VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS14.10%
Net Worth
0.364USD
STEEM
0.000STEEM
SBD
0.010SBD
Own SP
6.676SP
Detailed Balance
| STEEM | ||
| balance | 0.000STEEM | STEEM |
| market_balance | 0.000STEEM | STEEM |
| savings_balance | 0.000STEEM | STEEM |
| reward_steem_balance | 0.000STEEM | STEEM |
| STEEM POWER | ||
| Own SP | 6.676SP | SP |
| Delegated Out | 0.000SP | SP |
| Delegation In | 0.000SP | SP |
| Effective Power | 6.676SP | SP |
| Reward SP (pending) | 0.000SP | SP |
| SBD | ||
| sbd_balance | 0.010SBD | SBD |
| sbd_conversions | 0.000SBD | SBD |
| sbd_market_balance | 0.000SBD | SBD |
| savings_sbd_balance | 0.000SBD | SBD |
| reward_sbd_balance | 0.000SBD | SBD |
{
"balance": "0.000 STEEM",
"savings_balance": "0.000 STEEM",
"reward_steem_balance": "0.000 STEEM",
"vesting_shares": "10871.275296 VESTS",
"delegated_vesting_shares": "0.000000 VESTS",
"received_vesting_shares": "0.000000 VESTS",
"sbd_balance": "0.010 SBD",
"savings_sbd_balance": "0.000 SBD",
"reward_sbd_balance": "0.000 SBD",
"conversions": []
}Account Info
| name | kasek |
| id | 62618 |
| rank | 182,526 |
| reputation | 2233579533 |
| created | 2016-08-14T11:05:33 |
| recovery_account | steem |
| proxy | None |
| post_count | 12 |
| comment_count | 0 |
| lifetime_vote_count | 0 |
| witnesses_voted_for | 0 |
| last_post | 2016-08-31T08:34:57 |
| last_root_post | 2016-08-31T08:34:57 |
| last_vote_time | 2016-08-31T08:40:36 |
| proxied_vsf_votes | 0, 0, 0, 0 |
| can_vote | 1 |
| voting_power | 9,949 |
| delayed_votes | 0 |
| balance | 0.000 STEEM |
| savings_balance | 0.000 STEEM |
| sbd_balance | 0.010 SBD |
| savings_sbd_balance | 0.000 SBD |
| vesting_shares | 10871.275296 VESTS |
| delegated_vesting_shares | 0.000000 VESTS |
| received_vesting_shares | 0.000000 VESTS |
| reward_vesting_balance | 0.000000 VESTS |
| vesting_balance | 0.000 STEEM |
| vesting_withdraw_rate | 0.000000 VESTS |
| next_vesting_withdrawal | 1969-12-31T23:59:59 |
| withdrawn | 0 |
| to_withdraw | 0 |
| withdraw_routes | 0 |
| savings_withdraw_requests | 0 |
| last_account_recovery | 1970-01-01T00:00:00 |
| reset_account | null |
| last_owner_update | 1970-01-01T00:00:00 |
| last_account_update | 1970-01-01T00:00:00 |
| mined | No |
| sbd_seconds | 0 |
| sbd_last_interest_payment | 1970-01-01T00:00:00 |
| savings_sbd_last_interest_payment | 1970-01-01T00:00:00 |
{
"id": 62618,
"name": "kasek",
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM85pocrhd9CPmfk9rJx9wYknuDVe9d95fNWAMZASybtJ3HxtoVM",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5LFJr5xZbSEQheKPAGrwHAUz9X3ykVmQAezzSNErHRstzzgofA",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM73C5nZ8UxHL1QopUHnDwTvHaaxWUVXjpa75yQis3AuQBNSPjg6",
1
]
]
},
"memo_key": "STM7STiR6DokH84G1pnMfiEVfb8QmueeiJygEGeMQjPpuKzxaLzXx",
"json_metadata": "",
"posting_json_metadata": "",
"proxy": "",
"last_owner_update": "1970-01-01T00:00:00",
"last_account_update": "1970-01-01T00:00:00",
"created": "2016-08-14T11:05:33",
"mined": false,
"recovery_account": "steem",
"last_account_recovery": "1970-01-01T00:00:00",
"reset_account": "null",
"comment_count": 0,
"lifetime_vote_count": 0,
"post_count": 12,
"can_vote": true,
"voting_manabar": {
"current_mana": 9949,
"last_update_time": 1472632836
},
"downvote_manabar": {
"current_mana": 0,
"last_update_time": 1471172733
},
"voting_power": 9949,
"balance": "0.000 STEEM",
"savings_balance": "0.000 STEEM",
"sbd_balance": "0.010 SBD",
"sbd_seconds": "0",
"sbd_seconds_last_update": "2016-11-06T13:32:33",
"sbd_last_interest_payment": "1970-01-01T00:00:00",
"savings_sbd_balance": "0.000 SBD",
"savings_sbd_seconds": "0",
"savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
"savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
"savings_withdraw_requests": 0,
"reward_sbd_balance": "0.000 SBD",
"reward_steem_balance": "0.000 STEEM",
"reward_vesting_balance": "0.000000 VESTS",
"reward_vesting_steem": "0.000 STEEM",
"vesting_shares": "10871.275296 VESTS",
"delegated_vesting_shares": "0.000000 VESTS",
"received_vesting_shares": "0.000000 VESTS",
"vesting_withdraw_rate": "0.000000 VESTS",
"next_vesting_withdrawal": "1969-12-31T23:59:59",
"withdrawn": 0,
"to_withdraw": 0,
"withdraw_routes": 0,
"curation_rewards": 0,
"posting_rewards": 0,
"proxied_vsf_votes": [
0,
0,
0,
0
],
"witnesses_voted_for": 0,
"last_post": "2016-08-31T08:34:57",
"last_root_post": "2016-08-31T08:34:57",
"last_vote_time": "2016-08-31T08:40:36",
"post_bandwidth": 10000,
"pending_claimed_accounts": 0,
"vesting_balance": "0.000 STEEM",
"reputation": 2233579533,
"transfer_history": [],
"market_history": [],
"post_history": [],
"vote_history": [],
"other_history": [],
"witness_votes": [],
"tags_usage": [],
"guest_bloggers": [],
"rank": 182526
}Withdraw Routes
| Incoming | Outgoing |
|---|---|
Empty | Empty |
{
"incoming": [],
"outgoing": []
}From Date
To Date
2019/08/14 12:39:09
2019/08/14 12:39:09
| parent author | kasek |
| parent permlink | effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific |
| author | steemitboard |
| permlink | steemitboard-notify-kasek-20190814t123908000z |
| title | |
| body | Congratulations @kasek! You received a personal award! <table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@kasek/birthday3.png</td><td>Happy Birthday! - You are on the Steem blockchain for 3 years!</td></tr></table> <sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@kasek) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=kasek)_</sub> ###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes! |
| json metadata | {"image":["https://steemitboard.com/img/notify.png"]} |
| Transaction Info | Block #35545193/Trx d9e0f5fbdae8d836c21717e2b6ffe10a1c8d3952 |
View Raw JSON Data
{
"trx_id": "d9e0f5fbdae8d836c21717e2b6ffe10a1c8d3952",
"block": 35545193,
"trx_in_block": 9,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2019-08-14T12:39:09",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
"author": "steemitboard",
"permlink": "steemitboard-notify-kasek-20190814t123908000z",
"title": "",
"body": "Congratulations @kasek! You received a personal award!\n\n<table><tr><td>https://steemitimages.com/70x70/http://steemitboard.com/@kasek/birthday3.png</td><td>Happy Birthday! - You are on the Steem blockchain for 3 years!</td></tr></table>\n\n<sub>_You can view [your badges on your Steem Board](https://steemitboard.com/@kasek) and compare to others on the [Steem Ranking](https://steemitboard.com/ranking/index.php?name=kasek)_</sub>\n\n\n###### [Vote for @Steemitboard as a witness](https://v2.steemconnect.com/sign/account-witness-vote?witness=steemitboard&approve=1) to get one more award and increased upvotes!",
"json_metadata": "{\"image\":[\"https://steemitboard.com/img/notify.png\"]}"
}
]
}kasekcustom json: follow2017/08/25 10:51:36
kasekcustom json: follow
2017/08/25 10:51:36
| required auths | [] |
| required posting auths | ["kasek"] |
| id | follow |
| json | ["reblog",{"account":"kasek","author":"pagandance","permlink":"are-we-witnessing-a-global-attack-on-crypto"}] |
| Transaction Info | Block #14881581/Trx 786279e2e205c5ea26b00eeb58397056b521d073 |
View Raw JSON Data
{
"trx_id": "786279e2e205c5ea26b00eeb58397056b521d073",
"block": 14881581,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2017-08-25T10:51:36",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"kasek"
],
"id": "follow",
"json": "[\"reblog\",{\"account\":\"kasek\",\"author\":\"pagandance\",\"permlink\":\"are-we-witnessing-a-global-attack-on-crypto\"}]"
}
]
}kasekcustom json: follow2017/08/25 10:50:54
kasekcustom json: follow
2017/08/25 10:50:54
| required auths | [] |
| required posting auths | ["kasek"] |
| id | follow |
| json | ["reblog",{"account":"kasek","author":"generalbill","permlink":"bitcoin-is-com-ethereum-is-net"}] |
| Transaction Info | Block #14881567/Trx 5d428540036d5139fce7119081905db6356d1af8 |
View Raw JSON Data
{
"trx_id": "5d428540036d5139fce7119081905db6356d1af8",
"block": 14881567,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2017-08-25T10:50:54",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"kasek"
],
"id": "follow",
"json": "[\"reblog\",{\"account\":\"kasek\",\"author\":\"generalbill\",\"permlink\":\"bitcoin-is-com-ethereum-is-net\"}]"
}
]
}digitalplayerreplied to @kasek / 20170708t105347674z2017/07/08 11:16:00
digitalplayerreplied to @kasek / 20170708t105347674z
2017/07/08 11:16:00
| parent author | kasek |
| parent permlink | joao-pessoa-2015-internet-society-igf-ambassador-experience |
| author | digitalplayer |
| permlink | 20170708t105347674z |
| title | |
| body | Welcome and Thank You for being with us!! Following your Blog now |
| json metadata | {"tags":["welcome"],"app":"digitalplayer"} |
| Transaction Info | Block #13501657/Trx a1b8bb7ab571e6feef42d170f379c83f5342f86c |
View Raw JSON Data
{
"trx_id": "a1b8bb7ab571e6feef42d170f379c83f5342f86c",
"block": 13501657,
"trx_in_block": 5,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2017-07-08T11:16:00",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "joao-pessoa-2015-internet-society-igf-ambassador-experience",
"author": "digitalplayer",
"permlink": "20170708t105347674z",
"title": "",
"body": "Welcome and Thank You for being with us!! Following your Blog now",
"json_metadata": "{\"tags\":[\"welcome\"],\"app\":\"digitalplayer\"}"
}
]
}| from | bitland |
| to | kasek |
| amount | 0.010 SBD |
| memo | Celebrate 101 followers:) |
| Transaction Info | Block #6487637/Trx 9d9c54df2eb4aa54374237681babd1f24f6fa2c4 |
View Raw JSON Data
{
"trx_id": "9d9c54df2eb4aa54374237681babd1f24f6fa2c4",
"block": 6487637,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-11-06T13:32:33",
"op": [
"transfer",
{
"from": "bitland",
"to": "kasek",
"amount": "0.010 SBD",
"memo": "Celebrate 101 followers:)"
}
]
}| parent author | kasek |
| parent permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| author | linkback-bot-v0 |
| permlink | re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-linkbacks |
| title | |
| body | <div> <p> This post has been linked to from another place on Steem. </p> <ul> <li> <a href="https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4"> Steemit Cookbook [August Week #4] </a> by <a href="https://steemit.com/@rubenalexander"> @rubenalexander </a> </li> </ul> <p> Learn more about <a href="https://steemit.com/steem/@ontofractal/steem-linkback-bot-v0-3-released"> linkback bot v0.3</a> </p> <p>Upvote if you want the bot to continue posting linkbacks for your posts. Flag if otherwise. Built by @ontofractal</p></div> |
| json metadata | {} |
| Transaction Info | Block #4867363/Trx b91bef2aff366e9bd9cffab1b87b81e3c97d3fe5 |
View Raw JSON Data
{
"trx_id": "b91bef2aff366e9bd9cffab1b87b81e3c97d3fe5",
"block": 4867363,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-09-11T04:38:33",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"author": "linkback-bot-v0",
"permlink": "re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-linkbacks",
"title": "",
"body": "<div> <p> This post has been linked to from another place on Steem. </p> <ul> <li> <a href=\"https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4\"> Steemit Cookbook [August Week #4] </a> by <a href=\"https://steemit.com/@rubenalexander\"> @rubenalexander </a> </li> </ul> <p> Learn more about <a href=\"https://steemit.com/steem/@ontofractal/steem-linkback-bot-v0-3-released\"> linkback bot v0.3</a> </p> <p>Upvote if you want the bot to continue posting linkbacks for your posts. Flag if otherwise. Built by @ontofractal</p></div>",
"json_metadata": "{}"
}
]
}| voter | kasek |
| author | kasek |
| permlink | effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4556340/Trx 86c1e9e3aed900a52702a112ad7da3500172c17a |
View Raw JSON Data
{
"trx_id": "86c1e9e3aed900a52702a112ad7da3500172c17a",
"block": 4556340,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-31T08:40:36",
"op": [
"vote",
{
"voter": "kasek",
"author": "kasek",
"permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
"weight": 10000
}
]
}| parent author | |
| parent permlink | cybersecurity |
| author | kasek |
| permlink | effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific |
| title | Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific |
| body | @@ -179,18 +179,17 @@ economy -%0A%0A + is harme @@ -285,18 +285,17 @@ nstantly -%0A%0A + evolve, @@ -390,19 +390,17 @@ n engine -%0A%0Af + or econo @@ -484,18 +484,17 @@ is what -%0A%0A + United S @@ -580,18 +580,17 @@ d States -%0A%0A + Framewor @@ -656,16 +656,18 @@ y 2014. +%0A%0A This onl @@ -682,18 +682,17 @@ ghts the -%0A%0A + importan @@ -777,18 +777,17 @@ ectively -%0A%0A + addressi @@ -880,18 +880,17 @@ ion? How -%0A%0A + does is @@ -984,18 +984,17 @@ er risks -%0A%0A + with thi @@ -1088,18 +1088,17 @@ national -%0A%0A + presence @@ -1195,18 +1195,17 @@ er crime -%0A%0A + (Grabosk @@ -1295,18 +1295,17 @@ varying -%0A%0A + levels o @@ -1388,18 +1388,17 @@ becoming -%0A%0A + connecte @@ -1520,18 +1520,17 @@ t in the -%0A%0A + APAC reg @@ -1623,18 +1623,17 @@ ation of -%0A%0A + malware @@ -1721,18 +1721,17 @@ ernet is -%0A%0A + becoming @@ -1821,18 +1821,17 @@ ting, it -%0A%0A + has beco @@ -1995,18 +1995,17 @@ ic Cyber -%0A%0A + Emergenc @@ -2098,18 +2098,17 @@ those in -%0A%0A + the APAC @@ -2195,18 +2195,17 @@ urity as -%0A%0A + one of t @@ -2300,18 +2300,17 @@ isations -%0A%0A + is ASEAN @@ -2398,18 +2398,17 @@ in 2013 -%0A%0A + (ASEAN, @@ -2499,18 +2499,17 @@ he fight -%0A%0A + against @@ -2597,18 +2597,17 @@ ablished -%0A%0A + themselv @@ -2770,18 +2770,17 @@ obal and -%0A%0A + national @@ -2874,18 +2874,17 @@ users to -%0A%0A + protect @@ -2977,18 +2977,17 @@ icularly -%0A%0A + in the d @@ -3076,18 +3076,17 @@ C region -%0A%0A + with man @@ -3172,18 +3172,17 @@ e global -%0A%0A + challeng @@ -3273,18 +3273,17 @@ ng being -%0A%0A + introduc @@ -3441,18 +3441,17 @@ plomatic -%0A%0A + challeng @@ -3545,18 +3545,17 @@ rganised -%0A%0A + effort. @@ -3644,18 +3644,17 @@ ther and -%0A%0A + organise @@ -3821,18 +3821,17 @@ ries not -%0A%0A + having t @@ -3921,18 +3921,17 @@ tries as -%0A%0A + resource @@ -4024,18 +4024,17 @@ ons that -%0A%0A + work tow @@ -4127,18 +4127,17 @@ ifficult -%0A%0A + for law @@ -4224,18 +4224,17 @@ nd their -%0A%0A + own bord @@ -4323,18 +4323,17 @@ ountries -%0A%0A + make nec @@ -4426,18 +4426,17 @@ s. Also, -%0A%0A + cyber cr @@ -4528,18 +4528,17 @@ pan over -%0A%0A + differen @@ -4624,18 +4624,17 @@ rt would -%0A%0A + allow mo @@ -4718,18 +4718,17 @@ rwise be -%0A%0A + achieved @@ -4814,18 +4814,17 @@ nning an -%0A%0A + Internet @@ -4915,18 +4915,17 @@ ts would -%0A%0A + not have @@ -5013,18 +5013,17 @@ om these -%0A%0A + major be @@ -5216,18 +5216,17 @@ aided by -%0A%0A + taking a @@ -5319,18 +5319,17 @@ s, being -%0A%0A + part of |
