Crypto Countdown: Exactly Three Weeks Remain Until The Bitcoin Halving – newsBTC

Bitcoins halving is just three weeks away at this point, and with the critically important event happening so soon, the first-ever crypto asset is at an especially pivotal junction that could shape the future of the asset in the near and long term.

But what exactly does the halving mean, and why is it that crypto investors expect the event to be so shockingly bullish? Were taking a look at past halving cycles and providing various scenarios as to the final outcome of the event coming in just 21 days.

Bitcoin is the first of its kind and kicked off the cryptocurrency craze that has now led to thousands upon thousands of altcoins and billions of dollars in market cap.

However, it wasnt the first attempt at creating a digital form of cash. Instead, Satoshi Nakamoto took early concepts designed by other cypherpunks and solved the most critical issue plaguing these other pioneer projects: double-spending.

Related Reading | Bitcoin Mining Sell Pressure Waning, Supply Shock To Drive Massive Price Increase

The only way previously to prevent double-spending, was by having a third-party or central authority validating transactions. Bitcoin does this without the need for a central authority through a process called proof-of-work, or Bitcoin mining.

The process involves hi-tech machinery designed to squeeze out as much has hash power at as low cost as possible, using it to solve complex mathematical equations. The miner or mining pool to solve all equations unlocks a reward of 12.5 BTC currently.

In three weeks, that drops to just 6.25 BTC. There are 31 of these pre-coded halvings set to reduce the Bitcoin supply at regular intervals until the full supply is in circulation.

Each halving in the past has kicked off a monstrous bull run. The idea is that the BTC supply miners receive gets slashed in half, raising production costs immediately. Miners halt selling at a loss, and it throws off the delicate balance of supply and demand.

This fact has had crypto investors considering the event to be incredibly bullish. And each time in the past, Bitcoin price rose exponentially following the event.

In just three weeks, this same event happens once again, but the once highly anticipated event thought to be incredibly bullish, has done little to cause prices to rise in advance of what is expected to be the most important factor in causing Bitcoin price to rise.

Sentiment is in the gutter following last months record-breaking collapse that took the price of the leading cryptocurrency by market cap to under $4,000 at the low. The coronavirus pandemic has caused investors to be too fearful to take a risk with the cryptocurrency market, even with Bitcoins halving so close.

Related Reading | Bitcoin Shows Ideal Set Up For Epic Rally: Stock-to-Flow and Oversold RSI

If the bullish explosion that was once expected does play out, many of Bitcoins biggest supporters may miss out on the opportunity they spent the last four years waiting for.

And if it doesnt, well, the recession may send Bitcoin into its first real bear market in the assets history.

Original post:
Crypto Countdown: Exactly Three Weeks Remain Until The Bitcoin Halving - newsBTC

If Bitcoin is a Safe Haven, Why is it down during the Coronavirus outbreak? – Cryptopolitan

The coronavirus outbreak is no longer a new thing. Even illiterate grandmothers in my village know about the strange illness that is jumping from one country to another, as some of them put it. When the year started and the epidemic was just beginning to take hold in Europe and a few other countries, markets began to feel the effect. However, Bitcoin and some of the major cryptocurrencies started to see great demand, leading to great price increase. For instance, the BTCUSD pair saw its price jump above the $9,000 for the first time in several months. Many experts began to tout Bitcoin as a safe-haven asset. However, it did not take long for Bitcoins newly acquired safe-haven status to fall apart. Last week, Bitcoin sold off nearly half of its value in less than one hour in a bloody day for the cryptocurrency market.

Many of the experts and gurus who touted Bitcoin as the next big safe-haven asset after gold were confused. What really happened? How come the coronavirus-driven market fears were able to substantially crush Bitcoin to the extent to which it fell?

To answer the question, it is pertinent to define what a safe-haven asset is and then fit Bitcoin into the mold to see whether it can qualify to be known as a safe-haven asset.

What is a Safe Haven Asset?

Safe-haven assets are assets which are a store of value, and help protect investments from being wiped off by a market meltdown or by inflation. Safe-haven assets are therefore used to protect assets in times of economic downturn or to hedge against negative market exposures.

