DOJ seizes $1 billion in cryptocurrency tied to Silk Road dark web market – CyberScoop

Written by Tim Starks Nov 5, 2020 | CYBERSCOOP

The Department of Justice said Thursday that it seized approximately $1 billion worth of bitcoin, its biggest cryptocurrency seizure ever.

Theannouncement solves aa years-oldmystery about the shuttered Silk Road dark web market for illegal drugs and other unlawful goods, widely regarded as the largest and most extensive dark web marketplace of its time before its 2013 demise.

The law enforcement action solves another riddle about a bitcoin wallet that just saw a nearly identically valued amount of cryptocurrencywithdrawn after sitting dormant for a long time.

The successful prosecution of Silk Roads founder in 2015 left open a billion-dollar question. Where did the money go? said U.S. Attorney David Anderson. Todays forfeiture complaint answers this open question at least in part. $1 billion of these criminal proceeds are now in the United States possession.

Motherboard reported Wednesday on the Election Day emptying of the wallet. Then the complaint, filed Thursday, detailed how federal investigators tracked down someone identified only as Individual X, who had hacked the funds from Silk Road much to the dismay of Silk Road creatorRoss Ulbricht.

According to the investigation, Ulbricht became aware of Individual Xs online identity and threatened Individual X for return of the cryptocurrency to Ulbritcht, the complaint reads. Individual X did not return the cryptocurrency, but kept it and did not spend it.

On Tuesday, Individual X signed an agreement to forfeit those Bitcoins, whereupon feds took over the money.

The U.S. government still must prove its case in court to retain the cryptocurrency.

Original post:
DOJ seizes $1 billion in cryptocurrency tied to Silk Road dark web market - CyberScoop

Metrix Coin: An Efficient Decentralized Proof-of-Stake (PoS) Cryptocurrency That Exhibits Many Benefits for Consumers and Businesses – GlobeNewswire

Brisbane, Australia, Nov. 06, 2020 (GLOBE NEWSWIRE) -- Scalable, Flexible and Applicable to Multiple Use-Cases Metrix Coin and its ticker MRX is not just another PoS cryptocurrency, but rather a blockchain technology that offers benefits to consumers and businesses, scalable to encompass growth and flexibility to implement in multiple use-cases.

About PoS cryptocurrencies

A little background about PoS crypto algorithms first. In this kind of algorithm, anyone with a certain amount of coins participates in the transaction validation and block creation process that renders a stake reward (a process known as staking). It is simple, one must create a wallet, hold coins until maturity is reached, and have it connected online participating in the network to start receiving stake rewards. In order to prevent centralization and monopolization of the network by someone with the highest value of coins at stake, a number of techniques (i.e. randomization, age of holdings, staking limits, etc.) are used in the consensus algorithm to determine which user will create the next block.

About Metrix Coin

There is no dearth of PoS cryptocurrencies in the crypto economy. However, few of them have enough flexibility built into them that they can be used for a wide range of use-cases. Most of them are built for specific use cases only (i.e. gaming, e-commerce, P2P payments, etc.). But for mainstream adoption of PoS cryptocurrencies, it is necessary that PoS cryptocurrencies become multipurpose. Metrix Coin has fast transaction speeds of 10,000 transactions per second, ~90 second block times, is cost affordable, and harbors Bitcoins Unspent Transaction Output (UTXO) and Ethereum Virtual Machine (EVM) environments which make it perfect for e-commerce transactions and smart-contract development. The Metrix Coin blockchain is a hardfork from Quantum. However, Metrix Coin offers products and services that make it a robust blockchain and project overall that is for everyone and everything.

Consumer Benefits

Metrix Coin has incorporated a deflationary model that may attribute the value of the coin to appreciate over time. Consumers that stake their Metrix Coins will receive per annum in succession 10% for 2 years, 5% for 4 years, 2% for 6 years and 1% until max supply is reached. People may hold their Metrix Coin using any of the following products made in-house: Altitude, a desktop wallet available in multiple operating systems (OS); MyStakingWallet, an online wallet staking 24/7 that is also available as a mobile app for either android or iPhone; or MyNodePool, a stake pool service.

Business Partner Benefits

Metrix Coin aims to enhance business models customized to the needs of the business practice while also focusing on improving business-to-consumer (B2C) relationships. Partners that integrate Metrix Coin blockchain technology may expect to grow their brands to a worldwide audience while participating in Metrix Coins Partner Network at zero costs.