| json metadata | {"tags":["cybersecurity","internet","cybercrime","obama","pacific"],"links":["http://www.apcert.org/","http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf","http://www.microsoft.com/apac/news/PlayItSafe.aspx","http://www.pewresearch.org/fact-"],"image":["http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg"]} |
| Transaction Info | Block #4556332/Trx 2239a71b2ad2331699f27d42217d584bcb3bb80a |
View Raw JSON Data
{
"trx_id": "2239a71b2ad2331699f27d42217d584bcb3bb80a",
"block": 4556332,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-31T08:40:12",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "cybersecurity",
"author": "kasek",
"permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
"title": "Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific",
"body": "@@ -179,18 +179,17 @@\n economy\n-%0A%0A\n+ \n is harme\n@@ -285,18 +285,17 @@\n nstantly\n-%0A%0A\n+ \n evolve, \n@@ -390,19 +390,17 @@\n n engine\n-%0A%0Af\n+ \n or econo\n@@ -484,18 +484,17 @@\n is what\n-%0A%0A\n+ \n United S\n@@ -580,18 +580,17 @@\n d States\n-%0A%0A\n+ \n Framewor\n@@ -656,16 +656,18 @@\n y 2014. \n+%0A%0A\n This onl\n@@ -682,18 +682,17 @@\n ghts the\n-%0A%0A\n+ \n importan\n@@ -777,18 +777,17 @@\n ectively\n-%0A%0A\n+ \n addressi\n@@ -880,18 +880,17 @@\n ion? How\n-%0A%0A\n+ \n does is \n@@ -984,18 +984,17 @@\n er risks\n-%0A%0A\n+ \n with thi\n@@ -1088,18 +1088,17 @@\n national\n-%0A%0A\n+ \n presence\n@@ -1195,18 +1195,17 @@\n er crime\n-%0A%0A\n+ \n (Grabosk\n@@ -1295,18 +1295,17 @@\n varying\n-%0A%0A\n+ \n levels o\n@@ -1388,18 +1388,17 @@\n becoming\n-%0A%0A\n+ \n connecte\n@@ -1520,18 +1520,17 @@\n t in the\n-%0A%0A\n+ \n APAC reg\n@@ -1623,18 +1623,17 @@\n ation of\n-%0A%0A\n+ \n malware \n@@ -1721,18 +1721,17 @@\n ernet is\n-%0A%0A\n+ \n becoming\n@@ -1821,18 +1821,17 @@\n ting, it\n-%0A%0A\n+ \n has beco\n@@ -1995,18 +1995,17 @@\n ic Cyber\n-%0A%0A\n+ \n Emergenc\n@@ -2098,18 +2098,17 @@\n those in\n-%0A%0A\n+ \n the APAC\n@@ -2195,18 +2195,17 @@\n urity as\n-%0A%0A\n+ \n one of t\n@@ -2300,18 +2300,17 @@\n isations\n-%0A%0A\n+ \n is ASEAN\n@@ -2398,18 +2398,17 @@\n in 2013\n-%0A%0A\n+ \n (ASEAN, \n@@ -2499,18 +2499,17 @@\n he fight\n-%0A%0A\n+ \n against \n@@ -2597,18 +2597,17 @@\n ablished\n-%0A%0A\n+ \n themselv\n@@ -2770,18 +2770,17 @@\n obal and\n-%0A%0A\n+ \n national\n@@ -2874,18 +2874,17 @@\n users to\n-%0A%0A\n+ \n protect \n@@ -2977,18 +2977,17 @@\n icularly\n-%0A%0A\n+ \n in the d\n@@ -3076,18 +3076,17 @@\n C region\n-%0A%0A\n+ \n with man\n@@ -3172,18 +3172,17 @@\n e global\n-%0A%0A\n+ \n challeng\n@@ -3273,18 +3273,17 @@\n ng being\n-%0A%0A\n+ \n introduc\n@@ -3441,18 +3441,17 @@\n plomatic\n-%0A%0A\n+ \n challeng\n@@ -3545,18 +3545,17 @@\n rganised\n-%0A%0A\n+ \n effort. \n@@ -3644,18 +3644,17 @@\n ther and\n-%0A%0A\n+ \n organise\n@@ -3821,18 +3821,17 @@\n ries not\n-%0A%0A\n+ \n having t\n@@ -3921,18 +3921,17 @@\n tries as\n-%0A%0A\n+ \n resource\n@@ -4024,18 +4024,17 @@\n ons that\n-%0A%0A\n+ \n work tow\n@@ -4127,18 +4127,17 @@\n ifficult\n-%0A%0A\n+ \n for law \n@@ -4224,18 +4224,17 @@\n nd their\n-%0A%0A\n+ \n own bord\n@@ -4323,18 +4323,17 @@\n ountries\n-%0A%0A\n+ \n make nec\n@@ -4426,18 +4426,17 @@\n s. Also,\n-%0A%0A\n+ \n cyber cr\n@@ -4528,18 +4528,17 @@\n pan over\n-%0A%0A\n+ \n differen\n@@ -4624,18 +4624,17 @@\n rt would\n-%0A%0A\n+ \n allow mo\n@@ -4718,18 +4718,17 @@\n rwise be\n-%0A%0A\n+ \n achieved\n@@ -4814,18 +4814,17 @@\n nning an\n-%0A%0A\n+ \n Internet\n@@ -4915,18 +4915,17 @@\n ts would\n-%0A%0A\n+ \n not have\n@@ -5013,18 +5013,17 @@\n om these\n-%0A%0A\n+ \n major be\n@@ -5216,18 +5216,17 @@\n aided by\n-%0A%0A\n+ \n taking a\n@@ -5319,18 +5319,17 @@\n s, being\n-%0A%0A\n+ \n part of \n",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"internet\",\"cybercrime\",\"obama\",\"pacific\"],\"links\":[\"http://www.apcert.org/\",\"http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf\",\"http://www.microsoft.com/apac/news/PlayItSafe.aspx\",\"http://www.pewresearch.org/fact-\"],\"image\":[\"http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg\"]}"
}
]
}| parent author | |
| parent permlink | cybersecurity |
| author | kasek |
| permlink | effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific |
| title | Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific |
| body | @@ -1,8 +1,98 @@ +http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg%0A%0A %E2%80%9COur cri |
| json metadata | {"tags":["cybersecurity","internet","cybercrime","obama","pacific"],"links":["http://www.apcert.org/","http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf","http://www.microsoft.com/apac/news/PlayItSafe.aspx","http://www.pewresearch.org/fact-"],"image":["http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg"]} |
| Transaction Info | Block #4556268/Trx bb6987a343d6986d3c0694741d7588440305cd43 |
View Raw JSON Data
{
"trx_id": "bb6987a343d6986d3c0694741d7588440305cd43",
"block": 4556268,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-31T08:37:00",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "cybersecurity",
"author": "kasek",
"permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
"title": "Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific",
"body": "@@ -1,8 +1,98 @@\n+http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg%0A%0A\n %E2%80%9COur cri\n",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"internet\",\"cybercrime\",\"obama\",\"pacific\"],\"links\":[\"http://www.apcert.org/\",\"http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf\",\"http://www.microsoft.com/apac/news/PlayItSafe.aspx\",\"http://www.pewresearch.org/fact-\"],\"image\":[\"http://www.elp.com/content/dam/mae/online-articles/2013/07/cybersecurity-8-July-2013.jpg\"]}"
}
]
}| parent author | |
| parent permlink | cybersecurity |
| author | kasek |
| permlink | effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific |
| title | Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific |
| body | “Our critical infrastructure continues to be at risk from threats in cyberspace, and our economy is harmed by the theft of our intellectual property. Although the threats are serious and they constantly evolve, I believe that if we address them effectively, we can ensure that the Internet remains an engine for economic growth and a platform for the free exchange of ideas” (Obama, 2014). This is what United States President Barack Obama had to say in a statement when launching the United States Framework for Improving Critical infrastructure Security in February 2014. This only highlights the importance of cyber security in our daily lives. But how would countries go about “effectively addressing” such issues of cyber security to improve their regional level of cyber risk reduction? How does is differ from national approaches? What are some of the benefits, and are there any further risks with this approach? These are some of the questions that arise. With cyberspace having an international presence, it is important to maintain collaboration between countries in their efforts against cyber crime (Grabosky, 2001). This is may be particular in regions such as the Asia Pacific (APAC) with varying levels of Internet penetration and an increasing number of users as more people are becoming connected (Petrazzini, Kibani, 1999). According to a study by Microsoft, the cost of cybersecurity breaches are the highest in the APAC region (Microsoft Asia Pacific News Center, 2014). This is particularly due to the propagation of malware and possibly the vulnerability of several economies within the region. As the Internet is becoming increasingly popular with the use of such services as social media and cloud computing, it has become a priority to have a regional effort to build cyber risk reduction. Currently the leading regional organisation in the Asia Pacific is APCERT (Asia Pacific Cyber Emergency team) which has been set up with the sole purpose of ensuring Internet security for those in the APAC region (ACPERT, 2014). Other regional organisations have also included cybersecurity as one of their priority areas in developing and protecting the region. An example of such an organisations is ASEAN (Association of South East Asian Nations) who launched cybersecurity cooperation in 2013 (ASEAN, 2013). International cybersecurity bodies have also made APAC a priority region in the fight against cyber risks. ICSPA, the International Cyber Security Protection Alliance have established themselves in the region to help in the fight within the region (ICSPA, 2014). The regional approach is not without it's challenges and risks, however. The same global and national challenges with cyber security are still faced. Such challenges the growing volume of users to protect as Internet adoption grows with the aid of mobile devices and social media usage, particularly in the developing world (Rainie & Pouhsta, 2014). This is a particular concern for the APAC region with many member states being developing countries. The region is also not immune to the global challenges of new vulnerabilities that may arise due to newer services such as cloud computing being introduced and the increasing sophistication of cyber attacks (Lipson, 2002). Apart from such technological challenges, the are also the organisational and diplomatic challenges to navigate, as is the case when garnering the required support for any regionally organised effort. However, history has shown that these challenges can be resolved in one way or another and organised efforts can be made in order to achieve a common goal within a region. But what are the benefits of taking a regional on reducing cyber risks? With all countries not having the same resources, having a regional effort against cybercrime can benefit all countries as resources can be shared within the joint effort. This can be seen in other regional organisations that work toward a common goal. Also, with different jurisdictions within the region, it makes it difficult for law enforcement to prosecute cybercrime offenders who often commit their crimes beyond their own borders (Broadhurst, 2006). Thus taking a regional approach can aid in having member countries make necessary legislative adjustments to ensure perpetrators are accountable for their actions. Also, cyber criminals often do not work in isolation but are members of cyber crime networks that span over different countries and even continents (Choo & Smith, 2008). Having a coordinated effort would allow monitoring and policing such groups to be done more effectively than would otherwise be achieved. An example is the arrest of over 700 members of a global pedophile network running an Internet chat room called “Kids, the Light of Our Lives” in 2007 (Choo & Smith ). Such arrests would not have been possible without a coordinated effort between the states involved. Apart from these major benefits, there are also benefits such as having a link to a global effort on reducing cyber risks. Hence, it can be seen that some of the challenges faced in reducing cyber risks can be aided by taking a regional approach against cyber crime. Although not without it's own set of challenges, being part of a regional effort can greatly improve a countries level of cyber risk reduction. References Asia Pacific Computer Emergency Response Team, Available from: http://www.apcert.org/ [9 November 2014] Broadhurst, R. 2006. Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management,29(3), 408-433. Choo, K. K. R., & Smith, R. G. 2008. Criminal exploitation of online systems by organised crime groups. Asian journal of criminology, 3(1), 37-59. Grabosky, P. 2001. The Global and Regional Cyber Crime Problem. Proceedings of the Asia Cyber Crime Summit, 22-42. International Cyber Security Protection Alliance 2014, Establishing the International Cyber Security Protection Alliance in Asia Pacific, Available from: http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf Petrazzini, B., & Kibati, M. 1999. The Internet in developing countries.Communications of the ACM, 42(6), 31-36. Lipson, H. F. 2002. Tracking and tracing cyber-attacks: Technical challenges and global policy issues (No. CMU/SEI-2002-SR-009). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST. Microsoft 2014, Cost of Cyber-Security Breeaches Highest in Asia Pacific. Available from: http://www.microsoft.com/apac/news/PlayItSafe.aspx [9 November 2014] Rainie & Poushta 2014, Emerging nations catching up to U.S. on technology adoption, especially mobile and social media use. Available from: http://www.pewresearch.org/fact- tank/2014/02/13/emerging-nations-catching-up-to-u-s-on-technology-adoption-especially-mobile-and- social-media-use/ [November 7 2014] |
| json metadata | {"tags":["cybersecurity","internet","cybercrime","obama","pacific"],"links":["http://www.apcert.org/","http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf","http://www.microsoft.com/apac/news/PlayItSafe.aspx","http://www.pewresearch.org/fact-"]} |
| Transaction Info | Block #4556227/Trx fcc8f266542be045ff94fd7b9110e5faa945e4c5 |
View Raw JSON Data
{
"trx_id": "fcc8f266542be045ff94fd7b9110e5faa945e4c5",
"block": 4556227,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-31T08:34:57",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "cybersecurity",
"author": "kasek",
"permlink": "effecting-a-regional-approach-to-building-the-level-of-cyber-risk-reduction-in-the-asia-pacific",
"title": "Effecting a Regional Approach to ’Building the Level of Cyber Risk Reduction’ In the Asia Pacific",
"body": "“Our critical infrastructure continues to be at risk from threats in cyberspace, and our economy\n\nis harmed by the theft of our intellectual property. Although the threats are serious and they constantly\n\nevolve, I believe that if we address them effectively, we can ensure that the Internet remains an engine\n\nfor economic growth and a platform for the free exchange of ideas” (Obama, 2014). This is what\n\nUnited States President Barack Obama had to say in a statement when launching the United States\n\nFramework for Improving Critical infrastructure Security in February 2014. This only highlights the\n\nimportance of cyber security in our daily lives. But how would countries go about “effectively\n\naddressing” such issues of cyber security to improve their regional level of cyber risk reduction? How\n\ndoes is differ from national approaches? What are some of the benefits, and are there any further risks\n\nwith this approach? These are some of the questions that arise. With cyberspace having an international\n\npresence, it is important to maintain collaboration between countries in their efforts against cyber crime\n\n(Grabosky, 2001). This is may be particular in regions such as the Asia Pacific (APAC) with varying\n\nlevels of Internet penetration and an increasing number of users as more people are becoming\n\nconnected (Petrazzini, Kibani, 1999).\n\nAccording to a study by Microsoft, the cost of cybersecurity breaches are the highest in the\n\nAPAC region (Microsoft Asia Pacific News Center, 2014). This is particularly due to the propagation of\n\nmalware and possibly the vulnerability of several economies within the region. As the Internet is\n\nbecoming increasingly popular with the use of such services as social media and cloud computing, it\n\nhas become a priority to have a regional effort to build cyber risk reduction.\n\nCurrently the leading regional organisation in the Asia Pacific is APCERT (Asia Pacific Cyber\n\nEmergency team) which has been set up with the sole purpose of ensuring Internet security for those in\n\nthe APAC region (ACPERT, 2014). Other regional organisations have also included cybersecurity as\n\none of their priority areas in developing and protecting the region. An example of such an organisations\n\nis ASEAN (Association of South East Asian Nations) who launched cybersecurity cooperation in 2013\n\n(ASEAN, 2013). International cybersecurity bodies have also made APAC a priority region in the fight\n\nagainst cyber risks. ICSPA, the International Cyber Security Protection Alliance have established\n\nthemselves in the region to help in the fight within the region (ICSPA, 2014).\n\nThe regional approach is not without it's challenges and risks, however. The same global and\n\nnational challenges with cyber security are still faced. Such challenges the growing volume of users to\n\nprotect as Internet adoption grows with the aid of mobile devices and social media usage, particularly\n\nin the developing world (Rainie & Pouhsta, 2014). This is a particular concern for the APAC region\n\nwith many member states being developing countries. The region is also not immune to the global\n\nchallenges of new vulnerabilities that may arise due to newer services such as cloud computing being\n\nintroduced and the increasing sophistication of cyber attacks (Lipson, 2002).\n\nApart from such technological challenges, the are also the organisational and diplomatic\n\nchallenges to navigate, as is the case when garnering the required support for any regionally organised\n\neffort. However, history has shown that these challenges can be resolved in one way or another and\n\norganised efforts can be made in order to achieve a common goal within a region.\n\nBut what are the benefits of taking a regional on reducing cyber risks? With all countries not\n\nhaving the same resources, having a regional effort against cybercrime can benefit all countries as\n\nresources can be shared within the joint effort. This can be seen in other regional organisations that\n\nwork toward a common goal. Also, with different jurisdictions within the region, it makes it difficult\n\nfor law enforcement to prosecute cybercrime offenders who often commit their crimes beyond their\n\nown borders (Broadhurst, 2006). Thus taking a regional approach can aid in having member countries\n\nmake necessary legislative adjustments to ensure perpetrators are accountable for their actions. Also,\n\ncyber criminals often do not work in isolation but are members of cyber crime networks that span over\n\ndifferent countries and even continents (Choo & Smith, 2008). Having a coordinated effort would\n\nallow monitoring and policing such groups to be done more effectively than would otherwise be\n\nachieved. An example is the arrest of over 700 members of a global pedophile network running an\n\nInternet chat room called “Kids, the Light of Our Lives” in 2007 (Choo & Smith ). Such arrests would\n\nnot have been possible without a coordinated effort between the states involved. Apart from these\n\nmajor benefits, there are also benefits such as having a link to a global effort on reducing cyber risks.\n\nHence, it can be seen that some of the challenges faced in reducing cyber risks can be aided by\n\ntaking a regional approach against cyber crime. Although not without it's own set of challenges, being\n\npart of a regional effort can greatly improve a countries level of cyber risk reduction.\n\n\n\n\n\nReferences\n\nAsia Pacific Computer Emergency Response Team, Available from: http://www.apcert.org/ [9\n\nNovember 2014]\n\nBroadhurst, R. 2006. Developments in the global law enforcement of cyber-crime. Policing: An\n\nInternational Journal of Police Strategies & Management,29(3), 408-433.\n\nChoo, K. K. R., & Smith, R. G. 2008. Criminal exploitation of online systems by organised crime\n\ngroups. Asian journal of criminology, 3(1), 37-59.\n\nGrabosky, P. 2001. The Global and Regional Cyber Crime Problem. Proceedings of the Asia Cyber\n\nCrime Summit, 22-42.\n\nInternational Cyber Security Protection Alliance 2014, Establishing the International Cyber Security\n\nProtection Alliance in Asia Pacific, Available from:\n\nhttp://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf\n\nPetrazzini, B., & Kibati, M. 1999. The Internet in developing countries.Communications of the ACM,\n\n42(6), 31-36.\n\nLipson, H. F. 2002. Tracking and tracing cyber-attacks: Technical challenges and global policy issues\n\n(No. CMU/SEI-2002-SR-009). CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE\n\nENGINEERING INST.\n\nMicrosoft 2014, Cost of Cyber-Security Breeaches Highest in Asia Pacific. Available from:\n\nhttp://www.microsoft.com/apac/news/PlayItSafe.aspx [9 November 2014]\n\nRainie & Poushta 2014, Emerging nations catching up to U.S. on technology adoption, especially\n\nmobile and social media use. Available from: http://www.pewresearch.org/fact-\ntank/2014/02/13/emerging-nations-catching-up-to-u-s-on-technology-adoption-especially-mobile-and-\nsocial-media-use/ [November 7 2014]",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"internet\",\"cybercrime\",\"obama\",\"pacific\"],\"links\":[\"http://www.apcert.org/\",\"http://www.APAC/Establishing_ICSPA_APAC__For_external_distribution_.pdf\",\"http://www.microsoft.com/apac/news/PlayItSafe.aspx\",\"http://www.pewresearch.org/fact-\"]}"
}
]
}| voter | helen.tan |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494353/Trx f81b433c5f1b8a07551c6eb96bbd6695a3925442 |
View Raw JSON Data
{
"trx_id": "f81b433c5f1b8a07551c6eb96bbd6695a3925442",
"block": 4494353,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:21",
"op": [
"vote",
{
"voter": "helen.tan",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | moon |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494352/Trx 46af0ac2433cf38210fcbd26b33315c8e0c45a7b |
View Raw JSON Data
{
"trx_id": "46af0ac2433cf38210fcbd26b33315c8e0c45a7b",
"block": 4494352,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:18",
"op": [
"vote",
{
"voter": "moon",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | bunny |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494351/Trx 50ab9b42a8355058aadf21fd61bba0a112a2207c |
View Raw JSON Data
{
"trx_id": "50ab9b42a8355058aadf21fd61bba0a112a2207c",
"block": 4494351,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:15",
"op": [
"vote",
{
"voter": "bunny",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | daniel.pan |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494351/Trx 2bff7adf59f18c550c7563c3c763e08085a9021e |
View Raw JSON Data
{
"trx_id": "2bff7adf59f18c550c7563c3c763e08085a9021e",
"block": 4494351,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:15",
"op": [
"vote",
{
"voter": "daniel.pan",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | boy |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494350/Trx 7b69e842434ee7880afcb87224fcee7f0c7dc279 |
View Raw JSON Data
{
"trx_id": "7b69e842434ee7880afcb87224fcee7f0c7dc279",
"block": 4494350,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:12",
"op": [
"vote",
{
"voter": "boy",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | healthcare |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494349/Trx 3a459f58c07e8f101b81e081c374d4f0728f189f |
View Raw JSON Data
{
"trx_id": "3a459f58c07e8f101b81e081c374d4f0728f189f",
"block": 4494349,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:09",
"op": [
"vote",
{
"voter": "healthcare",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | mini |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494348/Trx 55864cca20e29751ff0d78adfa13137363cfd37d |
View Raw JSON Data
{
"trx_id": "55864cca20e29751ff0d78adfa13137363cfd37d",
"block": 4494348,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:06",
"op": [
"vote",
{
"voter": "mini",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | bue |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494348/Trx 0cdf7538f374c0782ada8f229880de4879224dcb |
View Raw JSON Data
{
"trx_id": "0cdf7538f374c0782ada8f229880de4879224dcb",
"block": 4494348,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:06",
"op": [
"vote",
{
"voter": "bue",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | bue-witness |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4494347/Trx 014ad23f807fddd43de720ac68d0c4778c39e632 |
View Raw JSON Data
{
"trx_id": "014ad23f807fddd43de720ac68d0c4778c39e632",
"block": 4494347,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:52:03",
"op": [
"vote",
{
"voter": "bue-witness",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| voter | tuck-fheman |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 100 (1.00%) |
| Transaction Info | Block #4494330/Trx 84114e2d8965687a4f0618eb6f83a28e34e5f197 |
View Raw JSON Data
{
"trx_id": "84114e2d8965687a4f0618eb6f83a28e34e5f197",
"block": 4494330,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:51:12",
"op": [
"vote",
{
"voter": "tuck-fheman",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 100
}
]
}| parent author | kasek |
| parent permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| author | tuck-fheman |
| permlink | re-kasek-re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160829t045015471z |
| title | |
| body | http://www.wsj.com/articles/an-internet-giveaway-to-the-u-n-1472421165 |
| json metadata | {"tags":["news"],"links":["http://www.wsj.com/articles/an-internet-giveaway-to-the-u-n-1472421165"]} |
| Transaction Info | Block #4494315/Trx 4c23e8b1a0c5bddab9a106f7bf23298bc7931883 |
View Raw JSON Data
{
"trx_id": "4c23e8b1a0c5bddab9a106f7bf23298bc7931883",
"block": 4494315,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-29T04:50:27",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"author": "tuck-fheman",
"permlink": "re-kasek-re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160829t045015471z",
"title": "",
"body": "http://www.wsj.com/articles/an-internet-giveaway-to-the-u-n-1472421165",
"json_metadata": "{\"tags\":[\"news\"],\"links\":[\"http://www.wsj.com/articles/an-internet-giveaway-to-the-u-n-1472421165\"]}"
}
]
}| parent author | kasek |
| parent permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| author | rubenalexander |
| permlink | re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-20160823t211000439z |
| title | |
| body | <center> <img src="http://i.imgur.com/1jjaNyi.png"><br>You’ve been added to the <a href="https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4">Steemit Cookbook Week #4</a> </center> |
| json metadata | {"tags":["food"],"image":["http://i.imgur.com/1jjaNyi.png"],"links":["https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4"]} |
| Transaction Info | Block #4342202/Trx 1b7036d42bfa056467bea9f10e15f9436124f07f |
View Raw JSON Data
{
"trx_id": "1b7036d42bfa056467bea9f10e15f9436124f07f",
"block": 4342202,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T21:10:09",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"author": "rubenalexander",
"permlink": "re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-20160823t211000439z",
"title": "",
"body": "<center>\n<img src=\"http://i.imgur.com/1jjaNyi.png\"><br>You’ve been added to the <a href=\"https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4\">Steemit Cookbook Week #4</a>\n</center>",
"json_metadata": "{\"tags\":[\"food\"],\"image\":[\"http://i.imgur.com/1jjaNyi.png\"],\"links\":[\"https://steemit.com/food/@rubenalexander/steemit-cookbook-august-week-4\"]}"
}
]
}rubenalexanderupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
rubenalexanderupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
| voter | rubenalexander |
| author | kasek |
| permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4342199/Trx f4499c0f7aa78dae1c15ffb07036be01e479f579 |
View Raw JSON Data
{
"trx_id": "f4499c0f7aa78dae1c15ffb07036be01e479f579",
"block": 4342199,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T21:10:00",
"op": [
"vote",
{
"voter": "rubenalexander",
"author": "kasek",
"permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"weight": 10000
}
]
}| parent author | kasek |
| parent permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| author | jo-stonellord |
| permlink | re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-20160823t113559889z |
| title | |
| body | SIN |
| json metadata | {"tags":["food"]} |
| Transaction Info | Block #4330842/Trx 1e8c5793cc676a1c1f29d44cdd69b5261e8d6213 |
View Raw JSON Data
{
"trx_id": "1e8c5793cc676a1c1f29d44cdd69b5261e8d6213",
"block": 4330842,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T11:36:03",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"author": "jo-stonellord",
"permlink": "re-kasek-you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts-20160823t113559889z",
"title": "",
"body": "SIN",
"json_metadata": "{\"tags\":[\"food\"]}"
}
]
}jo-stonellordupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
jo-stonellordupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
| voter | jo-stonellord |
| author | kasek |
| permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4330834/Trx 0b574e977d659568fb8fa41c583442cd0291db40 |
