows 10Hyperledger Fabric 2.0 Network Setup in Windows 10Hyperledger- Fabric 2.2 version test-network setup in 10 minutes !!Hyperledger- Fabric 2.2 version test-network setup in 10 minutes !!Hyperledger Fabric — TPS identification using Hyperledger CaliperHyperledger Fabric — TPS identification using Hyperledger CaliperHyperledger Fabric — Seashell Supplychain System IIHyperledger Fabric — Seashell Supplychain System IIHyperledger Fabric — Seashell Supplychain System IHyperledger Fabric — Seashell Supplychain System IHyperledger Use Case, in HealthcareHyperledger Use Case, in HealthcareHyperledger Fabric Best Practices in Production- #2 Connect Hyperledger Explorer To Your Network…Hyperledger Fabric Best Practices in Production- #2 Connect Hyperledger Explorer To Your Network…Blockchain Interoperability in 2020: A 4-Minute ReviewBlockchain Interoperability in 2020: A 4-Minute Review330 documents analysed, 30 people contacted to categorize the latest blockchain interoperability solutions.Continue reading on Coinmonks »Install and configure Hyperledger Fabric v1.4 on Ubuntu 18.04.3 LTSInstall and configure Hyperledger Fabric v1.4 on Ubuntu 18.04.3 LTS

Square Reports 600% Increase in Quarterly Bitcoin RevenueSquare Reports 600% Increase in Quarterly Bitcoin RevenueJack Dorsey's Square has seen one of the largest quarterly increases yet for its bitcoin business.Dark-Web Vendor and Pharmacist Charged With Trafficking Drugs Worth $270M in BitcoinDark-Web Vendor and Pharmacist Charged With Trafficking Drugs Worth $270M in BitcoinThe two men allegedly shipped opioids into the U.S. and sold them on the dark web for millions in bitcoin.Social Engineering: A Plague on Crypto and Twitter, Unlikely to StopSocial Engineering: A Plague on Crypto and Twitter, Unlikely to StopThe SIM swapping community entered the spotlight after helping the Twitter hacker breach the social media platform, but these threat actors have been going after the crypto community for years.Square Crypto, Human Rights Foundation Ramp Up Bitcoin Development GrantsSquare Crypto, Human Rights Foundation Ramp Up Bitcoin Development GrantsSquare Crypto and the Human Rights Foundation are continuing their support for an open source Bitcoin developer community with new contributor grants.Missouri Man Pleads Guilty to Trying to Buy Chemical Weapons With BitcoinMissouri Man Pleads Guilty to Trying to Buy Chemical Weapons With BitcoinThe chemicals, though never delivered, would have been potent enough to kill 300 people, prosecutors say.Market Wrap: Bitcoin Flat at $11.2K; DeFi Has Highest Volume Month EverMarket Wrap: Bitcoin Flat at $11.2K; DeFi Has Highest Volume Month EverA weak bitcoin market is not stopping Ethereum-powered DeFi growth. Can Social Media Be Redeemed? Feat. Bobby GoodlatteCan Social Media Be Redeemed? Feat. Bobby GoodlatteAn early Facebook product designer-turned angel investor discusses how social media has changed and whether it can be changed again for the better.‘Rat Poison Squared on Steroids’: What’s New in Bitcoin’s Latest Lightning Release‘Rat Poison Squared on Steroids’: What’s New in Bitcoin’s Latest Lightning ReleaseWith a sly poke at Warren Buffet's comment that Bitcoin is "rat poison squared," c-lightning developers' latest release adds some key new Lightning features.US Lawmakers Don’t Want Proof-of-Stake Networks to Get OvertaxedUS Lawmakers Don’t Want Proof-of-Stake Networks to Get OvertaxedFour U.S. congressmen have asked the IRS to clarify how block rewards from proof-of-stake networks are taxed, to prevent taxpayers from owing more than they should.SEC Seeking ‘Smart Contract’ Tracing Tool That Can Spot Security VulnerabilitiesSEC Seeking ‘Smart Contract’ Tracing Tool That Can Spot Security VulnerabilitiesThe federal securities watchdog has taken an interest in DeFi's most basic building block.Decentralized Exchange dYdX Debuts Ether Perpetual SwapsDecentralized Exchange dYdX Debuts Ether Perpetual SwapsPerpetual swaps that track the price of ether are coming to dYdX, the company announced Tuesday.There’s Now an Accelerator Exclusively for DeFi StartupsThere’s Now an Accelerator Exclusively for DeFi StartupsThe Chicago DeFi Alliance (CDA) just launched one of the first accelerator programs devoted entirely to DeFi crypto startups.Blockchain Bites: XRP Sales, INX IPO and Bitcoin Mining WoesBlockchain Bites: XRP Sales, INX IPO and Bitcoin Mining WoesChina's bitcoin miners are in a rut during a period of intense flooding, Ripple shows signs of sales growth and INX scaled down its IPO vision.Bitcoin News Roundup for August 4, 2020Bitcoin News Roundup for August 4, 2020With investment opportunities in traditional markets drying up, bitcoin futures are drawing record interest. CoinDesk's Markets Daily is back for your bitcoin news roundup!Russian