profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A self-professed “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — Peer-to-peer energy trading with IOTA Part 1Integrating physical devices with IOTA — The Reverse Vending MachineIntegrating physical devices with IOTA — The Reverse Vending MachineClass features provided by SolidityClass features provided by SolidityThis article discusses class features provided by Solidity, the defacto smart contract language for the Ethereum blockchain.Continue reading on Coinmonks »Integrating physical devices with IOTA — The Track&Trace AppIntegrating physical devices with IOTA — The Track&Trace AppIntegrating physical devices with IOTA — Zigbee editionIntegrating physical devices with IOTA — Zigbee editionHow to install and use Oyente — a smart contract analyzerHow to install and use Oyente — a smart contract analyzerOP PUSH TXOP_PUSH_TXStateful Smart Contracts on Bitcoin SVStateful Smart Contracts on Bitcoin SVLayer 1 Tokens on Bitcoin SVLayer 1 Tokens on Bitcoin SVCreating Your first DAPP: Beginner’s GuideCreating Your first DAPP: Beginner’s Guide

How to Redirect Feed Links to follow.it using .htaccessHow to Redirect Feed Links to follow.it using .htaccessFeedburner used to a powerful tool for RSS feeds publishing and subscriber management. However, feedburner will unlikely leave its maintenance mode because there has been no new features yet less features for quite some years. But RSS feed is still an important part of the Web supported by many software such as WordPress. follow.it is […] The post How to Redirect Feed Links to follow.it using .htaccess is from SysTutorials. How to make Grub2 boot to older kernel version in Ubuntu 20.04How to make Grub2 boot to older kernel version in Ubuntu 20.04In a Linux system, we may have multiple kernels installed. Usually, it is the latest kernel configured to be the default one the system boot loader will use during automatic boot if there is no manual kernel choosing. In many cases, such as there is no driver ready yet for some devices in newer kernels, […] The post How to make Grub2 boot to older kernel version in Ubuntu 20.04 is from SysTutorials. How to Add Inline Comments for Multi-line Command in Bash ScriptHow to Add Inline Comments for Multi-line Command in Bash ScriptIn Bash script, it is common that multiple small commands run together connected by pipes (|) and the whole command is quite long. For clarity, we may write the command in multiple lines. How to add comments for these long multi-line commands? In Bash, the content after # in a line is the comment. Using […] The post How to Add Inline Comments for Multi-line Command in Bash Script is from SysTutorials. How to Match Multiple Lines using Regex in Perl One-linersHow to Match Multiple Lines using Regex in Perl One-linersPerl one-liners with perl’s regular expression statement can be a very powerful text processing tools used as commands in a terminal or a script. By default, the input to the perl one-liner with -p or -n options is passed line by line. However, when we want to match multiple lines, it gets us some trouble. […] The post How to Match Multiple Lines using Regex in Perl One-liners is from SysTutorials. How to Query Transaction By ID in Hyperledger Fabric 2.0How to Query Transaction By ID in Hyperledger Fabric 2.0Querying transaction content out from a blockchain network is a common practice used by common scenarios like exploring the blockchain history or verifying the blockchain transaction content from a known ID. In Hyperledger Fabric, the transaction can be queried using a special system chaincode QSCC (Query System Chaincode) which is for ledger and other Fabric-related […] The post How to Query Transaction By ID in Hyperledger Fabric 2.0 is from SysTutorials. Blockchain Platforms Introduced, Each in One SentenceBlockchain Platforms Introduced, Each in One SentenceThis post lists some general- and special-purpose blockchains nowadays available with a short description in one sentence. Readers can have a quick understanding of what a blockchain network is built for and what uniqueness that blockchain has. I also give links to beginner friendly resources as learn materials. General purpose blockchains Blockchains for general purpose […] The post Blockchain Platforms Introduced, Each in One Sentence is from SysTutorials. How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04Hyperledger Fabric is a consortium blockchain system. It’s performance is relatively good and its modular architecture enables it to be usable in many scenarios. Hyperledger Fabric itself has rich documents and samples of test networks. For beginners, deploying a new network for trying and testing still consumes quite some time. In this post, we will […] The post How to Install Hyperledger Fabric 2.0 in Ubuntu 18.04 is from SysTutorials. How to Grep 2 Lines using grep in Linux?How to Grep 2 Lines using grep in Linux?grep is excellent to match patterns from STDOUT/text files in command line or scripts. It’s handy. Sometimes, our problem is more complex than finding a keyword from a file. On a first thought, it may sound impossible using grep for such complex problems. But grep can be quite powerful than we thought. Today, let’s check […] The post How to Grep 2 Lines using grep in Linux? is from SysTutorials. How to Install Go 1.13.x on Ubuntu 18.04How to Install Go 1.13.x on Ubuntu 18.04In Ubuntu 18.04 LTS, the default Go lang version is 1.10. For compatibility reason, the Ubuntu LTS will usually keep the major release version numbers for packages. However, many applications, such as Hyperledger Fabric 2.0, require a newer version of Go. In this post, let’s take a look at how to install a