Jakarta, Pintu News—An Indian start-up company, Hornet, has developed software that allows police to track crypto wallets suspected of involvement in criminal activities such as money laundering, drug smuggling, and terrorism financing.
The software can also conduct surveillance on the dark web to identify suspicious activity related to crypto wallets.
Check out the full news below!
Hornet, founded in 2023 and based in Hyderabad and Kolkata, has collaborated with the Telangana Police and the Directorate of Law Enforcement. The software developed uses advanced algorithms to initiate tracking of crypto wallets flagged by Indian law enforcement agencies.
This process starts from the point of entry on popular crypto exchanges, which allows filtering between private wallet addresses and wallet addresses associated with entities. The software is designed to overcome the challenges of tracking private wallets that are often difficult to identify.
However, by following transactions that occur through crypto exchanges or Peer-to-Peer (P2P) platforms, the software can link those transactions to real entities through the Bank’s KYC data.
In the case of investment fraud, this software tracks transactions forward to follow the money trail. As for terror or drug financing, the money trail is followed backwards.
Also read: Vitalik Buterin & CZ Meet at BNB Chain Builder S9, Any Collaboration?
Collaboration with the Telangana Police and Enforcement Directorate has enabled Hornet to test and refine the software in a real-world environment. The police use this software to quickly and effectively identify suspicious transactions and the crypto wallets involved.
This is a step forward in the fight against cybercrime and organized crime that use crypto to facilitate their illegal activities. Integrating data from various crypto exchanges and P2P platforms also increases the software’s effectiveness in tracking transactions that cross national borders.
This is especially important given the decentralized and global nature of crypto transactions. With this software, law enforcement can more easily associate crypto transactions with real identities, an important step in the investigation process.
Read also: Pierre Rochard: Exploring Bitcoin’s Potential in Traditional Finance
Hornet’s software development marks a technological advance and raises important questions about privacy and surveillance. While this software is extremely useful in fighting crime, it is also important to ensure that its use does not infringe on the privacy rights of legitimate individuals.
Governments and law enforcement agencies must balance security needs and civil rights. This software’s success also shows India’s great potential to lead innovation in the crypto security technology sector.
This could be an important step in positioning India as a leader in blockchain technology and cybersecurity, on par with other countries that are already advanced in this field.
That’s the latest information about crypto news today. Get more information about crypto academy from beginner to expert level only at Pintu Academy and enrich your knowledge about the world of crypto and blockchain.
Follow us on Google News for the latest updates on crypto and blockchain technology. Enjoy an easy and secure crypto trading experience by downloading Pintu crypto app via Google Play Store or App Store now.
Experience web trading with advanced trading tools such as pro charting, various order types, and portfolio tracker only at Pintu Pro. Click Register Pintu if you don’t have an account or click Login Pintu if you are already registered.
*Disclaimer
This content aims to enrich readers’ information. Pintu collects this information from various relevant sources and is not influenced by outside parties. Note that an asset’s past performance does not determine its projected future performance. Crypto trading activities have high risk and volatility, always do your own research and use cold cash before investing. All activities of buying and selling bitcoin and other crypto asset investments are the responsibility of the reader.
Reference: