Alibaba’s 10 Tech Trends to Watch in… – Alizila

The Alibaba DAMO Academy, Alibaba Groups global program for tackling ambitious, high-impact technology research, has made some predictions about the trends that will shape the industry in the year ahead. From more-advanced artificial intelligence to large-scale blockchain applications, heres what you can expect in 2020.

1. Artificial Intelligence Gets More Human2020 is set to be a breakthrough year for AI, according to DAMO. Researchers will be taking inspiration from a host of new areas to upgrade the technology, namely cognitive psychology and neuroscience combined with insights into human behavior and history. Theyll also adopt new machine-learning techniques, such as continual learning, which allows machines to remember what theyve learned in order to more quickly learn new things something humans take for granted. With these advances in cognitive intelligence, machines will be able to better understand and make use of knowledge rather than merely perceive and express information.

2. The Next Generation of ComputationComputers these days send information back and forth between the processor and the memory in order to complete tasks. The problem? Computing demands have grown to such an extent in the digital age that our computers cant keep up. Enter processing-in-memory architecture, which integrates the processor and memory into a single chip for faster processing speed. PIM innovations will play a critical role in spurring next-generation AI, DAMO said.

3. Hyper-Connected ManufacturingThe rapid deployment of 5G, Internet of Things and cloud- and edge-computing applications will help manufacturers go digital, including everything from automating equipment, logistics and production scheduling to integrating their factory, IT and communications systems. In turn, DAMO predicts theyll be faster to react to changes in demand and coordinate with suppliers in real time to help productivity and profitability.

WATCH: An Inside Look at Cainiaos Hyperconnected Warehouse

4. Machines Talking to Machines at ScaleMore-advanced IoT and 5G will enable more large-scale deployments of connected devices, which brings with them a range of benefits for governments, companies and consumers. For example, traffic-signal systems could be optimized in real time to keep drivers moving (and happy), while driverless cars could access roadside sensors to better navigate their surroundings. These technologies would also allow warehouse robots to maneuver around obstacles and sort parcels, and fleets of drones to efficiently and securely make last-mile deliveries.

5. Chip Design Gets EasierHave you heard? Moores Law is dying. It is now becoming too expensive to build faster and smaller semiconductors. In its place, chipmakers are now piecing together smaller chiplets into single wafers to handle more-demanding tasks. Think Legos. Another advantage of chiplets is that they often use already-inspected silicon, speeding up time to market. Barriers to entry in chipmaking are dropping, too, as open-source communities provide alternatives to traditional, proprietary design. And as more companies design their own custom chips, they are increasingly contributing to a growing ecosystem of development tools, product information and related software that will enable still easier and faster chip design in the future.

6. Blockchain Moves Toward MainstreamThe nascent blockchain industry is about to see some changes of its own. For one, expect the rise of the blockchain-as-a-service model to make these applications more accessible to businesses. Also, there will be a rise in specialized hardware chips for cloud and edge computing, powered by core algorithms used in blockchain technologies. Scientists at DAMO forecast that the number of new blockchain applications will grow significantly this year, as well, while blockchain-related collaborations across industries will become more common. Lastly, the academy expects large-scale blockchain applications to see wide-scale adoption.

7. A Turning Point for Quantum ComputingRecent advancements in this field have stirred up hopes for making large-scale quantum computers a reality, which will prompt more investments into quantum R&D, according to DAMO. That will result in increased competition and ecosystem growth around quantum technologies, as well as more attempts to commercialize the technology. DAMO predicts that after a difficult but critical period of intensive research in the coming years, quantum information science will deliver breakthroughs such as computers that can correct computation errors in real time.

8. More Revolution in SemiconductorsDemand is surging for computing power and storage, but major chipmakers still havent developed a better solution than 3-nanometer node silicon-based transistors. Experiments in design have led to the discovery of other materials that might boost performance. Topological insulators and two-dimensional superconducting materials, for example, may become connective materials as their properties allow electrical currents to flow without resistance. New magnetic and resistive switching materials might also be used to create next-generation magnetic memory technology, which can run on less power than their predecessors.

9. Data Protection Powered by AIAs businesses face a growing number of data-protection regulations and the rising compliance costs to meet them interest is growing in new solutions that support data security. AI algorithms can do that. They help organizations manage and filter through information, protect user information shared across multiple parties and make regulatory compliance easier, or even automatic. These technologies can help companies promote trust in the reuse and sharing of analytics, as well as overcome problems such as data silos, where certain information is not accessible to an entire organization and causes inefficiencies as a result.

10. Innovation Starts on the CloudCloud computing has evolved far beyond its intended purpose as technological infrastructure to take on a defining role in IT innovation. Today, clouds computing power is the backbone of the digital economy as it transforms the newest, most-advanced innovations into accessible services. From semiconductor chips, databases and blockchain to IoT and quantum computing, nearly all technologies are now tied to cloud computing. It has also given rise to new technologies, such as serverless computing architecture and cloud-powered robotic automation.

Visit link:
Alibaba's 10 Tech Trends to Watch in... - Alizila

HPC In 2020: Acquisitions And Mergers As The New Normal – The Next Platform

After a decade of vendor consolidation that saw some of the worlds biggest IT firms acquire first-class HPC providers such as SGI, Cray, and Sun Microsystems, as well as smaller players like Penguin Computing, WhamCloud, Appro, and Isilon, it is natural to wonder who is next. Or maybe, more to the point, who is left?

