Ecoer Logo
VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS14.10%
Net Worth
0.364USD
STEEM
0.000STEEM
SBD
0.010SBD
Own SP
6.676SP

Detailed Balance

STEEM
balance
0.000STEEM
market_balance
0.000STEEM
savings_balance
0.000STEEM
reward_steem_balance
0.000STEEM
STEEM POWER
Own SP
6.676SP
Delegated Out
0.000SP
Delegation In
0.000SP
Effective Power
6.676SP
Reward SP (pending)
0.000SP
SBD
sbd_balance
0.010SBD
sbd_conversions
0.000SBD
sbd_market_balance
0.000SBD
savings_sbd_balance
0.000SBD
reward_sbd_balance
0.000SBD
{
  "balance": "0.000 STEEM",
  "savings_balance": "0.000 STEEM",
  "reward_steem_balance": "0.000 STEEM",
  "vesting_shares": "10871.275296 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "sbd_balance": "0.010 SBD",
  "savings_sbd_balance": "0.000 SBD",
  "reward_sbd_balance": "0.000 SBD",
  "conversions": []
}

Account Info

namekasek
id62618
rank182,526
reputation2233579533
created2016-08-14T11:05:33
recovery_accountsteem
proxyNone
post_count12
comment_count0
lifetime_vote_count0
witnesses_voted_for0
last_post2016-08-31T08:34:57
last_root_post2016-08-31T08:34:57
last_vote_time2016-08-31T08:40:36
proxied_vsf_votes0, 0, 0, 0
can_vote1
voting_power9,949
delayed_votes0
balance0.000 STEEM
savings_balance0.000 STEEM
sbd_balance0.010 SBD
savings_sbd_balance0.000 SBD
vesting_shares10871.275296 VESTS
delegated_vesting_shares0.000000 VESTS
received_vesting_shares0.000000 VESTS
reward_vesting_balance0.000000 VESTS
vesting_balance0.000 STEEM
vesting_withdraw_rate0.000000 VESTS
next_vesting_withdrawal1969-12-31T23:59:59
withdrawn0
to_withdraw0
withdraw_routes0
savings_withdraw_requests0
last_account_recovery1970-01-01T00:00:00
reset_accountnull
last_owner_update1970-01-01T00:00:00
last_account_update1970-01-01T00:00:00
minedNo
sbd_seconds0
sbd_last_interest_payment1970-01-01T00:00:00
savings_sbd_last_interest_payment1970-01-01T00:00:00
{
  "id": 62618,
  "name": "kasek",
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM85pocrhd9CPmfk9rJx9wYknuDVe9d95fNWAMZASybtJ3HxtoVM",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM5LFJr5xZbSEQheKPAGrwHAUz9X3ykVmQAezzSNErHRstzzgofA",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM73C5nZ8UxHL1QopUHnDwTvHaaxWUVXjpa75yQis3AuQBNSPjg6",
        1
      ]
    ]
  },
  "memo_key": "STM7STiR6DokH84G1pnMfiEVfb8QmueeiJygEGeMQjPpuKzxaLzXx",
  "json_metadata": "",
  "posting_json_metadata": "",
  "proxy": "",
  "last_owner_update": "1970-01-01T00:00:00",
  "last_account_update": "1970-01-01T00:00:00",
  "created": "2016-08-14T11:05:33",
  "mined": false,
  "recovery_account": "steem",
  "last_account_recovery": "1970-01-01T00:00:00",
  "reset_account": "null",
  "comment_count": 0,
  "lifetime_vote_count": 0,
  "post_count": 12,
  "can_vote": true,
  "voting_manabar": {
    "current_mana": 9949,
    "last_update_time": 1472632836
  },
  "downvote_manabar": {
    "current_mana": 0,
    "last_update_time": 1471172733
  },
  "voting_power": 9949,
  "balance": "0.000 STEEM",
  "savings_balance": "0.000 STEEM",
  "sbd_balance": "0.010 SBD",
  "sbd_seconds": "0",
  "sbd_seconds_last_update": "2016-11-06T13:32:33",
  "sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_sbd_balance": "0.000 SBD",
  "savings_sbd_seconds": "0",
  "savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
  "savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
  "savings_withdraw_requests": 0,
  "reward_sbd_balance": "0.000 SBD",
  "reward_steem_balance": "0.000 STEEM",
  "reward_vesting_balance": "0.000000 VESTS",
  "reward_vesting_steem": "0.000 STEEM",
  "vesting_shares": "10871.275296 VESTS",
  "delegated_vesting_shares": "0.000000 VESTS",
  "received_vesting_shares": "0.000000 VESTS",
  "vesting_withdraw_rate": "0.000000 VESTS",
  "next_vesting_withdrawal": "1969-12-31T23:59:59",
  "withdrawn": 0,
  "to_withdraw": 0,
  "withdraw_routes": 0,
  "curation_rewards": 0,
  "posting_rewards": 0,
  "proxied_vsf_votes": [
    0,
    0,
    0,
    0
  ],
  "witnesses_voted_for": 0,
  "last_post": "2016-08-31T08:34:57",
  "last_root_post": "2016-08-31T08:34:57",
  "last_vote_time": "2016-08-31T08:40:36",
  "post_bandwidth": 10000,
  "pending_claimed_accounts": 0,
  "vesting_balance": "0.000 STEEM",
  "reputation": 2233579533,
  "transfer_history": [],
  "market_history": [],
  "post_history": [],
  "vote_history": [],
  "other_history": [],
  "witness_votes": [],
  "tags_usage": [],
  "guest_bloggers": [],
  "rank": 182526
}

Withdraw Routes

IncomingOutgoing
Empty
Empty
{
  "incoming": [],
  "outgoing": []
}
From Date
To Date
2019/08/14 12:39:09
parent authorkasek
parent permlinkeffecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific
authorsteemitboard
permlinksteemitboard-notify-kasek-20190814t123908000z
title
bodyCongratulations @kasek! You received a personal award! <table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@kasek/birthday3.png</td><td>Happy Birthday! - You are on the Steem blockchain for 3 years!</td></tr></table> <sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@kasek) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=kasek)_</sub> ###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!
json metadata{"image":["https://steemitboard.com/img/notify.png"]}
Transaction InfoBlock #35545193/Trx d9e0f5fbdae8d836c21717e2b6ffe10a1c8d3952
View Raw JSON Data
{
  "trx_id": "d9e0f5fbdae8d836c21717e2b6ffe10a1c8d3952",
  "block": 35545193,
  "trx_in_block": 9,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2019-08-14T12:39:09",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
      "author": "steemitboard",
      "permlink": "steemitboard-notify-kasek-20190814t123908000z",
      "title": "",
      "body": "Congratulations @kasek! You received a personal award!\n\n<table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@kasek/birthday3.png</td><td>Happy Birthday! - You are on the Steem blockchain for 3 years!</td></tr></table>\n\n<sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@kasek) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=kasek)_</sub>\n\n\n###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!",
      "json_metadata": "{\"image\":[\"https://steemitboard.com/img/notify.png\"]}"
    }
  ]
}
kasekcustom json: follow
2017/08/25 10:51:36
required auths[]
required posting auths["kasek"]
idfollow
json["reblog",{"account":"kasek","author":"pagandance","permlink":"are-we-witnessing-a-global-attack-on-crypto"}]
Transaction InfoBlock #14881581/Trx 786279e2e205c5ea26b00eeb58397056b521d073
View Raw JSON Data
{
  "trx_id": "786279e2e205c5ea26b00eeb58397056b521d073",
  "block": 14881581,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-08-25T10:51:36",
  "op": [
    "custom_json",
    {
      "required_auths": [],
      "required_posting_auths": [
        "kasek"
      ],
      "id": "follow",
      "json": "[\"reblog\",{\"account\":\"kasek\",\"author\":\"pagandance\",\"permlink\":\"are-we-witnessing-a-global-attack-on-crypto\"}]"
    }
  ]
}
kasekcustom json: follow
2017/08/25 10:50:54
required auths[]
required posting auths["kasek"]
idfollow
json["reblog",{"account":"kasek","author":"generalbill","permlink":"bitcoin-is-com-ethereum-is-net"}]
Transaction InfoBlock #14881567/Trx 5d428540036d5139fce7119081905db6356d1af8
View Raw JSON Data
{
  "trx_id": "5d428540036d5139fce7119081905db6356d1af8",
  "block": 14881567,
  "trx_in_block": 10,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-08-25T10:50:54",
  "op": [
    "custom_json",
    {
      "required_auths": [],
      "required_posting_auths": [
        "kasek"
      ],
      "id": "follow",
      "json": "[\"reblog\",{\"account\":\"kasek\",\"author\":\"generalbill\",\"permlink\":\"bitcoin-is-com-ethereum-is-net\"}]"
    }
  ]
}
2017/07/08 11:16:00
parent authorkasek
parent permlinkjoao-pessoa-2015-internet-society-igf-ambassador-experience
authordigitalplayer
permlink20170708t105347674z
title
bodyWelcome and Thank You for being with us!! Following your Blog now
json metadata{"tags":["welcome"],"app":"digitalplayer"}
Transaction InfoBlock #13501657/Trx a1b8bb7ab571e6feef42d170f379c83f5342f86c
View Raw JSON Data
{
  "trx_id": "a1b8bb7ab571e6feef42d170f379c83f5342f86c",
  "block": 13501657,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2017-07-08T11:16:00",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "joao-pessoa-2015-internet-society-igf-ambassador-experience",
      "author": "digitalplayer",
      "permlink": "20170708t105347674z",
      "title": "",
      "body": "Welcome and Thank You for being with us!! Following your Blog now",
      "json_metadata": "{\"tags\":[\"welcome\"],\"app\":\"digitalplayer\"}"
    }
  ]
}
bitlandsent 0.010 SBD to @kasek- "Celebrate 101 followers:)"
2016/11/06 13:32:33
frombitland
tokasek
amount0.010 SBD
memoCelebrate 101 followers:)
Transaction InfoBlock #6487637/Trx 9d9c54df2eb4aa54374237681babd1f24f6fa2c4
View Raw JSON Data
{
  "trx_id": "9d9c54df2eb4aa54374237681babd1f24f6fa2c4",
  "block": 6487637,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-11-06T13:32:33",
  "op": [
    "transfer",
    {
      "from": "bitland",
      "to": "kasek",
      "amount": "0.010 SBD",
      "memo": "Celebrate 101 followers:)"
    }
  ]
}
2016/09/11 04:38:33
parent authorkasek
parent permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
authorlinkback-bot-v0
permlinkre-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-linkbacks
title
body<div> <p> This post has been linked to from another place on Steem. </p> <ul> <li> <a href="https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4"> Steemit Cookbook [August Week #4] </a> by <a href="https://steemit.com/@rubenalexander"> @rubenalexander </a> </li> </ul> <p> Learn more about <a href="https://steemit.com/steem/@ontofractal/steem-linkback-bot-v0-3-released"> linkback bot v0.3</a> </p> <p>Upvote if you want the bot to continue posting linkbacks for your posts. Flag if otherwise. Built by @ontofractal</p></div>
json metadata{}
Transaction InfoBlock #4867363/Trx b91bef2aff366e9bd9cffab1b87b81e3c97d3fe5
View Raw JSON Data
{
  "trx_id": "b91bef2aff366e9bd9cffab1b87b81e3c97d3fe5",
  "block": 4867363,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-09-11T04:38:33",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "author": "linkback-bot-v0",
      "permlink": "re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-linkbacks",
      "title": "",
      "body": "<div>  <p>  This post has been linked to from another place on Steem.  </p>  <ul>        <li>      <a href=\"https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4\"> Steemit Cookbook [August Week #4] </a>      by      <a href=\"https://steemit.com/@rubenalexander\">  @rubenalexander </a>     </li>      </ul>  <p> Learn more about  <a href=\"https://steemit.com/steem/@ontofractal/steem-linkback-bot-v0-3-released\">    linkback bot v0.3</a>   </p>   <p>Upvote if you want the bot to continue posting linkbacks for your posts. Flag if otherwise.   Built by @ontofractal</p></div>",
      "json_metadata": "{}"
    }
  ]
}
2016/08/31 08:40:36
voterkasek
authorkasek
permlinkeffecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific
weight10000 (100.00%)
Transaction InfoBlock #4556340/Trx 86c1e9e3aed900a52702a112ad7da3500172c17a
View Raw JSON Data
{
  "trx_id": "86c1e9e3aed900a52702a112ad7da3500172c17a",
  "block": 4556340,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-31T08:40:36",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "kasek",
      "permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
      "weight": 10000
    }
  ]
}
2016/08/31 08:40:12
parent author
parent permlinkcybersecurity
authorkasek
permlinkeffecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific
titleEffecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific
body@@ -179,18 +179,17 @@ economy -%0A%0A + is harme @@ -285,18 +285,17 @@ nstantly -%0A%0A + evolve, @@ -390,19 +390,17 @@ n engine -%0A%0Af + or econo @@ -484,18 +484,17 @@ is what -%0A%0A + United S @@ -580,18 +580,17 @@ d States -%0A%0A + Framewor @@ -656,16 +656,18 @@ y 2014. +%0A%0A This onl @@ -682,18 +682,17 @@ ghts the -%0A%0A + importan @@ -777,18 +777,17 @@ ectively -%0A%0A + addressi @@ -880,18 +880,17 @@ ion? How -%0A%0A + does is @@ -984,18 +984,17 @@ er risks -%0A%0A + with thi @@ -1088,18 +1088,17 @@ national -%0A%0A + presence @@ -1195,18 +1195,17 @@ er crime -%0A%0A + (Grabosk @@ -1295,18 +1295,17 @@ varying -%0A%0A + levels o @@ -1388,18 +1388,17 @@ becoming -%0A%0A + connecte @@ -1520,18 +1520,17 @@ t in the -%0A%0A + APAC reg @@ -1623,18 +1623,17 @@ ation of -%0A%0A + malware @@ -1721,18 +1721,17 @@ ernet is -%0A%0A + becoming @@ -1821,18 +1821,17 @@ ting, it -%0A%0A + has beco @@ -1995,18 +1995,17 @@ ic Cyber -%0A%0A + Emergenc @@ -2098,18 +2098,17 @@ those in -%0A%0A + the APAC @@ -2195,18 +2195,17 @@ urity as -%0A%0A + one of t @@ -2300,18 +2300,17 @@ isations -%0A%0A + is ASEAN @@ -2398,18 +2398,17 @@ in 2013 -%0A%0A + (ASEAN, @@ -2499,18 +2499,17 @@ he fight -%0A%0A + against @@ -2597,18 +2597,17 @@ ablished -%0A%0A + themselv @@ -2770,18 +2770,17 @@ obal and -%0A%0A + national @@ -2874,18 +2874,17 @@ users to -%0A%0A + protect @@ -2977,18 +2977,17 @@ icularly -%0A%0A + in the d @@ -3076,18 +3076,17 @@ C region -%0A%0A + with man @@ -3172,18 +3172,17 @@ e global -%0A%0A + challeng @@ -3273,18 +3273,17 @@ ng being -%0A%0A + introduc @@ -3441,18 +3441,17 @@ plomatic -%0A%0A + challeng @@ -3545,18 +3545,17 @@ rganised -%0A%0A + effort. @@ -3644,18 +3644,17 @@ ther and -%0A%0A + organise @@ -3821,18 +3821,17 @@ ries not -%0A%0A + having t @@ -3921,18 +3921,17 @@ tries as -%0A%0A + resource @@ -4024,18 +4024,17 @@ ons that -%0A%0A + work tow @@ -4127,18 +4127,17 @@ ifficult -%0A%0A + for law @@ -4224,18 +4224,17 @@ nd their -%0A%0A + own bord @@ -4323,18 +4323,17 @@ ountries -%0A%0A + make nec @@ -4426,18 +4426,17 @@ s. Also, -%0A%0A + cyber cr @@ -4528,18 +4528,17 @@ pan over -%0A%0A + differen @@ -4624,18 +4624,17 @@ rt would -%0A%0A + allow mo @@ -4718,18 +4718,17 @@ rwise be -%0A%0A + achieved @@ -4814,18 +4814,17 @@ nning an -%0A%0A + Internet @@ -4915,18 +4915,17 @@ ts would -%0A%0A + not have @@ -5013,18 +5013,17 @@ om these -%0A%0A + major be @@ -5216,18 +5216,17 @@ aided by -%0A%0A + taking a @@ -5319,18 +5319,17 @@ s, being -%0A%0A + part of
json metadata{"tags":["cybersecurity","internet","cybercrime","obama","pacific"],"links":["http://www.apcert.org/","http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf","http://www.microsoft.com/apac/news/PlayItSafe.aspx","http://www.pewresearch.org/fact-"],"image":["http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg"]}
Transaction InfoBlock #4556332/Trx 2239a71b2ad2331699f27d42217d584bcb3bb80a
View Raw JSON Data
{
  "trx_id": "2239a71b2ad2331699f27d42217d584bcb3bb80a",
  "block": 4556332,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-31T08:40:12",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cybersecurity",
      "author": "kasek",
      "permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
      "title": "Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific",
      "body": "@@ -179,18 +179,17 @@\n  economy\n-%0A%0A\n+ \n is harme\n@@ -285,18 +285,17 @@\n nstantly\n-%0A%0A\n+ \n evolve, \n@@ -390,19 +390,17 @@\n n engine\n-%0A%0Af\n+ \n or econo\n@@ -484,18 +484,17 @@\n  is what\n-%0A%0A\n+ \n United S\n@@ -580,18 +580,17 @@\n d States\n-%0A%0A\n+ \n Framewor\n@@ -656,16 +656,18 @@\n y 2014. \n+%0A%0A\n This onl\n@@ -682,18 +682,17 @@\n ghts the\n-%0A%0A\n+ \n importan\n@@ -777,18 +777,17 @@\n ectively\n-%0A%0A\n+ \n addressi\n@@ -880,18 +880,17 @@\n ion? How\n-%0A%0A\n+ \n does is \n@@ -984,18 +984,17 @@\n er risks\n-%0A%0A\n+ \n with thi\n@@ -1088,18 +1088,17 @@\n national\n-%0A%0A\n+ \n presence\n@@ -1195,18 +1195,17 @@\n er crime\n-%0A%0A\n+ \n (Grabosk\n@@ -1295,18 +1295,17 @@\n  varying\n-%0A%0A\n+ \n levels o\n@@ -1388,18 +1388,17 @@\n becoming\n-%0A%0A\n+ \n connecte\n@@ -1520,18 +1520,17 @@\n t in the\n-%0A%0A\n+ \n APAC reg\n@@ -1623,18 +1623,17 @@\n ation of\n-%0A%0A\n+ \n malware \n@@ -1721,18 +1721,17 @@\n ernet is\n-%0A%0A\n+ \n becoming\n@@ -1821,18 +1821,17 @@\n ting, it\n-%0A%0A\n+ \n has beco\n@@ -1995,18 +1995,17 @@\n ic Cyber\n-%0A%0A\n+ \n Emergenc\n@@ -2098,18 +2098,17 @@\n those in\n-%0A%0A\n+ \n the APAC\n@@ -2195,18 +2195,17 @@\n urity as\n-%0A%0A\n+ \n one of t\n@@ -2300,18 +2300,17 @@\n isations\n-%0A%0A\n+ \n is ASEAN\n@@ -2398,18 +2398,17 @@\n  in 2013\n-%0A%0A\n+ \n (ASEAN, \n@@ -2499,18 +2499,17 @@\n he fight\n-%0A%0A\n+ \n against \n@@ -2597,18 +2597,17 @@\n ablished\n-%0A%0A\n+ \n themselv\n@@ -2770,18 +2770,17 @@\n obal and\n-%0A%0A\n+ \n national\n@@ -2874,18 +2874,17 @@\n users to\n-%0A%0A\n+ \n protect \n@@ -2977,18 +2977,17 @@\n icularly\n-%0A%0A\n+ \n in the d\n@@ -3076,18 +3076,17 @@\n C region\n-%0A%0A\n+ \n with man\n@@ -3172,18 +3172,17 @@\n e global\n-%0A%0A\n+ \n challeng\n@@ -3273,18 +3273,17 @@\n ng being\n-%0A%0A\n+ \n introduc\n@@ -3441,18 +3441,17 @@\n plomatic\n-%0A%0A\n+ \n challeng\n@@ -3545,18 +3545,17 @@\n rganised\n-%0A%0A\n+ \n effort. \n@@ -3644,18 +3644,17 @@\n ther and\n-%0A%0A\n+ \n organise\n@@ -3821,18 +3821,17 @@\n ries not\n-%0A%0A\n+ \n having t\n@@ -3921,18 +3921,17 @@\n tries as\n-%0A%0A\n+ \n resource\n@@ -4024,18 +4024,17 @@\n ons that\n-%0A%0A\n+ \n work tow\n@@ -4127,18 +4127,17 @@\n ifficult\n-%0A%0A\n+ \n for law \n@@ -4224,18 +4224,17 @@\n nd their\n-%0A%0A\n+ \n own bord\n@@ -4323,18 +4323,17 @@\n ountries\n-%0A%0A\n+ \n make nec\n@@ -4426,18 +4426,17 @@\n s. Also,\n-%0A%0A\n+ \n cyber cr\n@@ -4528,18 +4528,17 @@\n pan over\n-%0A%0A\n+ \n differen\n@@ -4624,18 +4624,17 @@\n rt would\n-%0A%0A\n+ \n allow mo\n@@ -4718,18 +4718,17 @@\n rwise be\n-%0A%0A\n+ \n achieved\n@@ -4814,18 +4814,17 @@\n nning an\n-%0A%0A\n+ \n Internet\n@@ -4915,18 +4915,17 @@\n ts would\n-%0A%0A\n+ \n not have\n@@ -5013,18 +5013,17 @@\n om these\n-%0A%0A\n+ \n major be\n@@ -5216,18 +5216,17 @@\n aided by\n-%0A%0A\n+ \n taking a\n@@ -5319,18 +5319,17 @@\n s, being\n-%0A%0A\n+ \n part of \n",
      "json_metadata": "{\"tags\":[\"cybersecurity\",\"internet\",\"cybercrime\",\"obama\",\"pacific\"],\"links\":[\"http://www.apcert.org/\",\"http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf\",\"http://www.microsoft.com/apac/news/PlayItSafe.aspx\",\"http://www.pewresearch.org/fact-\"],\"image\":[\"http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg\"]}"
    }
  ]
}
2016/08/31 08:37:00
parent author
parent permlinkcybersecurity
authorkasek
permlinkeffecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific
titleEffecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific
body@@ -1,8 +1,98 @@ +http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg%0A%0A %E2%80%9COur cri
json metadata{"tags":["cybersecurity","internet","cybercrime","obama","pacific"],"links":["http://www.apcert.org/","http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf","http://www.microsoft.com/apac/news/PlayItSafe.aspx","http://www.pewresearch.org/fact-"],"image":["http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg"]}
Transaction InfoBlock #4556268/Trx bb6987a343d6986d3c0694741d7588440305cd43
View Raw JSON Data
{
  "trx_id": "bb6987a343d6986d3c0694741d7588440305cd43",
  "block": 4556268,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-31T08:37:00",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cybersecurity",
      "author": "kasek",
      "permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
      "title": "Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific",
      "body": "@@ -1,8 +1,98 @@\n+http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg%0A%0A\n %E2%80%9COur cri\n",
      "json_metadata": "{\"tags\":[\"cybersecurity\",\"internet\",\"cybercrime\",\"obama\",\"pacific\"],\"links\":[\"http://www.apcert.org/\",\"http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf\",\"http://www.microsoft.com/apac/news/PlayItSafe.aspx\",\"http://www.pewresearch.org/fact-\"],\"image\":[\"http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg\"]}"
    }
  ]
}
2016/08/31 08:34:57
parent author
parent permlinkcybersecurity
authorkasek
permlinkeffecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific
titleEffecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific
body“Our critical infrastructure continues to be at risk from threats in cyberspace, and our economy is harmed by the theft of our intellectual property. Although the threats are serious and they constantly evolve, I believe that if we address them effectively, we can ensure that the Internet remains an engine for economic growth and a platform for the free exchange of ideas” (Obama, 2014). This is what United States President Barack Obama had to say in a statement when launching the United States Framework for Improving Critical infrastructure Security in February 2014. This only highlights the importance of cyber security in our daily lives. But how would countries go about “effectively addressing” such issues of cyber security to improve their regional level of cyber risk reduction? How does is differ from national approaches? What are some of the benefits, and are there any further risks with this approach? These are some of the questions that arise. With cyberspace having an international presence, it is important to maintain collaboration between countries in their efforts against cyber crime (Grabosky, 2001). This is may be particular in regions such as the Asia Pacific (APAC) with varying levels of Internet penetration and an increasing number of users as more people are becoming connected (Petrazzini, Kibani, 1999). According to a study by Microsoft, the cost of cybersecurity breaches are the highest in the APAC region (Microsoft Asia Pacific News Center, 2014). This is particularly due to the propagation of malware and possibly the vulnerability of several economies within the region. As the Internet is becoming increasingly popular with the use of such services as social media and cloud computing, it has become a priority to have a regional effort to build cyber risk reduction. Currently the leading regional organisation in the Asia Pacific is APCERT (Asia Pacific Cyber Emergency team) which has been set up with the sole purpose of ensuring Internet security for those in the APAC region (ACPERT, 2014). Other regional organisations have also included cybersecurity as one of their priority areas in developing and protecting the region. An example of such an organisations is ASEAN (Association of South East Asian Nations) who launched cybersecurity cooperation in 2013 (ASEAN, 2013). International cybersecurity bodies have also made APAC a priority region in the fight against cyber risks. ICSPA, the International Cyber Security Protection Alliance have established themselves in the region to help in the fight within the region (ICSPA, 2014). The regional approach is not without it's challenges and risks, however. The same global and national challenges with cyber security are still faced. Such challenges the growing volume of users to protect as Internet adoption grows with the aid of mobile devices and social media usage, particularly in the developing world (Rainie & Pouhsta, 2014). This is a particular concern for the APAC region with many member states being developing countries. The region is also not immune to the global challenges of new vulnerabilities that may arise due to newer services such as cloud computing being introduced and the increasing sophistication of cyber attacks (Lipson, 2002). Apart from such technological challenges, the are also the organisational and diplomatic challenges to navigate, as is the case when garnering the required support for any regionally organised effort. However, history has shown that these challenges can be resolved in one way or another and organised efforts can be made in order to achieve a common goal within a region. But what are the benefits of taking a regional on reducing cyber risks? With all countries not having the same resources, having a regional effort against cybercrime can benefit all countries as resources can be shared within the joint effort. This can be seen in other regional organisations that work toward a common goal. Also, with different jurisdictions within the region, it makes it difficult for law enforcement to prosecute cybercrime offenders who often commit their crimes beyond their own borders (Broadhurst, 2006). Thus taking a regional approach can aid in having member countries make necessary legislative adjustments to ensure perpetrators are accountable for their actions. Also, cyber criminals often do not work in isolation but are members of cyber crime networks that span over different countries and even continents (Choo & Smith, 2008). Having a coordinated effort would allow monitoring and policing such groups to be done more effectively than would otherwise be achieved. An example is the arrest of over 700 members of a global pedophile network running an Internet chat room called “Kids, the Light of Our Lives” in 2007 (Choo & Smith ). Such arrests would not have been possible without a coordinated effort between the states involved. Apart from these major benefits, there are also benefits such as having a link to a global effort on reducing cyber risks. Hence, it can be seen that some of the challenges faced in reducing cyber risks can be aided by taking a regional approach against cyber crime. Although not without it's own set of challenges, being part of a regional effort can greatly improve a countries level of cyber risk reduction. References Asia Pacific Computer Emergency Response Team, Available from: http://www.apcert.org/ [9 November 2014] Broadhurst, R. 2006. Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management,29(3), 408-433. Choo, K. K. R., & Smith, R. G. 2008. Criminal exploitation of online systems by organised crime groups. Asian journal of criminology, 3(1), 37-59. Grabosky, P. 2001. The Global and Regional Cyber Crime Problem. Proceedings of the Asia Cyber Crime Summit, 22-42. International Cyber Security Protection Alliance 2014, Establishing the International Cyber Security Protection Alliance in Asia Pacific, Available from: http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf Petrazzini, B., & Kibati, M. 1999. The Internet in developing countries.Communications of the ACM, 42(6), 31-36. Lipson, H. F. 2002. Tracking and tracing cyber-attacks: Technical challenges and global policy issues (No. CMU/SEI-2002-SR-009). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST. Microsoft 2014, Cost of Cyber-Security Breeaches Highest in Asia Pacific. Available from: http://www.microsoft.com/apac/news/PlayItSafe.aspx [9 November 2014] Rainie & Poushta 2014, Emerging nations catching up to U.S. on technology adoption, especially mobile and social media use. Available from: http://www.pewresearch.org/fact- tank/2014/02/13/emerging-nations-catching-up-to-u-s-on-technology-adoption-especially-mobile-and- social-media-use/ [November 7 2014]
