‘The forced remote working test will be a good experience for most organisations’ – Siliconrepublic.com

Netssos Brian ODoherty discusses online security, leading a remote team, and starting a business later in life.

Brian ODoherty is an economist and entrepreneur with more than 20 years experience in senior roles with Crs Trchtla (Irish Export Board), which later became part of Enterprise Ireland. There he worked as North American director, European director and assistant CEO.

ODoherty went on to run an economic development consulting company in Brussels, and was also director of a number of technology transfer and trading companies. He later moved into security software development and most recently established Netsso, a cloud-based web application designed to secure web activity through a central platform. He is based in Donegal, but his team works remotely.

Those of us with more years behind us should focus on taking advantage of the wisdom that comes with age BRIAN ODOHERTY

I am the founder and CEO of Netsso, a cloud-based web application that provides productivity and security for individuals and organisations. Netsso is a small team. We have three full-time staff, alongside three part-time, spread across three countries, each of whom are remote working.

Good management therefore requires personal, sensitive motivation and timely coordination to ensure that everyone is up to speed with everyone else. My background is in marketing while the rest of the team are specialists in programming, coding, cryptography, design and illustration.

Our own product, Netsso, is perfect for remotely conducting our team work. We are Netssos makers and testers every working minute of the day, something I oversee alongside the team.

At this stage in life, my work is devoted to enhancing my new product Netsso. We work on doing this remotely, across time zones, with one member of the team online between 7am and 11pm, seven days a week.

I prioritise the development of Netsso, and I rarely take a break; no more than a few hours on a Sunday morning. But, on the other hand, I dont always have to be in the office. I can receive questions, answer problems and enter discussions on any computer, anywhere.

Nowadays, I take winter holidays in the sun, but I make sure I contribute to the team for a few hours every day. Netsso has been quite a big project, but has reminded me that work-life balance is important as is doing something you are passionate about.

One of the biggest challenges is that our sector of the internet services market is extremely broad.So, how does a little Donegal start-up distinguish itself?

I think probably in our security. It is rather unique, and what makes Netsso a secure and valuable tool. We are lucky to have created a product that complements numerous online file storage services such as Dropbox etc.

Another major challenge is to find ways to store and distribute files securely, without losing data or information, and yet without having to manage complex security structures and defences.

Our solution is to encrypt the data itself, end-to-end, in a non-complex, nothing-to-download system, worked by simple clicks, after one SSO (single sign on) member password.

The Covid-19 pandemic has caused an astonishing surge of interest in remote working and, for that, the number one need is security, which is one of our major selling points. Of course the virus will be defeated eventually, and we can all go back to more normal working conditions. But I think remote working is here to stay, at least to a considerable extent.

I believe this is for two major reasons: todays forced test of the method will be a good experience for most organisations and individuals, and climate change requires us to disperse the working economy away from its high-density centralism of today so that we stop transporting tens of millions of workers billions of miles daily to and from congested cities.

In my early career in Crs Trchtla (CTT), I managed a few hundred executives dispersed across nearly 40 separate offices, many of whom were around the world but a few were at home too. We mainly provided one-on-one marketing and business planning services to up to 2,000 Irish companies annually.

In the second half of my working life, I have been involved in quite a lot of interesting new areas and activities, and one of these is cryptography. From that, I came into software using cryptography, an evolution which led over a few years into Netsso.

During my days in New York with CTT, my team was making major strides promoting Irish consumer products. I wrote up a proposal for a franchise chain of Irish shops across the country. Despite receiving a commitment for financing from an Irish investment company, I ended up dropping the idea and took my next promotion back in Dublin instead.

Thinking back, I wonder if this was a mistake. Im pretty sure the franchise would have been successful. Nonetheless, I cant say I regret my subsequent career, which was full of adventure, intellectual challenge and some satisfying success as a private entrepreneur.

The lesson of this? I think, probably, to take courage in your convictions. And certainly, dont look back to this day I cant say for sure if this was entirely a mistake or not, but I can say that theres no good in stewing over it.

