Thursday, September 20, 2018

Wi-Fi security: How to stay safe while connected



Wireless security has two components: Authentication and secrecy. And, in theory, responsibility for network security lies with both operators and users.
  • Operators of Wi-Fi (or WLAN) access points should make sure that only those authorized can access the network and consume its resources. In more specific cases, an operator might want to know what each user does on the network and limit the number of devices they can access.
  • Users of Wi-Fi networks should also have the ability to authenticate it themselves, although they rarely do. When connecting to a network, you mostly have no guarantee you are connecting to the entity you think you are connecting to.
  • It’s important for both users and operators to have the ability to secure communications while they are traversing the air. Otherwise, anyone within reach of the signal would be able to eavesdrop on the connections and possibly inject data.
Ideally, all communications should at all times be encrypted. Due to what we consider a pretty serious design flaw, however, data sent between the router and your device is only encrypted if there is a password set. It’s important to note, though, that the password is not the key used to encrypt the data. Instead, a new key is negotiated for each user and session.

Authenticating Wi-Fi networks

It is theoretically possible to encrypt all data even without setting a password, but current Wi-Fi standards don’t have this ability (the newly released WPA3 standard does). As such, you should always set a password to your network, even if you later print the password on signs for everyone in the building to see.
Primarily, passwords are used for authentication (only users that know a password can log into the network). But, as everybody uses the same password there is little to prevent people from sharing it with outsiders and (non-authorized) friends. Some apps even make password sharing possible between a large number of strangers.
While far more complicated from an administration perspective, It is possible to create individual accounts with unique passwords for each authorized user or device. Additionally, this setup also makes it possible to track unique users around the building or network and eject them from the system.
It is also possible to use certificates to authenticate your connection to the correct router. These certificates, however, have to be verified through another secure channel and this feature is rarely used.

Wi-Fi standards and security

The standard known as Wi-Fi is defined under IEEE 802.11. It has been amended frequently to account for new bands, frequencies, and changes in technology (such as authentication and encryption).
Currently, there are two primary standards to secure Wi-Fi and encrypt connections: WEP and WPA.
WEP (Wired Equivalent Privacy, often also wrongly called Wireless Encryption Protocol), released in 1997, was, for a time, the only standard available. And, due to U.S. export controls, it was intentionally weak and insecure. As soon as the U.S. removed these restrictions, WEP was superseded by WPA and WPA2 (Wi-Fi Protected Access) in 2004.
WPA and WPA2 were released together, with WPA as an intermediate solution for hardware that couldn’t support WPA2. Since 2012, WPA is considered broken and defunct.

WPA3 is here, but it’s not ready

Specifications for WPA3 were announced in early 2018, but the standard is still not commonly available in software packages and hardware. WPA3 increases security and privacy, for example by encrypting all connections by default, and offers perfect forward secrecy.
WPA2 is increasingly considered broken, as demonstrated by the KRACK attacks or other techniques that allow anyone to obtain Wi-Fi passwords easily.

How to protect your Wi-Fi network

  • As the operator of a Wi-Fi access point, you should always use WPA2 as it is still the most robust standard.
  • Enable encryption on your network to make sure all your guests and users benefit from encrypted data while in transit between your router and their device.
  • Change the passwords to your router’s admin interface to make it difficult for anybody to mess with your network and install spyware and malware on it.
  • If you are worried about unauthorized access to your network, change passwords frequently and consider creating unique username and passwords for each user.
  • If you are worried about your guests doing nefarious things through your internet connection, consider installing a VPN on your router to avoid being blamed for the actions of your guests.
  • As the user of a Wi-Fi network, you should prefer encrypted connections over unencrypted ones. Use a browser extension with HTTPS Everywhere for greater end-to-end encryption.
  • Use a VPN for your phone or laptop to fully encrypt your data as it passes the airwaves, the Wi-Fi router, and the ISP.



Friday, September 14, 2018

WiFi Signal - Monitor and troubleshoot the quality of your Wi-Fi connection.




Description

Monitor and troubleshoot the quality of your Wi-Fi connection. 

WiFi Signal is a system menu bar application that provides easy access to your Wi-Fi connection details (name, channel, transmit rate, signal strength, noise, etc.), monitors the signal quality of your wireless network, and can find and recommend alternative channels for your network thus avoiding signal overlapping and channel conflicts that can result in connectivity issues and performance degradation.