system level […] The post How to Install Go 1.13.x on Ubuntu 18.04 is from SysTutorials. GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleGCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length ExampleWe know compilers like gcc can do lots smart optimization to make the program run faster. Regarding functions call optimization, gcc can do tail-call elimination to save the cost of allocating a new stack frame, and tail recursion elimination to turn a recursive function to non-recursive iterative one. gcc can even transform some recursive functions […] The post GCC May “Save” You Some Recursive Functions Calls: an Analysis of a Function Call Stack Length Example is from SysTutorials. Dynamics 365 Developer Extension is Now Working in Visual Studio 2017Dynamics 365 Developer Extension is Now Working in Visual Studio 2017I don’t know why Jason Lattimer’s D365DeveloperExensions no more working after VS 2017 release? It seems D365DeveloperExtensions anymore supported for newer Visual Studio version. I am pretty much sure, some of you may be still struggling with installing Dynamics 355 Developer extension for your Visual Studio 2017 community or professional edition. Not sure why this tool has been […] The post Dynamics 365 Developer Extension is Now Working in Visual Studio 2017 is from SysTutorials. Bash Learning MaterialsBash Learning MaterialsBash (GNU Bourne-Again SHell) the default shell for many Linux distributions. It is very common for scripting languages in Linux. Bash is easy and straightforward for writing small tools. However, as most tools, it has its grammars that could easily cause bugs if they are not used correctly. Here I summarize a list of good […] The post Bash Learning Materials is from SysTutorials. How to Install Wine 32-bit on CentOS 8How to Install Wine 32-bit on CentOS 8Since version 7, RHEL and CentOS only have 64 bit versions. For some reasons, it’s better to run many Windows applications under 32 bit wine. Like How to Install Wine 32-bit on CentOS 7, this post introduce how to install 32-bit Wine on CentOS 8. Most of the mechanisms are similar yet there are differences. […] The post How to Install Wine 32-bit on CentOS 8 is from SysTutorials. How to Convert Integers to Strings and Strings to Integers in PHPHow to Convert Integers to Strings and Strings to Integers in PHPConversion from integer to string and from string to integer are common operations in most applications such as C++. PHP has its uniqueness in language and standard library design. In this post, we will check methods to convert integers to strings and vice versa. Convert string to int in PHP You can cast a string […] The post How to Convert Integers to Strings and Strings to Integers in PHP is from SysTutorials. How to list and start VirtualBox VMs in command line in Linux?How to list and start VirtualBox VMs in command line in Linux?VirtualBox is a nice open source virtual machine software. It works nicely on Linux and is supported by many Linux distros like Ubuntu in their official package repositories, so it is quite easy to set it up on Linux. The VMs can also be managed in command line using the vboxmanage command line tool provided […] The post How to list and start VirtualBox VMs in command line in Linux? is from SysTutorials. A StoneWall Solution in C++A StoneWall Solution in C++StoneWall is an interesting problem that requires some brain cycles yet not too complex. It is good software engineer interview question. Here is a C++ solution whose complexity is O(N). #include <stack> int solution(std::vector<int> &H) { int stones = 0; std::stack<int> heights; for (auto h: H) { while (!heights.empty() && h < heights.top()) { heights.pop(); […] The post A StoneWall Solution in C++ is from SysTutorials. How to add Gmail SMTP in ThunderbirdHow to add Gmail SMTP in ThunderbirdGmail’s authentication is secured by rejecting access from less secure apps. By default, adding Gmail SMTP in Thunderbird with your Google account password as SMTP authentication password will not work. And Google is beginning to shut off Google Account access to less secure apps. To solve this, the method is to use OAuth2 authentication instead […] The post How to add Gmail SMTP in Thunderbird is from SysTutorials. How to synchronize OneDrive and OneDrive for Business files in Linux using InsyncHow to synchronize OneDrive and OneDrive for Business files in Linux using InsyncOneDrive is one of the good cloud storage services available and there is a business version called OneDrive for Business. Microsoft’s Office 365 plan is widely used including Exchange Email service and OneDrive for Business. However, there is no official client released yet for Linux users. Insync is a third party cloud storage syncing software […] The post How to synchronize OneDrive and OneDrive for Business files in Linux using Insync is from SysTutorials. How to list all commits in a git repositoryHow to list all commits in a git repository`git log` only list all the commits in the current working branch. For some cases, we may want to list all the commits in a git repository. The `git log` command does not do this. But there are other supports in `git` that can do so. The command to list all commits is git rev-list […] The post How to list all commits in a git repository is from SysTutorials. How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux?How to generate a pair of RSA private and public key in Linux? To generate an RSA private key: openssl genrsa -out private.pem 2048 To generate the RSA public key from the RSA private key: openssl rsa -in private.pem -outform PEM -pubout -out public.pem The post How to generate a pair of RSA private and public key in Linux? is from SysTutorials.