I believe in them as we have a shared vision for Netsso. The guys I work with are all extremely talented and joined this enterprise purely because they believed in the concept.

We dont share office space, so communication and trust are both especially important for us. Were in a unique position whereby our remote work and collaboration take place via use of our own product, which is probably key to our efficiency and productivity.

Ive certainly witnessed the benefits of diversity in business. From the beginning of my career, Ive worked with a diverse range of people from all over the world. I was particularly fortunate in CTT, where approximately 50pc of those employed overseas were local men and women. CTT was notably one of the first Irish institutions to appoint female executives to managerial positions on the same salary and terms as males.

However, Ive also seen another side of it in tech where, for example, ageism prevails to a certain extent. Nonetheless, there are studies indicating that the average age of new start-up founders in the US is much closer to 40 than 20, while the average age of founders of successful start-ups is 45 all in all, not exactly kids out of college.

Such stats should encourage those of us with more years behind us to instead focus on taking advantage of the wisdom that comes with age. Well only benefit from a more diverse industry of people of all ages.

Ive never had a mentor per se, but I have been around the world a few times, worked in many countries, often travelled alone and always found people willing to help. In particular, I enjoyed living and working in the US, for eight years in total.

I found Americans to be the most friendly and hospitable, and often met business associates in the US who were valuable to my career development. They were always willing to provide information, advice, contacts and genuine help. One in particular who was pivotal was an immigrant from Derry named Jim McGilloway. He was the man who brought Toblerone to market and made Twinings Tea into a top brand. Thanks, Jim.

I read a lot on varying topics, but a couple of recent reads were great:

My freedom as a remote worker means Im not restricted by specific office hours or a commute, and Im lucky that I work from home with all the tools I need at my fingertips. The downside of remote working is I dont have the face-to-face reassurance that an office might offer, but the online tools we have help to bridge that gap for me.

Otherwise, what I find most useful for myself is my to-do list. A clear list keeps me grounded and helps me keep track of my priorities. I set myself a weekly list and find that its a great way of keeping the faith in myself, my work and my ambitions.

Want stories like this and more direct to your inbox? Sign up forTech Trends, Silicon Republics weekly digest of need-to-know tech news.

The rest is here:
'The forced remote working test will be a good experience for most organisations' - Siliconrepublic.com

OPINION: Blockchain and its impacts on everyday life – IOL

By Brenton Naicker 3h ago

Share this article:

The time is 1999. Youre wondering whether you stockpiled enough canned food for the coming Y2K Armageddon, while a small bunch of investors and techies are busy ranting about 'inter-webby' jargon. Fast forward twenty years and the tech fad no one really understood has now permeated every facet of the way the world operates, doing so at a fundamental level.

As a result of this new technology, that most at the time disregarded, information became decentralized and democratized for the first time. News, video, ideas, pretty much anything can be instantly shared with anyone around the globe. This was the true overarching benefit the internet provided to mankind, making information freely and globally accessible and transferable.

Now, with the internet, we were no longer bound by geographical boundaries or information gatekeepers. Not even the visionary thinkers at the time would have been able to predict the effect it would have on the world. In todays era, the largest taxi company owns no cars, the largest accommodation platform owns no property, and the largest video streaming platform doesnt produce any content. All of this made possible by a new technology.

We can talk to family members across the world as easily as if they were in the next room, stream a live lecture from Harvard University from an internet caf in a small city in Delhi, or share our thoughts and ideas with a global community in real-time. The same freedom the internet has brought to information, Blockchain promises to bring to value.

Blockchain allows for transfers in value without any intermediaries or trusted parties (third parties or counterparties). However, value transferred using blockchains prevents the problem of fraud (double spending), as well as being verified and stored by multiple segregated databases around the world. This is all achieved using mathematics, cryptography and game theory, the mechanics of which are beyond the scope of this article, but remember, we dont know the technicalities behind the internet or emails, but we use them daily dont we?