During periods of economic downturn or market upheaval, the focus of most experienced investors is to first preserve the value of whatever investments they have. Profiting from such investments, or capital appreciation is usually a secondary consideration. That is why such safe-haven assets are also called risk-off assets. They are in vogue at a time when traders are not willing to take risks. As you may know by now, reward in the markets is usually obtained by subjecting capital to risk. Occasionally additional risk might be worth taking, if you do not want to, however, take any, it is possible go for a Bitcoin demo account on which you can learn how much the coronavirus outbreak is affecting the price of Bitcoin, risk-free.

For an asset to be classified as a safe-haven asset, it must have the following attributes:

It is not easy to find a commodity or asset that has all these attributes. Traders generally have to make a choice as to which asset can present most, if not all of the characteristics that have been mentioned. In a world where new assets and derivative instruments are being created every year, it is becoming harder to sift out the true safe-haven assets from the ones that have pseudo status.

Bitcoin saw a meteoric rise from a price of just a few cents when it was created in 2009 to tens of thousands of dollars per coin at its peak. But certain events that punctuate this time period bring into question its perceived status as a safe-haven asset.

Does Bitcoin Qualify to be a Safe-Haven Asset?

As the world battles the coronavirus disease (COVID-19) outbreak with global stock and commodity markets all but battered, can we really say that Bitcoin is a safe-haven asset?Let us subject it to scrutiny using the parameters described above.

Also, Bitcoins value cannot be preserved over time. Newer cryptocurrencies are being released that have better use case applications. It is doubtful if Bitcoin will continue to retain the top spot in market capitalization in say, a decade from now.

So is Bitcoin a safe-haven asset?Is Bitcoin an acceptableand universal store of value? Can it hold its own in the face of market pressures or downside risks? That question seems to have been comprehensively answered in this article. It is not a safe-haven asset and so should not be treated as such. If circumstances emerge and cause a systemic disruption to the markets, Bitcoin is just as vulnerable to these as any other asset.

Read more from the original source:
If Bitcoin is a Safe Haven, Why is it down during the Coronavirus outbreak? - Cryptopolitan

Microsoft: Our AI can spot security flaws from just the titles of developers’ bug reports – ZDNet

Microsoft has revealed how it's applying machine learning to the challenge of correctly identifying which bug reports are actually security-related.

Its goal is to correctly identify security bugs at scale using a machine-learning model to analyze just the label of bug reports.

According to Microsoft, its 47,000 developers generate about 30,000 bugs a month, but only some of the flaws have security implications that need to be addressed during the development cycle.

Microsoft says its machine-learning model correctly distinguishes between security and non-security bugs 99% of the time. It can also accurately identify critical security bugs 97% of the time.

SEE: 10 tips for new cybersecurity pros (free PDF)

The model allows Microsoft to label and prioritize bugs without necessarily throwing more human resources at the challenge. Fortunately for Microsoft, it has a trove of 13 million work items and bugs it's collected since 2001 to train its machine-learning model on.

Microsoft used a supervised learning approach to teach a machine-learning model how to classify data from pre-labeled data and then used that model to label data that wasn't already classified.

Importantly, the classifier is able to classify bug reports just from the title of the bug report, allowing it to get around the problem of handling sensitive information within bug reports such as passwords or personal information.

"We train classifiers for the identification of security bug reports (SBRs) based solely on the title of the reports," explain Mayana Pereira, a Microsoft data scientist, and Scott Christiansen from Microsoft's Customer Security and Trust division in a new paper titled Identifying Security Bug Reports Based Solely on Report Titles and Noisy Data.

"To the best of our knowledge this is the first work to do so. Previous works either used the complete bug report or enhanced the bug report with additional complementary features," they write.

"Classifying bugs based solely on the tile is particularly relevant when the complete bug reports cannot be made available due to privacy concerns. For example, it is notorious the case of bug reports that contain passwords and other sensitive data."

SEE: Zoom vs Microsoft Teams? Now even Parliament is trying to decide

Microsoft still relies on security experts who are involved in training, retraining, and evaluating the model, as well as approving training data that its data scientists fed into the machine-learning model.

"By applying machine learning to our data, we accurately classify which work items are security bugs 99% of the time. The model is also 97% accurate at labeling critical and non-critical security bugs. This level of accuracy gives us confidence that we are catching more security vulnerabilities before they are exploited," Pereira and Christiansen said in a blogpost.

Microsoft plans to share its methodology on GitHub in the coming months.