As it turns out, there are still plenty of companies, large and small, that can fill critical holes in the product portfolios of HPC providers, or those who want to be HPC players. These niche acquisitions will be especially important to these same providers as they expand into HPC-adjacent markets such as artificial intelligence, data analytics and edge computing.

One company that can play into all of these markets is FPGA-maker Xilinx. Since Intel acquired Altera in 2015, Xilinx is the only standalone company of any size that makes reconfigurable logic devices. Give that, the natural buyer for Xilinx would be AMD, Intels arch-nemesis. AMD, of course, already has a highly competitive lineup of CPUs and GPUs to challenge its much larger rival, and the addition of an FPGA portfolio would open a third front. It would also provide AMD entry into a whole array of new application markets where FPGAs operate: ASIC prototyping, IoT, embedded aerospace/automotive, 5G communications, AI inference, database acceleration, and computational storage, to name a few.

The only problem is that Xilinxs current market cap of around $25 billion, or about half the current market cap of AMD. And if youre wondering about AMDs piggy bank, the chipmaker has $1.2 billion cash on hand as of September 2019. Which means any deal would probably take the form of a merger rather than a straight acquisition. Theres nothing wrong with that, but a merger is a more complex decision and has greater ramifications for both parties. Thats why the rumors of a Xilinx acquisition have tended to center on larger semiconductor manufacturers that might be looking to diversify their offerings, like Broadcom or Qualcomm. Those acquisitions wouldnt offer the HPC and AI technology synergies that AMD could provide, but they would likely be easier to execute.

Another area that continues to be ripe for acquisitions is the storage market. In HPC, Panasas and DataDirect Networks stand alone well, stand together as the two HPC specialists left in the market. And of those two, the more modest-sized Panasas would be easier to swallow. But most HPC OEMs, including the biggies like Hewlett Packard Enterprise, Dell Technologies, and Lenovo already have their own HPC storage and file system offerings of one sort or another, although Lenovo is probably most deficient in this regard. For what its worth though, Panasas, which has been around since 1999, has never attracted the kind of suitor willing to fold the companys rather specialized parallel file system technologies into its own product portfolio. In all honesty, we dont expect that to change.

The real storage action in the coming years in HPC, as well as in the enterprise and the cloud, is going to be in the software defined space, where companies like WekaIO, VAST Data, Excelero, and DataCore Software have built products that can virtualize all sorts of hardware. Thats because the way storage is being used and deployed in the datacenter these days is being transformed by cheaper capacity (disks) and cheaper IOPS (NVM-Express and other SSD devices), the availability of cloud storage, and the inverse trends of disaggregation and hyperconvergence.

As we noted last July: While there are plenty of NAS and SAN appliances being sold into the enterprise to support legacy applications, modern storage tends to be either disaggregated with compute and storage broken free of each other at the hardware level but glued together on the fly with software to look local or hyperconverged with the compute and block storage virtualized and running on the same physical server clusters and atop the same server virtualization hypervisors.

Any of the aforementioned SDS companies, along with others, may find themselves courted by OEMs and storage-makers, and even cloud providers. DDN has been busy in that regard, having acquired software-defined storage maker Nexenta in May 2019. We expect to see more of such deals in the coming years. Besides DDN, other storage companies like NetApp should be looking hard at bringing more SDS in-house. The big cloud providers Amazon, Microsoft, Google, and so on will also be making some big investments in SDS technologies, even if theyre not buying such companies outright.

One market that is nowhere near the consolidation stage is quantum computing. However, that doesnt mean companies wont be looking to acquire some promising startups in this area, even at this early stage. While major tech firms such as IBM, Google, Intel, Fujitsu, Microsoft, and Baidu have already invested a lot on in-house development and are busy selecting technology partners, other companies have taken a more wait-and-see approach.

In the latter category, one that particularly stands out is HPE. In this case, the company is more focused on near-term R&D, like memristors or other memory-centric technologies. While there may be some logic in letting other companies spend their money figuring out the most promising approaches for quantum computing, and then swoop in and copy (or buy) whatever technology is most viable, there is also the risk of being left behind. Thats something HPE cannot afford.

That said, HPE has recently invested in IonQ, a promising quantum computing startup that has built workable prototype using ion trap technology. The investment was provided via Pathfinder, HPEs investment arm. In an internal blog post on the subject penned by Abhishek Shukla, managing director of global venture investments, and Ray Beausoleil, Senior Fellow of large scale integrated photonics, the authors extol the virtues of IonQs technical approach:

IonQs technology has already surpassed all other quantum computers now available, demonstrating the largest number of usable qubits in the market. Its gate fidelity, which measures the accuracy of logical operations, is greater than 98 percent for both one-qubit and two-qubit operations, meaning it can handle longer calculations than other commercial quantum computers. We believe IonQs qubits and methodology are of such high quality, they will be able to scale to 100 qubits (and 10,000 gate operations) without needing any error correction.

As far as we can tell, HPE has no plans to acquire the company (and it shares investment in the startup with other companies, including Amazon, Google, and Samsung, among others). But if HPE is truly convinced IonQ is the path forward, it would make sense to pull the acquisition trigger sooner rather than later.