json metadata{"tags":["cybersecurity","internet","cybercrime","obama","pacific"],"links":["http://www.apcert.org/","http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf","http://www.microsoft.com/apac/news/PlayItSafe.aspx","http://www.pewresearch.org/fact-"]}
Transaction InfoBlock #4556227/Trx fcc8f266542be045ff94fd7b9110e5faa945e4c5
View Raw JSON Data
{
  "trx_id": "fcc8f266542be045ff94fd7b9110e5faa945e4c5",
  "block": 4556227,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-31T08:34:57",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cybersecurity",
      "author": "kasek",
      "permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
      "title": "Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific",
      "body": "“Our critical infrastructure continues to be at risk from threats in cyberspace, and our economy\n\nis harmed by the theft of our intellectual property. Although the threats are serious and they constantly\n\nevolve, I believe that if we address them effectively, we can ensure that the Internet remains an engine\n\nfor economic growth and a platform for the free exchange of ideas” (Obama, 2014). This is what\n\nUnited States President Barack Obama had to say in a statement when launching the United States\n\nFramework for Improving Critical infrastructure Security in February 2014. This only highlights the\n\nimportance of cyber security in our daily lives. But how would countries go about “effectively\n\naddressing” such issues of cyber security to improve their regional level of cyber risk reduction? How\n\ndoes is differ from national approaches? What are some of the benefits, and are there any further risks\n\nwith this approach? These are some of the questions that arise. With cyberspace having an international\n\npresence, it is important to maintain collaboration between countries in their efforts against cyber crime\n\n(Grabosky, 2001). This is may be particular in regions such as the Asia Pacific (APAC) with varying\n\nlevels of Internet penetration and an increasing number of users as more people are becoming\n\nconnected (Petrazzini, Kibani, 1999).\n\nAccording to a study by Microsoft, the cost of cybersecurity breaches are the highest in the\n\nAPAC region (Microsoft Asia Pacific News Center, 2014). This is particularly due to the propagation of\n\nmalware and possibly the vulnerability of several economies within the region. As the Internet is\n\nbecoming increasingly popular with the use of such services as social media and cloud computing, it\n\nhas become a priority to have a regional effort to build cyber risk reduction.\n\nCurrently the leading regional organisation in the Asia Pacific is APCERT (Asia Pacific Cyber\n\nEmergency team) which has been set up with the sole purpose of ensuring Internet security for those in\n\nthe APAC region (ACPERT, 2014). Other regional organisations have also included cybersecurity as\n\none of their priority areas in developing and protecting the region. An example of such an organisations\n\nis ASEAN (Association of South East Asian Nations) who launched cybersecurity cooperation in 2013\n\n(ASEAN, 2013). International cybersecurity bodies have also made APAC a priority region in the fight\n\nagainst cyber risks. ICSPA, the International Cyber Security Protection Alliance have established\n\nthemselves in the region to help in the fight within the region (ICSPA, 2014).\n\nThe regional approach is not without it's challenges and risks, however. The same global and\n\nnational challenges with cyber security are still faced. Such challenges the growing volume of users to\n\nprotect as Internet adoption grows with the aid of mobile devices and social media usage, particularly\n\nin the developing world (Rainie & Pouhsta, 2014). This is a particular concern for the APAC region\n\nwith many member states being developing countries. The region is also not immune to the global\n\nchallenges of new vulnerabilities that may arise due to newer services such as cloud computing being\n\nintroduced and the increasing sophistication of cyber attacks (Lipson, 2002).\n\nApart from such technological challenges, the are also the organisational and diplomatic\n\nchallenges to navigate, as is the case when garnering the required support for any regionally organised\n\neffort. However, history has shown that these challenges can be resolved in one way or another and\n\norganised efforts can be made in order to achieve a common goal within a region.\n\nBut what are the benefits of taking a regional on reducing cyber risks? With all countries not\n\nhaving the same resources, having a regional effort against cybercrime can benefit all countries as\n\nresources can be shared within the joint effort. This can be seen in other regional organisations that\n\nwork toward a common goal. Also, with different jurisdictions within the region, it makes it difficult\n\nfor law enforcement to prosecute cybercrime offenders who often commit their crimes beyond their\n\nown borders (Broadhurst, 2006). Thus taking a regional approach can aid in having member countries\n\nmake necessary legislative adjustments to ensure perpetrators are accountable for their actions. Also,\n\ncyber criminals often do not work in isolation but are members of cyber crime networks that span over\n\ndifferent countries and even continents (Choo & Smith, 2008). Having a coordinated effort would\n\nallow monitoring and policing such groups to be done more effectively than would otherwise be\n\nachieved. An example is the arrest of over 700 members of a global pedophile network running an\n\nInternet chat room called “Kids, the Light of Our Lives” in 2007 (Choo & Smith ). Such arrests would\n\nnot have been possible without a coordinated effort between the states involved. Apart from these\n\nmajor benefits, there are also benefits such as having a link to a global effort on reducing cyber risks.\n\nHence, it can be seen that some of the challenges faced in reducing cyber risks can be aided by\n\ntaking a regional approach against cyber crime. Although not without it's own set of challenges, being\n\npart of a regional effort can greatly improve a countries level of cyber risk reduction.\n\n\n\n\n\nReferences\n\nAsia Pacific Computer Emergency Response Team, Available from: http://www.apcert.org/ [9\n\nNovember 2014]\n\nBroadhurst, R. 2006. Developments in the global law enforcement of cyber-crime. Policing: An\n\nInternational Journal of Police Strategies & Management,29(3), 408-433.\n\nChoo, K. K. R., & Smith, R. G. 2008. Criminal exploitation of online systems by organised crime\n\ngroups. Asian journal of criminology, 3(1), 37-59.\n\nGrabosky, P. 2001. The Global and Regional Cyber Crime Problem. Proceedings of the Asia Cyber\n\nCrime Summit, 22-42.\n\nInternational Cyber Security Protection Alliance 2014, Establishing the International Cyber Security\n\nProtection Alliance in Asia Pacific, Available from:\n\nhttp://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf\n\nPetrazzini, B., & Kibati, M. 1999. The Internet in developing countries.Communications of the ACM,\n\n42(6), 31-36.\n\nLipson, H. F. 2002. Tracking and tracing cyber-attacks: Technical challenges and global policy issues\n\n(No. CMU/SEI-2002-SR-009). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE\n\nENGINEERING INST.\n\nMicrosoft 2014, Cost of Cyber-Security Breeaches Highest in Asia Pacific. Available from:\n\nhttp://www.microsoft.com/apac/news/PlayItSafe.aspx [9 November 2014]\n\nRainie & Poushta 2014, Emerging nations catching up to U.S. on technology adoption, especially\n\nmobile and social media use. Available from: http://www.pewresearch.org/fact-\ntank/2014/02/13/emerging-nations-catching-up-to-u-s-on-technology-adoption-especially-mobile-and-\nsocial-media-use/ [November 7 2014]",
      "json_metadata": "{\"tags\":[\"cybersecurity\",\"internet\",\"cybercrime\",\"obama\",\"pacific\"],\"links\":[\"http://www.apcert.org/\",\"http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf\",\"http://www.microsoft.com/apac/news/PlayItSafe.aspx\",\"http://www.pewresearch.org/fact-\"]}"
    }
  ]
}
2016/08/29 04:52:21
voterhelen.tan
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494353/Trx f81b433c5f1b8a07551c6eb96bbd6695a3925442
View Raw JSON Data
{
  "trx_id": "f81b433c5f1b8a07551c6eb96bbd6695a3925442",
  "block": 4494353,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:21",
  "op": [
    "vote",
    {
      "voter": "helen.tan",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:52:18
votermoon
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494352/Trx 46af0ac2433cf38210fcbd26b33315c8e0c45a7b
View Raw JSON Data
{
  "trx_id": "46af0ac2433cf38210fcbd26b33315c8e0c45a7b",
  "block": 4494352,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:18",
  "op": [
    "vote",
    {
      "voter": "moon",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:52:15
voterbunny
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494351/Trx 50ab9b42a8355058aadf21fd61bba0a112a2207c
View Raw JSON Data
{
  "trx_id": "50ab9b42a8355058aadf21fd61bba0a112a2207c",
  "block": 4494351,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:15",
  "op": [
    "vote",
    {
      "voter": "bunny",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:52:15
voterdaniel.pan
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494351/Trx 2bff7adf59f18c550c7563c3c763e08085a9021e
View Raw JSON Data
{
  "trx_id": "2bff7adf59f18c550c7563c3c763e08085a9021e",
  "block": 4494351,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:15",
  "op": [
    "vote",
    {
      "voter": "daniel.pan",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:52:12
voterboy
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494350/Trx 7b69e842434ee7880afcb87224fcee7f0c7dc279
View Raw JSON Data
{
  "trx_id": "7b69e842434ee7880afcb87224fcee7f0c7dc279",
  "block": 4494350,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:12",
  "op": [
    "vote",
    {
      "voter": "boy",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:52:09
voterhealthcare
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494349/Trx 3a459f58c07e8f101b81e081c374d4f0728f189f
View Raw JSON Data
{
  "trx_id": "3a459f58c07e8f101b81e081c374d4f0728f189f",
  "block": 4494349,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:09",
  "op": [
    "vote",
    {
      "voter": "healthcare",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:52:06
votermini
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494348/Trx 55864cca20e29751ff0d78adfa13137363cfd37d
View Raw JSON Data
{
  "trx_id": "55864cca20e29751ff0d78adfa13137363cfd37d",
  "block": 4494348,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:06",
  "op": [
    "vote",
    {