Prerequisites to Deploy your smart Contract with IBM BlockChain Platform VS Code extensionPrerequisites to Deploy your smart Contract with IBM BlockChain Platform VS Code extensionHyperledger Fabric 2.0 Network Setup in Windows 10Hyperledger Fabric 2.0 Network Setup in Windows 10Hyperledger- Fabric 2.2 version test-network setup in 10 minutes !!Hyperledger- Fabric 2.2 version test-network setup in 10 minutes !!Hyperledger Fabric — TPS identification using Hyperledger CaliperHyperledger Fabric — TPS identification using Hyperledger CaliperHyperledger Fabric — Seashell Supplychain System IIHyperledger Fabric — Seashell Supplychain System IIHyperledger Fabric — Seashell Supplychain System IHyperledger Fabric — Seashell Supplychain System IHyperledger Use Case, in HealthcareHyperledger Use Case, in HealthcareHyperledger Fabric Best Practices in Production- #2 Connect Hyperledger Explorer To Your Network…Hyperledger Fabric Best Practices in Production- #2 Connect Hyperledger Explorer To Your Network…Blockchain Interoperability in 2020: A 4-Minute ReviewBlockchain Interoperability in 2020: A 4-Minute Review330 documents analysed, 30 people contacted to categorize the latest blockchain interoperability solutions.Continue reading on Coinmonks »Install and configure Hyperledger Fabric v1.4 on Ubuntu 18.04.3 LTSInstall and configure Hyperledger Fabric v1.4 on Ubuntu 18.04.3 LTS

Bittrex and Poloniex Move for Summary Judgment in Market Manipulation CaseBittrex and Poloniex Move for Summary Judgment in Market Manipulation CaseBittrex and Poloniex were added to the case as defendants in June 2020. Market Wrap: Bitcoin Dips to $11.5K; Cardano Is Making a Big DeFi MoveMarket Wrap: Bitcoin Dips to $11.5K; Cardano Is Making a Big DeFi MoveAfter testing a $11,900 high bitcoin takes a dip while a DeFi competitor to Ethereum checks off a roadmap box. Riot Blockchain Ends Week Up 29%, Hits 2020 High Ahead of Q2 Earnings ReportRiot Blockchain Ends Week Up 29%, Hits 2020 High Ahead of Q2 Earnings ReportThe company has gained 70% so far in Q3.11 Numbers That Tell the Story of the Economy Right Now11 Numbers That Tell the Story of the Economy Right NowFrom the price of coffee to the national debt as a percentage of GDP, these 11 numbers provide a picture of a fast changing global economy. Money Reimagined: Warnings From an Argentine TragedyMoney Reimagined: Warnings From an Argentine TragedyProgrammable money can protect against politicians debasing currencies to satisfy their own interests. Blockchain Bites: Goldman’s Hire, Ether’s Options, Bitcoin’s PatronageBlockchain Bites: Goldman’s Hire, Ether’s Options, Bitcoin’s PatronageThe Fed is rushing ahead with a payments platform, Goldman Sachs is building out a digital assets team and NBA stars have backed Dapper Labs.Privacy Group Slams California Bill That Would Put Health Records on the BlockchainPrivacy Group Slams California Bill That Would Put Health Records on the BlockchainEFF said the bill is a serious threat to citizens' privacy; the immutability of a blockchain means false diagnoses can't be erased. Ethereum Classic Attacker Successfully Double-Spends $1.68M in Second Attack: ReportEthereum Classic Attacker Successfully Double-Spends $1.68M in Second Attack: ReportThe attacker attempted to double-spend roughly $3.3 million during the second attack. ParaFi Invests and Begins Staking in Bitfinex