View Raw JSON Data
{
"trx_id": "0b574e977d659568fb8fa41c583442cd0291db40",
"block": 4330834,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T11:35:39",
"op": [
"vote",
{
"voter": "jo-stonellord",
"author": "kasek",
"permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"weight": 10000
}
]
}kasekcustom json: follow
kasekcustom json: follow
| required auths | [] |
| required posting auths | ["kasek"] |
| id | follow |
| json | {"follower":"kasek","following":"mibenkito","what":["blog"]} |
| Transaction Info | Block #4330413/Trx abd90b2fca835478b96e14e93be33c1f326598c6 |
View Raw JSON Data
{
"trx_id": "abd90b2fca835478b96e14e93be33c1f326598c6",
"block": 4330413,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T11:14:24",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"kasek"
],
"id": "follow",
"json": "{\"follower\":\"kasek\",\"following\":\"mibenkito\",\"what\":[\"blog\"]}"
}
]
}lee5upvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
lee5upvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
| voter | lee5 |
| author | kasek |
| permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4330223/Trx 05a0ccc6b96f79f489097d9f8327697b339959f6 |
View Raw JSON Data
{
"trx_id": "05a0ccc6b96f79f489097d9f8327697b339959f6",
"block": 4330223,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T11:04:54",
"op": [
"vote",
{
"voter": "lee5",
"author": "kasek",
"permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"weight": 10000
}
]
}kasekupvoted (100.00%) @bogartgaming / uuaph-you-are-god-s-masterpiece
kasekupvoted (100.00%) @bogartgaming / uuaph-you-are-god-s-masterpiece
| voter | kasek |
| author | bogartgaming |
| permlink | uuaph-you-are-god-s-masterpiece |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4330098/Trx 8309eb2eba1f5b51644c34346d533299b4dd255b |
View Raw JSON Data
{
"trx_id": "8309eb2eba1f5b51644c34346d533299b4dd255b",
"block": 4330098,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T10:58:36",
"op": [
"vote",
{
"voter": "kasek",
"author": "bogartgaming",
"permlink": "uuaph-you-are-god-s-masterpiece",
"weight": 10000
}
]
}bitlandupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
bitlandupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
| voter | bitland |
| author | kasek |
| permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4330088/Trx 8fa1b55aeead612d29b2ac6c07e1d9e2a6e816e6 |
View Raw JSON Data
{
"trx_id": "8fa1b55aeead612d29b2ac6c07e1d9e2a6e816e6",
"block": 4330088,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T10:58:06",
"op": [
"vote",
{
"voter": "bitland",
"author": "kasek",
"permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"weight": 10000
}
]
}kasekupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
kasekupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
| voter | kasek |
| author | kasek |
| permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4330073/Trx ba74aa45fca21f90d4d2c37117c8600a3282a04d |
View Raw JSON Data
{
"trx_id": "ba74aa45fca21f90d4d2c37117c8600a3282a04d",
"block": 4330073,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T10:57:21",
"op": [
"vote",
{
"voter": "kasek",
"author": "kasek",
"permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"weight": 10000
}
]
}viktorya86upvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
viktorya86upvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
| voter | viktorya86 |
| author | kasek |
| permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4330071/Trx 2f74d5cb01a8fa4465a7b5cf4217de916592797c |
View Raw JSON Data
{
"trx_id": "2f74d5cb01a8fa4465a7b5cf4217de916592797c",
"block": 4330071,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T10:57:15",
"op": [
"vote",
{
"voter": "viktorya86",
"author": "kasek",
"permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"weight": 10000
}
]
}landalarupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
landalarupvoted (100.00%) @kasek / you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
| voter | landalar |
| author | kasek |
| permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4330059/Trx e019f85ec046d95bf15a7d384ec700550623176d |
View Raw JSON Data
{
"trx_id": "e019f85ec046d95bf15a7d384ec700550623176d",
"block": 4330059,
"trx_in_block": 5,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T10:56:39",
"op": [
"vote",
{
"voter": "landalar",
"author": "kasek",
"permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"weight": 10000
}
]
}kasekpublished a new post: you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
kasekpublished a new post: you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts
| parent author | |
| parent permlink | food |
| author | kasek |
| permlink | you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts |
| title | YOU'RE STUPID IF YOU DON'T LIKE RIBS!... [All the best cuts] |
| body | Yes, I said it. You're stupid if you don't like ribs. So what? The stupid people aren't reading this post. The following are some of the best cuts and cooking methods of ribs from various animals we love. Starting with our most favourite of the bovine family, the cattle. Beef short ribs: Taken form the end of the rib cage of cattle, this does well grilled or slow cooked. http://www.slapyodaddybbq.com/wp-content/uploads/ShortRibs-3-585.jpg http://www.bonappetit.com/wp-content/uploads/2011/08/red-wine-braised-short-ribs-940x560.jpg Beef back ribs: Taken higher up from the short ribs, these are a favourite for the BBQ. They are also great for smoking. https://bullbbq.files.wordpress.com/2015/08/3beef-ribs-cooked-and-sauced.jpg http://www.smoking-meat.com/image-files/smoked-beef-back-ribs-1.jpg Beef bone-in ribeye: One of my favourite cuts of beef. This is taken from right at the top of the ribs, adjoining the spine. Single ribs are enjoyed as steaks whilst whole rib rack makes for an excellent roast. http://www.heartlandsteaks.com/wp-content/uploads/2015/10/butchers-choice-bonein-ribeye.jpg http://www.pastacheese.com/media/catalog/product/cache/1/image/9df78eab33525d08d6e5fb8d27136e95/N/Y/NYPM01230000_3.jpg Pork rib tips: These are an economy cut. Off the very end of a rack of ribs but very tasty indeed. Great when roasted with a rub or slow cooked in a stew. http://www.pigtrip.net/photos/BTSHR/BTSHR2-ribtip1-big.jpg http://www.simplecomfortfood.com/images/mexican-pork-ribs-salsa-verde.jpg Pork spare ribs: Taken from the mid-section of the ribs, these are a BBQ staple. Dry rub or smothered in sauce. http://www.swiftfreshpork.com/media/41369/Product%20-%20Dry%20Rubbed%20WBP%20St.%20Louis%20Ribs.jpg http://d1dd4ethwnlwo2.cloudfront.net/wp-content/uploads/2014/09/pork_ribs.jpg Pork baby back ribs: These are the part of the ribs on the back of a pig. Meatier and contain less fat. http://www.livelikeanj.com/wp-content/uploads/2015/07/Baby-back-ribs.jpg http://www.guyseat.com/images/315/view/Fall-Off-The-Bones-Oven-Baked-Pork-Back-Ribs.jpg Lamb spare ribs: The bone in lamb ribs are not as big as other livestock featured and the meat is more tender, often not needing to me slow cooked as much. Spare ribs are from the mid rib section. Great for grilling. http://www.annarbor.com/assets_c/2012/05/IMG_8700-thumb-590x416-112398.jpg https://s3-media4.fl.yelpcdn.com/bphoto/2gkFPK2uu87cK4B_yomjww/o.jpg Lamb cutlets: These would be the lamb equivalent of a beef ribeye steak. Very popular pan fried or grilled. http://www.nutworks.com.au/images/recipes/lamb%20cutlets.jpg http://d3lp4xedbqa8a5.cloudfront.net/s3/digital-cougar-assets/food/2014/11/28/WomansDayBR108834/fragrant-lamb-cutlets.jpg Lamb rack: The whole upper section of lamb ribs. Popular as a Sunday roast. It is almost a sin to cook it any other way. https://masterpurveyors.com/wp-content/uploads/2014/09/Lamb-Rack-Roast-Rack-of-Lamb-Final.jpg http://www.seriouseats.com/images/2014/12/20141210-crown-rack-lamb-vicky-wasik-9.jpg ENJOY! |
| json metadata | {"tags":["food","photography","life","blog","meat"],"image":["http://www.slapyodaddybbq.com/wp-content/uploads/ShortRibs-3-585.jpg"]} |
| Transaction Info | Block #4330046/Trx 041699c87c5fe30462786255f995d0099108cc4a |
View Raw JSON Data
{
"trx_id": "041699c87c5fe30462786255f995d0099108cc4a",
"block": 4330046,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-23T10:56:00",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "food",
"author": "kasek",
"permlink": "you-re-stupid-if-you-don-t-like-ribs-all-the-best-cuts",
"title": "YOU'RE STUPID IF YOU DON'T LIKE RIBS!... [All the best cuts]",
"body": "Yes, I said it. You're stupid if you don't like ribs. So what? The stupid people aren't reading this post. The following are some of the best cuts and cooking methods of ribs from various animals we love. Starting with our most favourite of the bovine family, the cattle.\n\n\nBeef short ribs: Taken form the end of the rib cage of cattle, this does well grilled or slow cooked.\n\nhttp://www.slapyodaddybbq.com/wp-content/uploads/ShortRibs-3-585.jpg\n\nhttp://www.bonappetit.com/wp-content/uploads/2011/08/red-wine-braised-short-ribs-940x560.jpg\n\nBeef back ribs: Taken higher up from the short ribs, these are a favourite for the BBQ. They are also great for smoking.\n\nhttps://bullbbq.files.wordpress.com/2015/08/3beef-ribs-cooked-and-sauced.jpg\n\nhttp://www.smoking-meat.com/image-files/smoked-beef-back-ribs-1.jpg\n\nBeef bone-in ribeye: One of my favourite cuts of beef. This is taken from right at the top of the ribs, adjoining the spine. Single ribs are enjoyed as steaks whilst whole rib rack makes for an excellent roast. \n\nhttp://www.heartlandsteaks.com/wp-content/uploads/2015/10/butchers-choice-bonein-ribeye.jpg\n\nhttp://www.pastacheese.com/media/catalog/product/cache/1/image/9df78eab33525d08d6e5fb8d27136e95/N/Y/NYPM01230000_3.jpg\n\nPork rib tips: These are an economy cut. Off the very end of a rack of ribs but very tasty indeed. Great when roasted with a rub or slow cooked in a stew.\n\nhttp://www.pigtrip.net/photos/BTSHR/BTSHR2-ribtip1-big.jpg\n\nhttp://www.simplecomfortfood.com/images/mexican-pork-ribs-salsa-verde.jpg\n\nPork spare ribs: Taken from the mid-section of the ribs, these are a BBQ staple. Dry rub or smothered in sauce.\n\nhttp://www.swiftfreshpork.com/media/41369/Product%20-%20Dry%20Rubbed%20WBP%20St.%20Louis%20Ribs.jpg\n\nhttp://d1dd4ethwnlwo2.cloudfront.net/wp-content/uploads/2014/09/pork_ribs.jpg\n\nPork baby back ribs: These are the part of the ribs on the back of a pig. Meatier and contain less fat.\n\nhttp://www.livelikeanj.com/wp-content/uploads/2015/07/Baby-back-ribs.jpg\n\nhttp://www.guyseat.com/images/315/view/Fall-Off-The-Bones-Oven-Baked-Pork-Back-Ribs.jpg\n\nLamb spare ribs: The bone in lamb ribs are not as big as other livestock featured and the meat is more tender, often not needing to me slow cooked as much. Spare ribs are from the mid rib section. Great for grilling.\n\nhttp://www.annarbor.com/assets_c/2012/05/IMG_8700-thumb-590x416-112398.jpg\n\nhttps://s3-media4.fl.yelpcdn.com/bphoto/2gkFPK2uu87cK4B_yomjww/o.jpg\n\nLamb cutlets: These would be the lamb equivalent of a beef ribeye steak. Very popular pan fried or grilled.\n\nhttp://www.nutworks.com.au/images/recipes/lamb%20cutlets.jpg\n\nhttp://d3lp4xedbqa8a5.cloudfront.net/s3/digital-cougar-assets/food/2014/11/28/WomansDayBR108834/fragrant-lamb-cutlets.jpg\n\nLamb rack: The whole upper section of lamb ribs. Popular as a Sunday roast. It is almost a sin to cook it any other way.\n\nhttps://masterpurveyors.com/wp-content/uploads/2014/09/Lamb-Rack-Roast-Rack-of-Lamb-Final.jpg\n\nhttp://www.seriouseats.com/images/2014/12/20141210-crown-rack-lamb-vicky-wasik-9.jpg\n\nENJOY!",
"json_metadata": "{\"tags\":[\"food\",\"photography\",\"life\",\"blog\",\"meat\"],\"image\":[\"http://www.slapyodaddybbq.com/wp-content/uploads/ShortRibs-3-585.jpg\"]}"
}
]
}| voter | pazsion |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4305049/Trx 8aa2c81586321b19f9f5f4b7d47afc2433eed86f |
View Raw JSON Data
{
"trx_id": "8aa2c81586321b19f9f5f4b7d47afc2433eed86f",
"block": 4305049,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-22T13:52:42",
"op": [
"vote",
{
"voter": "pazsion",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}proglobyteupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
proglobyteupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | proglobyte |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4281335/Trx 76f9dbe7cad6e0c7b928dcb2cd6079a4d95ec29b |
View Raw JSON Data
{
"trx_id": "76f9dbe7cad6e0c7b928dcb2cd6079a4d95ec29b",
"block": 4281335,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T17:53:36",
"op": [
"vote",
{
"voter": "proglobyte",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}kurtbeilupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
kurtbeilupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | kurtbeil |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4281269/Trx c94b0e3e4def41f4528214a1f07d0ec94c21427c |
View Raw JSON Data
{
"trx_id": "c94b0e3e4def41f4528214a1f07d0ec94c21427c",
"block": 4281269,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T17:50:18",
"op": [
"vote",
{
"voter": "kurtbeil",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}| parent author | kasek |
| parent permlink | re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t055742094z |
| author | steemlinks |
| permlink | re-kasek-re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t145659798z |
| title | |
| body | i believe technology evolves everyday . thanks @kasek |
| json metadata | {"tags":["ethereum"],"users":["kasek"]} |
| Transaction Info | Block #4277835/Trx a90c33345028b52e03e03f76a44e134cd54e27dd |
View Raw JSON Data
{
"trx_id": "a90c33345028b52e03e03f76a44e134cd54e27dd",
"block": 4277835,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T14:57:00",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t055742094z",
"author": "steemlinks",
"permlink": "re-kasek-re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t145659798z",
"title": "",
"body": "i believe technology evolves everyday . thanks @kasek",
"json_metadata": "{\"tags\":[\"ethereum\"],\"users\":[\"kasek\"]}"
}
]
}bitlandupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
bitlandupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | bitland |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4273317/Trx d95cafe3311d14eda90446c437030e7cdbc7c8dc |
View Raw JSON Data
{
"trx_id": "d95cafe3311d14eda90446c437030e7cdbc7c8dc",
"block": 4273317,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T11:07:45",
