How blockchain is changing the finance industry: Triple Entry Accounting

The blockchain technology brings in yet another revelation, this time in accounting principles. Enter the Triple Entry Accounting system. Compared to the traditional double entry accounting, triple entry brings in another dimension in the accounting process. In this article we will...

/ March 6, 2017

How blockchain is changing the legal industry: Smart Contracts

A smart contract is a self-regulated software which has it’s own impeccable sense of time, it is used to send automated electronic messages, either periodically or conditionally. Periods are based on specific intervals of time and conditions are reference to objective facts around...

/ March 2, 2017

A brief history of the internet, cryptography, cryptanalysis and encryption laws of India

The internet Thanks to the internet you are reading this article right now. How did the internet get to where it is right today? There is so much history we cannot possibly get it together in this short article. The...

/ February 22, 2017

What is SBI doing with Blockchain technology? Intro to Bankchain

As per the latest reports, State Bank of India along with ten other commercial banks, is taking the lead in building the country’s first financial blockchain framework. Reportedly, Axis Bank, Central Bank of India, DCB Bank, Deutsche Bank, HDFC Bank, ICICI...

/ February 18, 2017

What are bitcoins / cryptocurrency / blockchain – what is so different than fiat money?

Bitcoins are all set to disrupt financial exchanges globally. In just one year the value of all bitcoins together have risen from USD 6 billion to USD 16 billion. At this rate I am sure by 2020 bitcoins will have...

/ February 13, 2017

What are digital signatures? Signing and verification – Relevant Indian Laws

Digital Signatures are considered to be more secure than the traditional ink signatures we all are used to. This is because ink signatures can be copied manually and exact duplicates can also be created through various ways. However, digital signatures can not...

/ February 12, 2017

Understanding Asymmetric Cryptography, Public Key, Private Key and the RSA Algorithm

Encryption as explained earlier is simply substitution of letters with numbers and then using complex mathematical functions to alter the pattern of numbers. This article is about understanding Asymmetric Cryptography, Public Key, Private Key and the RSA Algorithm. Encryption has been...

/ February 9, 2017

Encryption and Symmetric Cryptography – How is data secured electronically?

Computers got popular mostly as a mode of storage and communication. And as the relevance of computers grew in everyday life there arose the need to secure stored data. Encryption is not the creation or function of the internet or of computers. Encryption...

/ February 8, 2017

What is digital fingerprint and hashing? And how is it generated?

To start with digital fingerprints or hashing you need to understand what is a fingerprint and what is digital (no kidding).   What is a fingerprint? Normally a fingerprint in biology and biometrics is the unique pattern of whorls and...

/ February 6, 2017

What is Phishing or Spoofing? Affixing legal liability through Indian Laws

Internet developed rapidly leaving little or no scope for its terminologies to develop. Most internet terms and phrases are English loanwords most analogous to the concept being described. Phishing as a concept is analogous to fishing where predators wait for unsuspecting...

/ February 4, 2017