Spin-Out ExchangeParaFi Invests and Begins Staking in Bitfinex Spin-Out ExchangeParaFi and D1 have invested a total of $450,000 into Bitfinex spin-out DeversiFi and will now play a governance role in the project's DAO. California Agency Backs Green-Energy Pilot Using RSK’s Bitcoin Smart ContractsCalifornia Agency Backs Green-Energy Pilot Using RSK’s Bitcoin Smart ContractsThe California Energy Commission is funding an experimental market for carbon credit trading on the RSK blockchain, which runs on top of Bitcoin. Fixing This Bitcoin-Killing Bug Will (Eventually) Require a Hard ForkFixing This Bitcoin-Killing Bug Will (Eventually) Require a Hard ForkThe bug sheds light on the challenges of Bitcoin's decentralization. At least we've got 86 years for the community to join together and implement a fix. Free Speech vs. Cancel Culture: Reasons for OptimismFree Speech vs. Cancel Culture: Reasons for OptimismFrom social media to controversial statues, the free speech debate is more alive than ever. New tech can help safeguard history while letting us live our values.CoinDCX Becomes First India Exchange to Offer Users Crypto StakingCoinDCX Becomes First India Exchange to Offer Users Crypto StakingMumbai-based cryptocurrency exchange CoinDCX launched its new product on Friday, allowing users to stake cryptocurrencies from Harmony, Qtum and Tron. First Mover: Kyber CEO Predicts 2020 Transactions at $3B as DeFi Token SoarsFirst Mover: Kyber CEO Predicts 2020 Transactions at $3B as DeFi Token SoarsKyber Network's KNC token has brought traders eightfold returns this year, dwarfing those for bitcoin and ether. CoinDesk spoke with CEO Loi Luu about the project and the DeFi boom.BCB Group Teams With Circle to Offer EU Institutions USDC Stablecoin SettlementBCB Group Teams With Circle to Offer EU Institutions USDC Stablecoin SettlementBCB Group will integrate with Circle's platform in a bid to make the USDC stablecoin more widely available.Binance Says New York Banks Can Now Use Its Stablecoin After Watchdog ApprovalBinance Says New York Banks Can Now Use Its Stablecoin After Watchdog ApprovalNYDFS has added Binance USD to its approved list, cutting away most of the red tape around custody and listing of the stablecoin.Japan’s New FSA Chief Stands Firm on Crypto Regulation, Calls for Push on Digital YenJapan’s New FSA Chief Stands Firm on Crypto Regulation, Calls for Push on Digital YenThe incoming commissioner of the Financial Services Agency has said the regulator will not soften rules on cryptos.Market Wrap: Bitcoin Breaks $11,800; Ether Options Market ExplodesMarket Wrap: Bitcoin Breaks $11,800; Ether Options Market ExplodesBitcoin's price is clawing its way back after weekend losses while the ether options market suggests a bumpy road ahead. The History, Present and Future of Central Banks, Feat. George SelginThe History, Present and Future of Central Banks, Feat. George SelginThe Director of the Cato Institute's Center for Monetary and Financial Alternatives gives an eye-opening, 200-year history of today’s most powerful economic institution.Polkadot Releases Rococo, Its Test Environment for Interoperable ‘Parachains’Polkadot Releases Rococo, Its Test Environment for Interoperable ‘Parachains’Polkadot has released its first testnet, Rococo, for its parachain network. The testnet will commence with three parachains, Parity Technologies said.