FEATURES

• Simple, straightforward user interface 
• Fully customizable status icon display options
• Dark mode support
• Accurate dBm to percentage (%) conversion 
• Real-time graphs for signal strength and noise level, Signal-to-Noise Ratio (SNR), transmit rate, or MCS index (if supported)
• Signal quality ratings based on SNR measurements 
• Automatic channel recommendations*
• Notifications and event logging for common events, such as when the computer joins to or disconnects from a network, roams to a different access point, or when data rate or channel configuration changes are detected
• Comprehensive app's help describes how to use the tool the most effective way

Requires a Mac with built-in Wi-Fi. External Wi-Fi adapters are not supported.

For a more comprehensive analysis of the Wi-Fi environment consider WiFi Explorer, also available in the Mac App Store. 

* Due to limitations of the Wi-Fi scanning framework, channel recommendations are based solely on the detection of other Wi-Fi signals, and do not consider external sources of interference or hidden networks (i.e. networks that do not broadcast their SSIDs).

What's New


Version 4.0.7
• Fixes annotations integration with the latest version of WiFi Explorer and WiFi Explorer Pro.
• Updates vendors database.

If you find WiFi Signal useful and have a couple of minutes, please share your thoughts by leaving a review in the Mac App Store. It will make a huge difference to me!

Found a problem or have a concern? Please visit the WiFi Signal Support website and send me a message so we can resolve it.

Friday, September 7, 2018

WiFi Industry Is Gearing Up for Move to 802.11ax

WBA officials said the next-generation WiFi will bring improvements in performance, capacity and efficiency and will take on early 5G use cases.
At a time when the upcoming transition to 5G cellular networking is getting a lot of airtime, the Wireless Broadband Alliance is reminding businesses and consumers alike that the next generation of WiFi will bring with it vast improvements in performance and capacity and will be able to support many of the early use cases of 5G.
In a white paper titled “Enhanced Wi-Fi—802.11ax Decoded,” WBA officials outline the numerous new features that 802.11ax will bring with it to support not only the tens of millions of smartphones that currently rely on WiFi connectivity, but also to address the demands from emerging segments such as connected internet of things (IoT) devices and augmented and virtual reality.
“The Wi-Fi industry isn’t resting on its laurels,” the authors of white paper write. “It is not complacent about its ability to continue to help support the tsunami of mobile data. With 802.11ax (11ax), the Wi-Fi industry is introducing, not just the next generation of Wi-Fi, not just a set of increments in terms of better throughput and coverage that improve all existing deployments, but fundamentally new sets of capabilities which can be used by the industry to address a whole new set of opportunities.”

The use of WiFi connectivity continues to grow rapidly, according to the WBA. Almost 70 percent of smartphone data is carried over WiFi, and there are 8 million WiFi devices in use around the world, 3 billion of which were added over the past 12 months. In its annual report for 2017, the group said that almost 80 percent of survey respondents said they will deploy next-generation WiFi by 2020.
The group also expects that by 2021, there will be 3.5 devices and connections per capita, which is fueling the rapid growth—47 percent a year over the next five years—in mobile data traffic.
“This growth is coming from multiple different product categories with different key requirements; ranging from certain IoT use cases that require low data rates and low power consumption supported using small battery powered devices, through to Augmented Reality/Virtual Reality use cases that require extreme throughput and low latency,” the authors wrote in the report, which was released Sept. 5.
A report by MarketsandMarkets Research says that by 2022, the global WiFi market will grow to $15.6 billion, up from $5.96 billion last year.
The WBA is highlighting a range of new features that officials said will address challenges facing enterprises. The new features include multi-user MIMO (multiple input, multiple output) uplink and downlink to increase for enterprises and carrier networks as well as large public venues and buildings with multiple users by increasing channel capacity when supporting multiple devices at the same time.
Support for both 2.4GHz and 5GHz band frequencies will increase the spectrum that can be used and ensure compatibility with existing devices, and will provide support to the 6GHz band. Flexible channel sizes and resource units will mean operators will be able to offer greater IoT efficiency, including connections that use lower data rates for narrow dedicated channels, all of which will save power. In addition, with this feature, carriers will be able to support both broadband-based services and IoT on the same network. The Target Wake Time feature means IoT devices can sleep to reduce competition for network access and wake up when needed, saving battery life.
The WBA laid out a range of use cases for 802.11ax, including high-density networks, the transportation, retail and entertainment industries, enterprises, the industrial sector and smart cities.
The ability to deliver what WBA officials call 5G use cases is key, they said. Top telecommunications companies like AT&TVerizon, Sprint and T-Mobile are gearing up their networks for 5G, and systems and component makers are building out their portfolio of products that will support the next-generation cellular networks. But WBA officials say 802.11ax connectivity will arrive before 5G starts to gain significant traction, and the new WiFi technology will support requirements laid out for 5G in ITU for IMT-2020.
“However, being ‘5G-capable’ represents more than being able to meet a set of throughput and density requirements,” the WBA authors wrote. “Already we have seen Wi-Fi integrated into key 5G concepts such as ETSI’s [European Telecommunications Standards Institute’s] Multi-Access Edge Computing architecture.”
WBA officials said they expect the 802.11ax standard to be ratified in the fourth quarter of next year, though multiple group members will launch forward-compatible products before the ratification.
“With so many new capabilities being delivered in 11ax, it is expected that the ramp in deployments will mean that 11ax will lead 5G by several years,” they said in the report. “Moreover, the backwards compatibility guarantees mean that the existing device ecosystem can be seamlessly supported using the very latest equipment, not a characteristic available to 5G New Radio deployments.”
They noted that the GSM Association, a trade group for mobile network operators, is predicting that fewer than 15 percent of global mobile connections will use 5G technology by 2025, while more than 70 percent of the enterprise-class WiFi shipments by 2022 will use 802.11ax.
However, there are still some challenges. Analysts with Dell’Oro Group in June said that delays in 802.11ax products will slow the growth of the enterprise LAN market this year, though migrations from 802.11ac Wave 1 to Wave 2 will ramp up.
“Several manufacturers of enterprise-class products are postponing general availability of 802.11ax access points as they wait for more advanced chipsets and further development of the standard,” Trent Dell’Oro, business analyst at Dell’Oro, said in a statement.