"op": [
"vote",
{
"voter": "bitland",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}crystaljennupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
crystaljennupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | crystaljenn |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4271971/Trx 46b5061f79c671dbd58f9dc443eb4c74b31bf206 |
View Raw JSON Data
{
"trx_id": "46b5061f79c671dbd58f9dc443eb4c74b31bf206",
"block": 4271971,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:59:24",
"op": [
"vote",
{
"voter": "crystaljenn",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}mastercoreupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
mastercoreupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | mastercore |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4271479/Trx 8d4695e40aa21921cf37cd1a218946bddde65ec2 |
View Raw JSON Data
{
"trx_id": "8d4695e40aa21921cf37cd1a218946bddde65ec2",
"block": 4271479,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:34:27",
"op": [
"vote",
{
"voter": "mastercore",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}daycrypterupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
daycrypterupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | daycrypter |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4271323/Trx 84bbb4ce9233081569a02ca218b0f904a5901984 |
View Raw JSON Data
{
"trx_id": "84bbb4ce9233081569a02ca218b0f904a5901984",
"block": 4271323,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:26:39",
"op": [
"vote",
{
"voter": "daycrypter",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}kasekupvoted (100.00%) @urbanchick / the-real-reason-why-everyone-comes-to-steemit
kasekupvoted (100.00%) @urbanchick / the-real-reason-why-everyone-comes-to-steemit
| voter | kasek |
| author | urbanchick |
| permlink | the-real-reason-why-everyone-comes-to-steemit |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4271277/Trx 450be912e66b4f6e91da0ea97b760ed39b163243 |
View Raw JSON Data
{
"trx_id": "450be912e66b4f6e91da0ea97b760ed39b163243",
"block": 4271277,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:24:15",
"op": [
"vote",
{
"voter": "kasek",
"author": "urbanchick",
"permlink": "the-real-reason-why-everyone-comes-to-steemit",
"weight": 10000
}
]
}kasekupvoted (100.00%) @steemit777 / these-horses-are-so-beautiful-you-won-t-believe-they-re-real
kasekupvoted (100.00%) @steemit777 / these-horses-are-so-beautiful-you-won-t-believe-they-re-real
| voter | kasek |
| author | steemit777 |
| permlink | these-horses-are-so-beautiful-you-won-t-believe-they-re-real |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4271209/Trx 35a1640fe22d5a997e6c30506c1529175a233c4c |
View Raw JSON Data
{
"trx_id": "35a1640fe22d5a997e6c30506c1529175a233c4c",
"block": 4271209,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:20:51",
"op": [
"vote",
{
"voter": "kasek",
"author": "steemit777",
"permlink": "these-horses-are-so-beautiful-you-won-t-believe-they-re-real",
"weight": 10000
}
]
}kasekupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
kasekupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | kasek |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4271109/Trx 303bed8c6b2732c30635e8e93c0d013b02d3096d |
View Raw JSON Data
{
"trx_id": "303bed8c6b2732c30635e8e93c0d013b02d3096d",
"block": 4271109,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:15:48",
"op": [
"vote",
{
"voter": "kasek",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}ostapenkoupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
ostapenkoupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | ostapenko |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4271098/Trx cfdb989fff7241aa909124c9a8d4c9903a59df6b |
View Raw JSON Data
{
"trx_id": "cfdb989fff7241aa909124c9a8d4c9903a59df6b",
"block": 4271098,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:15:15",
"op": [
"vote",
{
"voter": "ostapenko",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}bofymupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
bofymupvoted (100.00%) @kasek / 10-most-ingenious-bacon-creations
| voter | bofym |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4271087/Trx 39caa2fe96c5b5d6c22ae85df01e3d5437e57957 |
View Raw JSON Data
{
"trx_id": "39caa2fe96c5b5d6c22ae85df01e3d5437e57957",
"block": 4271087,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:14:42",
"op": [
"vote",
{
"voter": "bofym",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"weight": 10000
}
]
}kasekpublished a new post: 10-most-ingenious-bacon-creations
kasekpublished a new post: 10-most-ingenious-bacon-creations
| parent author | |
| parent permlink | food |
| author | kasek |
| permlink | 10-most-ingenious-bacon-creations |
| title | 10 Most Ingenious Bacon Creations |
| body | In no particular order, these are the 10 most innovative ways of using our most beloved of cured meats. 1. Woven bacon taco shell http://dudefoods.com/wordpress/wp-content/uploads/2013/05/BaconWeaveTaco3111.jpg 2. Bacon covered onion rings https://s-media-cache-ak0.pinimg.com/564x/84/7f/49/847f49b2fd8438a8e0c6ac6181880d07.jpg 3. Bacon pancake dippers http://cdn.foodbeast.com/content/uploads/2014/03/bacon-pancake-dippers.jpg 4. Bacon s'mores http://weknowmemes.com/wp-content/uploads/2014/09/things-made-out-of-bacon.jpg 5. Bacon nachos http://www.cookingpassion.org/wp-content/uploads/2013/12/Bacon-Nachos.jpg 6. Bacon wrapped wings http://az810478.vo.msecnd.net/media/images/default-source/Recipes/bacon/bacon-wrapped-asian-chicken-wings.jpg?sfvrsn=6 7. Bacon ice cream https://upload.wikimedia.org/wikipedia/commons/3/3f/Nitro-Scrambled_Egg_and_Bacon_Ice_Cream.jpg 8. Bacon-wrapped grilled cheese https://img.buzzfeed.com/buzzfeed-static/static/2015-06/9/11/enhanced/webdr05/enhanced-4875-1433865112-1.jpg 9. Bacon cinnamon rolls http://rainydaygal.com/wp-content/uploads/2009/12/IMG_8900-800x533.jpg 10. Bacon-wrapped sushi http://www.foodista.com/sites/default/files/styles/featured/public/field/image/bacon-sushi-upload-1.jpg ENJOY! |
| json metadata | {"tags":["food","life","bacon","meat","eat"],"image":["http://dudefoods.com/wordpress/wp-content/uploads/2013/05/BaconWeaveTaco3111.jpg"]} |
| Transaction Info | Block #4271082/Trx 1754bd9a9c2cefa36459846dfb1034aaf0347690 |
View Raw JSON Data
{
"trx_id": "1754bd9a9c2cefa36459846dfb1034aaf0347690",
"block": 4271082,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T09:14:27",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "food",
"author": "kasek",
"permlink": "10-most-ingenious-bacon-creations",
"title": "10 Most Ingenious Bacon Creations",
"body": "In no particular order, these are the 10 most innovative ways of using our most beloved of cured meats.\n\n1. Woven bacon taco shell\n\nhttp://dudefoods.com/wordpress/wp-content/uploads/2013/05/BaconWeaveTaco3111.jpg\n\n2. Bacon covered onion rings\n\nhttps://s-media-cache-ak0.pinimg.com/564x/84/7f/49/847f49b2fd8438a8e0c6ac6181880d07.jpg\n\n3. Bacon pancake dippers\n\nhttp://cdn.foodbeast.com/content/uploads/2014/03/bacon-pancake-dippers.jpg\n\n4. Bacon s'mores\n\nhttp://weknowmemes.com/wp-content/uploads/2014/09/things-made-out-of-bacon.jpg\n\n5. Bacon nachos\n\nhttp://www.cookingpassion.org/wp-content/uploads/2013/12/Bacon-Nachos.jpg\n\n6. Bacon wrapped wings\n\nhttp://az810478.vo.msecnd.net/media/images/default-source/Recipes/bacon/bacon-wrapped-asian-chicken-wings.jpg?sfvrsn=6\n\n7. Bacon ice cream\n\nhttps://upload.wikimedia.org/wikipedia/commons/3/3f/Nitro-Scrambled_Egg_and_Bacon_Ice_Cream.jpg\n\n8. Bacon-wrapped grilled cheese\n\nhttps://img.buzzfeed.com/buzzfeed-static/static/2015-06/9/11/enhanced/webdr05/enhanced-4875-1433865112-1.jpg\n\n9. Bacon cinnamon rolls\n\nhttp://rainydaygal.com/wp-content/uploads/2009/12/IMG_8900-800x533.jpg\n\n10. Bacon-wrapped sushi\n\nhttp://www.foodista.com/sites/default/files/styles/featured/public/field/image/bacon-sushi-upload-1.jpg\n\n\nENJOY!",
"json_metadata": "{\"tags\":[\"food\",\"life\",\"bacon\",\"meat\",\"eat\"],\"image\":[\"http://dudefoods.com/wordpress/wp-content/uploads/2013/05/BaconWeaveTaco3111.jpg\"]}"
}
]
}| voter | ekitcho |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4269247/Trx 584f5716884d7ed2e882d1236c6fa89da0bfc71f |
View Raw JSON Data
{
"trx_id": "584f5716884d7ed2e882d1236c6fa89da0bfc71f",
"block": 4269247,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T07:42:12",
"op": [
"vote",
{
"voter": "ekitcho",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"weight": 10000
}
]
}| parent author | tuck-fheman |
| parent permlink | what-will-happen-to-steemit-once-a-global-entity-controls-icann |
| author | kasek |
| permlink | re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z |
| title | |
| body | I would have to clarify a few facts. Firstly, the United states do not control ICANN and the control of ICANN is not going to any global body, and certainly not the UN. ICANN will remain independent. The only thing that will change is the IANA stewardship. IANA is a department within ICANN. Currently, in order to edit names and numbers on the root nodes, IANA has to go through NTIA, who come under the department of commerce and perform only a clerical role. All that will happen now is that ICANN will take over that role and makes ICANN more independent. |
| json metadata | {"tags":["news"]} |
| Transaction Info | Block #4268903/Trx d9e2f4f55949eb87ef53aebf837aa4954c736b32 |
View Raw JSON Data
{
"trx_id": "d9e2f4f55949eb87ef53aebf837aa4954c736b32",
"block": 4268903,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T07:24:54",
"op": [
"comment",
{
"parent_author": "tuck-fheman",
"parent_permlink": "what-will-happen-to-steemit-once-a-global-entity-controls-icann",
"author": "kasek",
"permlink": "re-tuck-fheman-what-will-happen-to-steemit-once-a-global-entity-controls-icann-20160821t072456684z",
"title": "",
"body": "I would have to clarify a few facts. Firstly, the United states do not control ICANN and the control of ICANN is not going to any global body, and certainly not the UN. ICANN will remain independent. The only thing that will change is the IANA stewardship. IANA is a department within ICANN. Currently, in order to edit names and numbers on the root nodes, IANA has to go through NTIA, who come under the department of commerce and perform only a clerical role. All that will happen now is that ICANN will take over that role and makes ICANN more independent.",
"json_metadata": "{\"tags\":[\"news\"]}"
}
]
}| parent author | steemlinks |
| parent permlink | code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post |
| author | kasek |
| permlink | re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t055742094z |
| title | |
| body | "The way the Internet was supposed to work" is what they said of Ethereum. Well there are a few correlations in terms of code and how things developed in the early days. I look at how the Internet developed and meetings such as the IETF and IGF and how code is applied. Blockchain however seems to be - in many ways - carving out a path of its own in terms of code. |
| json metadata | {"tags":["ethereum"]} |
| Transaction Info | Block #4267166/Trx c91255f63f851d0bada2c8bfe30f97f413c35e62 |
View Raw JSON Data
{
"trx_id": "c91255f63f851d0bada2c8bfe30f97f413c35e62",
"block": 4267166,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T05:57:39",
"op": [
"comment",
{
"parent_author": "steemlinks",
"parent_permlink": "code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post",
"author": "kasek",
"permlink": "re-steemlinks-code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post-20160821t055742094z",
"title": "",
"body": "\"The way the Internet was supposed to work\" is what they said of Ethereum. Well there are a few correlations in terms of code and how things developed in the early days. I look at how the Internet developed and meetings such as the IETF and IGF and how code is applied. Blockchain however seems to be - in many ways - carving out a path of its own in terms of code.",
"json_metadata": "{\"tags\":[\"ethereum\"]}"
}
]
}| voter | kasek |
| author | steemlinks |
| permlink | code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4267042/Trx 64a00b04888353cfc8d30dd61eecee5d9ed74451 |
View Raw JSON Data
{
"trx_id": "64a00b04888353cfc8d30dd61eecee5d9ed74451",
"block": 4267042,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T05:51:24",
"op": [
"vote",
{
"voter": "kasek",
"author": "steemlinks",
"permlink": "code-is-not-law-if-it-was-really-law-it-would-be-settled-and-we-wouldn-t-be-having-this-steemit-blog-post",
"weight": 10000
}
]
}kasekupvoted (100.00%) @angelm / re-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z
kasekupvoted (100.00%) @angelm / re-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z
| voter | kasek |
| author | angelm |
| permlink | re-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4266990/Trx 7d709299c7ceebbf0c69fb7fa20982c442be289d |
View Raw JSON Data
{
"trx_id": "7d709299c7ceebbf0c69fb7fa20982c442be289d",
"block": 4266990,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-21T05:48:48",
"op": [
"vote",
{
"voter": "kasek",
"author": "angelm",
"permlink": "re-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z",
"weight": 10000
}
]
}angelmupvoted (100.00%) @kasek / re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
angelmupvoted (100.00%) @kasek / re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
| voter | angelm |
| author | kasek |
| permlink | re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4252156/Trx fa086c401b0510cf21cd9da7d9ec3b608826dcd0 |
View Raw JSON Data
{
"trx_id": "fa086c401b0510cf21cd9da7d9ec3b608826dcd0",
"block": 4252156,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T17:24:27",
"op": [
"vote",
{
"voter": "angelm",
"author": "kasek",
"permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
"weight": 10000
}
]
}| parent author | kasek |
| parent permlink | re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z |
| author | angelm |
| permlink | re-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z |
| title | |
| body | Yes, and now I can't imagine doing anything else. The things women do and say make it the best business ever! |
| json metadata | {"tags":["sex"]} |
| Transaction Info | Block #4249345/Trx 5ee0b88ce7575bf9043a9e5cbd703cf6809ada5d |
View Raw JSON Data
{
"trx_id": "5ee0b88ce7575bf9043a9e5cbd703cf6809ada5d",
"block": 4249345,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T15:03:30",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