We have no illusions that any of this comes to pass in 2020 or ever. As logical as the deals we have suggested seem to us, the world of acquisitions and mergers is a lot more mysterious and counterintuitive than wed like to admit (cases in point: Intel buying Whamcloud or essentially buying Cloudera through such heavy investment). More certain is the fact that these deals will continue to reshape the HPC vendor landscape in the coming decade as companies go after new markets and consolidate their hold on old ones. If anything, the number of businesses bought and sold will increase as high performance computing, driven by AI and analytics, will extend into more application domains. Or as the Greeks put it more succinctly, the only constant is change.

More:
HPC In 2020: Acquisitions And Mergers As The New Normal - The Next Platform

Instagram starts DMs on the web, going against Facebook end-to-end encryption policy – News Landed

Facebook-owned Instagram just began rolling out a test of its Direct Messages on the web version of the popular social media app. The feature will allow users to access their DMs and message their friends using their computers, which contradicts Facebook announcement for end-to-end encryption in all its messaging services. E2E encryption secures your messages so that government agencies (and even Facebook/Instagram) cant see what you send.

The feature is being tested only with a small percentage of users for now. Instagram says that you can create a new group, start a new chat, continue existing chats, like messages, and even share photos from the desktop through the web version of Instagram DMs. You can even receive notifications for messages that you receive in DMs through your browser.

- Advertisement -

Facebook announced that the company was going to integrate end-to-end encryption in all its messaging services, which include WhatsApp, Instagram, Messenger, etc. However, Instagrams latest move to publicly test DMs on the web app contradicts Facebooks goal.

Alex Stamos, former Facebook Chief Security Officer, tweeted that end-to-end has never been securely built on a web-based messenger. He even said that he was expecting Facebook to drop web support for Messenger in favor of end-to-end encryption.

He also further says that there hasnt been a secure way to store cryptographic secrets in JavaScript until now, though it is an active area of development.

- Advertisement -

Facebook even announced its ambition to eventually combine all its messaging services into a single app, allowing cross-platform communication between WhatsApp, Instagram, and Facebook. Instagrams web DMs ambitions make it unclear how everything will fit in.

However, as someone who spends hours working on a computer, using Instagram DMs without having to pick up your phone would be amazing. Though I am a fan of end-to-end encryption, lets be real: DMs on your laptop are amazing. Though there are third-party apps that allow this functionality, it is not wise to trust your accounts with anything other than the original Instagram app.

What do you think about the whole situation? Would you prefer DMs on your laptop or end-to-end encryption? Let us know in the comments!

- Advertisement -

Source: TechCrunch

Read our summaryof the most popular stories of previous weeks, in on our newsletter,What Just Happened!

Apply to write for usif you love writing and want to see your articles featured onApple News, Google News, and more.Subscribe to our newsletter,What Just Happened, where we dive deep into the hottest topics from the week!

+ Tinder, Grindr, and other dating apps share your personal data with advertisers, study shows

+ Xenobots: The worlds computer-designed living, self-healing robots created from stem cells

+ Tesla official Cybertruck merch is expensive and made specifically for Tesla fans

+New Discovery: The oldest material on Earth is older than the solar system

Read more:
Instagram starts DMs on the web, going against Facebook end-to-end encryption policy - News Landed

Laminar Growth to be Witnessed by Mobile Encryption Market – Technology Magazine

The research report on Mobile Encryption market now available with Market Study Report, LLC, offers a detailed analysis of the factors influencing the global business sphere. This report also provides precise information pertaining to market size, commercialization aspects and revenue estimation of this business. The report further elucidates the status of leading industry players thriving in the competitive spectrum of the Mobile Encryption market.

As per the Mobile Encryption market report, the industry is likely to amass significant returns while recording a lucrative annual growth rate during the estimated time period. The report also presents details regarding the complete valuation that market retains, as well as analysis of the Mobile Encryption market, and the growth opportunities in the business vertical.

Request a sample Report of Mobile Encryption Market at:https://www.marketstudyreport.com/request-a-sample/1630215?utm_source=technologymagazine&utm_medium=Kunal

What ideas and concepts are covered in the report?

Region-based analysis of the Mobile Encryption market:

An analysis of the market division:

. The market share of each product along with the project valuation is presented in the report.

. The market share of each product application as well as anticipated revenue that each application holds is described in the report.

Impeding factors and challenges:

Marketing strategies indulged:

Ask for Discount on Mobile Encryption Market Report at:https://www.marketstudyreport.com/check-for-discount/1630215?utm_source=technologymagazine&utm_medium=Kunal

Analysis of the competitors in the industry:

The Mobile Encryption market report consists of information such as evaluation of the competitive landscape, research related to the concentration ratio along with market concentration rate over the forecasted time period.