via eweek

Thursday, June 21, 2018

New Gigacheck Wireless Analyzer Offers Smartphone App Connectivity to Test WiFi and Ethernet Connection Speeds

Press Release Summary:


Greenlee Textron Inc. announces GigaCheck in AirScout® line of wireless analyzers for testing Wi-Fi coverage and wired Ethernet connection. It measures signal to noise ratio, PHY rate and transmit/receive success rates on wireless networks using the industry standard Ookla® Speedtest®. The analyzer provides technicians with tools to validate connection speed on wireless and Ethernet networks and verify whether the customers receive the connection speeds they pay for and expect.

Original Press Release:

Greenlee Communications Launches AirScout GigaCheck

Easily Verify Network Connection Speeds with Greenlee® Communications AirScout® WiFi® Test System
AirScout® GigaCheck Tests WiFi and Ethernet Connection Speeds up to a full Gigabit
Vista, Calif., (June 19, 2018) — Greenlee Textron Inc., a Textron Inc. (NYSE: TXT) company, announces the addition of GigaCheck to its award-winning AirScout® line of wireless analyzers. Controlled via Smartphone app, GigaCheck tests Wi-Fi coverage as seen from the residential gateway and tests wired Ethernet connection upload and download speeds up to 1Gb in real-time.
“Today’s customer demands dependable, high-speed services and expects their service provider will deliver the speed they pay for. AirScout GigaCheck gives technicians the tools needed to quickly and easily validate connection speeds on both wireless and ethernet networks,” explains Oleg Fishel, Director of PLM for Greenlee Communications.
AirScout GigaCheck measures Signal to Noise Ratio, PHY Rate and transmit/receive success rates on wireless networks using the industry standard Ookla® Speedtest®. Upload/download and Ping tests are performed on both Ethernet and WiFi for real-time speed testing.
The AirScout unit connects to the wireless router in one-click and is controlled via a smartphone app. The simple connection and intuitive user interface of the app make it easy for technicians to verify customers are receiving the connection speeds they pay for and expect. Technicians define pass/fail thresholds based upon their SLA and can generate reports and save them in the Cloud for easy transference and transparency of test results.
BTR, Broadband Technology Report, awarded AirScout Enterprise the 2017 Diamond Technology Winner in Wi-Fi Solutions. For more information on the complete AirScout line, visit www.getairscout.com.
Greenlee, under its Greenlee Communications brand, develops Ethernet, Transport, C37.94, Fiber, DSL, Wi-Fi and Copper test solutions, tracing and locating equipment, and fiber/cable jet installation equipment. A broad product portfolio, coupled with solutions-branded Greenlee Utility®, HD Electric Company® and Sherman + Reilly®, creates a single source partner providing unmatched value to the communications and utility markets.
Greenlee Communications
The Greenlee Communications brand offers a complete line of innovative and industryleading test and measurement solutions for the communication service provider industry. Our expertise and innovative solutions address all stages of network deployment enabling the development, installation and maintenance of xDSL, fiber, cable and wireless networks. It is a leading brand of test and measurement solutions in the global communications industry with a long track record of delivering high quality innovative solutions enabling technicians to achieve their goals in a timely manner and with confidence.
Greenlee Textron Inc.
Greenlee Textron Inc. is known as a global leader in the professional tool category. The Rockford, Illinois-based company develops high quality innovative products distinguished by customer-driven design and differentiated by supply chain excellence. It also leverages its powerful brands such as Greenlee Communications and Greenlee Utility in the electrical, construction and maintenance markets worldwide. More information is available at www.greenlee.com.
About Textron Inc.
Textron Inc. is a multi-industry company that leverages its global network of aircraft, defense, industrial and finance businesses to provide customers with innovative solutions and services. Textron is known around the world for its powerful brands such as Bell, Cessna, Beechcraft, Hawker, Jacobsen, Kautex, Lycoming, E-Z-GO, Greenlee, Textron Off Road, Arctic Cat, Textron Systems, and TRU Simulation + Training. For more information, visit: www.textron.com.
Certain statements in this press release may describe strategies, goals, outlook or other non-historical matters; these forward-looking statements speak only as of the date on which they are made, and we undertake no obligation to update them. These statements are subject to known and unknown risks, uncertainties, and other factors that may cause our actual results to differ materially from those expressed or implied by such forward-looking statements.

Tuesday, May 29, 2018

Is Your Router Vulnerable to VPNFilter Malware?

Below is a list of routers vulnerable to VPNFilter, malware that can brick your device.
The Justice Department last week urged everyone with a small office home office (SOHO) or NAS device to reboot their gadgets immediately in order to thwart VPNFilter, a new strain of malware that can brick your router.
SecurityWatchThe FBI seized a domain used to send commands to the infected devices, but it can't hurt to reboot anyway.
As Symantec outlines, VPNFilter is "a multi-staged piece of malware." Stage 1 makes the connection, Stage 2 delivers the goods, and Stage 3 acts as plugins for Stage 2. "These include a packet sniffer for spying on traffic that is routed through the device, including theft of website credentials and monitoring of Modbus SCADA protocols. Another Stage 3 module allows Stage 2 to communicate using Tor."
VPNFilter "is unlike most other IoT threats because it is capable of maintaining a persistent presence on an infected device, even after a reboot," Symantec says.
Still, "rebooting will remove Stage 2 and any Stage 3 elements present on the device, [temporarily removing] the destructive component of VPNFilter. However, if infected, the continuing presence of Stage 1 means that Stages 2 and 3 can be reinstalled by the attackers."
Those who believe they're infected should do a hard reset, which restores factory settings. Look for a small reset button on your device, though this will wipe any credentials you have stored on the device.
Below is a list of routers Symantec identified as vulnerable to VPNFilter. MikroTik tells Symantec that VPNFilter likely proliferated via a bug in MikroTik RouterOS software, which it patched in March 2017. "Upgrading RouterOS software deletes VPNFilter, any other third-party files and patches the vulnerability," Symantec says.
  • Linksys E1200
  • Linksys E2500
  • Linksys WRVS4400N
  • Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
  • Netgear DGN2200
  • Netgear R6400
  • Netgear R7000
  • Netgear R8000
  • Netgear WNR1000
  • Netgear WNR2000
  • QNAP TS251
  • QNAP TS439 Pro
  • Other QNAP NAS devices running QTS software
  • TP-Link R600VPN
"No other vendors, including Cisco, have been observed as infected by VPNFilter, but our research continues," according to Cisco Talos, which first reported the bug.
To date, Cisco Talos estimates that at least 500,000 in at least 54 countries have been hit by VPNFilter.
The feds are pinning this attack on Fancy Bear, a hacking group also known as APT28 and Sofacy Group, among other monikers. The group is notorious for attacking governments across the world and stealing confidential files from the Democratic National Committee during the 2016 election.


via PCMag

Monday, March 19, 2018

NetComm Wireless says its new router will improve large-scale fleet tracking

The 4G LTE Cat 6 IIoT Router with Dual Band WiFi (NTC-400)
and the cloud-based remote device manager (RDM) platform