Read more:
Microsoft: Our AI can spot security flaws from just the titles of developers' bug reports - ZDNet

Who knows the secret of the black magic box? Boffins seek the secrets of AI learning by mapping digital neurons – The Register

Roundup OpenAI Microscope: Neural networks, often described as black boxes, are complicated; its difficult to understand how all the neurons in the different layers interact with one another. As a result, machine learning engineers have a hard time trying to interpret their models.

OpenAI Microscope, a new project launched this week, shows that it is possible to see which groups of neurons are activated in a model when it processes an image. In other words, its possible to see what features these neurons in the different layers are learning. For example, the tools show what parts of a neural network are looking at the wheels or the windows in an image of a car.

There are eight different visualisations that take you through eight popular models - you can explore them all here.

At the moment, its more of an educational resource. The Microscope tools wont help you interpret your own models because they cant be applied to custom neural networks.

Generating the millions of images and underlying data for a Microscope visualization requires running lots of distributed jobs, OpenAI explained. At present, our tooling for doing this isn't usable by anyone other than us and is entangled with other infrastructure.

The researchers hope that their visualisation tools might inspire people to study the connections between neurons. Were excited to see how the community will use Microscope, and we encourage you to reuse these assets. In particular, we think it has a lot of potential in supporting the Circuits collaborationa project to reverse engineer neural networks by analyzing individual neurons and their connectionsor similar work, it concluded.

Don't stand so close to me: Current social distancing guidelines require people to stay at least six feet away from each other to prevent the spread of the novel coronavirus.

But how do you enforce this rule? Well, you cant really but you can try. Landing AI, a Silicon Valley startup led by Andrew Ng, has built what it calls an AI-enabled social distancing detection tool.

Heres how it works: Machine learning software analyses camera footage of people walking around and translates the frames into a birds eye view, where each person is represented as a green dot. A calibration tool estimates how far apart these people or dots are from one another by counting the pixels between them in the images. If theyre less than six feet apart, the dots turn red.

Landing AI said it built the tool to help the manufacturing and pharmaceutical industries. For example, at a factory that produces protective equipment, technicians could integrate this software into their security camera systems to monitor the working environment with easy calibration steps, it said.

The detector could highlight people whose distance is below the minimum acceptable distance in red, and draw a line between to emphasize this. The system will also be able to issue an alert to remind people to keep a safe distance if the protocol is violated.

Landing AI built this prototype at the request of customers whose businesses are deemed essential during this time, a spokesperson told The Register.

The productionization of this system is still early and we are exploring a few ways to notify people when the social distancing protocol is not followed. The methods being explored include issuing an audible alert if people pass too closely to each other on the factory floor, and a nightly report that can help managers get additional insights into their team so that they can make decisions like rearranging the workspace if needed.

You can read more about the prototype here.

Amazon improves Alexas reading voice: Amazon has added a new speaking style for its digital assistant Alexa.

The long-form speaking style will supposedly make Alexa sound more natural when its reading webpages or articles aloud. The feature, built from a text-to-speech AI model, introduces more natural pauses as it recites paragraphs of text or switches from one character to another in dialogues.

Unfortunately, this function is only available for customers in the US at the moment. To learn how to implement the long-form speaking style, follow the rules here.

Zoox settles with Tesla over IP use: Self-driving car startup Zoox announced it had settled its lawsuit with Tesla and agreed to pay Musks auto biz damages of an undisclosed fee.

Zoox acknowledges that certain of its new hires from Tesla were in possession of Tesla documents pertaining to shipping, receiving, and warehouse procedures when they joined Zooxs logistics team, and Zoox regrets the actions of those employees, according to a statement. As part of the settlement, Zoox will also conduct enhanced confidentiality training to ensure that all Zoox employees are aware of and respect their confidentiality obligations.

The case [PDF], initially filed by Teslas lawyers last year, accused the startup and four of its employees of stealing proprietary documents describing its warehouses and operations, and attempting to get more of its employees to join Zoox.

NeurIPS deadline extended: Heres a bit of good news for AI researchers amid all the doom and gloom of the current coronavirus pandemic: the deadline for submitting research papers to the annual NeurIPS AI conference has been extended.

Now, academics have until 27 May to submit their abstracts and 3 June to submit their finished papers. It can be hard to work during current lockdown situations as people juggle looking after children and their jobs.