For More Details On this Report:https://www.marketstudyreport.com/reports/global-mobile-encryption-market-growth-status-and-outlook-2019-2024

Some of the Major Highlights of TOC covers:

Mobile Encryption Regional Market Analysis

Mobile Encryption Segment Market Analysis (by Type)

Mobile Encryption Segment Market Analysis (by Application)

Mobile Encryption Major Manufacturers Analysis

Related Reports:

1. Global Microscope Imaging Analysis Software Market Growth (Status and Outlook) 2019-2024This report categorizes the Microscope Imaging Analysis Software market data by manufacturers, region, type and application, also analyzes the market status, market share, growth rate, future trends, market drivers, opportunities and challenges, risks and entry barriers, sales channels, distributors Analysis.Read More: https://www.marketstudyreport.com/reports/global-microscope-imaging-analysis-software-market-growth-status-and-outlook-2019-2024

2. Global Threat Intelligence Security Market Growth (Status and Outlook) 2019-2024Threat Intelligence Security Market Report covers the makers information, including shipment, value, income, net benefit, talk with record, business appropriation and so forth., this information enables the buyer to think about the contenders better. This report additionally covers every one of the districts and nations of the world, which demonstrates a provincial advancement status, including market size, volume and esteem, and also value information. It additionally covers diverse enterprises customers data, which is critical for the producers.Read More: https://www.marketstudyreport.com/reports/global-threat-intelligence-security-market-growth-status-and-outlook-2019-2024

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

See the original post:
Laminar Growth to be Witnessed by Mobile Encryption Market - Technology Magazine

Latest Study explores the Homomorphic Encryption Market Witness Highest Growth in near future – Technology Magazine

The Homomorphic Encryption market research report now available with Market Study Report, LLC, is a compilation of pivotal insights pertaining to market size, competitive spectrum, geographical outlook, contender share, and consumption trends of this industry. The report also highlights the key drivers and challenges influencing the revenue graph of this vertical along with strategies adopted by distinguished players to enhance their footprints in the Homomorphic Encryption market.

According to the report, the Homomorphic Encryption market is a collection of details that provides an in-depth evaluation of the industry vertical. The valuation of the Homomorphic Encryption market is from a dual viewpoint considering production and consumption.

Request a sample Report of Homomorphic Encryption Market at:https://www.marketstudyreport.com/request-a-sample/2432440?utm_source=technologymagazine&utm_medium=Kunal

Considering the production clause, the report provides data about the product renumeration, gross margins of the firms manufacturing the product, and manufacturing of the product. With regards to consumption, the report speaks about the product consumption value and product consumption volume in tandem with the status of import and export of the products.

An overview of the regional landscape:

Regional segmentation: North America, Europe, Asia Pacific, Middle East & Africa, Latin America.

Pivotal point in this section:

This report provides an understanding of the regional segment of this industry.

Crucial points encompassed in the report:

Brief of the product spectrum:

Product segmentation:

Pivotal point in this section:

The study offers particulars about the product reach.

An overview of the report:

Important aspects from the application terrain:

Application segmentation:

Pivotal point in this section:

Details about the classification of the application spectrum is mentioned in the report.

Ask for Discount on Homomorphic Encryption Market Report at:https://www.marketstudyreport.com/check-for-discount/2432440?utm_source=technologymagazine&utm_medium=Kunal

A succinct overview of the application-based segment of the Homomorphic Encryption market:

A concise overview of competitive reach:

Competitive segmentation:

Pivotal point in this section:

The study presents specifics about the competitive spectrum of the Homomorphic Encryption market.

Glimpse into some concepts and ideas offered by the report:

The study offers data associated to the growth margins of the firms in tandem with the manufacturing expenses, product costs, and renumeration. A significant amount of data is provided which speaks about the level to which the industry has been evaluated. Data pertaining the possibility of new investment projects that are undertaken, as well as the research conclusions, are presented in the report.

For More Details On this Report: https://www.marketstudyreport.com/reports/global-homomorphic-encryption-market-professional-survey-2019-by-manufacturers-regions-types-and-applications-forecast-to-2024

Some of the Major Highlights of TOC covers:

Development Trend of Analysis of Homomorphic Encryption Market

Marketing Channel

Market Dynamics

Methodology/Research Approach

Related Reports:

1. Global Lipid Testing Market Professional Survey 2019 by Manufacturers, Regions, Types and Applications, Forecast to 2024Lipid Testing market research report provides the newest industry data and industry future trends, allowing you to identify the products and end users driving Revenue growth and profitability. The industry report lists the leading competitors and provides the insights strategic industry Analysis of the key factors influencing the market.Read More: https://www.marketstudyreport.com/reports/global-lipid-testing-market-professional-survey-2019-by-manufacturers-regions-types-and-applications-forecast-to-2024

2. Global Orthopedic Products Market Professional Survey 2019 by Manufacturers, Regions, Types and Applications, Forecast to 2024Orthopedic Products Market report begins from overview of Industry Chain structure, and describes industry environment, then analyses market size and forecast of Orthopedic Products by product, region and application, in addition, this report introduces market competition situation among the vendors and company profile, besides, market price analysis and value chain features are covered in this report.Read More: https://www.marketstudyreport.com/reports/global-orthopedic-products-market-professional-survey-2019-by-manufacturers-regions-types-and-applications-forecast-to-2024

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

Read the rest here:
Latest Study explores the Homomorphic Encryption Market Witness Highest Growth in near future - Technology Magazine

Breaking the encryption impasse | TheHill – The Hill

The debate about encryption is stuck in a long battle between one camp arguing that access to encrypted data is essential for law enforcement and another camp arguing that encryption is necessary to protect against cyber espionage and to enable individuals to safeguard their information. The debate also does not seem to move forward. Just like in the 2016 San Bernardino case, the Justice Department is pressing Apple to provide the data from the two iPhones belonging to the Saudi lieutenant who acted as the gunman during the shooting at the Pensacola naval base last month.