As mentioned earlier, Metrix Coins deflationary model will be a contributing factor to Metrix Coin value appreciation over time. Consumers that hold Metrix Coin as an asset will gain in passive income through the stake rewards. In addition to the inherent value that the blockchain offers to consumers, partners that integrate a custom incentive business model will not only grow their client base, but also retain them.

Metrix Coin products: Altitude, MyStakingWallet, and MyNodePool are accessible, without the technical hassles, that facilitate consumers to use Metrix Coin as a means of payment.

Metrix Coins marketing model further propels business partners to reach a worldwide audience at zero cost. Metrix Coin Business Developers have fine-tuned this productive model to provide an ease of mind to business partners underlining business growth.

Metrix Coin support team is available 24/7 to assist with any technical issues.

Developments

Metrix Coin also comes with its own ecosystem of a payment processing app, wallet, an altcoin pool, a gaming platform, and many other apps that are still being built. These apps were built by the core team of Metrix Coin to show its immense capabilities. The project also established a DIY technical support guide, email support system, and a support chat service to assist with their user-bases technical needs.

Metrix Coin Blockchain Solutions

A challenge that has been witnessed time-and-time again in the crypto-space is blockchain ecosystem disruption, or hardforking and softforking to fix security issues, smart-contract issues, and outdated blockchain parameters (block gas limit, block size, gas schedule, etc). Hardforking is when another blockchain is created from the existing chain, thus allowing two chains. Softforking is when only script lines of code are added to the current blockchain, think of it as an update to the existing blockchain.

One of the fascinating aspects of Metrix Coin is its Decentralized Governance Protocol (DGP) built on smart-contract technology. As the protocol implies, blockchain issues are addressed without the need for disrupting the network with forks by appointing Governor nodes, or Governors, to oversee blockchain changes via the DGP lens. If the existing chain needs an upgrade or an update, DGP and the governor node consensus will mandate to apply necessary changes to the betterment of the Metrix Coin blockchain. Under the same governance protocol, governor nodes may vote on budget proposals allocating necessary funding to development. Metrix Coins governance protocol is a force of significant improvement that will push beyond the boundaries of its own development. Project development will never be hindered such that the power of the community will always ascertain its potential growth.

Metrix Coin is a DeFi Ready Blockchain

Decentralized Finance (DeFi) has reshaped how we visualize the financial and banking system. DeFi is a permission-less financial service ecosystem that does not need banking support. Recently, DeFi protocols which are built on smart-contracts have gained much popularity by giving the liquidity provider (LP) financial gains. How it works is the LP deposits a stablecoin, which is pegged against ETH, another cryptocurrency, or fiat currency into a liquidity pool and earns a %APY in return. These assets may be traded in available decentralized markets or deposited into other liquidity pools offering the best yield in return. There are multiple DeFi protocols that are tailored to serve various financial services (lending and borrowing, yield farming, derivatives, margin trading, etc). Metrix Coin is a DeFi Ready blockchain, meaning that it offers the scalability that DeFi protocols warrant without congesting the network and raising the cost of a transaction to increase. DeFi protocols on Ethereum have caused gas prices to rise making it expensive to submit transactions across the platform affecting other projects. And as mentioned previously, Metrix Coins DGP provides the network oversight to address any smart-contract issues or blockchain problems. Developers may have a peace of mind to build their DeFi protocols on the Metrix Coin blockchain without the burden of network congestion and security.

Metrix Coin. For Everyone. For Everything.

There are very few Proof-of-Stake cryptocurrencies that are fast, scalable, and affordable at the same time and offer consumer and business solutions. Metrix Coin is a proven blockchain that offers more to e-commerce transactions and smart-contract developments. With its superfast transaction speed, deflationary staking model, quick block times, decentralized governance, scalability and DeFi capabilities, its one of the few PoS cryptocurrencies that can become mainstream.

And now it has become even more important because it is listed on the WhiteBIT exchange. This is its 4th major exchange listing after BarterTrade, DigiFinex, and P2PB2B. With a fast-growing and loyal community, robust features, and solid team, Metrix Coin has the potential to outperform many other PoS cryptocurrencies in the game of mainstream adoption.

For more information about product services visit http://www.metrixcoin.com, or email trent@metrixcoin.com if you would like to learn how our business model and blockchain may enhance your business practice.

Join Metrix coin Telegram and discord:Telegram: https://t.me/officialmetrixcoin Discord: https://discord.gg/DY4d7AV

Media Contact Details:Company Name: Metrix CoinCompany Email: trent@metrixcoin.comCompany website: https://www.metrixcoin.com/

Link:
Metrix Coin: An Efficient Decentralized Proof-of-Stake (PoS) Cryptocurrency That Exhibits Many Benefits for Consumers and Businesses - GlobeNewswire

Some Important Things to Know Before Investing in Cryptocurrency – Programming Insider

Billionaire investor Paul Tudor Jones named it as the top bet to hedge against bitcoins post-pandemic inflation. The average investor probably does not know much about bitcoin. In this case, this cryptocurrency is seen in the news, Bitcoin, which is considered as the first cryptocurrency digital currency. Cryptos are not managed at all by a bank and by a public agency. In order to perform all transactions of cryptocurrency tokens, the public blockchain is entered into it. It contains the stored digital information of the database. In this, the future of everyone remains uncertain. To know more you can visit bmmagazine.co.uk

The co-founder of Framework Ventures, also known as Michael Anderson, uses tokens or coins used in its decentralized network that are not at all the same as all the companys shares. It requires new models to succeed in order to advance all networks. We are in its first inning to prove it.

Cryptos Are Risky

By the majority of start-up companies in it, most of the crypto assets in it can fail, says Anderson. All non-professional investors should invest in it for an amount that you can be prepared to lose. By all investors, despite a story of making millions in it, to invest in its inadequate time It can also rapidly reach its peak loss as a result before. In the year 2017, the business of bitcoin (BTC) had reached about $ 1,500. At the end of May 2017, the Bitcoin (BTC) unit traded up to about $ 1,500. Talking about December 2017, it peaked at its peak, bitcoin that rose to nearly $ 19,800. BTC had recently reached a price of about $ 6,600 to $ 7.600 from April 7 to April 15. Investing in crypto gives you a chance to make you rich, its market which is very volatile, there is also a possibility of loss.

The Uses for Cryptos Vary

The cryptocurrency is also known for its illegal transactions and financing. Crypto is accepted for all legal business transactions. Cryptos that offer their fast, low cost and their own money transfers. This makes the transfer of international money popular. In fact, it takes only two and a half minutes for all $ 99 million worth of bitcoin (LTC) transactions. It costs very little more than a dollar in remittance transaction fees. It is completely free from cryptos authorities, and cannot be frozen so easily, because it contains the wallets private key that the owner owns. Investors who can also speculate listed in cryptocurrencies can easily make this betting successful.

Cryptocurrency Investors Use Many Strategies

In order to make simple speculation investments, it gives an approach to cryptocurrency. In order to invest in this stock market, it has specific strategies for all investors. Marcus Swanepoel, CEO of global cryptocurrency company Luno, said that you can easily do the day-trading of crypto, and with both fundamental and technical analysis, you can easily buy and sold its assets, and we can evaluate it as well. Despite the difficulty of predicting digital currency fluctuations, Swanepoel claimed that it also had some methods of market analysis that informed all investors to buy and sell. All strategies for evaluating cryptocurrencies include concepts for demand and future use for its asset supply.

Excerpt from:
Some Important Things to Know Before Investing in Cryptocurrency - Programming Insider

Microsoft: New VS Code update is out plus here’s what GitHub Codespaces will cost – ZDNet

Microsoft has released a new update of its Visual Studio Code (VS Code) code editor for Windows, Windows on Arm, macOS and Linux.

The latest update brings VS Code to version 1.51, which contains fixes for "housekeeping GitHub issues" that have emerged since GitHub Codespaces was released.

Microsoft in September aired its plans to kill off Visual Studio Codespaces the rebranded version of Visual Studio Online and merge it with GitHub's take on the online code-editing service, GitHub Codespaces.

SEE: Hiring Kit: Python developer (TechRepublic Premium)

Microsoft opted to consolidate Visual Studio Codespaces with GitHub Codespaces to "eliminate confusion, simplify the experience for everyone, and make more rapid progress to address customer feedback".

Visual Studio Codespaces users have until February 2021 to move to GitHub Codespaces. After that, the Visual Studio Codespaces offering on Azure will end.

The VS Code team said it has "worked with our partners at GitHub on GitHub Codespaces, which ended up being more involved than originally anticipated".

The team says it will continue working on GitHub housekeeping for part of the November iteration of VS Code.

Microsoft unveiled GitHub Codespaces in May, offering developers a cloud-hosted development environment that launches quickly inside GitHub so that developers can start contributing to projects immediately.

It offers developers a containerized, browser-based version of the VS Code editor, but developers can also opt to use their desktop IDEs instead to start a codespace in GitHub and connect to it from their desktops via VS Code.

Codespaces in GitHub supports VS Code's code completion and navigation, extensions, and terminal access.

GitHub Codespaces is still in a limited public beta. It's described as an "integrated development environment (IDE) on GitHub". During the beta phase, GitHub Codespaces is free to use. However, when it becomes generally available, users will be billed for storage and compute resources.

GitHub has now listed pricing details that will apply when GitHub Codespaces reaches general availability.

The 'basic' Linux package with two CPU cores, 4GB of RAM, and 32GB of SSD storage costs $0.085 per hour. The 'standard' option with four CPU cores, 8GB of RAM, 32GB of SSD costs $0.169 per hour, whole the 'premium' option with eight CPU cores, 16GB of RAM, 32GB of SSD costs $0.339 per hour.

Additionally, each codespace incurs monthly storage costs until users delete the codespace. Storage costs for all instance types are $0.10 per GB per month.

SEE: Windows 10: Microsoft details workaround for 'Reset This PC' failures in 2004 update

The proposed pricing is consistent with the recently discounted prices of instances for Visual Studio Codespaces in Azure, which was basically halved.

Besides GitHub housekeeping, Microsoft has introduced more prominent pinned tabs for the VS Code workbench, a custom hover for extension trees, and the ability to install a VS Code extension without synchronizing it while settings sync is enabled.

Users can also now move the cursor while suggestions are showing, allowing users to trigger suggestions at the end of a word, move left to see more suggestions, and then use replace to overwrite the word.

See more here:

Microsoft: New VS Code update is out plus here's what GitHub Codespaces will cost - ZDNet

Cyber Actors Stole Source Code Of U.S. Government Agencies And Businesses: FBI – Mashable India

The U.S. Federal Bureau of Investigation (FBI) issued a security alert warning that states have stolen source code from U.S. government agencies and private businesses. These hackers are abusing misconfigured SonarQube applications to access sensitive data, reports ZDNet.

SEE ALSO: Apple Paid $2,88,500 To Ethical Hackers For Discovering Security Flaws In Its Systems

The alert was issued by the FBI back in October and states that unidentified threat actors have been actively targeting vulnerable SonarQube applications since April 2020. The attack is being conducted with the purpose of access to source code repositories of U.S. government agencies and private businesses in the technology, finance, retail, food, eCommerce, and manufacturing sectors.

It further states that these hackers exploit known configuration vulnerabilities that give them access to proprietary code. For the uninitiated, SonarQube is an open-source automatic code review tool that detects bugs and security vulnerabilities in source code. FBI states that these unidentified threat actors leaked internal data from two organizations.

The stolen data was sourced from SonarQube instances that used default port settings and admin credentials running on the affected organizations networks, states the FBI.

The FBI has also listed a slew of mitigations for organizations to protect themselves from these threats including changing the SonarQube default settings, changing default administrator username, password, and port (9000), placing SonarQube instances behind a login screen, etc.

SEE ALSO: Russian Hackers Hit U.S. Hospitals With Ransomware Attack

See the article here:

Cyber Actors Stole Source Code Of U.S. Government Agencies And Businesses: FBI - Mashable India

You Don’t Have to Be a Moodle Expert to Make the Most Out of Your Moodle – Moodle

Video ConferencingBigBlueButton is an open source web conferencing system that supports real-time sharing of slides (including a white board), audio, video, chat, breakout rooms and more that is available as a plugin to Moodle.

Another option is Zoom, a cloud-based video conferencing solution that can be integrated with Moodle using the Zoom meeting plugin or via an LTI.

GamificationGamifying your courses can help you keep your learners motivated and engaged during their learning journey. From literally turning your quiz into a video game where answers to questions come down as spaceships for learners to hit the correct one, to rewarding your students with coins or items to collect theres many options to bring gamification into Moodle courses.

The options to extend your Moodles functionality are many. You can start by checking out Moodles Certified Integrations for add-ons that work seamlessly with Moodle, and also the communitys favorite plugins for more inspiration on how you can transform your Moodle.

It is also worth noting that with Moodle you own your site data, meaning that the configurations, integrations, all your course content everything is yours to do with as you please, which is important when you think of future-proofing your learning platform.

With open-source Moodle, you have a number of options when it comes to how you host your site. You can self-host your Moodle instance or work with a Certified Moodle Partner or a number of vendors. Because Moodle is open source and all users own their data, it also makes it easy to change how you host your site if needed.

The benefit of this is that if you are ever dissatisfied with your current instance, need more support, or are just looking for a change, you can bring your Moodle site with you. You dont have to worry about starting from scratch or losing any of the hard work youve already put into configuring your site.

Like weve said, you dont have to be a technical expert to create and set up your Moodle in a way that works for your organisation. In saying that, if you need extra help with configuration or with certain aspects key to keeping your Moodle site running smoothly (taking care of hosting, maintenance, updates), we have a network of Certified Moodle Partners that can help.

Beyond customisation, our Certified Partner network is there to support you with a range of Moodle services to help you meet your learning goals. Working with a Certified Moodle Partner ensures your Moodle is configured to meet your needs and budget, while taking the heavy lifting off your shoulders, so you have more time to focus on what you do best.

As Moodle is an open source solution, there are many companies that provide Moodle-based online learning solutions. However, only Certified Moodle Partners have our seal of approval and a guarantee for excellent solutions and services, and ensure you are actively contributing back to our open-source Moodle project.

If youre ready to begin with Moodle LMS, learn how to get started on our website, and chat with other Moodlers in our community forums.

Our worldwide network of Certified Moodle Partners can also help you with customised LMS hosting, maintenance and training.

Read more from the original source:

You Don't Have to Be a Moodle Expert to Make the Most Out of Your Moodle - Moodle

GCHQ takes action against Russian COVID-19 vaccine disinformation. Source code theft. OceanLotus has a network of fake sites. – The CyberWire

Britains GCHQ has gone on the offensive against anti-vaccine propaganda. The Times says the SIGINT agency is using techniques proved against Islamic State online activity against state-sponsored purveyors of vaccine disinformation. Its not a comprehensive rumor-control effort, but operates against state-directed disinformation only, not ordinary grassroots craziness.

The campaign against which GCHQs efforts are directed is Russian, Engineering and Technology reports. One of the disinformation campaigns central claims seems unlikely to convince anyone: a COVID-19 vaccine developed in the UK by AstraZeneca and Oxford University is bound to turn anyone who gets it into an ape, on account of that vaccine used a chimpanzee virus somewhere in its development. According to Reuters GCHQ is taking down hostile state-linked content and disrupting the communications of the cyberactors responsible. The Week suggests the motive for the disinformation is at least partly commercial: Russia is pushing widespread adoption of two vaccines developed there.

The US FBI last week made public an alert issued on a restricted basis back in October to the effect that unknown actors had exploited insecurely configured instances of the SonarQube code review tool to steal source code from companies and Government agencies. ZDNet summarizes the research into and remediation of the issue.

Volexity researchers report that OceanLotus, the Vietnamese cyberespionage crew also known as APT32, is using an array of bogus Web sites and Facebook pages to attract victims. CyberScoop notes that OceanLotus has, since its discovery in 2017, been particularly active against foreign corporations doing business in Vietnam.

More:

GCHQ takes action against Russian COVID-19 vaccine disinformation. Source code theft. OceanLotus has a network of fake sites. - The CyberWire

IBM Food Trust Delivers Traceability, Quality Assurance to Major Olive Oil Brands with Blockchain – cnweekly

ARMONK, N.Y., Nov. 11, 2020 /PRNewswire/ --IBM (NYSE: IBM) and olive oil producers Conde de Benalua, a cooperative in Spain made up of more than 2,000 farmers, and Rolar de Cuyo, an olive oil supplier in Argentina, today announced they are using IBM Food Trust on IBM Cloud to trace the lifecycle of their product and provide traceability,authenticity and quality for consumers. They join CHO, a Tunisia-based producer that makes Terra Delyssa brand olive oil, and I Potti de Fratini, a family-run oil mill in Italy, which joined IBM Food Trust earlier in 2020.

Using blockchain technology, these companies from around the world are promoting greater consumer trust in their olive oil and working to create a more efficient and transparent supply chain.

Consumers' demand for transparency and general distrust have been driven by recent reports of olive oil counterfeits and adulteration. That trend is reflected in a broader context, according to a recent IBM Institute for Business Valuestudy, whichfound that 73% of consumers will pay a premium for full transparency into the products they buy.

"Our mission is to provide customers quality olive oil so they can enjoy a genuine and healthy product. Rolar de Cuyo's objective in using blockchain technology is to ensure olive oil packers worldwide trust us and choose us. IBM blockchain technology provides the transparency we need to trace the origin of our products, complying with all quality processes to reach consumers' tables," said Guillermo Jos Albornoz, Rolar de Cuyo director.