"author": "angelm",
"permlink": "re-kasek-re-angelm-my-life-as-a-dildo-slinger-20160820t150332609z",
"title": "",
"body": "Yes, and now I can't imagine doing anything else. The things women do and say make it the best business ever!",
"json_metadata": "{\"tags\":[\"sex\"]}"
}
]
}markrmorrisjrupvoted (100.00%) @kasek / re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
markrmorrisjrupvoted (100.00%) @kasek / re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
| voter | markrmorrisjr |
| author | kasek |
| permlink | re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4248973/Trx 47fb8dc097a945e3a8869442ffc19646b275ff0e |
View Raw JSON Data
{
"trx_id": "47fb8dc097a945e3a8869442ffc19646b275ff0e",
"block": 4248973,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T14:44:51",
"op": [
"vote",
{
"voter": "markrmorrisjr",
"author": "kasek",
"permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
"weight": 10000
}
]
}| voter | proglobyte |
| author | kasek |
| permlink | un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4239480/Trx b7e6b18c23e10a98482789d9cfaedd85eba0b216 |
View Raw JSON Data
{
"trx_id": "b7e6b18c23e10a98482789d9cfaedd85eba0b216",
"block": 4239480,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T06:47:57",
"op": [
"vote",
{
"voter": "proglobyte",
"author": "kasek",
"permlink": "un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty",
"weight": 10000
}
]
}| voter | snowcrash |
| author | kasek |
| permlink | un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4239108/Trx c11c3f0e7ed169ac371e71e94f00b46081357838 |
View Raw JSON Data
{
"trx_id": "c11c3f0e7ed169ac371e71e94f00b46081357838",
"block": 4239108,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T06:29:21",
"op": [
"vote",
{
"voter": "snowcrash",
"author": "kasek",
"permlink": "un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty",
"weight": 10000
}
]
}kasekupvoted (100.00%) @mxu111 / asian-americans-bullied-at-schools
kasekupvoted (100.00%) @mxu111 / asian-americans-bullied-at-schools
| voter | kasek |
| author | mxu111 |
| permlink | asian-americans-bullied-at-schools |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4238762/Trx 32588b4c6c432d5e23ddd712026c7dcbf2238f80 |
View Raw JSON Data
{
"trx_id": "32588b4c6c432d5e23ddd712026c7dcbf2238f80",
"block": 4238762,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T06:11:51",
"op": [
"vote",
{
"voter": "kasek",
"author": "mxu111",
"permlink": "asian-americans-bullied-at-schools",
"weight": 10000
}
]
}kasekupvoted (100.00%) @ingenesist / how-blockchains-will-reorganize-society
kasekupvoted (100.00%) @ingenesist / how-blockchains-will-reorganize-society
| voter | kasek |
| author | ingenesist |
| permlink | how-blockchains-will-reorganize-society |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4238747/Trx c6c3c291b0dce961017e3781015b2422aa940332 |
View Raw JSON Data
{
"trx_id": "c6c3c291b0dce961017e3781015b2422aa940332",
"block": 4238747,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T06:11:06",
"op": [
"vote",
{
"voter": "kasek",
"author": "ingenesist",
"permlink": "how-blockchains-will-reorganize-society",
"weight": 10000
}
]
}kasekupvoted (100.00%) @kasek / re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
kasekupvoted (100.00%) @kasek / re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z
| voter | kasek |
| author | kasek |
| permlink | re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4238733/Trx b9ecb919ab441e63d72951f8917cec25e59b7b92 |
View Raw JSON Data
{
"trx_id": "b9ecb919ab441e63d72951f8917cec25e59b7b92",
"block": 4238733,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T06:10:24",
"op": [
"vote",
{
"voter": "kasek",
"author": "kasek",
"permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
"weight": 10000
}
]
}| voter | kasek |
| author | proglobyte |
| permlink | the-great-steemit-debate-larken-rose-responds-to-my-response-to-which-i-respond |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4238394/Trx 913ff016cc9afdd938b7acafaa891b5e7fba27eb |
View Raw JSON Data
{
"trx_id": "913ff016cc9afdd938b7acafaa891b5e7fba27eb",
"block": 4238394,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T05:53:15",
"op": [
"vote",
{
"voter": "kasek",
"author": "proglobyte",
"permlink": "the-great-steemit-debate-larken-rose-responds-to-my-response-to-which-i-respond",
"weight": 10000
}
]
}| parent author | angelm |
| parent permlink | my-life-as-a-dildo-slinger |
| author | kasek |
| permlink | re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z |
| title | |
| body | LOL. One of those things that make you look back and think how did I get here. |
| json metadata | {"tags":["sex"]} |
| Transaction Info | Block #4238383/Trx 416ba1eed514b9d90f50f06dcd9314cdac369cf1 |
View Raw JSON Data
{
"trx_id": "416ba1eed514b9d90f50f06dcd9314cdac369cf1",
"block": 4238383,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T05:52:42",
"op": [
"comment",
{
"parent_author": "angelm",
"parent_permlink": "my-life-as-a-dildo-slinger",
"author": "kasek",
"permlink": "re-angelm-my-life-as-a-dildo-slinger-20160820t055242295z",
"title": "",
"body": "LOL. One of those things that make you look back and think how did I get here.",
"json_metadata": "{\"tags\":[\"sex\"]}"
}
]
}kasekupvoted (100.00%) @angelm / my-life-as-a-dildo-slinger
kasekupvoted (100.00%) @angelm / my-life-as-a-dildo-slinger
| voter | kasek |
| author | angelm |
| permlink | my-life-as-a-dildo-slinger |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4238360/Trx 8de324a1c4d5867c592456ff33c850463e5a7ef2 |
View Raw JSON Data
{
"trx_id": "8de324a1c4d5867c592456ff33c850463e5a7ef2",
"block": 4238360,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T05:51:33",
"op": [
"vote",
{
"voter": "kasek",
"author": "angelm",
"permlink": "my-life-as-a-dildo-slinger",
"weight": 10000
}
]
}| parent author | waldemar-kuhn |
| parent permlink | stay-a-while-tomorrowland-edition-dimitri-vegas-and-like-mike |
| author | kasek |
| permlink | re-waldemar-kuhn-stay-a-while-tomorrowland-edition-dimitri-vegas-and-like-mike-20160820t054856275z |
| title | |
| body | Very nice indeed. One day I hope to go to Tomorrowland. |
| json metadata | {"tags":["music"]} |
| Transaction Info | Block #4238308/Trx 528e5fbb2948bd86636820a6e68687287279c63d |
View Raw JSON Data
{
"trx_id": "528e5fbb2948bd86636820a6e68687287279c63d",
"block": 4238308,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T05:48:57",
"op": [
"comment",
{
"parent_author": "waldemar-kuhn",
"parent_permlink": "stay-a-while-tomorrowland-edition-dimitri-vegas-and-like-mike",
"author": "kasek",
"permlink": "re-waldemar-kuhn-stay-a-while-tomorrowland-edition-dimitri-vegas-and-like-mike-20160820t054856275z",
"title": "",
"body": "Very nice indeed. One day I hope to go to Tomorrowland.",
"json_metadata": "{\"tags\":[\"music\"]}"
}
]
}kasekupvoted (100.00%) @levycore / kalimaya-the-queen-of-gemstone
kasekupvoted (100.00%) @levycore / kalimaya-the-queen-of-gemstone
| voter | kasek |
| author | levycore |
| permlink | kalimaya-the-queen-of-gemstone |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4238293/Trx 7f5f0d8cacb9edfb27f21563d87b4423d00d7b54 |
View Raw JSON Data
{
"trx_id": "7f5f0d8cacb9edfb27f21563d87b4423d00d7b54",
"block": 4238293,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T05:48:12",
"op": [
"vote",
{
"voter": "kasek",
"author": "levycore",
"permlink": "kalimaya-the-queen-of-gemstone",
"weight": 10000
}
]
}| voter | kasek |
| author | kasek |
| permlink | un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4238212/Trx c68e6a68a54e5990fd640231afd1f42436739f7f |
View Raw JSON Data
{
"trx_id": "c68e6a68a54e5990fd640231afd1f42436739f7f",
"block": 4238212,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T05:44:06",
"op": [
"vote",
{
"voter": "kasek",
"author": "kasek",
"permlink": "un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty",
"weight": 10000
}
]
}kasekpublished a new post: un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty
kasekpublished a new post: un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty
| parent author | |
| parent permlink | cybersecurity |
| author | kasek |
| permlink | un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty |
| title | UN and Cybersecurity: The Likelihood and Implications of a Global Cyber Treaty |
| body | <html> <p><em><strong>by Kasek Galgal</strong></em></p> <p>“<em>I think they are going to say I have committed grave crimes, I have violated the Espionage Act. They are going to say I have aided our enemies in making them aware of these systems. But this argument can be made against anyone who reveals information that points out mass surveillance systems</em>” (Snowden, 2014). That is what Edward Snowden had to say when being interviewed by Glenn Greenwald of The Guardian, stating also that U.S surveillance was not something he was willing to live under (Greenwald, et al, 2013).<br> Edward Snowden is an American IT professional who worked as a cyber security contractor for the United States' National Security Agency (NSA) as well as their Central Intelligence Agency (CIA) (Cole & Brunker, 2014). During which time he had access to highly confidential information. Some of this information including that of the United States NSA having ongoing mass surveillance programs did not sit well with Snowden's views on privacy. Hence, in May 2013, he began revealing some of this information to renowned journalists; Glenn Greenwald, Laura Poitras and Barton Gellman (Cole & Brunker, 2014). His revelations were met with varied reception. Some calling him a champion of Internet freedom, others labeling him as a traitor for leaking state secrets. But in the grand scheme of things, how does this affect the global agreements on such issues as cybersecurity, cybercrime, cyber espionage and sabotage? Does it affect the likelihood of a global cyber treaty? And what implications will this cyber treaty have on international relations, the privacy of citizens and on the world as a whole?<br> <img src="https://upload.wikimedia.org/wikipedia/commons/thumb/d/d8/United_Nations_Flags_-_cropped.jpg/640px-United_Nations_Flags_-_cropped.jpg" width="640" height="427"/></p> <p>In light of these recent developments, the International Telecommunications Union (ITU) (a member of the United Nations development group) Secretary General Dr. Hamadoun Touré had been quoted as saying that "It gives us an opportunity, and I keep saying let's build bridges" in an interview with Reuters (Miles, 2013). ITU is one of the world's respected organisations in terms of standards in ICT and its policing. Dr. Touré goes on to say that he had been calling for a cyber treaty for some time and that countries were reluctant to discuss the issue and would instead blame each other for attacks.<br> </p> <p>So what is this “opportunity” that Secretary General Touré was referring to? Well, as is the case with any form of espionage, mass surveillance and the like, no country wants to admit that they are involved in such activities. And cybercrime and espionage are no different. A constant game of denial and accusations ensues without fruitful discussion and without positive outcomes, as Dr. Touré explained (Miles, 2013). But now with the information being revealed by Snowden, it exposes the fact that the United States are involved in mass surveillance and are investing in activities that would constitute cybercrimes and that it is very likely that other countries are involved in similar activities. This puts everything in the open now and can allow for fruitful discussion on the issue as the facts state that politically motivated cybercrimes such as espionage is not a myth and positive outcomes such as a cyber treaty can be developed.<br> </p> <p>But what are the possibilities of a cyber treaty on cybercrime and cybersecurity? It is often stated that the cyber world is a mere reflection of the “real world”. Whether we like it or not, cyberspace is part of the real world as we know it. Thus, the crimes committed in cyberspace must be treated as real crime. “Traditional” espionage and sabotage have effects on a country's economic and political stability and the potential of sparking warfare. Thus there are treaties in place to prevent countries from spying and sabotaging. Cyber attacks and cyber espionage can also destabilise countries and have the same potential to create conflict. This begs the question whether or not efforts have been made to put in place such a treaty to prevent cybercrime and to ensure a level of cybersecurity for citizens. One may point to the Council of Europe Convention on Cybercrime as the leading international agreement on cybercrime and cybersecurity. But what impact has this convention had? And what implications has it had on current national and regional approaches to cybercrime and cybersecurity?</p> <p>After four years of work, the Council of Europe drafted the Convention on Cybercrime on the 8th of November 2001. Later that month, on November 23, 2001, what is now known as the Budapest convention was open for signing (Keyser, 2002). There are currently forty-four states that have signed and ratified the convention which looks to harmonise national cyber laws in order to make the task of policing cybercrime more efficient on an international level (Council of Europe, 2014). Under the convention, countries who ratify must legislate a minimum list of nine acts such as online fraud and child pornography as criminal offenses. The convention also looks to put in place procedures and mechanisms that enhance international cooperation in the fight against cybercrime. The convention has won particular praise for its ability to avoid conflict and to overcome jurisdictional obstacles when investigating cybercrime (Robel, 2006).