Due to continued COVID-19 disruption, we have decided to extend the NeurIPS submission deadline by just over three weeks, the program chairs announced this week.

Sponsored: Practical tips for Office 365 tenant-to-tenant migration

Read the original post:
Who knows the secret of the black magic box? Boffins seek the secrets of AI learning by mapping digital neurons - The Register

Automation and Machine Learning Intern (Summer) job with AARP | 40983222 – Washington Post

Business Unit Description

AARP is a nonprofit, nonpartisan organization, with a membership of nearly 38 million that helps people turn their goals and dreams into 'Real Possibilities' by changing the way America defines aging. With staffed offices in all 50 states, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands, AARP works to strengthen communities and promote the issues that matter most to families such as healthcare security, financial security and personal fulfillment. AARP also advocates for individuals in the marketplace by selecting products and services of high quality and value to carry the AARP name. As a trusted source for news and information, AARP produces the world's largest circulation magazine, AARP The Magazine and AARP Bulletin.

Information Technology Solutions (ITS) is AARP's technology leader in positive social change and member value, enabling a more effective workforce and globally connecting employees, members, volunteers, partners and advocates to maximize engagement. Summary

Are you a software developer who wants to create solutions, broaden your abilities, and apply new skills? Our IT team is advancing AARP's automation and machine learning efforts related to workflows in the financial planning and analysis space and identifying creative ways to automate workflows in rapid delivery, agile and low-code, no-code projects.

As an Intern, you will have the opportunity to work across technical teams to apply your creativity and technical expertise to solve challenging business problems.

On any given day, you will:

-Work on a self-organized and cross-functional team

-Harness Lean thinking to create a Kanban board

-Prioritize the highest-value work

-Manage stakeholder relationships and incorporate frequent stakeholder feedback

-Participate in frequent demonstrations of RPA prototypes and other products

-Contribute in retrospectives to continuously improve how the team performs and communicates

We'll challenge you to adopt an agile mindset to your work and consider the outcomes that you desire from your internship. We are committed to your growth and will cultivate your continued learning and development.

Soft-skills desired:

Prospective interns must be currently enrolled in a degree program at an accredited college or university; be considered rising undergraduate juniors or seniors, graduate students, or post-doctoral students; and remain academically enrolled throughout the internship.

AARP also considers non-traditional interns who are looking to re-enter the workforce or change careers. This may include those who have previously graduated from college and enrolled in a continuing education program. Benefits Offered

Internships are non-exempt positions and are not eligible for employee benefits. Equal Employment Opportunity

AARP is an equal opportunity employer committed to hiring a diverse workforce and sustaining an inclusive culture. AARP does not discriminate on the basis of race, ethnicity, religion, sex, color, national origin, age, sexual orientation, gender identity or expression, mental or physical disability, genetic information, veteran status, or on any other basis prohibited by applicable law.

Read this article:
Automation and Machine Learning Intern (Summer) job with AARP | 40983222 - Washington Post

SAP Makes Support Experience Even Smarter With ML and AI – AiThority

SAP SE announced several updates, including the Schedule a ManagerandAsk an Expert Peerservices, to its Next-Generation Support approach focused on the customer support experience and enabling customer success. Based on artificial intelligence (AI) and machine learning technologies, SAP has further developed existing functionalities with new, automated capabilities such as theIncident Solution Matching service and automatic translation.

When it comes to customer support, weve seen great success in flipping the customer engagement model by leveraging AI and machine learning technologies across our product support functionalities and solutions, saidAndreas Heckmann, head of Customer Solution Support and Innovation and executive vice president, SAP. To simplify and enhance the customer experience through our award-winning support channels, were making huge steps towards our goal of meeting customers needs by anticipating what they may need before it even occurs.

Recommended AI News: Kofax Presents Partner of the Year Awards

AI and machine learning technologies are key to improving and simplifying the customer support experience. They continue to play an important role in expanding Next-Generation Support to help SAP deliver maximum business outcomes for customers. SAP has expanded its offerings by adding new features to existing services, for example:

Recommended AI News: Kyocera Selects Skyhook to Power Precision Location Services for Rugged DuraXV Extreme

Customers expect their issues to be resolved quickly, and SAP strives toward a consistent line of communication across all support channels, including real-time options. SAP continues to improve, innovate and extend live support for technical issues by connecting directly with customers to provide a personal customer experience. Building on top of live support services, such asExpert ChatandSchedule an Expert, SAP has made significant strides in upgrading its real-time support channels. For example, it now offers the Schedule a Manager service and a peer-to-peer collaboration channel through the Ask an Expert Peer service.