IBM Food Trust uses IBM Blockchain technology and IBM Cloud to close the information gap for customers. By scanning a QR code on each bottle of olive oil, consumers can trace its production from the groves where the olives were grown, to the mills where they were processed into oil, to the stores where it is sold. They can see images of where the olives were picked and pressedand get to know the farmers and workers behind the scenes and even review what criteria was met for the oil in each bottle. For example, the tracing will show whether the olives were processed to the standards required to be labeled extra virgin olive oil.

On the production side, members of the supply chain can work together with greater confidence and efficiency, creating a permanent digital record of transactions that can be easily shared with permissioned parties. This data within IBM Food Trust can also be used to help ensure the freshness of food, control storage times and reduce waste.

"Our Terra Delyssa brand of premium olive oil has seen a spike in demand since bottles of traceable olive oil reached stores shelves earlier this year. Consumers in the US and Canada can now buy Terra Delyssa premium extra virgin olive oil in more than 10,000 grocery stores and online platforms, with more retailers adding Terra Delyssa's premium, traceable olive oil to their shelves," said Chris Fowler, Sales Manager at CHO America.

The growing demand in early January helped CHO anticipate a spike in sales due to its new consumer traceability app. Supply chains had ample products on store shelves throughout the pandemic, during which time demand rose 30% due to an increase in consumers cooking at home.

CHO is now working on creating a separate enterprise application for distributors and retailers. This app will provide access to in-depth information about each processing and control stage that a certain lot has passed through, including whether it was first cold-pressed, extra virgin or organic, with analysis from CHO's International Olive Council-accredited laboratory and third-party auditors.

"Our continuing work with olive oil producers demonstrates the growing momentum around Food Trust and our commitment to strengthening the chain that connects food from farm to table around the world,"said Raj Rao, general manager, IBM Blockchain Platforms."There's a growing desire among consumers to know where their food comes from and an increased business motivation to optimize processes with better supply insights. We're able to work with olive oil producers and distributors provide a single source of secured and transparent information through IBM Blockchain technology."

For more information on IBM Food Trust please visithere.

About IBM Blockchain

IBM is recognized as theleading enterprise blockchain provider. The company's research, technical and business experts have broken barriers in transaction processing speeds, developed the most advanced cryptography to secure transactions, and are contributing millions of lines of open source code to advance blockchain for businesses. IBM is the leader in open-source blockchain solutions built for the enterprise. Since 2016, IBM has worked with hundreds of clients across financial services, supply chain, government, retail, digital rights management and healthcare to implement blockchain applications, and operates a number of networks running live and in production. The cloud-based IBM Blockchain Platform delivers the end-to-end capabilities that clients need to quickly activate and successfully develop, operate, govern and secure their own business networks. IBM is an early member of Hyperledger, an open source collaborative effort created to advance cross-industry blockchain technologies. For more information about IBM Blockchain, visithttps://www.ibm.com/blockchain/or follow us on Twitter at @ibmblockchain.

Media Contact:Anthony Colucci, IBM External RelationsAnthony.colucci@ibm.com

Read the original post:

IBM Food Trust Delivers Traceability, Quality Assurance to Major Olive Oil Brands with Blockchain - cnweekly

The future of programming languages: What to expect in this new Infrastructure as Code world – TechRepublic

Commentary: New declarative programming languages like HCL and Polar might just be the perfect way to boost productivity with IaC.

Image: DragonImages, Getty Images/iStockphoto

There are a lot of programming languages--over 700, as Wikipedia lists them. And yet, we arguably don't have nearly enough programming languages. Not since cloud upended the way applications get built.

Developers are moving away from managing physical servers to calling APIs that touch storage, compute, and networking resources. In turn, developers are trying to automate everything as code through static configurations, scripts, and files. Such automation would be easier if developers had programming languages that matched the task at hand, but they don't. So, using a general purpose language like Java, a developer might invest thousands of lines of code to try to express business logic...and mostly fail.

To solve for this, we're seeing companies like HashiCorp (HCL) and oso (Polar) release special-purpose declarative languages. Even at the risk of programming language proliferation, this feels like the right way forward: Purpose-built instead of general-purpose languages. However, we're likely to see many of these programming languages rise and fall before we settle into a useful set of standard declarative languages.

SEE:Top 5 programming languages for systems admins to learn (free PDF)(TechRepublic)

The irony is that the "novel" approach taken by special-purpose declarative languages really isn't very novel. Years ago, programming languages split between functional (declarative) programming languages like Lisp and imperative programming languages like C. While the latter dominated for decades, functional declarative languages are making a comeback, said Jared Rosoff in an interview, a software executive who has built product at VMware, MongoDB, and more.

