Eduardo Sagrera

QR Code Fraud Explodes: Convenience Meets Compromise
QR Code Fraud Explodes: Convenience Meets Compromise Quick response (QR) codes have become ubiquitous — embedded on menus, payment terminals, advertisements, and…

Encrypted DNS vs. Enterprise Monitoring: Who Sees What, Exactly?
Encrypted DNS vs. Enterprise Monitoring: Who Sees What, Exactly? This article explains how encrypted DNS protocols (for example, DNS-over-HTTPS and DNS-over-TLS) change…

Laundering Through Gaming Ecosystems: Skins, Gold, and Gift Currencies
Laundering Through Gaming Ecosystems: Skins, Gold, and Gift Currencies Digital gaming ecosystems have developed sophisticated virtual economies that mirror, and sometimes intersect…

KYC by Algorithm: How Fintech Screens Synthetic and Stolen Identities
KYC by Algorithm: How Fintech Screens Synthetic and Stolen Identities Financial technology companies rely increasingly on automated identity verification and monitoring to…

Stablecoins Underground: Convenience, Controls, and Workarounds
Stablecoins Underground: Convenience, Controls, and Workarounds Stablecoins—cryptocurrencies designed to maintain a stable value relative to a fiat currency or other reference—have become…

Disposable Clouds: How Short-Lived Infrastructure Fuels Cybercrime
Disposable Clouds: How Short-Lived Infrastructure Fuels Cybercrime Cloud computing enables rapid provisioning and teardown of infrastructure. That capability is a productivity boon…

Snowflake, Meek, and Beyond: The State of Tor Censorship Circumvention
Snowflake, Meek, and Beyond: The State of Tor Censorship Circumvention Tor remains one of the most widely used tools for reaching the…

Browser Fingerprinting vs. Privacy Tools: Measuring Real-World Anonymity
Browser Fingerprinting vs. Privacy Tools: Measuring Real-World Anonymity Browser fingerprinting collects a variety of passive and active signals from a user’s browser…

Wallet Drainers as a Service: Inside the New Crypto Theft Economy
Wallet Drainers as a Service: Inside the New Crypto Theft Economy As crypto adoption grows, so does the sophistication of criminal activity…

Bridge Takedowns and Crypto Tracing: What Cross-Chain Forensics Really Sees
Bridge Takedowns and Crypto Tracing: What Cross-Chain Forensics Really Sees Cross-chain bridges connect distinct blockchains and enable asset flows between them. When…