By continuing to invest in AI and machine learningbased technologies, SAP enables more efficient support processes for customers while providing the foundation for predictive support functionalities and superior customer support experiences.

Customers can learn more about the Next-Generation Support approach through theProduct Support Accreditation program, available to SAP customers and partners at no additional cost. Customers can be empowered to get the best out of SAPs product support tools and the Next-Generation Support approach.

Recommended AI News: O.C. Tanner Recognized as a Leader in Everest Group PEAK Matrix Rewards & Recognition Solutions Assessment 2020

Continued here:
SAP Makes Support Experience Even Smarter With ML and AI - AiThority

May 31 | Predictive Analytics World for Business Virtual Edition 2020 | Moorpark – Patch.com

Predictive Analytics World for Business is the leading cross-vendor data science conference series covering the commercial deployment of machine learning and predictive analytics. Hear from the horse's mouth precisely how Fortune 500 analytics competitors deploy machine learning and the kind of business results they achieve.

The conference schedule features a 2-Day conference program filled with insightful keynote presentations, industry-leading networking opportunities - plus optional training workshop days.

Predictive Analytics World for Business' main two-day program is packed with sessions that are divided among three tracks:

Business: Analytics operationalization and management

Tech: Machine learning methods and advanced topics

Case Studies: Cross-industry business applications of machine learning

Have a look at some highlight sessions:

The Foundation of Analytics-Driven Organizations: Jennifer Redmon, Chief Data Evangelist - Cisco Systems, Inc

Machine Learning at Facebook Scale: Mohamed Fawzy, Senior Software Engineering Lead - AI Infra - Facebook

How We Learned to Stop Worrying and Gained Company-Wide Adoption of Machine Learning: Clayton Clouse, Senior Data Scientist - FedEx

Efficiently Exploring (Possibly Infinite) Parameter Space with ML-Guided Adaptive Experiments: Clinton Brownley, Data Scientist - WhatsApp

URLs:Website: https://go.evvnt.com/563581-0?...Tickets: https://go.evvnt.com/563581-2?...

Date and Time: On Sunday May 31, 2020 at 9:00 am ends Thursday June 04, 2020 at 6:00 pm

Category: Conferences | Business and Economics

Prices:Early Bird Price (Ends Feb 21): USD 1895.00,Regular Price (Ends April 17): USD 1995.00,Late/Pre-event Price (Ends May 30): USD 2195.00,Onsite Price (From May 31): USD 2395.00

See the original post here:
May 31 | Predictive Analytics World for Business Virtual Edition 2020 | Moorpark - Patch.com

Zoom hack: What about the encryption models used by Microsoft, Google, and AnyDesk? – The Star Online

From getting hacked by Zoombombers to selling software exploits in the Dark Web, Zoom, the video conferencing app, has probably seen it all over the past few weeks.

The software, available both on desktop and mobile, has surged in popularity ever since the Covid-19 lockdown began, and is now feeling the heat as schools and organisations have started moving away from the platform due to security concerns.

But with several million of us hunkering down at home to curb the spread of coronavirus, online collaborations with employees or students via video conferences are important to get the work done. And this brings us to the golden question which video conferencing app should we use?

Now, there are several other video calling apps you can use including Google Duo, Microsoft Skype, Microsoft Teams, AnyDesk etc and you can rank these based on their features. But features are not what we are talking about today, we are talking about their encryption models and how safe are they to use (which is more important than anything right now).

So, to answer this Hindustan Times Tech got in touch with Microsoft, Google, Anydesk and spoke to the CEO of cybersecurity firm Lucideus.

But before we tell you what the experts said, here's a brief about what encryption really means. In simple terms, encryption encodes the information sent from one party and decodes it when it reaches the recipient. This prevents the possibility of infiltration, making video calling and messaging secure. However, how well this system can work depends on the level of encryption that firms, in this case the video calling apps, use.