Voters’ Data on Sale After Blockchain Poll to Keep Putin in Power: ReportRussian Voters’ Data on Sale After Blockchain Poll to Keep Putin in Power: ReportRussians voted electronically, using blockchain tech, to keep Putin in power. Now, hackers may be selling the personal data of over a million of those voters.Ethereum 2.0 Testnet Medalla Goes Live With 20,000 ValidatorsEthereum 2.0 Testnet Medalla Goes Live With 20,000 ValidatorsMedalla, the final testnet before the anticipated launch of Ethereum 2.0 later this year, is now live, the Ethereum Foundation announced Tuesday.Genesis’ Crypto Lending Rebounds in 2Q; Firm Acknowledges Unsecured LoansGenesis’ Crypto Lending Rebounds in 2Q; Firm Acknowledges Unsecured LoansGenesis’ crypto lending arm came back strong in 2Q after a rocky 1Q. Separately, executives acknowledged the firm makes some uncollateralized loans.What People Who Aren’t Bullish on Bitcoin Still Like About ItWhat People Who Aren’t Bullish on Bitcoin Still Like About ItWorking with open-source software changes the development process, according to this researcher who interviewed hundreds of technologists across projects. First Mover: As Fed Nears Inflation Rubicon, Analysts See $50K Bitcoin in PlayFirst Mover: As Fed Nears Inflation Rubicon, Analysts See $50K Bitcoin in PlayThe Federal Reserve appears ready to pursue yet another untested strategy that could ultimately boost inflation – and possibly prices for bitcoin.INX Scales Down US IPO Target to $117M – Still Set to Be Crypto’s LargestINX Scales Down US IPO Target to $117M – Still Set to Be Crypto’s LargestThe cryptocurrency and security token exchange has filed an updated IPO prospectus with the SEC, lowering the maximum expected raise and proposing a new launch date.

How to build an automated dApp in 4 steps — with GelatoHow to build an automated dApp in 4 steps — with GelatoOne-click Chainlink deploymentOne-click Chainlink deploymentCrypto in Korea — the Past and the Future.Crypto in Korea — the Past and the Future.Ordering Food and Investing in BitcoinOrdering Food and Investing in BitcoinHow money market interest rates affect stablecoinsHow money market interest rates affect stablecoinsAgreeable Smart ContractsAgreeable Smart ContractsWho decides whether to terminate a smart contract? Who decides whether a smart contract should change state?Continue reading on Coinmonks »Zero-Knowledge Proofs ExplainedZero-Knowledge Proofs ExplainedMusing on UMA: DeFi InfrastructureMusing on UMA: DeFi InfrastructureLedger hack, Bitcoin and Gold price rises and DeFi boomLedger hack, Bitcoin and Gold price rises and DeFi boomFuture of the Beacon Chain. When does ETH 2.0 start?Future of the Beacon Chain. When does ETH 2.0 start?Ethereum is terrific but incredibly plugged-up. what’s gonna change?Continue reading on Coinmonks »

Is There an Optimal SIEM Approach for Your Business?Is There an Optimal SIEM Approach for Your Business?Is there an optimal SIEM approach for your business?  SIEM proves one of the most complex branches of cybersecurity, with every vendor offering a unique variation on the theme. Basically, SIEM collects logged security event data from around the enterprise network. Then, it aggregates and analyzes the data, looking for commonalities and other signs of […] The post Is There an Optimal SIEM Approach for Your Business? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Top Online Cybersecurity Certification Courses for ProfessionalsTop Online Cybersecurity Certification Courses for ProfessionalsSolutions Review lists the top online cybersecurity certification courses that every IT and risk manager can take right now.  Previously, we listed several articles across the Solutions Review security sites listing the top cybersecurity courses professionals should take. In some of those lists, we recommended courses offering online cybersecurity certifications. However, these courses only represented […] The post Top Online Cybersecurity Certification Courses for Professionals appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. The Dave Breach: What Happened to the Tech Unicorn?The Dave Breach: What Happened to the Tech Unicorn?Recently, digital banking aggregator and technology unicorn Dave suffered from a significant cyber-attack and data breach; hackers may have compromised up to 7.5 million banking users. According to a report from Dave, users of the financial technology company had their data sold at auction. Later, the data appeared on a forum used by hackers to […] The post The Dave Breach: What Happened to the Tech Unicorn? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Top 10 Udemy Cybersecurity Courses for ProfessionalsTop 10 Udemy Cybersecurity Courses for ProfessionalsSolutions Review lists the top 10 cybersecurity courses you can take on Udemy right now that every security professional should consider taking. Are you a security operations professional or cybersecurity engineer looking to gain new knowledge in networking or brush up your skills? Do you want to earn a cybersecurity certification but you don’t know […] The post Top 10 Udemy Cybersecurity Courses for Professionals appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Phishing Has Been Around for a Long Time. Why Did Twitter Fall for It?Phishing Has Been Around for a Long Time. Why Did Twitter Fall for It?What happened at Twitter was a cyber attack almost unprecedented in scope and publicity. One of the largest social media platforms in the world suffered at the hands of as-yet-unknown hackers.  The full effects of the hack continue to reverberate. To learn a little more and gain a fresh perspective on the attack, we turn […] The post Phishing Has Been Around for a Long Time. Why Did Twitter Fall for It? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. 2020 Vendors to Know: SIEM2020 Vendors to Know: SIEMSolutions Review’s listing of the Vendors to Know: SIEM is a mashup of products that best represent current market conditions, according to the crowd. Our editors selected the privileged access management products listed here based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites […] The post 2020 Vendors to Know: SIEM appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. What Generated Data Should Your SIEM Ingest?What Generated Data Should Your SIEM Ingest?What data should your SIEM solution ingest for optimal performance?  In traditional SIEM strategy and execution, SIEM collects and ingests data from throughout the enterprise network. Then, the solution normalizes the data for easy analysis and uses the information to uncover security events. Therefore, IT security teams can discover and investigate potentially connected security events […] The post What Generated Data Should Your SIEM Ingest? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM)Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM)Gartner announced the vendors selected to the 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM). According to Gartner, it bases its Peer Insights Customers’ Choice on customer feedback and ratings, taking into account both the number of reviews and the overall user ratings of verified end-users. Gartner maintains rigorous criteria for […] The post Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM) appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. 2020 Vendors to Know: SOAR2020 Vendors to Know: SOARSolutions Review’s listing of the Vendors to Know: SOAR is a mashup of products that best represent current market conditions, according to the crowd. Our editors selected the privileged access management products listed here based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites […] The post 2020 Vendors to Know: SOAR appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Should We Move to a New Definition of SIEM?Should We Move to a New Definition of SIEM?Should we move to a new definition of SIEM? What should experts and enterprises consider and discuss in relation to SIEM solutions?  Why do we need to consider a new definition of SIEM? IT decision-makers across the U.S. still don’t think of SIEM as a necessary component of their modern cybersecurity platforms. Previously, SIEM only […] The post Should We Move to a New Definition of SIEM? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management.

Flex streamlines app access for 20k suppliers with IAM overhaulFlex streamlines app access for 20k suppliers with IAM overhaulContract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. (Insider Story)How to overcome the top challenges of achieving identity resolution How to overcome the top challenges of achieving identity resolution No matter the enterprise industry, common business practices today require personalization at scale, in terms of both volume and speed of resolution, with identity resolution at the core. Identity resolution consists of combining what is already known about individuals through personally identifiable information (PII) such as email, mailing address, birthday, home and mobile phone numbers, or other first-party identifiers, with data that marketers can purchase from a third-party to know more about the individuals, and information that marketers still need directly from individuals to complete a profile. This is an important element of establishing a competitive advantage in any industry as identity resolution allows for improved personalization, omnichannel orchestration, and real-time engagement that leads to increased customer retention, loyalty, and ultimately revenue growth.To read this article in full, please click here