      "voter": "mini",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:52:06
voterbue
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494348/Trx 0cdf7538f374c0782ada8f229880de4879224dcb
View Raw JSON Data
{
  "trx_id": "0cdf7538f374c0782ada8f229880de4879224dcb",
  "block": 4494348,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:06",
  "op": [
    "vote",
    {
      "voter": "bue",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:52:03
voterbue-witness
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4494347/Trx 014ad23f807fddd43de720ac68d0c4778c39e632
View Raw JSON Data
{
  "trx_id": "014ad23f807fddd43de720ac68d0c4778c39e632",
  "block": 4494347,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:52:03",
  "op": [
    "vote",
    {
      "voter": "bue-witness",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/29 04:51:12
votertuck-fheman
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight100 (1.00%)
Transaction InfoBlock #4494330/Trx 84114e2d8965687a4f0618eb6f83a28e34e5f197
View Raw JSON Data
{
  "trx_id": "84114e2d8965687a4f0618eb6f83a28e34e5f197",
  "block": 4494330,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:51:12",
  "op": [
    "vote",
    {
      "voter": "tuck-fheman",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 100
    }
  ]
}
2016/08/29 04:50:27
parent authorkasek
parent permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
authortuck-fheman
permlinkre-kasek-re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160829t045015471z
title
bodyhttp://www.wsj.com/articles/an-internet-giveaway-to-the-u-n-1472421165
json metadata{"tags":["news"],"links":["http://www.wsj.com/articles/an-internet-giveaway-to-the-u-n-1472421165"]}
Transaction InfoBlock #4494315/Trx 4c23e8b1a0c5bddab9a106f7bf23298bc7931883
View Raw JSON Data
{
  "trx_id": "4c23e8b1a0c5bddab9a106f7bf23298bc7931883",
  "block": 4494315,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-29T04:50:27",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "author": "tuck-fheman",
      "permlink": "re-kasek-re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160829t045015471z",
      "title": "",
      "body": "http://www.wsj.com/articles/an-internet-giveaway-to-the-u-n-1472421165",
      "json_metadata": "{\"tags\":[\"news\"],\"links\":[\"http://www.wsj.com/articles/an-internet-giveaway-to-the-u-n-1472421165\"]}"
    }
  ]
}
2016/08/23 21:10:09
parent authorkasek
parent permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
authorrubenalexander
permlinkre-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-20160823t211000439z
title
body<center> <img src="http://i.imgur.com/1jjaNyi.png"><br>You’ve been added to the <a href="https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4">Steemit Cookbook Week #4</a> </center>
json metadata{"tags":["food"],"image":["http://i.imgur.com/1jjaNyi.png"],"links":["https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4"]}
Transaction InfoBlock #4342202/Trx 1b7036d42bfa056467bea9f10e15f9436124f07f
View Raw JSON Data
{
  "trx_id": "1b7036d42bfa056467bea9f10e15f9436124f07f",
  "block": 4342202,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T21:10:09",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "author": "rubenalexander",
      "permlink": "re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-20160823t211000439z",
      "title": "",
      "body": "<center>\n<img src=\"http://i.imgur.com/1jjaNyi.png\"><br>You’ve been added to the <a href=\"https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4\">Steemit Cookbook Week #4</a>\n</center>",
      "json_metadata": "{\"tags\":[\"food\"],\"image\":[\"http://i.imgur.com/1jjaNyi.png\"],\"links\":[\"https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4\"]}"
    }
  ]
}
2016/08/23 21:10:00
voterrubenalexander
authorkasek
permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
weight10000 (100.00%)
Transaction InfoBlock #4342199/Trx f4499c0f7aa78dae1c15ffb07036be01e479f579
View Raw JSON Data
{
  "trx_id": "f4499c0f7aa78dae1c15ffb07036be01e479f579",
  "block": 4342199,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T21:10:00",
  "op": [
    "vote",
    {
      "voter": "rubenalexander",
      "author": "kasek",
      "permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "weight": 10000
    }
  ]
}
2016/08/23 11:36:03
parent authorkasek
parent permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
authorjo-stonellord
permlinkre-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-20160823t113559889z
title
bodySIN
json metadata{"tags":["food"]}
Transaction InfoBlock #4330842/Trx 1e8c5793cc676a1c1f29d44cdd69b5261e8d6213
View Raw JSON Data
{
  "trx_id": "1e8c5793cc676a1c1f29d44cdd69b5261e8d6213",
  "block": 4330842,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T11:36:03",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "author": "jo-stonellord",
      "permlink": "re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-20160823t113559889z",
      "title": "",
      "body": "SIN",
      "json_metadata": "{\"tags\":[\"food\"]}"
    }
  ]
}
2016/08/23 11:35:39
voterjo-stonellord
authorkasek
permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
weight10000 (100.00%)
Transaction InfoBlock #4330834/Trx 0b574e977d659568fb8fa41c583442cd0291db40
View Raw JSON Data
{
  "trx_id": "0b574e977d659568fb8fa41c583442cd0291db40",
  "block": 4330834,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T11:35:39",
  "op": [
    "vote",
    {
      "voter": "jo-stonellord",
      "author": "kasek",
      "permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "weight": 10000
    }
  ]
}
kasekcustom json: follow
2016/08/23 11:14:24
required auths[]
required posting auths["kasek"]
idfollow
json{"follower":"kasek","following":"mibenkito","what":["blog"]}
Transaction InfoBlock #4330413/Trx abd90b2fca835478b96e14e93be33c1f326598c6
View Raw JSON Data
{
  "trx_id": "abd90b2fca835478b96e14e93be33c1f326598c6",
  "block": 4330413,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T11:14:24",
  "op": [
    "custom_json",
    {
      "required_auths": [],
      "required_posting_auths": [
        "kasek"
      ],
      "id": "follow",
      "json": "{\"follower\":\"kasek\",\"following\":\"mibenkito\",\"what\":[\"blog\"]}"
    }
  ]
}
2016/08/23 11:04:54
voterlee5
authorkasek
permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
weight10000 (100.00%)
Transaction InfoBlock #4330223/Trx 05a0ccc6b96f79f489097d9f8327697b339959f6
View Raw JSON Data
{
  "trx_id": "05a0ccc6b96f79f489097d9f8327697b339959f6",
  "block": 4330223,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T11:04:54",
  "op": [
    "vote",
    {
      "voter": "lee5",
      "author": "kasek",
      "permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "weight": 10000
    }
  ]
}
2016/08/23 10:58:36
voterkasek
authorbogartgaming
permlinkuuaph-you-are-god-s-masterpiece
weight10000 (100.00%)
Transaction InfoBlock #4330098/Trx 8309eb2eba1f5b51644c34346d533299b4dd255b
View Raw JSON Data
{
  "trx_id": "8309eb2eba1f5b51644c34346d533299b4dd255b",
  "block": 4330098,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T10:58:36",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "bogartgaming",
      "permlink": "uuaph-you-are-god-s-masterpiece",
      "weight": 10000
    }
  ]
}
2016/08/23 10:58:06
voterbitland
authorkasek
permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
weight10000 (100.00%)
Transaction InfoBlock #4330088/Trx 8fa1b55aeead612d29b2ac6c07e1d9e2a6e816e6
View Raw JSON Data
{
  "trx_id": "8fa1b55aeead612d29b2ac6c07e1d9e2a6e816e6",
  "block": 4330088,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T10:58:06",
  "op": [
    "vote",
    {
      "voter": "bitland",
      "author": "kasek",
      "permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "weight": 10000
    }
  ]
}
2016/08/23 10:57:21
voterkasek
authorkasek
permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
weight10000 (100.00%)
Transaction InfoBlock #4330073/Trx ba74aa45fca21f90d4d2c37117c8600a3282a04d
View Raw JSON Data
{
  "trx_id": "ba74aa45fca21f90d4d2c37117c8600a3282a04d",
  "block": 4330073,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T10:57:21",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "kasek",
      "permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "weight": 10000
    }
  ]
}
2016/08/23 10:57:15
voterviktorya86
authorkasek
permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
weight10000 (100.00%)
Transaction InfoBlock #4330071/Trx 2f74d5cb01a8fa4465a7b5cf4217de916592797c
View Raw JSON Data
{
  "trx_id": "2f74d5cb01a8fa4465a7b5cf4217de916592797c",
  "block": 4330071,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T10:57:15",
  "op": [
    "vote",
    {
      "voter": "viktorya86",
      "author": "kasek",
      "permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "weight": 10000
    }
  ]
}
2016/08/23 10:56:39
voterlandalar
authorkasek
permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
weight10000 (100.00%)
Transaction InfoBlock #4330059/Trx e019f85ec046d95bf15a7d384ec700550623176d
View Raw JSON Data
{
  "trx_id": "e019f85ec046d95bf15a7d384ec700550623176d",
  "block": 4330059,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T10:56:39",
  "op": [
    "vote",
    {
      "voter": "landalar",
      "author": "kasek",
      "permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "weight": 10000
    }
  ]
}
2016/08/23 10:56:00
parent author
parent permlinkfood
authorkasek
permlinkyou-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
titleYOU'RE STUPID IF YOU DON'T LIKE RIBS!... [All the best cuts]
bodyYes, I said it. You're stupid if you don't like ribs. So what? The stupid people aren't reading this post. The following are some of the best cuts and cooking methods of ribs from various animals we love. Starting with our most favourite of the bovine family, the cattle. Beef short ribs: Taken form the end of the rib cage of cattle, this does well grilled or slow cooked. http://www.slapyodaddybbq.com/wp-content/uploads/ShortRibs-3-585.jpg http://www.bonappetit.com/wp-content/uploads/2011/08/red-wine-braised-short-ribs-940x560.jpg Beef back ribs: Taken higher up from the short ribs, these are a favourite for the BBQ. They are also great for smoking. https://bullbbq.files.wordpress.com/2015/08/3beef-ribs-cooked-and-sauced.jpg http://www.smoking-meat.com/image-files/smoked-beef-back-ribs-1.jpg Beef bone-in ribeye: One of my favourite cuts of beef. This is taken from right at the top of the ribs, adjoining the spine. Single ribs are enjoyed as steaks whilst whole rib rack makes for an excellent roast. http://www.heartlandsteaks.com/wp-content/uploads/2015/10/butchers-choice-bonein-ribeye.jpg http://www.pastacheese.com/media/catalog/product/cache/1/image/9df78eab33525d08d6e5fb8d27136e95/N/Y/NYPM01230000_3.jpg Pork rib tips: These are an economy cut. Off the very end of a rack of ribs but very tasty indeed. Great when roasted with a rub or slow cooked in a stew. http://www.pigtrip.net/photos/BTSHR/BTSHR2-ribtip1-big.jpg http://www.simplecomfortfood.com/images/mexican-pork-ribs-salsa-verde.jpg Pork spare ribs: Taken from the mid-section of the ribs, these are a BBQ staple. Dry rub or smothered in sauce. http://www.swiftfreshpork.com/media/41369/Product%20-%20Dry%20Rubbed%20WBP%20St.%20Louis%20Ribs.jpg http://d1dd4ethwnlwo2.cloudfront.net/wp-content/uploads/2014/09/pork_ribs.jpg Pork baby back ribs: These are the part of the ribs on the back of a pig. Meatier and contain less fat. http://www.livelikeanj.com/wp-content/uploads/2015/07/Baby-back-ribs.jpg http://www.guyseat.com/images/315/view/Fall-Off-The-Bones-Oven-Baked-Pork-Back-Ribs.jpg Lamb spare ribs: The bone in lamb ribs are not as big as other livestock featured and the meat is more tender, often not needing to me slow cooked as much. Spare ribs are from the mid rib section. Great for grilling. http://www.annarbor.com/assets_c/2012/05/IMG_8700-thumb-590x416-112398.jpg https://s3-media4.fl.yelpcdn.com/bphoto/2gkFPK2uu87cK4B_yomjww/o.jpg Lamb cutlets: These would be the lamb equivalent of a beef ribeye steak. Very popular pan fried or grilled. http://www.nutworks.com.au/images/recipes/lamb%20cutlets.jpg http://d3lp4xedbqa8a5.cloudfront.net/s3/digital-cougar-assets/food/2014/11/28/WomansDayBR108834/fragrant-lamb-cutlets.jpg Lamb rack: The whole upper section of lamb ribs. Popular as a Sunday roast. It is almost a sin to cook it any other way. https://masterpurveyors.com/wp-content/uploads/2014/09/Lamb-Rack-Roast-Rack-of-Lamb-Final.jpg http://www.seriouseats.com/images/2014/12/20141210-crown-rack-lamb-vicky-wasik-9.jpg ENJOY!