VALUE TRANSFER

To highlight the extreme potential this technology has to revolutionize value transfer, lets look at an empirical example:

The average remittances cost of sending money into Sub-Saharan Africa currently sits well over 9% and takes multiple days to complete. This isnt quite intuitive if we think about whats happening. Think about it? Nobody is physically taking your money, jumping on a plane and depositing it into a bank in Sub-Saharan Africa. All that is happening is someone changing digital balances and performing a number of checks and balances. So why then the massive time delay and exorbitant costs?

Now, lets compare this with an actual cross border value transaction that occurred using one of Blockchains' most popular assets, Litecoin. On April 19th, 2018, $99 Million (R 1 518 521 400.00) was transferred between wallets in a single transaction. The wow factor you may ask? The transaction took only 2,5 minutes to complete and the cost of the entire transaction racked up at an unbelievable $0.40 (R6,14). The very notion of this being possible threatens the entire business model of behemoths such as MoneyGram and Western Union.

Now, lets expand these capabilities to everyday activities. This essentially means sending money anywhere in the world could very soon be almost free and near to instant. It also makes things such as micropayments possible. For example, you can now pay a writer half a cent for every person who reads their work, irrespective of where they are and who they bank with. You could send money to your son studying in China at 3 am and he would be able to spend those funds within minutes. The true possibilities are limitless and have most likely yet to even be conceived.

Lets go back at the internet example, when we first started accepting and using it, for emails and to visit websites, nobody would have been able to predict one day, in the relatively near future, that we would be able to hold up a piece of glass and metal in the palm of our hands and be able to see and speak to family and friends anywhere in the world, in real-time. The potential of blockchain to completely revolutionize the way we store and transact value should be evident by now, and I for one am very excited for the future of this nascent technology.

Brenton Naicker is the co-founder of Chainlink Capital, a crypto asset and blockchain technology consultancy.

PERSONAL FINANCE

Read more here:
OPINION: Blockchain and its impacts on everyday life - IOL

Encrypting police and fire radios is on the agenda – My Columbia Basin

PENDLETON The Pendleton City Council meets at 7 p.m. Tuesday via Zoom. Topping the agenda is a request by Fire Chief Jim Critchley and Police Chief Stuart Roberts that their radio channels be encrypted.

Roberts said that the move toward encryption is recommended by a national study and is being considered by all first responder areas within the Umatilla-Morrow Radio District. He cited the growing emphasis on individual privacy rights and the tendency of the public to show up at active crime scenes, endangering their own safety, as some of the reasons behind the recommendation. Roberts also said many criminals carry hand-held scanners with them so they can know where police are.

Im not overly concerned about encryption on what we would categorize as our main channel, Roberts said. Some of my peers feel very strongly the other way.

Those peers have told Roberts they believe encryption should be all or nothing. He says he believes it is obvious why its important to have encryption on the tactical channels that are used by the Blue Mountain Enforcement Narcotics team and SWAT.

Our need to maintain encryption on tactical channels far exceeds, at least in my analysis, the need for the public to be able to essentially monitor the radio traffic, he said.

Also on the council agenda is a $595,595 bid from Central Washington Asphalt, Inc. of Moses Lake to perform the overlays and road reconstructions throughout Pendleton this summer.

The Pendleton Development Commission will meet one hour prior to the council meeting.

ZOOM ACCESS INSTRUCTIONS

You can attend this meeting at the Council Chambers at Pendleton City Hall, 500 SW Dorion Ave., or you can access the meeting via Zoom by following these instructions.

Meeting ID: 955 4604 3802

Internet Browser Connection:

(From aninternet browseron yourcomputer, smart phone or tablet,click on this link to join the meeting. By connecting via a web browser you will have both an audio and a video connection if your connecting device has both audio and video transmission capabilities. If you use a computer without a camera or microphone you will not be able to be seen or to be heard.) Click here:

https://zoom.us/j/95546043802

Phone Connection:

On a smart or landline phone, dial one of these phone numbers to be connected to the meeting.(You will have an audio connection via your phone.You will not have a video connection.)

then input the Meeting ID, 955 4604 3802 when instructed to do so.You do not need a password.