A new router launched today by NetComm Wireless will help improve speed and connectivity for the industrial internet of things (IIoT) – which it says will improve the reliability of large-scale fleet tracking.
The 4G LTE Cat 6 IIoT Router with Dual Band WiFi (NTC-400) and the cloud-based remote device manager (RDM) platform will also create high speed WiFi hotspots for vehicles and public transport, the company said.
Designed to connect and manage some of the most bandwidth intensive in-vehicle IIoT applications – also including surveillance and 4K/UHD digital displays – the NTC-400 series offers reliable data connectivity across more environments where fixed line applications are either unavailable or unsuitable.
The NTC-400’s dual band WiFi access point has carrier-grade remote management and support for multiple LTE bands including band 28 (700 MHz).
Launched in conjunction with the NTC-400 to lower the total cost of ownership, the RDM enables the secure upgrade of firmware and applications to individual, groups or large-scale fleets of devices.
It supports TR-069 and OMA LWM2M standards, and enables real time monitoring, analytics, comprehensive reporting on failed connections and tasks, profile updates and inventory reports.
The device also integrates into existing remote management platforms, and includes Gigabit Ethernet ports, a serial port, and a USB port for network flexibility.
It also features a robust metal enclosure and a wide temperature rating; and supports in-vehicle and tracking applications with integrated GPS that is compatible with all global systems.
NetComm Wireless chief operating officer Timo Brouwer says the NTC-400 Series is engineered to increase operational efficiencies.
"Our cloud based remote device management platform adds another level of efficiency with live visibility and smart network management at scale," he says.

Thursday, February 1, 2018

How Scammers Steal Your Computing Power to Mine Cryptocurrencies







Cryptojacking, an internet scam found on thousands of websites in which nefarious actors mine cryptocurrencies on computers without users’ permission, has been on the rise since the prices of bitcoin and many other cryptocurrencies began spiking last year. The con involves websites stealing computational power from a visitor’s computer to execute the algorithms that are involved in cryptocurrency mining, which requires significant amounts of energy.
While it’s most common in the sketchier corners of the internet, hackers have also been able to inject the cryptojacking software onto websites for Showtime and PolitiFact and on e-commerce platforms. Patrons of a Buenos Aires, Argentina, Starbucks branch discovered in December that its Wi-Fi service was covertly using their computers for mining, and last week disgruntled netizens complained on social media that YouTube ads were also stealing mining power. AdGuard estimates websites can earn up to $326,000 per month from cryptojacking based on traffic to popular websites found to have the mining software.

Cryptocurrencies are digital currencies that exist on a blockchain, an encrypted digital ledger that securely keeps track of the order of transactions between computers. Mining in general requires a computer to solve extremely complex mathematical puzzles in order to produce a piece of data, which serves as a unit of a given cryptocurrency. The mining process needs to be difficult and energy-intensive to make sure that these data sets are scarce enough to serve as a currency. If it were too easy to mine a bitcoin, then the coin would have no value. Cryptojackers are essentially stealing the energy that mining requires.
One of the most popular tools among cryptojackers is a JavaScript plugin called Coinhive, which mines Monero, a privacy-focused cryptocurrency launched in 2014. Although not as valuable as bitcoin, a single Monero is worth roughly $300. And it’s easy to mine on a personal computer, unlike bitcoin, whose mining process usually requires large server farms. A portion of the processing power that a computer allots to a website with the Coinhive plugin goes toward the mining process. The creators of the tool then get a 22 percent cut of the mined Monero.


Coinhive and other in-browser miners are often employed in a deceptive manner. AdGuard released data in December showing that four of the most popular streaming and video-conversion sites (Streamango, RapidVideo, Openload, and OnlineVideoConverter), which collectively receive about 992 million monthly visits, take users’ processing power for mining without informing them.
Cryptojackers are essentially stealing the energy that cryptomining requires.
To observe the effects of cryptojacking for myself, I went on publicwww.com, a search engine for source code, and found a list of websites that use Coinhive. Most of them appeared, based on their URLs, to feature either porn or pirated movies. I then visited five of the sites on separate Chrome windows at the same time, veering away from the NSFW content and toward websites for universities in Indonesia and Mexico. Only one site, the notorious Kiwi Farms forum, gave me the option to turn the miner on or off. Within 15 minutes, my laptop was hot to the touch, and the internal fan began whirring like a commercial airliner at takeoff. My cursor could no longer keep up with my finger’s trackpad movements, and the text that appeared on the screen was a good five words behind what I was typing on my keyboard. I opened the activity monitor, which showed a huge increase in processing:


Yet, returning my computer to its regular functions didn’t require any help from my anti-virus software or trips to the Genius Bar. Simply exiting out of the offending websites did the trick.
My experience with cryptojacking was more annoying than destructive. But this is not to condone the practice—it does rely on deceit and can cause crashes and make your computer vulnerable to other malicious codes. There are also more invasive forms of the scam, like miners disguised as legitimate Android apps that users unknowingly download. “This is a theft of power and time from people,” said Tarah Wheeler, a cybersecurity policy fellow at the New America Foundation. (New America is a partner with Slate and Arizona State University in Future Tense.)
However, the creators of Coinhive say they didn’t intend for it to be malicious. Their websiteadvises, “While it’s possible to run the miner without informing your users, we strongly advise against it. You know this. Long term goodwill of your users is much more important than any short term profits.”
I emailed the Coinhive team to ask if they knew whether anyone was using their miner legitimately, as all the coverage of their software I had seen had been in the context of the cryptojacking. They pointed me to a German image board called pr0gramm, which has been allowing users to access premium accounts with extra features in exchange for running the miner on a separate page. The team further claimed that some porn sites have been giving viewers the option to disable invasive pop-up ads by mining Monero. “Cryptomining in the browser is a very new concept and we (the web) still have to figure out how to use it properly. We have high hopes that a more ‘legitimate’ use of the miner will eventually prevail,” they wrote in the email.




At best, the outsourcing concept behind Coinhive could hold potential as a new way for websites to earn revenue. Users caught Pirate Bay, one of the most established internet hubs for sharing movies and other files, using Coinhive on some of its websites without prior notice in 2017. The site’s administrators explained in a blog post, “We really want to get rid of all the ads. But we also need enough money to keep the site running.”
While many weren’t pleased, some users actually seemed open to the idea of contributing spare processing power if it meant the end of pesky, and often crude, ads. Perhaps if Pirate Bay had presented cryptomining as a bargain beforehand, its users wouldn’t have been so irritated. As Wheeler, the cybersecurity policy fellow, said, “Cryptocurrency mining when you have the consent of the people that are visiting a site is like borrowing a cup of sugar from the neighbors. Cryptocurrency mining when you don’t have consent is like sneaking in and stealing the sugar.”
Almost everyone I conferred with about this monetization scheme mentioned SETI@home, a project at the University of California, Berkeley, that uses a radio telescope to listen for unnatural signals that could be evidence of extraterrestrial life. Whereas previous iterations of the project required a supercomputer to analyze all the data, researchers in 1999 released a software program to the general public that allowed people to donate their computers’ processing power while not in use. More than 4 million people have participated, and the collective effort of their idle computers has turbocharged the search. SETI represents what current efforts to outsource cryptomining could aspire to be. “[SETI] actually asked people if they could use the computers. … The research community has already found a way to do this with permission,” said Yvo Desmedt, professor of computer science at the University of Texas, Dallas.

However, there are many hurdles to jump before this vision can come to fruition. For the majority of people who are not familiar with the mechanics of plugins like Coinhive, the prospect of a website co-opting their computers to mine cryptocurrency may seem invasive. Bill Maurer, director of the Institute for Money, Technology and Financial Inclusion at the University of California, Irvine, said, “It depends on a pretty sophisticated consumer … you need to have a certain level of geekiness.”
And this revenue model also, of course, relies on the viability of cryptocurrencies, which have seen an overall slump in prices in 2018. Extreme volatility and high transaction costs have often precluded bitcoin owners from using it for purchasing—the online payment platform Stripe recently announced that it would no longer accept bitcoin as payment. The possibility of a large-scale hack or bubble burst bringing the whole currency system down may also prevent companies from implementing a cryptomining model. Nicole Becher, a fellow at New America’s Cybersecurity Initiative, surmised, “In the advertising world, you have to be able to sell this to a C-level [senior management] and say, ‘This is actually a new, viable to make money, so you can actually make payroll and actually become profitable.’ It’s all cool and nerdy, but at the end of the day, doesn’t it really come down to that?” 
One more thing
You depend on Slate for sharp, distinctive coverage of the latest developments in politics and culture. Now we need to ask for your support.

Our work is more urgent than ever and is reaching more readers—but online advertising revenues don’t fully cover our costs, and we don’t have print subscribers to help keep us afloat. So we need your help. If you think Slate’s work matters, become a Slate Plus member. You’ll get exclusive members-only content and a suite of great benefits—and you’ll help secure Slate’s future.