<br> </p> <p>Being the first of its kind in terms of international treaties dealing with cybercrime, the Budapest convention gained support from the Council of Europe's member states. However, the convention was not without its critics and its potential pitfalls. A particular issue may not be with the convention itself but with its adoption (Weber, 2003). With only forty-four states having ratified the convention, it is not a universally adopted convention. This doesn't actually solve the issue of jurisdiction. This allows cyber criminals to conduct their operations without much fear of the law in countries that have yet to ratify the convention. Countries without effective cybercrime laws and lacking enforcement can potentially become havens for cyber criminals. With notable countries which pose a cyber risk such as China, Indonesia and South Korea having not signed the convention, it could have an adverse effect on the global fight against cybercrime. Robel (2006) illustrates how this treaty can be circumvented by attacking a country like the United States by going through several countries outside the convention and attacking U.S offshore operations in a country that is also outside the convention. Dr. Touré of the UN's ITU is also known to express his reservations on the convention. He was reported stating that the treaty is now somewhat outdated and having most of the contribution toward the convention being from European countries (Harley, 2010). There have been reservations expressed by countries about some aspects of the convention. One such example is Brazil's concerns over certain aspects relating to the criminalization of intellectual property infringements (Harley, 2010). This certainly doesn't help the cause for a global cyber treaty to be put in place but a lot can be learned from this pioneering piece of work. Improvements can be made and better treaties can be drafted.</p> <p><img src="https://upload.wikimedia.org/wikipedia/commons/thumb/a/a6/Anonymous_emblem.svg/480px-Anonymous_emblem.svg.png" width="480" height="480"/></p> <p>So the Council of Europe's Convention of Cybercrime may not be without its pitfalls as pointed out by numerous experts, but that does not mean there is no likelihood of a global cyber treaty. In relation to Dr. Touré's comments in a Reuters interview with regard to Snowden's revelations - “ It gives us an opportunity, and I keep saying let's build bridges” - as well as his reservation that the Budapest convention was drafted mostly by European states, I believe it is an opportunity for a larger global organisation such as his own ITU or the UN to take the lead with this proposed idea of a global cyber treaty. According to the same Reuters article that ITU are working closely with the UN Office on Drugs and Crime as well as with Interpol on how best to enforce laws in cyber space (Miles, 2013). Particularly after the UN had rejected a bid for an international cyber treaty back in 2010 (Ballard, 2010), I believe this is a step in the right direction. And the possibility of such a treaty may have just improved given the recent events and concerns raised.<br> </p> <p>As can be seen with other UN treaties such as their most ratified treaties in “The Vienna Convention and Montreal Protocols on Substances that Deplete the Ozone Layer” and the “United Nations Framework Convention on Climate Change” which have nearly Universal participation, it is possible for a the UN to garner more ratification for a treaty (United Nations Blog, 2012). So as stated earlier, one of the major issues in the pioneering work in the Council of Europe Convention on Cybercrime was the participation has managed to garner. More participation mean better harmonisation of national laws and better regional and global cooperation in policing cyber space.<br> </p> <p>In conclusion, the events surrounding the Snowden's revelations and the US NSA has made it clear that something has to be done about the growing issue of cyber security. Previous work done in the Budapest Convention have not been able to provide tangible results in alleviating the problem as we've seen. In support of what Dr. Touré's had to say, there needs to be a global cyber treaty put in place. And I believe the UN should be the ones to lead the way in this respect. It would have positive implications on regional and global efforts against cybercrime as the UN, from their record, would be better able to garner greater participation. Being a world-leading organisation, their treaties have more ratification and are adhered to better such as the widely adhered “United Nations Convention on the Law of the Sea”. Hence, the possibilities of having a global cyber treaty are improving, and if things keep going as they are, it may even be seen as a necessity. <br> </p> <p><br></p> <p>References<br> </p> <p>Ballard, M. 2010. <em>UN Rejects International Cybercrime Treaty </em>Available at: <a href="http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty">http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty</a> [19 December 2014]<br> Cole & Brunker. 2014. <em>Edward Snowden: A Timeline. </em>Available at: <a href="http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871">http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871</a> [19 December 2014]<br> Council of Europe. 2014. <em>Convention on Cybercrime. </em>Available at: <a href="http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG">http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG</a> [18 December 2014]<br> Greenwald, Poitras & McAskill. 2013. <em>Edward Snowden: US surveillance 'not something I'm willing to live under.' </em>Available from: <a href="http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview">http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview</a> [11 December 2014]<br> </p> <ol> <li>Harley, B. 2010 <em>A Global Convention on Cybercrime</em>? Available at: <a href="http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/">http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/</a> [20 December 2014].</li> </ol> <p>Keyser, M. 2002. Council of Europe Convention on Cybercrime, The. <em>J. Transnat'l L. & Pol'y</em>, <em>12</em>, 287.<br> </p> <p>Miles, T. 2013 <em>Snowden affair is chance for truce in cyber war: U.N. </em>Available at:<a href="http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715">http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715</a> [14 December 2014]<br> Robel, D. 2006. International cybercrime treaty: Looking beyond ratification. <em>Sans Institute Reading Room</em>, <em>15</em>.<br> Staff Writer, United Nations Blog. 2012. <em>Most Ratified International Treaties</em>. Available at: http://blogs.un.org/blog/2012/09/24/most-ratified-international-treaties/#sthash.je4fFVxF.dp</p> <p><br></p> </html> |
| json metadata | {"tags":["cybersecurity","un","life","snowden","unitednations"],"image":["https://upload.wikimedia.org/wikipedia/commons/thumb/d/d8/United_Nations_Flags_-_cropped.jpg/640px-United_Nations_Flags_-_cropped.jpg","https://upload.wikimedia.org/wikipedia/commons/thumb/a/a6/Anonymous_emblem.svg/480px-Anonymous_emblem.svg.png"],"links":["http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty","http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871","http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG","http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview","http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/","http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715","http://blogs.un.org/blog/2012/09/24/most-ratified-international-treaties/#sthash.je4fFVxF.dp"]} |
| Transaction Info | Block #4238166/Trx 8585440d514ef90340b9e846517e35bffc2b4baa |
View Raw JSON Data
{
"trx_id": "8585440d514ef90340b9e846517e35bffc2b4baa",
"block": 4238166,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T05:41:48",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "cybersecurity",
"author": "kasek",
"permlink": "un-and-cybersecurity-the-likelihood-and-implications-of-a-global-cyber-treaty",
"title": "UN and Cybersecurity: The Likelihood and Implications of a Global Cyber Treaty",
"body": "<html>\n<p><em><strong>by Kasek Galgal</strong></em></p>\n<p>“<em>I think they are going to say I have committed grave crimes, I have violated the Espionage Act. They are going to say I have aided our enemies in making them aware of these systems. But this argument can be made against anyone who reveals information that points out mass surveillance systems</em>” (Snowden, 2014). That is what Edward Snowden had to say when being interviewed by Glenn Greenwald of The Guardian, stating also that U.S surveillance was not something he was willing to live under (Greenwald, et al, 2013).<br>\nEdward Snowden is an American IT professional who worked as a cyber security contractor for the United States' National Security Agency (NSA) as well as their Central Intelligence Agency (CIA) (Cole & Brunker, 2014). During which time he had access to highly confidential information. Some of this information including that of the United States NSA having ongoing mass surveillance programs did not sit well with Snowden's views on privacy. Hence, in May 2013, he began revealing some of this information to renowned journalists; Glenn Greenwald, Laura Poitras and Barton Gellman (Cole & Brunker, 2014). His revelations were met with varied reception. Some calling him a champion of Internet freedom, others labeling him as a traitor for leaking state secrets. But in the grand scheme of things, how does this affect the global agreements on such issues as cybersecurity, cybercrime, cyber espionage and sabotage? Does it affect the likelihood of a global cyber treaty? And what implications will this cyber treaty have on international relations, the privacy of citizens and on the world as a whole?<br>\n<img src=\"https://upload.wikimedia.org/wikipedia/commons/thumb/d/d8/United_Nations_Flags_-_cropped.jpg/640px-United_Nations_Flags_-_cropped.jpg\" width=\"640\" height=\"427\"/></p>\n<p>In light of these recent developments, the International Telecommunications Union (ITU) (a member of the United Nations development group) Secretary General Dr. Hamadoun Touré had been quoted as saying that \"It gives us an opportunity, and I keep saying let's build bridges\" in an interview with Reuters (Miles, 2013). ITU is one of the world's respected organisations in terms of standards in ICT and its policing. Dr. Touré goes on to say that he had been calling for a cyber treaty for some time and that countries were reluctant to discuss the issue and would instead blame each other for attacks.<br>\n</p>\n<p>So what is this “opportunity” that Secretary General Touré was referring to? Well, as is the case with any form of espionage, mass surveillance and the like, no country wants to admit that they are involved in such activities. And cybercrime and espionage are no different. A constant game of denial and accusations ensues without fruitful discussion and without positive outcomes, as Dr. Touré explained (Miles, 2013). But now with the information being revealed by Snowden, it exposes the fact that the United States are involved in mass surveillance and are investing in activities that would constitute cybercrimes and that it is very likely that other countries are involved in similar activities. This puts everything in the open now and can allow for fruitful discussion on the issue as the facts state that politically motivated cybercrimes such as espionage is not a myth and positive outcomes such as a cyber treaty can be developed.<br>\n</p>\n<p>But what are the possibilities of a cyber treaty on cybercrime and cybersecurity? It is often stated that the cyber world is a mere reflection of the “real world”. Whether we like it or not, cyberspace is part of the real world as we know it. Thus, the crimes committed in cyberspace must be treated as real crime. “Traditional” espionage and sabotage have effects on a country's economic and political stability and the potential of sparking warfare. Thus there are treaties in place to prevent countries from spying and sabotaging. Cyber attacks and cyber espionage can also destabilise countries and have the same potential to create conflict. This begs the question whether or not efforts have been made to put in place such a treaty to prevent cybercrime and to ensure a level of cybersecurity for citizens. One may point to the Council of Europe Convention on Cybercrime as the leading international agreement on cybercrime and cybersecurity. But what impact has this convention had? And what implications has it had on current national and regional approaches to cybercrime and cybersecurity?</p>\n<p>After four years of work, the Council of Europe drafted the Convention on Cybercrime on the 8th of November 2001. Later that month, on November 23, 2001, what is now known as the Budapest convention was open for signing (Keyser, 2002). There are currently forty-four states that have signed and ratified the convention which looks to harmonise national cyber laws in order to make the task of policing cybercrime more efficient on an international level (Council of Europe, 2014). Under the convention, countries who ratify must legislate a minimum list of nine acts such as online fraud and child pornography as criminal offenses. The convention also looks to put in place procedures and mechanisms that enhance international cooperation in the fight against cybercrime. The convention has won particular praise for its ability to avoid conflict and to overcome jurisdictional obstacles when investigating cybercrime (Robel, 2006).<br>\n</p>\n<p>Being the first of its kind in terms of international treaties dealing with cybercrime, the Budapest convention gained support from the Council of Europe's member states. However, the convention was not without its critics and its potential pitfalls. A particular issue may not be with the convention itself but with its adoption (Weber, 2003). With only forty-four states having ratified the convention, it is not a universally adopted convention. This doesn't actually solve the issue of jurisdiction. This allows cyber criminals to conduct their operations without much fear of the law in countries that have yet to ratify the convention. Countries without effective cybercrime laws and lacking enforcement can potentially become havens for cyber criminals. With notable countries which pose a cyber risk such as China, Indonesia and South Korea having not signed the convention, it could have an adverse effect on the global fight against cybercrime. Robel (2006) illustrates how this treaty can be circumvented by attacking a country like the United States by going through several countries outside the convention and attacking U.S offshore operations in a country that is also outside the convention. Dr. Touré of the UN's ITU is also known to express his reservations on the convention. He was reported stating that the treaty is now somewhat outdated and having most of the contribution toward the convention being from European countries (Harley, 2010). There have been reservations expressed by countries about some aspects of the convention. One such example is Brazil's concerns over certain aspects relating to the criminalization of intellectual property infringements (Harley, 2010). This certainly doesn't help the cause for a global cyber treaty to be put in place but a lot can be learned from this pioneering piece of work. Improvements can be made and better treaties can be drafted.