As explained by Saket Modi, co-founder and CEO of Lucideus, there are three encryption standards: 128-bit encryption, 192-bit encryption and the 256-bit encryption, which is also the most difficult level of encryption to crack. Many have been using AES (Advanced Encryption System) with 256-bit for improved security as well. For instance, all your banking applications use 256-bit encryption. However, when it comes to video calling, there are two main kinds of encryption methods end-to-end encryption and TLS 1.2.

TLS (Transport Layer Security), as the name suggests, ensures secure delivery of data over the Internet between two applications. It however, does not secure data on the end systems (your smartphones and your computers).

So, what encryption platform is Zoom using?

As mentioned by Zoom in its support page, the TLS 1.2 with AES 256-bit algorithm is only used for the desktop clients right now. However, "for dial-in participants joining by phone, the audio is encrypted until it leaves Zoom's datacentre and is transferred to the participant's phone network," says Zoom.

What's worth adding is that while Zoom did mention it uses end-to-end encryption before for all calls, it never actually did. The firm even apologised for it later in a blog post and even faced a class-action lawsuit for overstating privacy standards and not disclosing that its service was not end-to-end encrypted.

What about the alternatives?

When we asked Microsoft about Skype's encryption model, the Redmond-based tech firm said that it "does not store any Skype video or audio calls, and chat messages are stored to enable sync across devices, but can be deleted".

The representative even pointed us towards the Skype support page that duly mentions the use of AES (Advanced Encryption Standard) "which is used by the US Government to protect sensitive information, and Skype has for some time always used the strong 256-bit encryption".

While for instant messages, Microsoft uses TLS to encrypt messages between Skype and other chat services that are based on Microsoft's cloud. However, it uses AES when the messages are sent between two Skype clients.

The spokesperson added that Skype has seen a growth over the past one month. "Skype has seen an increase in usage, with 40 million people using it daily, up 70% month over month and, we are seeing a 220% increase in Skype to Skype calling minutes month over month."

AnyDesk, another team collaboration app, confirmed to HT Tech that it uses TLS 1.2 encryption platform. "In addition to that, we use 2048bit RSA (standard cryptographic algorithm) or 256bit Elliptic curve DH asymmetric key exchange and AEAD to verify every single connection. The combination of TLS 1.2 and 2048bit RSA or 256bit Elliptic key exchanges mean that each connection is wrapped in multiple layers of security."

The firm adds that if any modification is detected in the connection signal, the connection drops automatically, which makes it difficult for man-in-the-middle attacks, something Zoom has witnessed thanks to Zoombombers and Zoom raiders.

AnyDesk claims that it has seen an increase of 200-500% in usage in certain regions across the world.

When HT Tech asked the Google Duoteam about the encryption platform they use, the team had no comments but pointed us towards one of their support pages. Although the page did say that Duo uses end-to-end encryption for all video and audio calls, it failed to provide details on the standards that are being used.

But, should you use Zoom or not? Lucideus CEO Saket Modi pointed out that although the firm has been transparent about the loopholes lately and has started making the platform more secure, it is still not recommended given its track record.

But in case you are already using Zoom, and still have to use it, the security protocols must be enabled. The Hindustan Times (New Delhi)/Tribune News Service

Read the original:
Zoom hack: What about the encryption models used by Microsoft, Google, and AnyDesk? - The Star Online

Zoom hackWe asked Microsoft, Google, AnyDesk in their encryption Versions | – KEYC TV

Last updated on April 19, 2020

From becoming hacked by Zoombombers to promoting applications exploits from the Dark Internet, Zoom, the video conferencing program, has likely seen it throughout the last couple of weeks. The software, that is accessible both on desktop computers and mobile, has surged in popularity since the COVID-19 lockdown started, and is now feeling the heat since organizations and schools have begun moving away in the platform because of safety issues.

But with a few million people hunkering down in your home to suppress the spread of coronavirus, online collaborations with students or employees through video conferences are all important for the job done. And that brings us into the gold question that video conferencing program if we use?

But features arent what were speaking about now, were discussing their encryption versions and how secure are they to use (that can be more significant than anything else right now).

Thus, to answer that HT Tech touch base with Microsoft, Google, Anydesk and talked to the CEO of cybersecurity company Lucideus.

However, before we tell you exactly what the specialists said, here is a short about what encryption means. Encryption encodes the data delivered from 1 party and decodes it as it reaches the receiver. This prevents the chance of infiltration, producing video calling and calling protected. But how well this system may work is contingent upon the degree of encryption which companies, in this instance the video calling programs, use.