The debate has received attention over the plans by Facebook to expand encryption of user messages, a policy that the FBI director referred to as a dream come true for child pornographers. But the new Pensacola case again raises the issues from the San Bernardino mass shooting. The law enforcement argument is best understood through the positions of the Justice Department and the FBI, which have been fighting a losing battle against the use of end to end encryption, security that ensures only the sender and receiver can read the message. The Justice Department and the FBI want such encryption banned, replaced by exceptional access systems allowing law enforcement with a warrant to read the messages.

On the other side of the argument in the encryption debate are primarily civil libertarians and cybersecurity experts. The problem they see is that exceptional access would decrease broader cybersecurity. Computer security experts argue that if you make it easy for law enforcement to get around encryption, this makes it easy for the bad guys, such as malicious hackers, foreign nations, criminals, and spies, to also do the same thing.

While we have started on different sides of the argument, we have both long recognized the need to find a critical path forward. Earlier this year, we convened a working group of former law enforcement and national security officials, civil society organizations, business representatives, and academics to work together on finding practical and useful solutions that acknowledge the importance of the two dimensions of national security.

What we found, through months of meeting with experts on both sides of the argument, is that we have been thinking about the debate the wrong way. We started our initial working group meeting by throwing out two strawmen. First, we should stop seeking approaches to enable access to encrypted information. Second, law enforcement officials will not be able to protect the public unless they can obtain access to all encrypted data. Once we changed the nature of the debate, we found a lot of agreement.

We agreed that proposals should address a legitimate and demonstrated law enforcement problem, that solutions should not make disparities in law enforcement worse, and that it should not be possible to repurpose exceptional access solutions into mass surveillance tools. We agreed that these tools should not appreciably decrease public cybersecurity, and that use of the capability should be documented and reported in a way that enables public oversight. By far the most promising path for the current debate was focusing on law enforcement access to data at rest.

By putting aside the more controversial debate about data in motion, or information being passed between two devices on an encrypted platform, and focusing on a conversation about data at rest, or information stored on a particular device, allowed us to find a more pragmatic way to address the concerns of both privacy advocates and law enforcement. This was an important starting point, and while we did not conclude with an agreed upon proposal, we were able to make progress. Embracing this approach could help move this entrenched debate in a more constructive direction.

One thing we did manage to all agree on is that no single approach will solve every problem when it comes to the encryption debate. It is now well past time to rethink the belief that solutions are impossible and that encryption means law enforcement officials cannot do their jobs. So by breaking the debate down into its component parts and looking at points of agreement, there is a path toward a more fruitful and more civil debate.

Denis McDonough is a visiting senior fellow at the Carnegie Endowment for International Peace and a former White House chief of staff. Susan Landau is the Bridge Professor in Cyber Security and Policy with Tufts University.

Originally posted here:
Breaking the encryption impasse | TheHill - The Hill

The US government should stop demanding tech companies compromise on encryption – TechCrunch

In a tweet late Tuesday, President Trumpcriticized Apple for refusing to unlock phones used by killers, drug dealers and other violent criminal elements. Trump was specifically referring to a locked iPhone that belonged to a Saudi airman who killed three U.S sailors in an attack on a Florida base in December.

Its only the latest example of the government trying to gain access to a terror suspects device it claims it cant access because of the encryption that scrambles the devices data without the owners passcode.

The government spent the past week bartering for Apples help. Apple said it had given to investigators gigabytes of information, including iCloud backups, account information and transactional data for multiple accounts. In every instance it received a legal demand, Apple said it responded with all of the information it had. But U.S. Attorney General William BarraccusedApple of not giving investigators any substantive assistance in unlocking the phone.

Read this article:
The US government should stop demanding tech companies compromise on encryption - TechCrunch

Instagram messages on the web could pose an encryption challenge – The Verge

Its a relatively slow week on the platforms-and-democracy beat, so lets talk about something small but fascinating in its own way: the arrival of Instagram messages on the web.

An unfortunate thing about being a xennial who grew up using (and loving) the world wide web is that most developers no longer build for it. Over the past 15 years, mobile phones became more popular than desktop computers ever were, and the result is that web development has entered a slow but seemingly inexorable decline. At the same time, like most journalists, I spent all day working on that same web. And with each passing year, the place where I do most of my work seems a little less vital.

This all feels particularly true when it comes to communications tools. Once, every messaging kingdom was united with a common API, allowing us to gather our conversations into a single place. (Shout out to Adium.) But today, our messages are often scattered across a dozen or more corporate inboxes, and accessing them typically requires picking up your phone and navigating to a separate app.

As a result, I spend a lot of time typing on a glass screen, where I am slow and typo-prone, rather than on a physical keyboard, where Im lightning-quick. And each time I pick up my phone to respond to a message on WhatsApp, or Snapchat, or Signal, I inevitably find a notification for some other app, and the next thing I know 20 minutes have passed.

All of which is to say, I was extremely excited today to see Instagrams announcement that it had begun rolling out direct messages on the web. (The company gave me access to the feature, and its glorious.) Heres Ashley Carman at The Verge:

Starting today, a small percentage of the platforms global users will be able to access their DMs from Instagrams website, which should be useful for businesses, influencers, and anyone else who sends lots of DMs, while also helping to round out the apps experience across devices. Todays rollout is only a test, the company says, and more details on a potential wide-scale rollout will come in the future.