</p>\n<p><img src=\"https://upload.wikimedia.org/wikipedia/commons/thumb/a/a6/Anonymous_emblem.svg/480px-Anonymous_emblem.svg.png\" width=\"480\" height=\"480\"/></p>\n<p>So the Council of Europe's Convention of Cybercrime may not be without its pitfalls as pointed out by numerous experts, but that does not mean there is no likelihood of a global cyber treaty. In relation to Dr. Touré's comments in a Reuters interview with regard to Snowden's revelations - “ It gives us an opportunity, and I keep saying let's build bridges” - as well as his reservation that the Budapest convention was drafted mostly by European states, I believe it is an opportunity for a larger global organisation such as his own ITU or the UN to take the lead with this proposed idea of a global cyber treaty. According to the same Reuters article that ITU are working closely with the UN Office on Drugs and Crime as well as with Interpol on how best to enforce laws in cyber space (Miles, 2013). Particularly after the UN had rejected a bid for an international cyber treaty back in 2010 (Ballard, 2010), I believe this is a step in the right direction. And the possibility of such a treaty may have just improved given the recent events and concerns raised.<br>\n</p>\n<p>As can be seen with other UN treaties such as their most ratified treaties in “The Vienna Convention and Montreal Protocols on Substances that Deplete the Ozone Layer” and the “United Nations Framework Convention on Climate Change” which have nearly Universal participation, it is possible for a the UN to garner more ratification for a treaty (United Nations Blog, 2012). So as stated earlier, one of the major issues in the pioneering work in the Council of Europe Convention on Cybercrime was the participation has managed to garner. More participation mean better harmonisation of national laws and better regional and global cooperation in policing cyber space.<br>\n</p>\n<p>In conclusion, the events surrounding the Snowden's revelations and the US NSA has made it clear that something has to be done about the growing issue of cyber security. Previous work done in the Budapest Convention have not been able to provide tangible results in alleviating the problem as we've seen. In support of what Dr. Touré's had to say, there needs to be a global cyber treaty put in place. And I believe the UN should be the ones to lead the way in this respect. It would have positive implications on regional and global efforts against cybercrime as the UN, from their record, would be better able to garner greater participation. Being a world-leading organisation, their treaties have more ratification and are adhered to better such as the widely adhered “United Nations Convention on the Law of the Sea”. Hence, the possibilities of having a global cyber treaty are improving, and if things keep going as they are, it may even be seen as a necessity. <br>\n</p>\n<p><br></p>\n<p>References<br>\n</p>\n<p>Ballard, M. 2010. <em>UN Rejects International Cybercrime Treaty </em>Available at: <a href=\"http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty\">http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty</a> [19 December 2014]<br>\nCole & Brunker. 2014. <em>Edward Snowden: A Timeline. </em>Available at: <a href=\"http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871\">http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871</a> [19 December 2014]<br>\nCouncil of Europe. 2014. <em>Convention on Cybercrime. </em>Available at: <a href=\"http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG\">http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG</a> [18 December 2014]<br>\nGreenwald, Poitras & McAskill. 2013. <em>Edward Snowden: US surveillance 'not something I'm willing to live under.' </em>Available from: <a href=\"http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview\">http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview</a> [11 December 2014]<br>\n</p>\n<ol>\n <li>Harley, B. 2010 <em>A Global Convention on Cybercrime</em>? Available at: <a href=\"http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/\">http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/</a> [20 December 2014].</li>\n</ol>\n<p>Keyser, M. 2002. Council of Europe Convention on Cybercrime, The. <em>J. Transnat'l L. & Pol'y</em>, <em>12</em>, 287.<br>\n</p>\n<p>Miles, T. 2013 <em>Snowden affair is chance for truce in cyber war: U.N. </em>Available at:<a href=\"http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715\">http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715</a> [14 December 2014]<br>\nRobel, D. 2006. International cybercrime treaty: Looking beyond ratification. <em>Sans Institute Reading Room</em>, <em>15</em>.<br>\nStaff Writer, United Nations Blog. 2012. <em>Most Ratified International Treaties</em>. Available at: http://blogs.un.org/blog/2012/09/24/most-ratified-international-treaties/#sthash.je4fFVxF.dp</p>\n<p><br></p>\n</html>",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"un\",\"life\",\"snowden\",\"unitednations\"],\"image\":[\"https://upload.wikimedia.org/wikipedia/commons/thumb/d/d8/United_Nations_Flags_-_cropped.jpg/640px-United_Nations_Flags_-_cropped.jpg\",\"https://upload.wikimedia.org/wikipedia/commons/thumb/a/a6/Anonymous_emblem.svg/480px-Anonymous_emblem.svg.png\"],\"links\":[\"http://www.computerweekly.com/news/1280092617/UN-rejects-international-cybercrime-treaty\",\"http://www.nbcnews.com/feature/edward-snowden-interview/edward-snowden-timeline-n114871\",\"http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG\",\"http://www.theguardian.com/world/2013/jul/08/edward-snowden-surveillance-excess-interview\",\"http://stlr.org/2010/03/23/a-global-convention-on-cybercrime/\",\"http://www.reuters.com/article/2013/07/15/net-us-usa-security-cybertruce-idUSBRE96E0L320130715\",\"http://blogs.un.org/blog/2012/09/24/most-ratified-international-treaties/#sthash.je4fFVxF.dp\"]}"
}
]
}kasekcustom json: follow
kasekcustom json: follow
| required auths | [] |
| required posting auths | ["kasek"] |
| id | follow |
| json | {"follower":"kasek","following":"rook","what":["blog"]} |
| Transaction Info | Block #4237551/Trx b8ea45726888ff3a6d634a7292a4bbaa1bddc3c9 |
View Raw JSON Data
{
"trx_id": "b8ea45726888ff3a6d634a7292a4bbaa1bddc3c9",
"block": 4237551,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-20T05:10:51",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"kasek"
],
"id": "follow",
"json": "{\"follower\":\"kasek\",\"following\":\"rook\",\"what\":[\"blog\"]}"
}
]
}| parent author | kasek |
| parent permlink | re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t110450403z |
| author | gardenofeden |
| permlink | re-kasek-re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t151455199z |
| title | |
| body | Modern society reflects a set of values that we don't agree with, so we don't comply and instead lead by example. |
| json metadata | {"tags":["homelessness"]} |
| Transaction Info | Block #4106603/Trx b7f664a61b5e0384e680e27edf6184d16ff8f2d0 |
View Raw JSON Data
{
"trx_id": "b7f664a61b5e0384e680e27edf6184d16ff8f2d0",
"block": 4106603,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-15T15:14:54",
"op": [
"comment",
{
"parent_author": "kasek",
"parent_permlink": "re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t110450403z",
"author": "gardenofeden",
"permlink": "re-kasek-re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t151455199z",
"title": "",
"body": "Modern society reflects a set of values that we don't agree with, so we don't comply and instead lead by example.",
"json_metadata": "{\"tags\":[\"homelessness\"]}"
}
]
}| parent author | sanosakis |
| parent permlink | 9-foods-which-do-the-most-damage-to-the-earth |
| author | kasek |
| permlink | re-sanosakis-9-foods-which-do-the-most-damage-to-the-earth-20160815t110835676z |
| title | |
| body | It is a tough one. You need to feed the masses somehow and yet, sustainability is crucial. Better technology or better habits from people is the key I guess. |
| json metadata | {"tags":["life"]} |
| Transaction Info | Block #4101734/Trx bbacbe45b917c3502460aeb7974c5753c9365334 |
View Raw JSON Data
{
"trx_id": "bbacbe45b917c3502460aeb7974c5753c9365334",
"block": 4101734,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-15T11:08:36",
"op": [
"comment",
{
"parent_author": "sanosakis",
"parent_permlink": "9-foods-which-do-the-most-damage-to-the-earth",
"author": "kasek",
"permlink": "re-sanosakis-9-foods-which-do-the-most-damage-to-the-earth-20160815t110835676z",
"title": "",
"body": "It is a tough one. You need to feed the masses somehow and yet, sustainability is crucial. Better technology or better habits from people is the key I guess.",
"json_metadata": "{\"tags\":[\"life\"]}"
}
]
}kasekupvoted (100.00%) @sanosakis / 9-foods-which-do-the-most-damage-to-the-earth
kasekupvoted (100.00%) @sanosakis / 9-foods-which-do-the-most-damage-to-the-earth
| voter | kasek |
| author | sanosakis |
| permlink | 9-foods-which-do-the-most-damage-to-the-earth |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4101690/Trx 1fa1757b21373324a5dca9c01f1f1cdb9c5a23ba |
View Raw JSON Data
{
"trx_id": "1fa1757b21373324a5dca9c01f1f1cdb9c5a23ba",
"block": 4101690,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-15T11:06:24",
"op": [
"vote",
{
"voter": "kasek",
"author": "sanosakis",
"permlink": "9-foods-which-do-the-most-damage-to-the-earth",
"weight": 10000
}
]
}| parent author | gardenofeden |
| parent permlink | sustainable-community-illegally-feeds-the-homeless |
| author | kasek |
| permlink | re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t110450403z |
| title | |
| body | Illegal to feed those who need it the most? You ever see those signs at the beachside fish & chips to not feed the birds? What has the world come to? |
| json metadata | {"tags":["homelessness"]} |
| Transaction Info | Block #4101659/Trx ef1df5075a190e70ebbdf549f666fec55da40a24 |
View Raw JSON Data
{
"trx_id": "ef1df5075a190e70ebbdf549f666fec55da40a24",
"block": 4101659,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-15T11:04:51",
"op": [
"comment",
{
"parent_author": "gardenofeden",
"parent_permlink": "sustainable-community-illegally-feeds-the-homeless",
"author": "kasek",
"permlink": "re-gardenofeden-sustainable-community-illegally-feeds-the-homeless-20160815t110450403z",
"title": "",
"body": "Illegal to feed those who need it the most? You ever see those signs at the beachside fish & chips to not feed the birds? What has the world come to?",
"json_metadata": "{\"tags\":[\"homelessness\"]}"
}
]
}kasekcustom json: follow
kasekcustom json: follow
| required auths | [] |
| required posting auths | ["kasek"] |
| id | follow |
| json | {"follower":"kasek","following":"matrixdweller","what":["blog"]} |
| Transaction Info | Block #4101156/Trx 0723214e0adc39fc3135278a6e88165853d812ef |
View Raw JSON Data
{
"trx_id": "0723214e0adc39fc3135278a6e88165853d812ef",
"block": 4101156,
"trx_in_block": 5,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-15T10:39:33",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"kasek"
],
"id": "follow",
"json": "{\"follower\":\"kasek\",\"following\":\"matrixdweller\",\"what\":[\"blog\"]}"
}
]
}kasekupvoted (100.00%) @kasek / sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure
kasekupvoted (100.00%) @kasek / sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure
| voter | kasek |
| author | kasek |
| permlink | sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4101146/Trx 0e27d198a11979efb72ae518209ffbb317a51636 |
View Raw JSON Data
{
"trx_id": "0e27d198a11979efb72ae518209ffbb317a51636",
"block": 4101146,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-15T10:39:03",
"op": [
"vote",
{
"voter": "kasek",
"author": "kasek",
"permlink": "sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure",
"weight": 10000
}
]
}matrixdwellerupvoted (100.00%) @kasek / sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure
matrixdwellerupvoted (100.00%) @kasek / sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure
| voter | matrixdweller |
| author | kasek |
| permlink | sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure |
| weight | 10000 (100.00%) |
| Transaction Info | Block #4101143/Trx 07cba88fb077660fb8eddcc8063bd6a3c519ec41 |
View Raw JSON Data
{
"trx_id": "07cba88fb077660fb8eddcc8063bd6a3c519ec41",
"block": 4101143,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2016-08-15T10:38:54",
"op": [
"vote",
{
"voter": "matrixdweller",
"author": "kasek",
"permlink": "sydney-blockchain-workshop-panel-blockchain-as-new-infrastructure",
"weight": 10000
}
]
}Manabar
Voting Power100.00%
Downvote Power100.00%
Resource Credits100.00%
Reputation Progress14.10%
{
"voting_manabar": {
"current_mana": 9949,
"last_update_time": 1472632836
},
"downvote_manabar": {
"current_mana": 0,
"last_update_time": 1471172733
},
"rc_account": {
"account": "kasek",
"rc_manabar": {
"current_mana": "12892024269",
"last_update_time": 1537887600
},
"max_rc_creation_adjustment": {
"amount": "2020748973",
"precision": 6,
"nai": "@@000000037"
},
"max_rc": "12892024269"
}
}Account Metadata
| POSTING JSON METADATA | |
| None | |
| JSON METADATA | |
| None |
{
"posting_json_metadata": {},
"json_metadata": {}
}Auth Keys
Owner
Single Signature
Public Keys
STM85pocrhd9CPmfk9rJx9wYknuDVe9d95fNWAMZASybtJ3HxtoVM1/1
Active
Single Signature
Public Keys
STM5LFJr5xZbSEQheKPAGrwHAUz9X3ykVmQAezzSNErHRstzzgofA1/1
Posting
Single Signature
Public Keys
STM73C5nZ8UxHL1QopUHnDwTvHaaxWUVXjpa75yQis3AuQBNSPjg61/1
Memo
STM7STiR6DokH84G1pnMfiEVfb8QmueeiJygEGeMQjPpuKzxaLzXx
{
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM85pocrhd9CPmfk9rJx9wYknuDVe9d95fNWAMZASybtJ3HxtoVM",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5LFJr5xZbSEQheKPAGrwHAUz9X3ykVmQAezzSNErHRstzzgofA",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM73C5nZ8UxHL1QopUHnDwTvHaaxWUVXjpa75yQis3AuQBNSPjg6",
1
]
]
},
"memo": "STM7STiR6DokH84G1pnMfiEVfb8QmueeiJygEGeMQjPpuKzxaLzXx"
}Witness Votes
0 / 30
No active witness votes.
[]