For example, all of your banking programs utilize 256-bit encryption.

TLS (Transport Layer Security), as its name implies, guarantees secure delivery of information on the net between two programs. It does not secure data on the finish programs (your smartphones along with your computers ).

As stated by Zoom in its service page, the TLS 1.2 using the AES 256-bit algorithm is just used for the desktop customers at the moment. Butto get dial-in participants connecting by telephone, the sound is encrypted before it renders Zooms data center and is moved to the players phone system, states Zoom.

What is well worth is that while Zoom did cite it utilizes end-to-end encryption before for many of calls, it never really did. The company even apologized to it afterward in a blog article and maybe even confronted a class-action lawsuit for overstating privacy criteria rather than revealing that its support wasnt end-to-end encrypted.

After we asked Microsoft about Skype encryption version, the Redmond-based tech company stated that itdoesnt save any Skype audio or video calls, and chat messages have been saved to allow sync over devices, but maybe deleted.

The agent pointed towards the Skype service page that mentions the usage of AES (Advanced Encryption Standard) that is utilized by the US Government to safeguard sensitive data, and Skype has for a while consistently utilized the powerful 256-bit encryption.

But, it utilizes AES once the messages are routed between two Skype customers.

The spokesperson added that Skype has witnessed a rise over the previous month. Skype has witnessed a rise in use, with 40 million people using it every day up 70% over the month and, were seeing with a 220% increase in Skype to Skype calling seconds month .

AnyDesk, yet another team cooperation program, supported to HT Tech it uses TLS 1.2 encryption system. The blend of both TLS 1.2 and 2048bit RSA or 256bit Elliptic important exchanges means that every link is wrapped in many layers of safety.

The company adds that when any alteration is detected from the link sign, the link drops automatically, making it hard for man-in-the-middle strikes, and something Zoom has seen thanks to Zoombombers along with Zoom raiders.

AnyDesk asserts it has seen a rise of 200-500percent in use in certain areas throughout the world.

When HT Tech requested the Google Duo team concerning the security system that they use, the staff had no remarks but directed us towards among the service pages. Even though the webpage did state that Duo utilizes end-to-end encryption for all audio and video calls, it neglected to provide details regarding the criteria that are used.

However, in case you use compressed or maybe not? Lucideus CEO Saket Modi pointed out that even though the company was clear about the loopholes recently and has begun making the system more secure, its still not recommended given its history.

However, in the event youre already utilizing Zoom, and have to use it, then the safety protocols have to be permitted. Weve mentioned a couple of tips here about how you can make Zoom phoning more protected.

Read more:
Zoom hackWe asked Microsoft, Google, AnyDesk in their encryption Versions | - KEYC TV

IBM i 7.3 Encryption Bolstered With TR8 – IT Jungle

April 15, 2020Alex Woodie

Customers running IBM i 7.3 got some good news on the security front when IBM announced that the operating system would get support for the latest Transport Layer Security (TLS) protocol, version 1.3. And thats not the only security-related enhancement this group of users received with the new Technology Refreshes.

Last year, IBM gave IBM i shops the ability to use TLS 1.3, which is strongest publicly available encryption protocol used on the Internet today. TLS 1.3 debuted in the summer of 2018 and has since been adopted by nearly a quarter of sites on the Web, according to surveys. Its faster than TLS 1.2, but more importantly, TLS 1.3 is more secure, as it eliminated security ciphers that posed a security vulnerability of their own.

However, IBM i customers had to move to the latest release of the operating system, IBM i version 7.4, to get TLS 1.3. IBM remedied that situation with this weeks introduction of IBM i 7.3 TR8, which adds support for TLS 1.3 in that version of the operating system.

In a COMMON Webcast yesterday announcing the new TRs, IBM i Chief Architect Steve Will acknowledged that IBM was aware of the security shortcoming in IBM i version 7.3 when it shipped 7.4 last year. That support [for TLS 1.3] was put into 7.4, but we knew at the time that putting it into 7.4 was not going to be sufficient, he said.

IBM i 7.3 is still used by 50 percent of the installed base, according to the 2020 version of HelpSystems Marketplace Survey, compared to just 4 percent on IBM i 7.4. Those numbers have surely narrowed, as HelpSystems conducted the survey last fall and many undoubtedly have upgraded since then. But IBM i 7.3 will likely have a significant number of users for years to come, so it behooved IBM to make it as secure as possible.