The direct messaging experience will be essentially the same through the browser as it is on mobile. You can create new groups or start a chat with someone either from the DM screen or a profile page; you can also double-tap to like a message, share photos from the desktop, and see the total number of unread messages you have. Youll be able to receive desktop DM notifications if you enable notifications for the entire Instagram site in your browser.

Instagram didnt state a strategic rationale for the move, but it makes sense in a world that is already moving toward small groups and private communication. Messengers win in part by being ubiquitous, and even if deskbound users like myself are in the minority, Facebook can only grab market share from rivals if its everywhere those rivals can be found. (iMessage and Signal, for example, have long been usable on desktop as well as mobile devices.)

Now, thanks to this move, I can make greater use of Instagram as both a social and reporting tool, and the web itself feels just a bit more vital. All of which is good news but, asks former Facebook security chief Alex Stamos, is it secure? After all, Facebook is in the midst of a significant shift toward private, end-to-end encrypted messaging, with plans to create a single, encrypted backend for all of its messaging apps.

Stamos went on to highlight two core challenges in making web-based communications secure. One is securely storing cryptographic information in JavaScript, the lingua franca of the web. (This problem is being actively worked on, Stamos notes.) The second is that the nature of the web would allow a company to create a custom backdoor targeting an individual user if compelled by a government, say. For that, there are few obvious workarounds.

One alternative is to take the approach that Signal and Facebook-owned WhatsApp have, and create native or web-based apps. As security researcher Saleem Rashid told me, the web version of WhatsApp generates a public key in the browser using JavaScript, then encodes it in a QR code that a users scans with their phone. This creates an encrypted tunnel between the web and the smartphone, and so long as the JavaScript involved in generating the key is not malicious, WhatsApp should not be able to encrypt any of the messages.

When I asked Instagram about how it plans to square the circle between desktop messages and encryption, the company declined to comment. Im told that it still plans to build encryption into its products, and is still working through exactly how to accomplish this.

Granted, when I think of the tasks that I hope Facebook accomplishes this year, encrypted Instagram DMs are low on the list. But with our authoritarian president browbeating Apple today for failing to unlock a suspected criminals phone, the stakes for all this are relatively clear. We will either have good encrypted messaging backed by US corporations, or we wont. As Apple put it this week:

We have always maintained there is no such thing as a backdoor just for the good guys, the company explained. Backdoors can also be exploited by those who threaten our national security and the data security of our customers. ... We feel strongly encryption is vital to protecting our country and our users data.

On one level, todays Instagram news is a small story about a niche feature. But in the background, questions about the security of our private communications are swirling. Which should give us all reason to watch Facebooks next moves here very closely.

Today in news that could affect public perception of the big tech platforms.

Trending down: Facebook said it doesnt need to change its web-tracking services to comply with Californias new consumer-privacy law. The companys rationale is that routine data transfers about consumers dont fit the laws definition of selling data. The move puts it at odds with Google, which is taking the opposite tack.

Trending down: Grindr, OkCupid and Tinder are sharing sensitive user data like dating choices and precise location to advertisers in ways that may violate privacy laws, according to a new report. I dont want to downplay that, but if you think that data is sensitive, you should see the average Grindr users DMs.

Two days before the UK election in December, some 74,000 political advertisements vanished from Facebooks Ad Library, a website that serves as an archive of political and issue ads run on the platform. The company said a bug wiped 40 percent of all political Facebook ads in the UK from the public record. Rory Smith at BuzzFeed has the story:

In the wake of the failure during the UK elections, Facebook said it had launched a review of how to prevent these issues, as well as how to communicate them more clearly.

But the events of Dec. 10 are not the first time Facebooks Ad Library has failed since its launch in May 2018. The API, which is supposed to give researchers greater access to data than the library website, went live in March 2019 and ran into trouble within weeks of the European Parliament election in May. Researchers have been documenting a myriad of issues ever since.

The platform also drew the ire of researchers when it failed to deliver the data it promised as part of a partnership with the nonprofit Social Science Research Council and Social Science One, a for-profit initiative run by researchers a project that was funded by several large US foundations. Facebook said it remains committed to providing data to researchers, but the SSRC and funders have begun withdrawing from the project due to the companys delays.

Russian military hackers may have been boring into the Ukrainian gas company at the center of the impeachment inquiry, where Hunter Biden served on the board. Experts say the timing and scale of the attacks suggest that the Russians could be searching for potentially embarrassing material on the Bidens, similar to what Trump was looking for. On Twitter, security experts like Facebooks Nathaniel Gleicher have urged caution when writing about this story, arguing that the case for attribution to Russia is thin. (Nicole Perlroth and Matthew Rosenberg / The New York Times)

Theres been an explosion of online disinformation, including the use of doctored images, from politicians. They do it for a simple reason: Its effective at spreading their messages, and so far none have paid a price for trafficking in bogus memes. (Drew Harwell / The Washington Post)

Artificial personas, in the form of AI-driven text generation and social-media chatbots, could drown out actual human discussions on the internet, experts warn. They say the issue could manifest itself in particularly frightening ways during an election. (Bruce Schneier / The Atlantic)

The Treasury Department unveiled new rules designed to increase scrutiny of foreign investors whose potential stakes in US companies could pose a national security threat. The rules are focused on businesses that handle personal data, and come after the United States has heightened scrutiny of foreign involvement in apps such as Grindr and TikTok. (Katy Stech Ferek / The Wall Street Journal)

The Harvard Law Review just floated the idea of adding 127 more states to the union. These states would add enough votes in Congress to rewrite the Constitution by passing amendments aimed at making every vote count equally. Worth a read.(Ian Millhiser / Vox)

The New York Times editorial board interviewed Bernie Sanders on how he plans carry out his ambitious policy ideas if faced with the Republican-led Senate that stymied so many of President Barack Obamas proposals. Notably, he says hes not an Amazon Prime customer and tries never to use any apps.