"Imperative languages were better suited to encoding business logic for apps," Rosoff noted. "But in Infrastructure as Code [IoC], the world isn't imperative. It's rule-driven. And this world gets much easier when we change out the languages we use to program it."

Even Polar, a declarative logic programming language specialized for making authorization decisions and tightly integrating with an application's native language, really isn't new. As Sam Scott, cofounder and CTO of oso, suggested in an interview, Polar has its roots in Prolog, which was developed way back in 1972, yet has the feel of imperative languages like Python. (Here's an example of what Polar looks like.) This is important because it's difficult to encode authorization logic in traditional, general-purpose programming languages. Doing so in a declarative language like Polar is more expressive and concise--think "tens of lines of code" instead of "thousands of lines of code."

And yet, many will question whether creating new programming languages is the right approach. How many do we really need? The short answer is "more." Here's the longer answer.

While we still use COBOL and other older programming languages, we also keep inventing new languages, each with its own advantages and disadvantages. For example, we have Rust and C++ for low-level, performance-sensitive systems programming (with Rust adding the benefit of safety); Python and R for machine learning, data manipulation, and more; and so on. Different tools for different needs.

But as we move into this Everything-as-Code world, why can't we just keep using the same programming languages? After all, wouldn't it be better to use the Ruby you know (with all its built-in tooling) rather than starting from scratch?

The answer is "no," as Graham Neray, cofounder and CEO of oso, told me. Why? Because there is often a "mismatch between the language and the purpose." These general-purpose, imperative languages "were designed for people to build apps and scripts from the ground up, as opposed to defining configurations, policies, etc."

Further, mixing declarative tools with an imperative language doesn't make things any easier to debug. Consider Pulumi, which bills itself as an "open source infrastructure-as-code SDK [that] enables you to create, deploy, and manage infrastructure on any cloud, using your favorite languages." Sounds awesome, right?

Unfortunately, while the program may be executed, this is simply used to build a data structure for Pulumi to feed into its engine, which operates in a more declarative way (i.e., take the data structure, diff it with the current infrastructure state, and apply changes). Although existing language tools exist (e.g., JavaScript debuggers), they aren't very useful because debugging Pulumi would require an intimate knowledge of that codebase. The Pulumi engine is still very opaque and tough to debug. This isn't a critique of Pulumi--it's just indicative of the problems inherent in trying to apply existing, imperative languages to Everything-as-Code.

SEE:Python is eating the world: How one developer's side project became the hottest programming language on the planet (cover story PDF) (TechRepublic)

The same problem crops up when trying to skirt the issue with data as config. This is a bit like using an existing language (Hey! I already know JSON). As Scott explained, to make this approach work, a vendor typically needs to dress up the data format with conditions or custom rules (e.g., GitHub Actions) to make it work for the use case. Or maybe they use templating (e.g., Helm or how Ansible uses Jinja2). Plus, while the appeal often starts with the data format being human readable, the "files have a nasty habit of getting long and unwieldy," he said, leading to posts like this and this and this and this.

This brings us back to declarative programming languages.

Declarative languages like Polar and HCL are great for use cases like configuration because they allow you to just declare what you want the world to look like and not have to worry about what you need to do to make that happen. The downside is that it's new: New learning curve, new need to build out an ecosystem of tools around it, etc. It's still early for declarative programming languages, but that's ok--it's also still early for our Everything-as-Code world.

And while declarative programming languages aren't perfect, they offer significant benefits over imperative programming languages, as iRobot's Ben Kehoe called out. Over the next few years, I suspect we'll see declarative programming languages proliferate, with the industry standardizing around those that do best at making themselves accessible to newbies through tooling and approachability (e.g., embracing a familiar syntax). If "developers are the new kingmakers," it's time for the declarative programming language designers to start crowning some new kings.

Disclosure: I work for AWS, but the views expressed herein are mine.

From the hottest programming languages to the jobs with the highest salaries, get the developer news and tips you need to know. Weekly

See more here:

The future of programming languages: What to expect in this new Infrastructure as Code world - TechRepublic

Open Source: The IIoT Security You’re Looking For? | RFID JOURNAL – RFID Journal

Nov 08, 2020As the Industrial Internet of Things (IioT) market continues to mature, new devices flood onto networks that also contain a host of legacy and early-generation devices. This combination is increasing the complexity of network traffic, as well as raising integration questions, forcing enterprises across the spectrum to reappraise the best security approaches, with open-source solutions increasingly coming to the fore.