json metadata{"tags":["food","photography","life","blog","meat"],"image":["http://www.slapyodaddybbq.com/wp-content/uploads/ShortRibs-3-585.jpg"]}
Transaction InfoBlock #4330046/Trx 041699c87c5fe30462786255f995d0099108cc4a
View Raw JSON Data
{
  "trx_id": "041699c87c5fe30462786255f995d0099108cc4a",
  "block": 4330046,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-23T10:56:00",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "food",
      "author": "kasek",
      "permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
      "title": "YOU'RE STUPID IF YOU DON'T LIKE RIBS!... [All the best cuts]",
      "body": "Yes, I said it. You're stupid if you don't like ribs. So what? The stupid people aren't reading this post. The following are some of the best cuts and cooking methods of ribs from various animals we love. Starting with our most favourite of the bovine family, the cattle.\n\n\nBeef short ribs: Taken form the end of the rib cage of cattle, this does well grilled  or slow cooked.\n\nhttp://www.slapyodaddybbq.com/wp-content/uploads/ShortRibs-3-585.jpg\n\nhttp://www.bonappetit.com/wp-content/uploads/2011/08/red-wine-braised-short-ribs-940x560.jpg\n\nBeef back ribs: Taken higher up from the short ribs, these are a favourite for the BBQ. They are also great for smoking.\n\nhttps://bullbbq.files.wordpress.com/2015/08/3beef-ribs-cooked-and-sauced.jpg\n\nhttp://www.smoking-meat.com/image-files/smoked-beef-back-ribs-1.jpg\n\nBeef bone-in ribeye: One of my favourite cuts of beef. This is taken from right at the top of the ribs, adjoining the spine. Single ribs are enjoyed as steaks whilst  whole rib rack makes for an excellent roast. \n\nhttp://www.heartlandsteaks.com/wp-content/uploads/2015/10/butchers-choice-bonein-ribeye.jpg\n\nhttp://www.pastacheese.com/media/catalog/product/cache/1/image/9df78eab33525d08d6e5fb8d27136e95/N/Y/NYPM01230000_3.jpg\n\nPork rib tips: These are an economy cut. Off the very end of a rack of ribs but very tasty indeed. Great when roasted with a rub or slow cooked in a stew.\n\nhttp://www.pigtrip.net/photos/BTSHR/BTSHR2-ribtip1-big.jpg\n\nhttp://www.simplecomfortfood.com/images/mexican-pork-ribs-salsa-verde.jpg\n\nPork spare ribs: Taken from the mid-section of the ribs, these are a BBQ staple. Dry rub or smothered in sauce.\n\nhttp://www.swiftfreshpork.com/media/41369/Product%20-%20Dry%20Rubbed%20WBP%20St.%20Louis%20Ribs.jpg\n\nhttp://d1dd4ethwnlwo2.cloudfront.net/wp-content/uploads/2014/09/pork_ribs.jpg\n\nPork baby back ribs:  These are the part of the ribs on the back of a pig. Meatier and contain less fat.\n\nhttp://www.livelikeanj.com/wp-content/uploads/2015/07/Baby-back-ribs.jpg\n\nhttp://www.guyseat.com/images/315/view/Fall-Off-The-Bones-Oven-Baked-Pork-Back-Ribs.jpg\n\nLamb spare ribs: The bone in lamb ribs are not as big as other livestock featured and the meat is more tender, often not needing to me slow cooked as much. Spare ribs are from the mid rib section. Great for grilling.\n\nhttp://www.annarbor.com/assets_c/2012/05/IMG_8700-thumb-590x416-112398.jpg\n\nhttps://s3-media4.fl.yelpcdn.com/bphoto/2gkFPK2uu87cK4B_yomjww/o.jpg\n\nLamb cutlets: These would be the lamb equivalent of a beef ribeye steak. Very popular pan fried or grilled.\n\nhttp://www.nutworks.com.au/images/recipes/lamb%20cutlets.jpg\n\nhttp://d3lp4xedbqa8a5.cloudfront.net/s3/digital-cougar-assets/food/2014/11/28/WomansDayBR108834/fragrant-lamb-cutlets.jpg\n\nLamb rack: The whole upper section of lamb ribs. Popular as a Sunday roast. It is almost a sin to cook it any other way.\n\nhttps://masterpurveyors.com/wp-content/uploads/2014/09/Lamb-Rack-Roast-Rack-of-Lamb-Final.jpg\n\nhttp://www.seriouseats.com/images/2014/12/20141210-crown-rack-lamb-vicky-wasik-9.jpg\n\nENJOY!",
      "json_metadata": "{\"tags\":[\"food\",\"photography\",\"life\",\"blog\",\"meat\"],\"image\":[\"http://www.slapyodaddybbq.com/wp-content/uploads/ShortRibs-3-585.jpg\"]}"
    }
  ]
}
2016/08/22 13:52:42
voterpazsion
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4305049/Trx 8aa2c81586321b19f9f5f4b7d47afc2433eed86f
View Raw JSON Data
{
  "trx_id": "8aa2c81586321b19f9f5f4b7d47afc2433eed86f",
  "block": 4305049,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-22T13:52:42",
  "op": [
    "vote",
    {
      "voter": "pazsion",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/21 17:53:36
voterproglobyte
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4281335/Trx 76f9dbe7cad6e0c7b928dcb2cd6079a4d95ec29b
View Raw JSON Data
{
  "trx_id": "76f9dbe7cad6e0c7b928dcb2cd6079a4d95ec29b",
  "block": 4281335,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T17:53:36",
  "op": [
    "vote",
    {
      "voter": "proglobyte",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 17:50:18
voterkurtbeil
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4281269/Trx c94b0e3e4def41f4528214a1f07d0ec94c21427c
View Raw JSON Data
{
  "trx_id": "c94b0e3e4def41f4528214a1f07d0ec94c21427c",
  "block": 4281269,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T17:50:18",
  "op": [
    "vote",
    {
      "voter": "kurtbeil",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 14:57:00
parent authorkasek
parent permlinkre-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t055742094z
authorsteemlinks
permlinkre-kasek-re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t145659798z
title
bodyi believe technology evolves everyday . thanks @kasek
json metadata{"tags":["ethereum"],"users":["kasek"]}
Transaction InfoBlock #4277835/Trx a90c33345028b52e03e03f76a44e134cd54e27dd
View Raw JSON Data
{
  "trx_id": "a90c33345028b52e03e03f76a44e134cd54e27dd",
  "block": 4277835,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T14:57:00",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t055742094z",
      "author": "steemlinks",
      "permlink": "re-kasek-re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t145659798z",
      "title": "",
      "body": "i believe technology evolves everyday . thanks @kasek",
      "json_metadata": "{\"tags\":[\"ethereum\"],\"users\":[\"kasek\"]}"
    }
  ]
}
2016/08/21 11:07:45
voterbitland
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4273317/Trx d95cafe3311d14eda90446c437030e7cdbc7c8dc
View Raw JSON Data
{
  "trx_id": "d95cafe3311d14eda90446c437030e7cdbc7c8dc",
  "block": 4273317,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T11:07:45",
  "op": [
    "vote",
    {
      "voter": "bitland",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 09:59:24
votercrystaljenn
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4271971/Trx 46b5061f79c671dbd58f9dc443eb4c74b31bf206
View Raw JSON Data
{
  "trx_id": "46b5061f79c671dbd58f9dc443eb4c74b31bf206",
  "block": 4271971,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:59:24",
  "op": [
    "vote",
    {
      "voter": "crystaljenn",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 09:34:27
votermastercore
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4271479/Trx 8d4695e40aa21921cf37cd1a218946bddde65ec2
View Raw JSON Data
{
  "trx_id": "8d4695e40aa21921cf37cd1a218946bddde65ec2",
  "block": 4271479,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:34:27",
  "op": [
    "vote",
    {
      "voter": "mastercore",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 09:26:39
voterdaycrypter
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4271323/Trx 84bbb4ce9233081569a02ca218b0f904a5901984
View Raw JSON Data
{
  "trx_id": "84bbb4ce9233081569a02ca218b0f904a5901984",
  "block": 4271323,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:26:39",
  "op": [
    "vote",
    {
      "voter": "daycrypter",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 09:24:15
voterkasek
authorurbanchick
permlinkthe-real-reason-why-everyone-comes-to-steemit
weight10000 (100.00%)
Transaction InfoBlock #4271277/Trx 450be912e66b4f6e91da0ea97b760ed39b163243
View Raw JSON Data
{
  "trx_id": "450be912e66b4f6e91da0ea97b760ed39b163243",
  "block": 4271277,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:24:15",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "urbanchick",
      "permlink": "the-real-reason-why-everyone-comes-to-steemit",
      "weight": 10000
    }
  ]
}
2016/08/21 09:20:51
voterkasek
authorsteemit777
permlinkthese-horses-are-so-beautiful-you-won-t-believe-they-re-real
weight10000 (100.00%)
Transaction InfoBlock #4271209/Trx 35a1640fe22d5a997e6c30506c1529175a233c4c
View Raw JSON Data
{
  "trx_id": "35a1640fe22d5a997e6c30506c1529175a233c4c",
  "block": 4271209,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:20:51",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "steemit777",
      "permlink": "these-horses-are-so-beautiful-you-won-t-believe-they-re-real",
      "weight": 10000
    }
  ]
}
2016/08/21 09:15:48
voterkasek
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4271109/Trx 303bed8c6b2732c30635e8e93c0d013b02d3096d
View Raw JSON Data
{
  "trx_id": "303bed8c6b2732c30635e8e93c0d013b02d3096d",
  "block": 4271109,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:15:48",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 09:15:15
voterostapenko
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4271098/Trx cfdb989fff7241aa909124c9a8d4c9903a59df6b
View Raw JSON Data
{
  "trx_id": "cfdb989fff7241aa909124c9a8d4c9903a59df6b",
  "block": 4271098,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:15:15",
  "op": [
    "vote",
    {
      "voter": "ostapenko",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 09:14:42
voterbofym
authorkasek
permlink10-most-ingenious-bacon-creations
weight10000 (100.00%)
Transaction InfoBlock #4271087/Trx 39caa2fe96c5b5d6c22ae85df01e3d5437e57957
View Raw JSON Data
{
  "trx_id": "39caa2fe96c5b5d6c22ae85df01e3d5437e57957",
  "block": 4271087,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:14:42",
  "op": [
    "vote",
    {
      "voter": "bofym",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "weight": 10000
    }
  ]
}
2016/08/21 09:14:27
parent author
parent permlinkfood
authorkasek
permlink10-most-ingenious-bacon-creations
title10 Most Ingenious Bacon Creations
bodyIn no particular order, these are the 10 most innovative ways of using our most beloved of cured meats. 1. Woven bacon taco shell http://dudefoods.com/wordpress/wp-content/uploads/2013/05/BaconWeaveTaco3111.jpg 2. Bacon covered onion rings https://s-media-cache-ak0.pinimg.com/564x/84/7f/49/847f49b2fd8438a8e0c6ac6181880d07.jpg 3. Bacon pancake dippers http://cdn.foodbeast.com/content/uploads/2014/03/bacon-pancake-dippers.jpg 4. Bacon s'mores http://weknowmemes.com/wp-content/uploads/2014/09/things-made-out-of-bacon.jpg 5. Bacon nachos http://www.cookingpassion.org/wp-content/uploads/2013/12/Bacon-Nachos.jpg 6. Bacon wrapped wings http://az810478.vo.msecnd.net/media/images/default-source/Recipes/bacon/bacon-wrapped-asian-chicken-wings.jpg?sfvrsn=6 7. Bacon ice cream https://upload.wikimedia.org/wikipedia/commons/3/3f/Nitro-Scrambled_Egg_and_Bacon_Ice_Cream.jpg 8. Bacon-wrapped grilled cheese https://img.buzzfeed.com/buzzfeed-static/static/2015-06/9/11/enhanced/webdr05/enhanced-4875-1433865112-1.jpg 9. Bacon cinnamon rolls http://rainydaygal.com/wp-content/uploads/2009/12/IMG_8900-800x533.jpg 10. Bacon-wrapped sushi http://www.foodista.com/sites/default/files/styles/featured/public/field/image/bacon-sushi-upload-1.jpg ENJOY!
json metadata{"tags":["food","life","bacon","meat","eat"],"image":["http://dudefoods.com/wordpress/wp-content/uploads/2013/05/BaconWeaveTaco3111.jpg"]}
Transaction InfoBlock #4271082/Trx 1754bd9a9c2cefa36459846dfb1034aaf0347690
View Raw JSON Data
{
  "trx_id": "1754bd9a9c2cefa36459846dfb1034aaf0347690",
  "block": 4271082,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T09:14:27",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "food",
      "author": "kasek",
      "permlink": "10-most-ingenious-bacon-creations",
      "title": "10 Most Ingenious Bacon Creations",
      "body": "In no particular order, these are the 10 most innovative ways of using our most beloved of cured meats.\n\n1. Woven bacon taco shell\n\nhttp://dudefoods.com/wordpress/wp-content/uploads/2013/05/BaconWeaveTaco3111.jpg\n\n2. Bacon covered onion rings\n\nhttps://s-media-cache-ak0.pinimg.com/564x/84/7f/49/847f49b2fd8438a8e0c6ac6181880d07.jpg\n\n3. Bacon pancake dippers\n\nhttp://cdn.foodbeast.com/content/uploads/2014/03/bacon-pancake-dippers.jpg\n\n4.  Bacon s'mores\n\nhttp://weknowmemes.com/wp-content/uploads/2014/09/things-made-out-of-bacon.jpg\n\n5. Bacon nachos\n\nhttp://www.cookingpassion.org/wp-content/uploads/2013/12/Bacon-Nachos.jpg\n\n6. Bacon wrapped wings\n\nhttp://az810478.vo.msecnd.net/media/images/default-source/Recipes/bacon/bacon-wrapped-asian-chicken-wings.jpg?sfvrsn=6\n\n7. Bacon ice cream\n\nhttps://upload.wikimedia.org/wikipedia/commons/3/3f/Nitro-Scrambled_Egg_and_Bacon_Ice_Cream.jpg\n\n8. Bacon-wrapped grilled cheese\n\nhttps://img.buzzfeed.com/buzzfeed-static/static/2015-06/9/11/enhanced/webdr05/enhanced-4875-1433865112-1.jpg\n\n9. Bacon cinnamon rolls\n\nhttp://rainydaygal.com/wp-content/uploads/2009/12/IMG_8900-800x533.jpg\n\n10. Bacon-wrapped sushi\n\nhttp://www.foodista.com/sites/default/files/styles/featured/public/field/image/bacon-sushi-upload-1.jpg\n\n\nENJOY!",
      "json_metadata": "{\"tags\":[\"food\",\"life\",\"bacon\",\"meat\",\"eat\"],\"image\":[\"http://dudefoods.com/wordpress/wp-content/uploads/2013/05/BaconWeaveTaco3111.jpg\"]}"
    }
  ]
}
2016/08/21 07:42:12
voterekitcho
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
weight10000 (100.00%)
Transaction InfoBlock #4269247/Trx 584f5716884d7ed2e882d1236c6fa89da0bfc71f
View Raw JSON Data
{
  "trx_id": "584f5716884d7ed2e882d1236c6fa89da0bfc71f",
  "block": 4269247,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T07:42:12",
  "op": [
    "vote",
    {
      "voter": "ekitcho",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "weight": 10000
    }
  ]
}
2016/08/21 07:24:54
parent authortuck-fheman
parent permlinkwhat-will-happen-to-steemit-once-a-global-entity-controls-icann
authorkasek
permlinkre-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z
title
bodyI would have to clarify a few facts. Firstly, the United states do not control ICANN and the control of ICANN is not going to any global body, and certainly not the UN. ICANN will remain independent. The only thing that will change is the IANA stewardship. IANA is a department within ICANN. Currently, in order to edit names and numbers on the root nodes, IANA has to go through NTIA, who come under the department of commerce and perform only a clerical role. All that will happen now is that ICANN will take over that role and makes ICANN more independent.
json metadata{"tags":["news"]}
Transaction InfoBlock #4268903/Trx d9e2f4f55949eb87ef53aebf837aa4954c736b32
View Raw JSON Data
{
  "trx_id": "d9e2f4f55949eb87ef53aebf837aa4954c736b32",
  "block": 4268903,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T07:24:54",
  "op": [
    "comment",
    {
      "parent_author": "tuck-fheman",
      "parent_permlink": "what-will-happen-to-steemit-once-a-global-entity-controls-icann",
      "author": "kasek",
      "permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
      "title": "",
      "body": "I would have to clarify a few facts. Firstly, the United states do not control ICANN  and the control of ICANN is not going to any global body, and certainly not the UN. ICANN will remain independent. The only thing that will change is the IANA stewardship. IANA is a department within ICANN. Currently, in order to edit names and numbers on the root nodes, IANA has to go through NTIA, who come under the department of commerce and perform only a clerical role. All that will happen now is that ICANN will take over that role and makes ICANN more independent.",
      "json_metadata": "{\"tags\":[\"news\"]}"
    }
  ]
}
2016/08/21 05:57:39
parent authorsteemlinks
parent permlinkcode-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post
authorkasek
permlinkre-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t055742094z
title
body"The way the Internet was supposed to work" is what they said of Ethereum. Well there are a few correlations in terms of code and how things developed in the early days. I look at how the Internet developed and meetings such as the IETF and IGF and how code is applied. Blockchain however seems to be - in many ways - carving out a path of its own in terms of code.
json metadata{"tags":["ethereum"]}
Transaction InfoBlock #4267166/Trx c91255f63f851d0bada2c8bfe30f97f413c35e62
View Raw JSON Data
{
  "trx_id": "c91255f63f851d0bada2c8bfe30f97f413c35e62",
  "block": 4267166,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T05:57:39",
  "op": [
    "comment",
    {
      "parent_author": "steemlinks",
      "parent_permlink": "code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post",
      "author": "kasek",
      "permlink": "re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t055742094z",
      "title": "",
      "body": "\"The way the Internet was supposed to work\" is what they said of Ethereum. Well there are a few correlations in terms of code and how things developed in the early days. I look at how the Internet developed and meetings such as the IETF and IGF and how code is applied. Blockchain however seems to be - in many ways - carving out a path of its own in terms of code.",
      "json_metadata": "{\"tags\":[\"ethereum\"]}"
    }
  ]
}
2016/08/21 05:51:24
voterkasek
authorsteemlinks
permlinkcode-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post
weight10000 (100.00%)
Transaction InfoBlock #4267042/Trx 64a00b04888353cfc8d30dd61eecee5d9ed74451
View Raw JSON Data
{
  "trx_id": "64a00b04888353cfc8d30dd61eecee5d9ed74451",
  "block": 4267042,
  "trx_in_block": 6,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T05:51:24",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "steemlinks",
      "permlink": "code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post",
      "weight": 10000
    }
  ]
}
2016/08/21 05:48:48
voterkasek
authorangelm
permlinkre-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z
weight10000 (100.00%)
Transaction InfoBlock #4266990/Trx 7d709299c7ceebbf0c69fb7fa20982c442be289d
View Raw JSON Data
{
  "trx_id": "7d709299c7ceebbf0c69fb7fa20982c442be289d",
  "block": 4266990,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-21T05:48:48",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "angelm",
      "permlink": "re-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z",
      "weight": 10000
    }
  ]
}
2016/08/20 17:24:27
voterangelm
authorkasek
permlinkre-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
weight10000 (100.00%)
Transaction InfoBlock #4252156/Trx fa086c401b0510cf21cd9da7d9ec3b608826dcd0
View Raw JSON Data
{
  "trx_id": "fa086c401b0510cf21cd9da7d9ec3b608826dcd0",
  "block": 4252156,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T17:24:27",
  "op": [
    "vote",
    {
      "voter": "angelm",
      "author": "kasek",
      "permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
      "weight": 10000
    }
  ]
}
2016/08/20 15:03:30
parent authorkasek
parent permlinkre-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
authorangelm
permlinkre-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z
title
bodyYes, and now I can't imagine doing anything else. The things women do and say make it the best business ever!
json metadata{"tags":["sex"]}
Transaction InfoBlock #4249345/Trx 5ee0b88ce7575bf9043a9e5cbd703cf6809ada5d
View Raw JSON Data
{
  "trx_id": "5ee0b88ce7575bf9043a9e5cbd703cf6809ada5d",
  "block": 4249345,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T15:03:30",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
      "author": "angelm",
      "permlink": "re-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z",
      "title": "",
      "body": "Yes, and now I can't imagine doing anything else.  The things women do and say make it the best business ever!",
      "json_metadata": "{\"tags\":[\"sex\"]}"
    }
  ]
}
2016/08/20 14:44:51
votermarkrmorrisjr
authorkasek
permlinkre-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
weight10000 (100.00%)
Transaction InfoBlock #4248973/Trx 47fb8dc097a945e3a8869442ffc19646b275ff0e
View Raw JSON Data
{
  "trx_id": "47fb8dc097a945e3a8869442ffc19646b275ff0e",
  "block": 4248973,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T14:44:51",
  "op": [
    "vote",
    {
      "voter": "markrmorrisjr",
      "author": "kasek",
      "permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
      "weight": 10000
    }
  ]
}
2016/08/20 06:47:57
voterproglobyte
authorkasek
permlinkun-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty
weight10000 (100.00%)
Transaction InfoBlock #4239480/Trx b7e6b18c23e10a98482789d9cfaedd85eba0b216
View Raw JSON Data
{
  "trx_id": "b7e6b18c23e10a98482789d9cfaedd85eba0b216",
  "block": 4239480,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T06:47:57",
  "op": [
    "vote",
    {
      "voter": "proglobyte",
      "author": "kasek",
      "permlink": "un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty",
      "weight": 10000
    }
  ]
}
2016/08/20 06:29:21
votersnowcrash
authorkasek
permlinkun-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty
weight10000 (100.00%)
Transaction InfoBlock #4239108/Trx c11c3f0e7ed169ac371e71e94f00b46081357838
View Raw JSON Data
{
  "trx_id": "c11c3f0e7ed169ac371e71e94f00b46081357838",
  "block": 4239108,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T06:29:21",
  "op": [
    "vote",
    {
      "voter": "snowcrash",
      "author": "kasek",
      "permlink": "un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty",
      "weight": 10000
    }
  ]
}
2016/08/20 06:11:51
voterkasek
authormxu111
permlinkasian-americans-bullied-at-schools
weight10000 (100.00%)
Transaction InfoBlock #4238762/Trx 32588b4c6c432d5e23ddd712026c7dcbf2238f80
View Raw JSON Data
{
  "trx_id": "32588b4c6c432d5e23ddd712026c7dcbf2238f80",
  "block": 4238762,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T06:11:51",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "mxu111",
      "permlink": "asian-americans-bullied-at-schools",
      "weight": 10000
    }
  ]
}
2016/08/20 06:11:06
voterkasek
authoringenesist
permlinkhow-blockchains-will-reorganize-society
weight10000 (100.00%)
Transaction InfoBlock #4238747/Trx c6c3c291b0dce961017e3781015b2422aa940332
View Raw JSON Data
{
  "trx_id": "c6c3c291b0dce961017e3781015b2422aa940332",
  "block": 4238747,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T06:11:06",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "ingenesist",
      "permlink": "how-blockchains-will-reorganize-society",
      "weight": 10000
    }
  ]
}
2016/08/20 06:10:24
voterkasek
authorkasek
permlinkre-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
weight10000 (100.00%)
Transaction InfoBlock #4238733/Trx b9ecb919ab441e63d72951f8917cec25e59b7b92
View Raw JSON Data
{
  "trx_id": "b9ecb919ab441e63d72951f8917cec25e59b7b92",
  "block": 4238733,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T06:10:24",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "kasek",
      "permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
      "weight": 10000
    }
  ]
}
2016/08/20 05:53:15
voterkasek
authorproglobyte
permlinkthe-great-steemit-debate-larken-rose-responds-to-my-response-to-which-i-respond
weight10000 (100.00%)
Transaction InfoBlock #4238394/Trx 913ff016cc9afdd938b7acafaa891b5e7fba27eb
View Raw JSON Data
{
  "trx_id": "913ff016cc9afdd938b7acafaa891b5e7fba27eb",
  "block": 4238394,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T05:53:15",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "proglobyte",
      "permlink": "the-great-steemit-debate-larken-rose-responds-to-my-response-to-which-i-respond",
      "weight": 10000
    }
  ]
}
2016/08/20 05:52:42
parent authorangelm
parent permlinkmy-life-as-a-dildo-slinger
authorkasek
permlinkre-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
title
bodyLOL. One of those things that make you look back and think how did I get here.
json metadata{"tags":["sex"]}
Transaction InfoBlock #4238383/Trx 416ba1eed514b9d90f50f06dcd9314cdac369cf1
View Raw JSON Data
{
  "trx_id": "416ba1eed514b9d90f50f06dcd9314cdac369cf1",
  "block": 4238383,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T05:52:42",
  "op": [
    "comment",
    {
      "parent_author": "angelm",
      "parent_permlink": "my-life-as-a-dildo-slinger",
      "author": "kasek",
      "permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
      "title": "",
      "body": "LOL. One of those things that make you look back and think how did I get here.",
      "json_metadata": "{\"tags\":[\"sex\"]}"
    }
  ]
}
2016/08/20 05:51:33
voterkasek
authorangelm
permlinkmy-life-as-a-dildo-slinger
weight10000 (100.00%)
Transaction InfoBlock #4238360/Trx 8de324a1c4d5867c592456ff33c850463e5a7ef2
View Raw JSON Data
{
  "trx_id": "8de324a1c4d5867c592456ff33c850463e5a7ef2",
  "block": 4238360,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T05:51:33",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "angelm",
      "permlink": "my-life-as-a-dildo-slinger",
      "weight": 10000
    }
  ]
}
2016/08/20 05:48:57
parent authorwaldemar-kuhn
parent permlinkstay-a-while-tomorrowland-edition-dimitri-vegas-and-like-mike
authorkasek
permlinkre-waldemar-kuhn-stay-a-while-tomorrowland-edition-dimitri-vegas-and-like-mike-20160820t054856275z
title
bodyVery nice indeed. One day I hope to go to Tomorrowland.
json metadata{"tags":["music"]}
Transaction InfoBlock #4238308/Trx 528e5fbb2948bd86636820a6e68687287279c63d
View Raw JSON Data
{
  "trx_id": "528e5fbb2948bd86636820a6e68687287279c63d",
  "block": 4238308,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T05:48:57",
  "op": [
    "comment",
    {
      "parent_author": "waldemar-kuhn",
      "parent_permlink": "stay-a-while-tomorrowland-edition-dimitri-vegas-and-like-mike",
      "author": "kasek",
      "permlink": "re-waldemar-kuhn-stay-a-while-tomorrowland-edition-dimitri-vegas-and-like-mike-20160820t054856275z",
      "title": "",
      "body": "Very nice indeed. One day I hope to go to Tomorrowland.",
      "json_metadata": "{\"tags\":[\"music\"]}"
    }
  ]
}
2016/08/20 05:48:12
voterkasek
authorlevycore
permlinkkalimaya-the-queen-of-gemstone
weight10000 (100.00%)
Transaction InfoBlock #4238293/Trx 7f5f0d8cacb9edfb27f21563d87b4423d00d7b54
View Raw JSON Data
{
  "trx_id": "7f5f0d8cacb9edfb27f21563d87b4423d00d7b54",
  "block": 4238293,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T05:48:12",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "levycore",
      "permlink": "kalimaya-the-queen-of-gemstone",
      "weight": 10000
    }
  ]
}
2016/08/20 05:44:06
voterkasek
authorkasek
permlinkun-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty
weight10000 (100.00%)
Transaction InfoBlock #4238212/Trx c68e6a68a54e5990fd640231afd1f42436739f7f
View Raw JSON Data
{
  "trx_id": "c68e6a68a54e5990fd640231afd1f42436739f7f",
  "block": 4238212,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T05:44:06",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "kasek",
      "permlink": "un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty",
      "weight": 10000
    }
  ]
}
2016/08/20 05:41:48
parent author
parent permlinkcybersecurity
authorkasek
permlinkun-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty
titleUN and Cybersecurity: The Likelihood and Implications of a Global Cyber Treaty
body<html> <p><em><strong>by Kasek Galgal</strong></em></p> <p>“<em>I think they are going to say I have committed grave crimes, I have violated the Espionage Act. They are going to say I have aided our enemies in making them aware of these systems. But this argument can be made against anyone who reveals information that points out mass surveillance systems</em>” (Snowden, 2014). That is what Edward Snowden had to say when being interviewed by Glenn Greenwald of The Guardian, stating also that U.S surveillance was not something he was willing to live under (Greenwald, et al, 2013).<br> Edward Snowden is an American IT professional who worked as a cyber security contractor for the United States' National Security Agency (NSA) as well as their Central Intelligence Agency (CIA) (Cole &amp; Brunker, 2014). During which time he had access to highly confidential information. Some of this information including that of the United States NSA having ongoing mass surveillance programs did not sit well with Snowden's views on privacy. Hence, in May 2013, he began revealing some of this information to renowned journalists; Glenn Greenwald, Laura Poitras and Barton Gellman (Cole &amp; Brunker, 2014). His revelations were met with varied reception. Some calling him a champion of Internet freedom, others labeling him as a traitor for leaking state secrets. But in the grand scheme of things, how does this affect the global agreements on such issues as cybersecurity, cybercrime, cyber espionage and sabotage? Does it affect the likelihood of a global cyber treaty? And what implications will this cyber treaty have on international relations, the privacy of citizens and on the world as a whole?<br> <img src="https://upload.wikimedia.org/wikipedia/commons/thumb/d/d8/United_Nations_Flags_-_cropped.jpg/640px-United_Nations_Flags_-_cropped.jpg" width="640" height="427"/></p> <p>In light of these recent developments, the International Telecommunications Union (ITU) (a member of the United Nations development group) Secretary General Dr. Hamadoun Touré had been quoted as saying that "It gives us an opportunity, and I keep saying let's build bridges" in an interview with Reuters (Miles, 2013). ITU is one of the world's respected organisations in terms of standards in ICT and its policing. Dr. Touré goes on to say that he had been calling for a cyber treaty for some time and that countries were reluctant to discuss the issue and would instead blame each other for attacks.<br> </p> <p>So what is this “opportunity” that Secretary General Touré was referring to? Well, as is the case with any form of espionage, mass surveillance and the like, no country wants to admit that they are involved in such activities. And cybercrime and espionage are no different. A constant game of denial and accusations ensues without fruitful discussion and without positive outcomes, as Dr. Touré explained (Miles, 2013). But now with the information being revealed by Snowden, it exposes the fact that the United States are involved in mass surveillance and are investing in activities that would constitute cybercrimes and that it is very likely that other countries are involved in similar activities. This puts everything in the open now and can allow for fruitful discussion on the issue as the facts state that politically motivated cybercrimes such as espionage is not a myth and positive outcomes such as a cyber treaty can be developed.<br> </p> <p>But what are the possibilities of a cyber treaty on cybercrime and cybersecurity? It is often stated that the cyber world is a mere reflection of the “real world”. Whether we like it or not, cyberspace is part of the real world as we know it. Thus, the crimes committed in cyberspace must be treated as real crime. “Traditional” espionage and sabotage have effects on a country's economic and political stability and the potential of sparking warfare. Thus there are treaties in place to prevent countries from spying and sabotaging. Cyber attacks and cyber espionage can also destabilise countries and have the same potential to create conflict. This begs the question whether or not efforts have &nbsp;been made to put in place such a treaty to prevent cybercrime and to ensure a level of cybersecurity for citizens. One may point to the Council of Europe Convention on Cybercrime as the leading international agreement on cybercrime and cybersecurity. But what impact has this convention had? And what implications has it had on current national and regional approaches to cybercrime and cybersecurity?