Workers for grocery delivery platform Instacart are organizing a national boycott of the company next week to push for the reinstatement of a 10 percent default tip on all orders. One of 2020s big stories is going to be tech-focused labor movements; this is but the latest example. (Kim Lyons / The Verge)

Microsoft CEO Satya Nadella strongly criticized a new citizenship law that the Indian government passed last month. The law, known as the Citizenship Amendment Act, fast-tracks Indian citizenship for immigrants from most major South Asian religions except Islam. India is Nadellas birthplace, and one of Microsofts largest markets, making his comments all the more notable. (Pranav Dixit / BuzzFeed)

Facebooks push into virtual reality has resulted in a slew of new patents, mostly for heads-up displays. The company won 64 percent more patents in 2019 than in 2018. Christopher Yasiejko and Sarah Frier at Bloomberg explain what this might mean:

The breadth of Facebooks patent growth, said Larry Cady, a senior analyst with IFI, resembled that of intellectual-property heavyweights Amazon.com Inc. and Apple Inc., which were No. 9 and No. 7, respectively, with each winning more than twice as many patents as the social media titan. Facebooks largest numbers were in categories typical of Internet-based computer companies -- data processing and digital transmission, for example -- but its areas of greatest growth were in more novel categories that may suggest where the company sees its future.

Facebooks 169 patents in the Optical Elements category marked a nearly six-fold jump. Most of that growth stems from the Heads-Up Displays sub-category, which Cady said probably is related to virtual-reality headsets. Facebook owns the VR company Oculus and in November acquired the Prague-based gaming studio behind the popular Beat Saber game. One such patent, granted Nov. 5, is titled Compact head-mounted display for artificial reality.

Popular e-boys on TikTok are nabbing fashion and entertainment deals. Theyre known mostly for making irony-steeped videos of themselves in their bedrooms wearing tragically hip outfits composed of thrifted clothes. Some observers predict that top e-boys will have success reminiscent of the boy bands of yore. (Rebecca Jennings / Vox)

YouTube signed three video stars Lannan LazarBeam Eacott, Elliott Muselk Watkins and Rachell Valkyrae Hofstetter to combat Amazons Twitch and Facebook. Exclusive deals for top video game streamers have been one of the big tech stories of the year so far. (Salvador Rodriguez / CNBC)

Uncanny Valley, Anna Wieners beautiful memoir about life working at San Francisco tech companies, is out today. Kaitlyn Tiffany has a great interview with Wiener in the Atlantic. Read this book and stay tuned for news about an Interface Live event with Wiener in San Francisco next month!

Mark Bergen, friend of The Interface and a journalist at Bloomberg, is writing a book about YouTube titled Like, Comment, Subscribe. Bergen is a former Recode colleague and ace YouTube reporter, and this book will be a must-read in our world. (Kia Kokalitcheva / Axios)

The Information published a Twitter org chart that identifies the companys 66 top executives, including the nine people who report directly to CEO Jack Dorsey. (Alex Heath / The Information)

A new app called Doublicat allows users to put any face on a GIFs in seconds, essentially allowing them to create deepfakes. The app launches just as prominent tech companies like Facebook and Reddit ban deepfakes almost completely. (Matthew Wille / Input)

Wired got Jack Dorsey to do 11 minutes of Twitter tech support on video. Enjoy!

Send us tips, comments, questions, and web-based DMs: casey@theverge.com and zoe@theverge.com.

Read the original:
Instagram messages on the web could pose an encryption challenge - The Verge

Review: SecureDrive BT, the encrypted external SSD you can unlock with Face ID – 9to5Mac

If youre looking for a secure external drive that meets both US military and government security standards, there are a number of encrypted external SSD options around. I reviewed one approach a couple of years ago, the iStorage diskAshur 2, which has a built-in PIN pad for entering a seven- to 15-digit code to unlock the drive.

The SecureDrive BT is a similar idea, but instead of a PIN pad, you unlock it via Bluetooth. Specifically, when you plug the drive into your Mac, you can use Face ID on your iPhone to unlock it

The drive is available in both spinning metal and SSD variants, in capacities ranging from 250 GB to 8 TB. Pricing for SSDs ranges from $262 (250GB) to $3,309 (8TB). I tested the 1TB SSD model at $458.80.

The drive can be used with Mac, Windows, and Linux, and the companion app is available on both iOS and Android.

The drive looks much like any other external drive. It has a blue anodized aluminum body with black plastic endcaps. On the front is a Secure Drive Bluetooth name, and on the back a somewhat unsightly mix of barcode, website, and various standards compliance logos.

One thing to watch for: SecureDrive tells me its available with both USB-A and USB-C cables. The drive I got had a USB-A cable, so needed an adapter to connect it to my MacBook Pro.

SecureDrive BT uses the same AES256-bit XTS hardware encryption as the iStorage drive. Often referred to as military-grade encryption, this is certified by the Institute of Electrical and Electronics Engineers (IEEE) as standard P1619 and is indeed approved for US military use.