HelpSystems Marketplace Survey

IBM i shops arent always the most security conscious, as weve come to learn. But IBM clearly understood the importance of adding support for the latest encryption technology to a mainstream and fully supported release of a server operating system that would be around for years.

TLS 1.3, which took 10 years to develop, will eventually replace TLS 1.2, just as TLS replaced Secure Sockets Layer (SSL) technology before that. Nobody is saying TLS 1.2 is unsafe to use (yet), but TLS 1.3 clearly is the encryption technology that forward-looking, security-conscious firms use today.

The key is that all of the support that you might want to talk to the [TLS] 1.2 partners that you have or the [TLS] 1.3 partners that you have are now part of our two most recent releases, 7.4 and 7.3, Will said in the COMMON webcast. Therefore, you can get all the necessary TLS 1.3 attributes. All of that is available to you through the standard mechanism for configuring and for getting information out of IBM.

Companies that use *OPSYS will automatically be presented with the option to use the new TLS 1.3 ciphers, Will said. Those shops that use other mechanisms for managing their SSL/TLS connections will need to manually make the change when IBM i 7.3 TR8 becomes available on May 15.

We also added the system value support back in so that you could identify on your 7.3 system that you wanted to use TLS 1.3 where possible, Will said. In this case, demonstrator need to explicitly add the new values unless they were already using the *OPSYS for the SSL/[TLS] control.

TLS 1.3 is the strongest publicly available encryption for data exchange over the Internet.

IBM also bolstered its support for TLS 1.2 in IBM i 7.4. The cryptographic community has made some changes to TLS 1.2 (which debuted way back in 2008) that will solidify its use going forward. Specifically, it added a handful of new cipher suites, including more elliptic curve algorithms for key exchanges. IBM added support for these TLS 1.2 enhancements with IBM i 7.4 TR1 last fall, and now its giving IBM i 7.3 customers the same support.

Supporting these TLS 1.2 enhancements ensures that IBM i customers can continue exchanging data with their trading partners in an unimpeded manner, Will said.

While most of our clients will want to move to 1.3, they need a partner conversation that can also do 1.2, he said. If youre dealing with somebody who is using 1.2 and hasnt moved to 1.3 yet, you may still want to do things that are stronger in their encryption and so on. TLS 1.2 has some enhancements for that. We put those in 7.4. And now they are also in 7.3.

This situation is similar to what IBM faced back in 2017, when a handful of IBM i 7.1 users were clamoring for IBM to add support for new SSL/TLS ciphers specifically, the elliptic curve encryption algorithms to that operating system.

At that time, IBM i customers were being turned down by their trading partners because they werent using the latest, greatest ciphers, which eliminated their ability to use standard Internet techniques to exchange data. IBM i 7.1 was still supported at the time, but both IBM i 7.2 and IBM i 7.3 were already out. IBM i 7.1 was nearing the end of its (very long) life, and IBM did not want to give these customers any more reason to stay on that release, so it didnt add those new ciphers to 7.1.

However, there is one key difference between IBMs TLS support now and back in 2017: IBM i 7.3 is expected to be around for quite a while (although IBM i 7.2 will be pulled from marketing at the end of April of this year and will be pulled from mainstream support at the end of April 2021). Getting TLS 1.3 running on IBM i 7.3, therefore, was a priority for IBM.

The new Digital Certificate Manager (DCM) interface that IBM introduced with IBM i 7.4 has also been added to 7.3. According to Will, the new GUI interface for DCM was received very positively by customers.

But what we found was as people were introduced to this new interface on 7.4, they said Absolutely this is what we wanted. Now make it available to 7.3 because Im managing multiple systems as well, Will said. You can use the original one if it take you a little time to learn the new one. But what were finding is that its relatively straightforward . . . The ability to see certificates that are close to expirations so that you can act on them its so much easier in this new interface, so youll want to take a look at that.

Heres Whats In the Latest IBM i Technology Refreshes

How IBM i 7.4 Improves Security

Lack Of Ciphers In IBM i 7.1 Raises Concern

See the original post:
IBM i 7.3 Encryption Bolstered With TR8 - IT Jungle