</p> <p>After four years of work, the Council of Europe drafted the Convention on Cybercrime on the 8th of November 2001. Later that month, on November 23, 2001, what is now known as the Budapest convention was open for signing (Keyser, 2002). There are currently forty-four states that have signed and ratified the convention which looks to harmonise national cyber laws in order to make the task of policing cybercrime more efficient on an international level (Council of Europe, 2014). Under the convention, countries who ratify must legislate a minimum list of nine acts such as online fraud and child pornography as criminal offenses. The convention also looks to put in place procedures and mechanisms that enhance international cooperation in the fight against cybercrime. The convention has won particular praise for its ability to avoid conflict and to overcome jurisdictional obstacles when investigating cybercrime (Robel, 2006).<br> </p> <p>Being the first of its kind in terms of international treaties dealing with cybercrime, the Budapest convention gained support from the Council of Europe's member states. However, the convention was not without its critics and its potential pitfalls. A particular issue may not be with the convention itself but with its adoption (Weber, 2003). With only forty-four states having ratified the convention, it is not a universally adopted convention. This doesn't actually solve the issue of jurisdiction. This allows cyber criminals to conduct their operations without much fear of the law in countries that have yet to ratify the convention. Countries without effective cybercrime laws and lacking enforcement can potentially become havens for cyber criminals. With notable countries which pose a cyber risk such as China, Indonesia and South Korea having not signed the convention, it could have an adverse effect on the global fight against cybercrime. Robel (2006) illustrates how this treaty can be circumvented by attacking a country like the United States by going through several countries outside the convention and attacking U.S offshore operations in a country that is also outside the &nbsp;convention. Dr. Touré of the UN's ITU is also known to express his reservations on the convention. He was reported stating that the treaty is now somewhat outdated and having most of the contribution toward the convention being from European countries (Harley, 2010). There have been reservations expressed by countries about some aspects of the convention. One such example is Brazil's concerns over certain aspects relating to the criminalization of intellectual property infringements (Harley, 2010). This certainly doesn't help the cause for a global cyber treaty to be put in place but a lot can be learned from this pioneering piece of work. Improvements can be made and better treaties can be drafted.</p> <p><img src="https://upload.wikimedia.org/wikipedia/commons/thumb/a/a6/Anonymous_emblem.svg/480px-Anonymous_emblem.svg.png" width="480" height="480"/></p> <p>So the Council of Europe's Convention of Cybercrime may not be without its pitfalls as pointed out by numerous experts, but that does not mean there is no likelihood of a global cyber treaty. In relation to Dr. Touré's comments in a Reuters interview with regard to Snowden's revelations - “ It gives us an opportunity, and I keep saying let's build bridges” - as well as his reservation that the Budapest convention was drafted mostly by European states, I believe it is an opportunity for a larger global organisation such as his own ITU or the UN to take the lead with this proposed idea of a global cyber treaty. According to the same &nbsp;Reuters article that ITU are working closely with the UN Office on Drugs and Crime as well as with Interpol on how best to enforce laws in cyber space (Miles, 2013). Particularly after the UN had rejected a bid for an international cyber treaty back in 2010 (Ballard, 2010), I believe this is a step in the right direction. And the possibility of such a treaty may have just improved given the recent events and concerns raised.<br> </p> <p>As can be seen with other UN treaties such as their most ratified treaties in “The Vienna Convention and Montreal Protocols on Substances that Deplete the Ozone Layer” and the “United Nations Framework Convention on Climate Change” which have nearly Universal participation, it is possible for a the UN to garner more ratification for a treaty (United Nations Blog, 2012). So as stated earlier, one of the major issues in the pioneering work in the Council of Europe Convention on Cybercrime was the participation has managed to garner. More participation mean better harmonisation of national laws and better regional and global cooperation in policing cyber space.<br> </p> <p>In conclusion, the events surrounding the Snowden's revelations and the US NSA has made it clear that something has to be done about the growing issue of cyber security. Previous work done in the Budapest Convention have not been able to provide tangible results in alleviating the problem as we've seen. In support of what Dr. Touré's had to say, there needs to be a global cyber treaty put in place. And I believe the UN should be the ones to lead the way in this respect. It would have positive implications on regional and global efforts against cybercrime as the UN, from their record, would be better able to garner greater participation. Being a world-leading organisation, their treaties have more ratification and are adhered to better such as the widely adhered &nbsp;“United Nations Convention on the Law of the Sea”. Hence, the possibilities of having a global cyber treaty are improving, and if things keep going as they are, it may even be seen as a necessity. &nbsp;<br> </p> <p><br></p> <p>References<br> </p> <p>Ballard, M. 2010. <em>UN Rejects International Cybercrime Treaty </em>Available at: <a href="http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty">http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty</a> [19 December 2014]<br> Cole &amp; Brunker. 2014. <em>Edward Snowden: A Timeline. </em>Available at: <a href="http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871">http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871</a> [19 December 2014]<br> Council of Europe. 2014. <em>Convention on Cybercrime. </em>Available at: <a href="http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&amp;CM=&amp;DF=&amp;CL=ENG">http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&amp;CM=&amp;DF=&amp;CL=ENG</a> [18 December 2014]<br> Greenwald, Poitras &amp; McAskill. 2013. <em>Edward Snowden: US surveillance 'not something I'm willing to live under.' </em>Available from: <a href="http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview">http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview</a> [11 December 2014]<br> </p> <ol> <li>Harley, B. 2010 <em>A Global Convention on Cybercrime</em>? Available at: <a href="http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/">http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/</a> [20 December 2014].</li> </ol> <p>Keyser, M. 2002. Council of Europe Convention on Cybercrime, The. <em>J. Transnat'l L. &amp; Pol'y</em>, <em>12</em>, 287.<br> </p> <p>Miles, T. 2013 <em>Snowden affair is chance for truce in cyber war: U.N. </em>Available at:<a href="http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715">http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715</a> [14 December 2014]<br> Robel, D. 2006. International cybercrime treaty: Looking beyond ratification. <em>Sans Institute Reading Room</em>, <em>15</em>.<br> Staff Writer, United Nations Blog. 2012. <em>Most Ratified International Treaties</em>. Available at: http://blogs.un.org/blog/2012/09/24/most-ratified-international-treaties/#sthash.je4fFVxF.dp</p> <p><br></p> </html>
json metadata{"tags":["cybersecurity","un","life","snowden","unitednations"],"image":["https://upload.wikimedia.org/wikipedia/commons/thumb/d/d8/United_Nations_Flags_-_cropped.jpg/640px-United_Nations_Flags_-_cropped.jpg","https://upload.wikimedia.org/wikipedia/commons/thumb/a/a6/Anonymous_emblem.svg/480px-Anonymous_emblem.svg.png"],"links":["http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty","http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871","http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG","http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview","http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/","http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715","http://blogs.un.org/blog/2012/09/24/most-ratified-international-treaties/#sthash.je4fFVxF.dp"]}
Transaction InfoBlock #4238166/Trx 8585440d514ef90340b9e846517e35bffc2b4baa
View Raw JSON Data
{
  "trx_id": "8585440d514ef90340b9e846517e35bffc2b4baa",
  "block": 4238166,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T05:41:48",
  "op": [
    "comment",
    {
      "parent_author": "",
      "parent_permlink": "cybersecurity",
      "author": "kasek",
      "permlink": "un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty",
      "title": "UN and Cybersecurity: The Likelihood and Implications of a Global Cyber Treaty",
      "body": "<html>\n<p><em><strong>by Kasek Galgal</strong></em></p>\n<p>“<em>I think they are going to say I have committed grave crimes, I have violated the Espionage Act. They are going to say I have aided our enemies in making them aware of these systems. But this argument can be made against anyone who reveals information that points out mass surveillance systems</em>” (Snowden, 2014). That is what Edward Snowden had to say when being interviewed by Glenn Greenwald of The Guardian, stating also that U.S surveillance was not something he was willing to live under (Greenwald, et al, 2013).<br>\nEdward Snowden is an American IT professional who worked as a cyber security contractor for the United States' National Security Agency (NSA) as well as their Central Intelligence Agency (CIA) (Cole &amp; Brunker, 2014). During which time he had access to highly confidential information. Some of this information including that of the United States NSA having ongoing mass surveillance programs did not sit well with Snowden's views on privacy. Hence, in May 2013, he began revealing some of this information to renowned journalists; Glenn Greenwald, Laura Poitras and Barton Gellman (Cole &amp; Brunker, 2014). His revelations were met with varied reception. Some calling him a champion of Internet freedom, others labeling him as a traitor for leaking state secrets. But in the grand scheme of things, how does this affect the global agreements on such issues as cybersecurity, cybercrime, cyber espionage and sabotage? Does it affect the likelihood of a global cyber treaty? And what implications will this cyber treaty have on international relations, the privacy of citizens and on the world as a whole?<br>\n<img src=\"https://upload.wikimedia.org/wikipedia/commons/thumb/d/d8/United_Nations_Flags_-_cropped.jpg/640px-United_Nations_Flags_-_cropped.jpg\" width=\"640\" height=\"427\"/></p>\n<p>In light of these recent developments, the International Telecommunications Union (ITU) (a member of the United Nations development group) Secretary General Dr. Hamadoun Touré had been quoted as saying that \"It gives us an opportunity, and I keep saying let's build bridges\" in an interview with Reuters (Miles, 2013). ITU is one of the world's respected organisations in terms of standards in ICT and its policing. Dr. Touré goes on to say that he had been calling for a cyber treaty for some time and that countries were reluctant to discuss the issue and would instead blame each other for attacks.<br>\n</p>\n<p>So what is this “opportunity” that Secretary General Touré was referring to? Well, as is the case with any form of espionage, mass surveillance and the like, no country wants to admit that they are involved in such activities. And cybercrime and espionage are no different. A constant game of denial and accusations ensues without fruitful discussion and without positive outcomes, as Dr. Touré explained (Miles, 2013). But now with the information being revealed by Snowden, it exposes the fact that the United States are involved in mass surveillance and are investing in activities that would constitute cybercrimes and that it is very likely that other countries are involved in similar activities. This puts everything in the open now and can allow for fruitful discussion on the issue as the facts state that politically motivated cybercrimes such as espionage is not a myth and positive outcomes such as a cyber treaty can be developed.<br>\n</p>\n<p>But what are the possibilities of a cyber treaty on cybercrime and cybersecurity? It is often stated that the cyber world is a mere reflection of the “real world”. Whether we like it or not, cyberspace is part of the real world as we know it. Thus, the crimes committed in cyberspace must be treated as real crime. “Traditional” espionage and sabotage have effects on a country's economic and political stability and the potential of sparking warfare. Thus there are treaties in place to prevent countries from spying and sabotaging. Cyber attacks and cyber espionage can also destabilise countries and have the same potential to create conflict. This begs the question whether or not efforts have &nbsp;been made to put in place such a treaty to prevent cybercrime and to ensure a level of cybersecurity for citizens. One may point to the Council of Europe Convention on Cybercrime as the leading international agreement on cybercrime and cybersecurity. But what impact has this convention had? And what implications has it had on current national and regional approaches to cybercrime and cybersecurity?</p>\n<p>After four years of work, the Council of Europe drafted the Convention on Cybercrime on the 8th of November 2001. Later that month, on November 23, 2001, what is now known as the Budapest convention was open for signing (Keyser, 2002). There are currently forty-four states that have signed and ratified the convention which looks to harmonise national cyber laws in order to make the task of policing cybercrime more efficient on an international level (Council of Europe, 2014). Under the convention, countries who ratify must legislate a minimum list of nine acts such as online fraud and child pornography as criminal offenses. The convention also looks to put in place procedures and mechanisms that enhance international cooperation in the fight against cybercrime. The convention has won particular praise for its ability to avoid conflict and to overcome jurisdictional obstacles when investigating cybercrime (Robel, 2006).