IoT security has become one of the hot topics of today, with a Gartner report predicting a total market value of $3.1 billion by 2021. While there is an element of fear, uncertainty and doubt to some of the more doom-laden predictions, the fact is that IIoT security presents some significant challenges.

OT Plus IT: A Heady MixIn just one example, a study from Trend Micro, in association with Politecnico di Milano, conducted in its Industry 4.0 lab, has identified a variety of methods by which attackers are able to leverage unconventional new attack vectors to sabotage smart manufacturing environments. The security firm highlights two key problems. Firstly, IIoT systems were originally designed to be isolated from traditional IT infrastructure, so network trust is high and there are few integrity checks. Secondly, many IIoT platforms utilize proprietary languages that, while more niche than widespread languages, can still be effectively exploited to input malicious code, traverse through the network or steal confidential information.

That increasing erosion of IIoT isolation is, indeed, at the heart of the next wave of IIoT security concerns. As OT and IT systems are integrated more widely, those underlying security issues will be enhanced. There is also a significant issue with regard to legacy systemsthe simple fact is that many pilot projects and early-adopter enterprises did not have security at the forefront of their thinking.

LoRaWan: Pros and ConsThe LoRaWan protocol has been widely deployed across the globe in applications ranging from IIoT climate-control systems to smart meters and asset tracking. As a non-cellular protocol, it has been popular; there are approximately 142 countries with LoRaWAN deployments and 121 network operators in 58 countries, with around 100 million LoRaWAN-connected devices online, a figure projected to hit 730 million or more by 2023.

However, a recent study released by IOActive found that the root keys used for encrypting communications between LoRaWAN smart devices, gateways and network servers are often poorly protected and easily obtainable through several common hacking methods. The researchers found that many deployments simply used default keys in their enthusiasm to test out the technology, leaving the door open.

Moreover, another core issue with LoRaWAN is managing security revisionsa particularly problematic question throughout the IIoT, due to power limitations and access difficulties. In the case of LoRaWAN, 1.0.3 devices can't be updated to version 1.1 due to hardware limitations, locking an entire generation of devices into outdated software. This is something that hackers are more than well aware of how to exploit.

Limitations of the PLCAnother specific battleground is the industrial programmable logic controller (PLC), which has been a core part of industrial automation applications for decades. These were never built with security in mind, creating the difficult scenario of either updating the PLCs, creating open-source gateways to secure them or replacing them with custom IIoT devices.

Either option requires in-house developers or a third-party systems integrator to build something bespokethat "something" being reliant on a wide range of software libraries used to program the devices. The gateway route has been explored by developers using the open-source Apache MyNewt, Apache's first RTOS built for systems too small to run Linux.

Open-Sourced Trust?Of course, open-source technology is not entirely invulnerable to security flaws and vulnerabilities, as demonstrated by the recent Heartbleed security bug affecting OpenSSL. However, the open-source community is taking the initiative in many ways, perhaps most visibly in the shape of Project Alvarium. Set up by the Linux Foundation in October 2019, Alvarium is dedicated to building a data confidence fabric (DCF) to facilitate trust and confidence in data and applications spanning IIoT/IoT and traditional IT systems. The game plan is to collaborate on the baseline open-source framework and related APIs that bind together the various ingredients that constitute trust fabrics, as well as to define the algorithms that drive confidence scores.

The idea of introducing and quantifying trust in IIoT networks is not entirely new, but it does potentially offer a more scalable and robust solution than traditional IT approaches. Another leading light in developing IIoT trust frameworks is, of course, blockchain stalwart IOTA, which has been pushing the adoption of its distributed ledger technology (DLT) for some years. Recent announcements include collaborating on the E.U.-funded Dig_IT project to use DLT for increasing sustainability (via the IIoT) in the mining industry, as well as joining the Eclipse Open-Source Foundation.

Future ValuesOf course, the road of open source is littered with failures, as well as notable successes, and whether Project Alvarium and IOTA will thrive and prosper remains to be seen. However, it's increasingly clear that traditional IT-style approaches to IIoT security are not able to scale cost-effectively, and new approaches will be required as the sheer volume of devices and applications continues to increase exponentially. Open source also has the major inbuilt requirement of good collaboration between enterprises, a critical element in cementing the future of the IIoT.

Martin Keenan is the technical director at Avnet Abacus, which assists and informs design engineers in the latest technological challenges, including designing for Industry 4.0 and Industrial IoT manufacturing.

See original here:

Open Source: The IIoT Security You're Looking For? | RFID JOURNAL - RFID Journal