The encrypted external SSD is also FIPS 140-3 certified. This is the Federal Information Processing Standards certification, which allows it to be used for the storage of US government Top Secret documents.

Inside, the chips are encased in epoxy resin, meaning its not possible to extract the SSD chips from the rest of the hardware.

The app lets you set a password in the 7- to 15-character range, and you can then choose to toggle on Face ID, Apple Watch unlock, or both. The drive offers remote-wipe capabilities, and can be set to automatically wipe if 10 incorrect passwords are entered.

Incidentally, Apples FileVault also offers the same AES256-bit XTS standard, but defaults to the weaker 128-bit version for performance reasons. Disk Utility does, however, give you the option of formatting with full 256-bit AES.

Running Blackmagic, I saw write speeds of around 310MB/s, and read speeds of around 325MB/s.

These are, of course, low numbers compared to the very fast external SSDs available now, and there are two reasons for that. First, the interface is USB 3.1. Second, the AES256-bit XTS encryption does significantly slow things down, which is the reason Apple defaults to 128-bit with FileVault.

The bottom line here is that youre probably not going to want to use this as a working drive for demanding applications like video editing though it will cope with HD video.

Thats not to say its aslow drive in SSD form, but its still about half to two-thirds the speed of an equivalent unencrypted drive.

Mostly, though, this is a drive youre going to use to store commercially sensitive documents, like product designs, in-progress apps, marketing materials for unannounced products, customer databases, and similar.

Once the SecureDrive BT is unlocked, it works just like any other drive. So the in use section of the review is really about the unlocking experience and here theres good news and bad.

The bad news is that its a little less convenient than a drive with a keypad. To unlock it, you have to open the companion app and tap the drive name. At that point, Face ID will unlock it. But if you keep the app on your homescreen, unlocking is about as fast as using a keypad.

The good news is that youre trading off a slight inconvenience for more security. A keypad limits you to a numeric passcode; with this drive, you can have an alphanumeric password, including all special characters.

Plus, its not obvious that its a secure drive. If someone sees a drive with a keypad used in public, it draws attention to itself. This one, however, looks no different to any other external drive, and using your phone isnt going to be associated with unlocking the drive. So its the more discreet option, as well as the more secure. SecureDrive does make a keypad version, too, if you prefer that.

As I said about the diskAshur 2, whether or not the SecureDrive BT is right for you really depends on whether you have a need for the security:

The real question is whether you need this level of security. For the average consumer, its overkill, but I could definitely see some professional users appreciating it. Carrying around external drives with commercially sensitive materials on them is always a little nerve-wracking. There have been all kinds of reports of drives being left in embarrassing places like bars and trains.

For a startup, the peace of mind could well be worth the relatively small premium youre paying for heavy-duty security. For professional freelancers, it could even be turned into a selling point for clients. So if you need an external SSD and could use the reassurance this one brings, it could be very good value.

If you do need the security, or can use it as a selling tool, then the drive justifies itself. If you dont, you can get faster performance at a significantly lower price in unencrypted form. For example, the equivalent Western Digital My Passport 1TB SSD is about 50% faster and has a list price of $340 against just over $500 for the SecureDrive BT (and the WD drive is available for much less on Amazon). So, if you need this, it will be worth the price; if you dont, it wont.

The Secure Drive BT encrypted external SSD is available from Amazon in both spinning metal and SSD variants, in capacities ranging from 250GB to 8TB. I tested the 1TB SSD model at $458.80. The equivalent spinning metal version costs $238.

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Read this article:
Review: SecureDrive BT, the encrypted external SSD you can unlock with Face ID - 9to5Mac

Malware Obfuscation, Encoding and Encryption – Security Boulevard

Introduction

Malware is complex and meant to confuse. Many computer users think malware is just another word for virus when a virus is actually a type of malware. And in addition to viruses, malware includes all sorts of malicious and unwanted code, including spyware, adware, Trojans and worms. Malware has been known to shut down power grids, steal identities and hold government secrets for ransom.

The swift detection and extraction of malware is always called for, but malware isnt going to make it easy. Malware is mischievous and slippery, using tricks like obfuscation, encoding and encryption to evade detection.

Understanding obfuscation is easier than pronouncing it. Malware obfuscation makes data unreadable. Nearly every piece of malware uses it.

The incomprehensible data usually contains important words, called strings. Some strings hold identifiers like the malware programmers name or the URL from which the destructive code is pulled. Most malware has obfuscated strings that hide the instructions that tell the infected machine what to do and when to do it.

Obfuscation conceals the malware data so well that static code analyzers simply pass by. Only when the malware is executed is the true code revealed.

Simple malware obfuscation techniques like exclusive OR (XOR), Base64, ROT13 and codepacking are commonly used. These techniques are easy to implement and even easier to overlook. Obfuscation can be as simple as interposed text or extra padding within a string. Even trained eyes often miss obfuscated code.

The malware mimics everyday use cases until it is executed. Upon execution, the malicious code is revealed, spreading rapidly through the system.

Next-level malware obfuscation is active and evasive. Advanced malware techniques, like environmental awareness, confusing automated tools, timing-based evasion, and obfuscating internal data, allow (Read more...)

Continue reading here:
Malware Obfuscation, Encoding and Encryption - Security Boulevard