<br>\n</p>\n<p>Being the first of its kind in terms of international treaties dealing with cybercrime, the Budapest convention gained support from the Council of Europe's member states. However, the convention was not without its critics and its potential pitfalls. A particular issue may not be with the convention itself but with its adoption (Weber, 2003). With only forty-four states having ratified the convention, it is not a universally adopted convention. This doesn't actually solve the issue of jurisdiction. This allows cyber criminals to conduct their operations without much fear of the law in countries that have yet to ratify the convention. Countries without effective cybercrime laws and lacking enforcement can potentially become havens for cyber criminals. With notable countries which pose a cyber risk such as China, Indonesia and South Korea having not signed the convention, it could have an adverse effect on the global fight against cybercrime. Robel (2006) illustrates how this treaty can be circumvented by attacking a country like the United States by going through several countries outside the convention and attacking U.S offshore operations in a country that is also outside the &nbsp;convention. Dr. Touré of the UN's ITU is also known to express his reservations on the convention. He was reported stating that the treaty is now somewhat outdated and having most of the contribution toward the convention being from European countries (Harley, 2010). There have been reservations expressed by countries about some aspects of the convention. One such example is Brazil's concerns over certain aspects relating to the criminalization of intellectual property infringements (Harley, 2010). This certainly doesn't help the cause for a global cyber treaty to be put in place but a lot can be learned from this pioneering piece of work. Improvements can be made and better treaties can be drafted.</p>\n<p><img src=\"https://upload.wikimedia.org/wikipedia/commons/thumb/a/a6/Anonymous_emblem.svg/480px-Anonymous_emblem.svg.png\" width=\"480\" height=\"480\"/></p>\n<p>So the Council of Europe's Convention of Cybercrime may not be without its pitfalls as pointed out by numerous experts, but that does not mean there is no likelihood of a global cyber treaty. In relation to Dr. Touré's comments in a Reuters interview with regard to Snowden's revelations - “ It gives us an opportunity, and I keep saying let's build bridges” - as well as his reservation that the Budapest convention was drafted mostly by European states, I believe it is an opportunity for a larger global organisation such as his own ITU or the UN to take the lead with this proposed idea of a global cyber treaty. According to the same &nbsp;Reuters article that ITU are working closely with the UN Office on Drugs and Crime as well as with Interpol on how best to enforce laws in cyber space (Miles, 2013). Particularly after the UN had rejected a bid for an international cyber treaty back in 2010 (Ballard, 2010), I believe this is a step in the right direction. And the possibility of such a treaty may have just improved given the recent events and concerns raised.<br>\n</p>\n<p>As can be seen with other UN treaties such as their most ratified treaties in “The Vienna Convention and Montreal Protocols on Substances that Deplete the Ozone Layer” and the “United Nations Framework Convention on Climate Change” which have nearly Universal participation, it is possible for a the UN to garner more ratification for a treaty (United Nations Blog, 2012). So as stated earlier, one of the major issues in the pioneering work in the Council of Europe Convention on Cybercrime was the participation has managed to garner. More participation mean better harmonisation of national laws and better regional and global cooperation in policing cyber space.<br>\n</p>\n<p>In conclusion, the events surrounding the Snowden's revelations and the US NSA has made it clear that something has to be done about the growing issue of cyber security. Previous work done in the Budapest Convention have not been able to provide tangible results in alleviating the problem as we've seen. In support of what Dr. Touré's had to say, there needs to be a global cyber treaty put in place. And I believe the UN should be the ones to lead the way in this respect. It would have positive implications on regional and global efforts against cybercrime as the UN, from their record, would be better able to garner greater participation. Being a world-leading organisation, their treaties have more ratification and are adhered to better such as the widely adhered &nbsp;“United Nations Convention on the Law of the Sea”. Hence, the possibilities of having a global cyber treaty are improving, and if things keep going as they are, it may even be seen as a necessity. &nbsp;<br>\n</p>\n<p><br></p>\n<p>References<br>\n</p>\n<p>Ballard, M. 2010. <em>UN Rejects International Cybercrime Treaty </em>Available at: <a href=\"http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty\">http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty</a> [19 December 2014]<br>\nCole &amp; Brunker. 2014. <em>Edward Snowden: A Timeline. </em>Available at: <a href=\"http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871\">http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871</a> [19 December 2014]<br>\nCouncil of Europe. 2014. <em>Convention on Cybercrime. </em>Available at: <a href=\"http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&amp;CM=&amp;DF=&amp;CL=ENG\">http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&amp;CM=&amp;DF=&amp;CL=ENG</a> [18 December 2014]<br>\nGreenwald, Poitras &amp; McAskill. 2013. <em>Edward Snowden: US surveillance 'not something I'm willing to live under.' </em>Available from: <a href=\"http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview\">http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview</a> [11 December 2014]<br>\n</p>\n<ol>\n  <li>Harley, B. 2010 <em>A Global Convention on Cybercrime</em>? Available at: <a href=\"http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/\">http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/</a> [20 December 2014].</li>\n</ol>\n<p>Keyser, M. 2002. Council of Europe Convention on Cybercrime, The. <em>J. Transnat'l L. &amp; Pol'y</em>, <em>12</em>, 287.<br>\n</p>\n<p>Miles, T. 2013 <em>Snowden affair is chance for truce in cyber war: U.N. </em>Available at:<a href=\"http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715\">http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715</a> [14 December 2014]<br>\nRobel, D. 2006. International cybercrime treaty: Looking beyond ratification. <em>Sans Institute Reading Room</em>, <em>15</em>.<br>\nStaff Writer, United Nations Blog. 2012. <em>Most Ratified International Treaties</em>. Available at: http://blogs.un.org/blog/2012/09/24/most-ratified-international-treaties/#sthash.je4fFVxF.dp</p>\n<p><br></p>\n</html>",
      "json_metadata": "{\"tags\":[\"cybersecurity\",\"un\",\"life\",\"snowden\",\"unitednations\"],\"image\":[\"https://upload.wikimedia.org/wikipedia/commons/thumb/d/d8/United_Nations_Flags_-_cropped.jpg/640px-United_Nations_Flags_-_cropped.jpg\",\"https://upload.wikimedia.org/wikipedia/commons/thumb/a/a6/Anonymous_emblem.svg/480px-Anonymous_emblem.svg.png\"],\"links\":[\"http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty\",\"http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871\",\"http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG\",\"http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview\",\"http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/\",\"http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715\",\"http://blogs.un.org/blog/2012/09/24/most-ratified-international-treaties/#sthash.je4fFVxF.dp\"]}"
    }
  ]
}
kasekcustom json: follow
2016/08/20 05:10:51
required auths[]
required posting auths["kasek"]
idfollow
json{"follower":"kasek","following":"rook","what":["blog"]}
Transaction InfoBlock #4237551/Trx b8ea45726888ff3a6d634a7292a4bbaa1bddc3c9
View Raw JSON Data
{
  "trx_id": "b8ea45726888ff3a6d634a7292a4bbaa1bddc3c9",
  "block": 4237551,
  "trx_in_block": 1,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-20T05:10:51",
  "op": [
    "custom_json",
    {
      "required_auths": [],
      "required_posting_auths": [
        "kasek"
      ],
      "id": "follow",
      "json": "{\"follower\":\"kasek\",\"following\":\"rook\",\"what\":[\"blog\"]}"
    }
  ]
}
2016/08/15 15:14:54
parent authorkasek
parent permlinkre-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t110450403z
authorgardenofeden
permlinkre-kasek-re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t151455199z
title
bodyModern society reflects a set of values that we don't agree with, so we don't comply and instead lead by example.
json metadata{"tags":["homelessness"]}
Transaction InfoBlock #4106603/Trx b7f664a61b5e0384e680e27edf6184d16ff8f2d0
View Raw JSON Data
{
  "trx_id": "b7f664a61b5e0384e680e27edf6184d16ff8f2d0",
  "block": 4106603,
  "trx_in_block": 4,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-15T15:14:54",
  "op": [
    "comment",
    {
      "parent_author": "kasek",
      "parent_permlink": "re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t110450403z",
      "author": "gardenofeden",
      "permlink": "re-kasek-re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t151455199z",
      "title": "",
      "body": "Modern society reflects a set of values that we don't agree with, so we don't comply and instead lead by example.",
      "json_metadata": "{\"tags\":[\"homelessness\"]}"
    }
  ]
}
2016/08/15 11:08:36
parent authorsanosakis
parent permlink9-foods-which-do-the-most-damage-to-the-earth
authorkasek
permlinkre-sanosakis-9-foods-which-do-the-most-damage-to-the-earth-20160815t110835676z
title
bodyIt is a tough one. You need to feed the masses somehow and yet, sustainability is crucial. Better technology or better habits from people is the key I guess.
json metadata{"tags":["life"]}
Transaction InfoBlock #4101734/Trx bbacbe45b917c3502460aeb7974c5753c9365334
View Raw JSON Data
{
  "trx_id": "bbacbe45b917c3502460aeb7974c5753c9365334",
  "block": 4101734,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-15T11:08:36",
  "op": [
    "comment",
    {
      "parent_author": "sanosakis",
      "parent_permlink": "9-foods-which-do-the-most-damage-to-the-earth",
      "author": "kasek",
      "permlink": "re-sanosakis-9-foods-which-do-the-most-damage-to-the-earth-20160815t110835676z",
      "title": "",
      "body": "It is a tough one. You need to feed the masses somehow and yet, sustainability is crucial. Better technology or better habits from people is the key I guess.",
      "json_metadata": "{\"tags\":[\"life\"]}"
    }
  ]
}
2016/08/15 11:06:24
voterkasek
authorsanosakis
permlink9-foods-which-do-the-most-damage-to-the-earth
weight10000 (100.00%)
Transaction InfoBlock #4101690/Trx 1fa1757b21373324a5dca9c01f1f1cdb9c5a23ba
View Raw JSON Data
{
  "trx_id": "1fa1757b21373324a5dca9c01f1f1cdb9c5a23ba",
  "block": 4101690,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-15T11:06:24",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "sanosakis",
      "permlink": "9-foods-which-do-the-most-damage-to-the-earth",
      "weight": 10000
    }
  ]
}
2016/08/15 11:04:51
parent authorgardenofeden
parent permlinksustainable-community-illegally-feeds-the-homeless
authorkasek
permlinkre-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t110450403z
title
bodyIllegal to feed those who need it the most? You ever see those signs at the beachside fish & chips to not feed the birds? What has the world come to?
json metadata{"tags":["homelessness"]}
Transaction InfoBlock #4101659/Trx ef1df5075a190e70ebbdf549f666fec55da40a24
View Raw JSON Data
{
  "trx_id": "ef1df5075a190e70ebbdf549f666fec55da40a24",
  "block": 4101659,
  "trx_in_block": 0,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-15T11:04:51",
  "op": [
    "comment",
    {
      "parent_author": "gardenofeden",
      "parent_permlink": "sustainable-community-illegally-feeds-the-homeless",
      "author": "kasek",
      "permlink": "re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t110450403z",
      "title": "",
      "body": "Illegal to feed those who need it the most? You ever see those signs at the beachside fish & chips  to not feed the birds? What has the world come to?",
      "json_metadata": "{\"tags\":[\"homelessness\"]}"
    }
  ]
}
kasekcustom json: follow
2016/08/15 10:39:33
required auths[]
required posting auths["kasek"]
idfollow
json{"follower":"kasek","following":"matrixdweller","what":["blog"]}
Transaction InfoBlock #4101156/Trx 0723214e0adc39fc3135278a6e88165853d812ef
View Raw JSON Data
{
  "trx_id": "0723214e0adc39fc3135278a6e88165853d812ef",
  "block": 4101156,
  "trx_in_block": 5,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-15T10:39:33",
  "op": [
    "custom_json",
    {
      "required_auths": [],
      "required_posting_auths": [
        "kasek"
      ],
      "id": "follow",
      "json": "{\"follower\":\"kasek\",\"following\":\"matrixdweller\",\"what\":[\"blog\"]}"
    }
  ]
}
2016/08/15 10:39:03
voterkasek
authorkasek
permlinksydney-blockchain-workshop-panel-blockchain-as-new-infrastructure
weight10000 (100.00%)
Transaction InfoBlock #4101146/Trx 0e27d198a11979efb72ae518209ffbb317a51636
View Raw JSON Data
{
  "trx_id": "0e27d198a11979efb72ae518209ffbb317a51636",
  "block": 4101146,
  "trx_in_block": 2,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-15T10:39:03",
  "op": [
    "vote",
    {
      "voter": "kasek",
      "author": "kasek",
      "permlink": "sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure",
      "weight": 10000
    }
  ]
}
2016/08/15 10:38:54
votermatrixdweller
authorkasek
permlinksydney-blockchain-workshop-panel-blockchain-as-new-infrastructure
weight10000 (100.00%)
Transaction InfoBlock #4101143/Trx 07cba88fb077660fb8eddcc8063bd6a3c519ec41
View Raw JSON Data
{
  "trx_id": "07cba88fb077660fb8eddcc8063bd6a3c519ec41",
  "block": 4101143,
  "trx_in_block": 3,
  "op_in_trx": 0,
  "virtual_op": 0,
  "timestamp": "2016-08-15T10:38:54",
  "op": [
    "vote",
    {
      "voter": "matrixdweller",
      "author": "kasek",
      "permlink": "sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure",
      "weight": 10000
    }
  ]
}

Account Metadata

POSTING JSON METADATA
None
JSON METADATA
None
{
  "posting_json_metadata": {},
  "json_metadata": {}
}

Auth Keys

Owner
Single Signature
Public Keys
STM85pocrhd9CPmfk9rJx9wYknuDVe9d95fNWAMZASybtJ3HxtoVM1/1
Active
Single Signature
Public Keys
STM5LFJr5xZbSEQheKPAGrwHAUz9X3ykVmQAezzSNErHRstzzgofA1/1
Posting
Single Signature
Public Keys
STM73C5nZ8UxHL1QopUHnDwTvHaaxWUVXjpa75yQis3AuQBNSPjg61/1
Memo
STM7STiR6DokH84G1pnMfiEVfb8QmueeiJygEGeMQjPpuKzxaLzXx
{
  "owner": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM85pocrhd9CPmfk9rJx9wYknuDVe9d95fNWAMZASybtJ3HxtoVM",
        1
      ]
    ]
  },
  "active": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM5LFJr5xZbSEQheKPAGrwHAUz9X3ykVmQAezzSNErHRstzzgofA",
        1
      ]
    ]
  },
  "posting": {
    "weight_threshold": 1,
    "account_auths": [],
    "key_auths": [
      [
        "STM73C5nZ8UxHL1QopUHnDwTvHaaxWUVXjpa75yQis3AuQBNSPjg6",
        1
      ]
    ]
  },
  "memo": "STM7STiR6DokH84G1pnMfiEVfb8QmueeiJygEGeMQjPpuKzxaLzXx"
}

Witness Votes

0 / 30
No active witness votes.
[]