My Data Share ExpiresMy Data Share ExpiresI willingly share my personal information with companies providing me with services, as long as it is deleted when the service expires.Continue reading on Coinmonks »SNARKs and STARKs. A Small Difference with Big ImplicationsSNARKs and STARKs. A Small Difference with Big ImplicationsOne Thing to Understand about Yield FarmingOne Thing to Understand about Yield FarmingIf you understand arbitrage, you’ve got the right foundation for yield farming.Continue reading on Coinmonks »A Primer on Ethereum Social GovernanceA Primer on Ethereum Social GovernanceHow to build an automated dApp in 4 steps — with GelatoHow to build an automated dApp in 4 steps — with GelatoOne-click Chainlink deploymentOne-click Chainlink deploymentCrypto in Korea — the Past and the Future.Crypto in Korea — the Past and the Future.Ordering Food and Investing in BitcoinOrdering Food and Investing in BitcoinHow money market interest rates affect stablecoinsHow money market interest rates affect stablecoinsAgreeable Smart ContractsAgreeable Smart ContractsWho decides whether to terminate a smart contract? Who decides whether a smart contract should change state?Continue reading on Coinmonks »

Quick Hits: Preventing Insider Threats in Your BusinessQuick Hits: Preventing Insider Threats in Your BusinessAccording to the 2020 Cost of Insider Threats Global Report, the cost of an insider threat in 2020 totals around $11.45 million on average. What can your enterprise do to begin preventing insider threats?  First, your enterprise needs to embrace strong security awareness training. Employees create workarounds and make cybersecurity mistakes in part because of […] The post Quick Hits: Preventing Insider Threats in Your Business appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Is There an Optimal SIEM Approach for Your Business?Is There an Optimal SIEM Approach for Your Business?Is there an optimal SIEM approach for your business?  SIEM proves one of the most complex branches of cybersecurity, with every vendor offering a unique variation on the theme. Basically, SIEM collects logged security event data from around the enterprise network. Then, it aggregates and analyzes the data, looking for commonalities and other signs of […] The post Is There an Optimal SIEM Approach for Your Business? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Top Online Cybersecurity Certification Courses for ProfessionalsTop Online Cybersecurity Certification Courses for ProfessionalsSolutions Review lists the top online cybersecurity certification courses that every IT and risk manager can take right now.  Previously, we listed several articles across the Solutions Review security sites listing the top cybersecurity courses professionals should take. In some of those lists, we recommended courses offering online cybersecurity certifications. However, these courses only represented […] The post Top Online Cybersecurity Certification Courses for Professionals appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. The Dave Breach: What Happened to the Tech Unicorn?The Dave Breach: What Happened to the Tech Unicorn?Recently, digital banking aggregator and technology unicorn Dave suffered from a significant cyber-attack and data breach; hackers may have compromised up to 7.5 million banking users. According to a report from Dave, users of the financial technology company had their data sold at auction. Later, the data appeared on a forum used by hackers to […] The post The Dave Breach: What Happened to the Tech Unicorn? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Top 10 Udemy Cybersecurity Courses for ProfessionalsTop 10 Udemy Cybersecurity Courses for ProfessionalsSolutions Review lists the top 10 cybersecurity courses you can take on Udemy right now that every security professional should consider taking. Are you a security operations professional or cybersecurity engineer looking to gain new knowledge in networking or brush up your skills? Do you want to earn a cybersecurity certification but you don’t know […] The post Top 10 Udemy Cybersecurity Courses for Professionals appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Phishing Has Been Around for a Long Time. Why Did Twitter Fall for It?Phishing Has Been Around for a Long Time. Why Did Twitter Fall for It?What happened at Twitter was a cyber attack almost unprecedented in scope and publicity. One of the largest social media platforms in the world suffered at the hands of as-yet-unknown hackers.  The full effects of the hack continue to reverberate. To learn a little more and gain a fresh perspective on the attack, we turn […] The post Phishing Has Been Around for a Long Time. Why Did Twitter Fall for It? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. 2020 Vendors to Know: SIEM2020 Vendors to Know: SIEMSolutions Review’s listing of the Vendors to Know: SIEM is a mashup of products that best represent current market conditions, according to the crowd. Our editors selected the privileged access management products listed here based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites […] The post 2020 Vendors to Know: SIEM appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. What Generated Data Should Your SIEM Ingest?What Generated Data Should Your SIEM Ingest?What data should your SIEM solution ingest for optimal performance?  In traditional SIEM strategy and execution, SIEM collects and ingests data from throughout the enterprise network. Then, the solution normalizes the data for easy analysis and uses the information to uncover security events. Therefore, IT security teams can discover and investigate potentially connected security events […] The post What Generated Data Should Your SIEM Ingest? appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM)Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM)Gartner announced the vendors selected to the 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM). According to Gartner, it bases its Peer Insights Customers’ Choice on customer feedback and ratings, taking into account both the number of reviews and the overall user ratings of verified end-users. Gartner maintains rigorous criteria for […] The post Key Findings: 2020 Gartner Peer Insights Customers’ Choice for Security Information Event Management (SIEM) appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management. 2020 Vendors to Know: SOAR2020 Vendors to Know: SOARSolutions Review’s listing of the Vendors to Know: SOAR is a mashup of products that best represent current market conditions, according to the crowd. Our editors selected the privileged access management products listed here based on each solution’s Authority Score, a meta-analysis of real user sentiment through the web’s most trusted business software review sites […] The post 2020 Vendors to Know: SOAR appeared first on Top SIEM Vendors, News & Reviews for Security Information and Event Management.