New Reports Shine a Spotlight on Tether’s Legal Status
February 9, 2018 | Kai Sedgwick,

Nicholas Weaver is a computer security researcher at the International Computer Science Institute in Berkeley. On Thursday, he published a piece in Lawfareblog giving his thoughts on the likelihood of Tether being targeted by U.S. regulators.

Berkeley computer security researcher Nick Weaver argues that form of "arbitrage"—running a crime scheme with profitable victims in one locale, while hosting in another that's safer from prosecution—can provide more effective shielding for criminals than Tor. "You find a place where the local laws are happy and host there," Weaver says. "A cybercrime forum that is 'no damage to Russia' is generally allowed in Russia, no need to use Tor."

How to Hack an Election: An Intelligence Analysis
February 6, 2018 | Eric Haseltine PhD, Psychology Today

For instance, CNN online published a story quoting Dr. Nicholas Weaver, of the International Computer Science Institute at the University of California, Berkeley. "Nobody is going to be able to change the outcome of the presidential vote by hacking voting machines. The system is too distributed, too decentralized, too many implementations for any individual actor or group to make substantial change."

"Over the past couple of months, a huge amount of tether has been created, it has shifted to the Bitfinex exchange and presumably buys bitcoin and other cryptos. This, I believe, has been keeping the price up," Nicholas Weaver, a senior researcher at the International Computer Science Institute at Berkeley, California, told CNBC by phone Thursday.

Nicholas Weaver, a professor from UC Berkeley’s International Computer Science Institute has warned that a “bloodbath” would ensue if the claims turn out to be true.

The types of phishing attacks that garner data like that are cheap, effective, hard to track and perfect for the American electoral system, says Nicholas Weaver, a researcher at the International Computer Science Institute.

To expect computing speeds, known in the cryptocurrency world as “hash rates,” to remain steady “is ridiculous,” said Nicholas Weaver, a lecturer at the University of California, Berkeley.

As Berkeley International Computer Science Institute researcher Nicholas Weaver noted, “The cost estimates are insanely wrong: Assumes no increase in mining rate, no power cost” (though the language does specify Kodak’s partner Spotlite will cover most operational costs including electricity).

WannaCry, Petya, NotPetya: how ransomware hit the big time in 2017
December 30, 2017 | Alex Hern, The Guardian

NotPetya had another oddity: it didn’t actually seem created to make money. The “ransomware” was coded in such a way that, even if users did pay up, their data could never be recovered. “I’m willing to say with at least moderate confidence that this was a deliberate, malicious, destructive attack or perhaps a test disguised as ransomware,” UC Berkeley academic Nicholas Weaver told the infosec blog Krebs on Security.

Wi-Fi + Malware = Surveillance Dealers' Answer To Spying On WhatsApp
December 4, 2017 | Thomas Fox-Brewster, Forbes

Nicholas Weaver, senior staff researcher focusing on computer security at the International Computer Science Institute at Berkeley, wasn't impressed with what Almenta advertised. "Really, this is a surveillance vendor taking some off-the-shelf tools, combining it with a directional antenna, slapping some [graphical user interface] on it, and probably selling it for way, way, way, way too much money," he said.