Dial one of these numbers:

+1 669 900 9128 US

+1 301 715 8592 US

+1 253 215 8782 US

Meeting ID: 955 4604 3802

You can leave the meeting at any time by hanging up.

Read the original post:
Encrypting police and fire radios is on the agenda - My Columbia Basin

Cloud Encryption Software Market 2020-2025: by Key Manufacturers with Countries, Type, Application and Forecast Till 2025 Cole Reports – Cole of Duty

The research report on the Cloud Encryption Software market offers a comprehensive study on market share, size, growth aspects, and major players. In addition, the report contains brief information about the regional competitive landscape, market trends, and drivers, opportunities and challenges, distributors, sales channels, risks & entry barriers, as well as Porters Five Forces Analysis. Moreover, the main objective of this report is to offer a detailed analysis of how the market aspects potentially influence the coming future of the Cloud Encryption Software market. The report also offers a comprehensive analysis about the competitive manufacturers as well as the new entrants also studies along with their brief research.

ACCESS THE PDF SAMPLE OF THE REPORT @HTTPS://WWW.ORBISRESEARCH.COM/CONTACTS/REQUEST-SAMPLE/2311441

In addition, this report also contains a price, revenue, market share, and production of the service providers is also mentioned with accurate data. Moreover, the global Cloud Encryption Software report majorly focuses on the current developments, new possibilities, advancements, as well as dormant traps. Furthermore, the Cloud Encryption Software market report offers a complete analysis of the current situation and the advancement possibilities of the Cloud Encryption Software market across the globe. This report analyses substantial key components such as production, capacity, revenue, price, gross margin, sales revenue, sales volume, growth rate, consumption, import, export, technological developments, supply, and future growth strategies.

Moreover, the Cloud Encryption Software report offers a detailed analysis of the competitive landscape in terms of regions and the major service providers are also highlighted along with attributes of the market overview, business strategies, financials, developments pertaining as well as the product portfolio of the Cloud Encryption Software market. Likewise, this report comprises significant data about market segmentation on the basis of type, application, and regional landscape. The Cloud Encryption Software market report also provides a brief analysis of the market opportunities and challenges faced by the leading service provides. This report is specially designed to know accurate market insights and market status

MAKE AN ENQUIRY OF THIS REPORT @HTTPS://WWW.ORBISRESEARCH.COM/CONTACTS/ENQUIRY-BEFORE-BUYING/2311441

The key players covered in this study

GemaltoHPEIBMMicrosoftSymantecThales E-SecurityCiphercloudNetskopeTrend MicroParablu

Market segment by Type, the product can be split into

Cloud-basedOn-premise

Browse the complete report @https://www.orbisresearch.com/reports/index/global-cloud-encryption-software-market-size-status-and-forecast-2018-2025

Market segment by Application, split into

BFSIManufacturingHealthcareGovernmentOthers

Market segment by Regions/Countries, this report covers

United StatesEuropeChinaJapanSoutheast AsiaIndiaCentral & South America

The study objectives of this report are:

To analyze global Cloud Encryption Software status, future forecast, growth opportunity, key market and key players.To present the Cloud Encryption Software development in United States, Europe and China.To strategically profile the key players and comprehensively analyze their development plan and strategies.To define, describe and forecast the market by product type, market and key regions.

In this study, the years considered to estimate the market size of Cloud Encryption Software are as follows:

History Year: 2013-2017Base Year: 2017Estimated Year: 2018Forecast Year 2018 to 2025

Major Points From Table of Content:

Chapter One: Report OverviewChapter Two: Global Growth TrendsChapter Three: Market Share by Key PlayersChapter Four: Breakdown Data by Type and ApplicationChapter Five: United StatesChapter Six: EuropeChapter Seven: ChinaChapter Eight: JapanChapter Nine: Southeast AsiaChapter Ten: IndiaChapter Eleven: Central & South AmericaChapter Twelve: International Players ProfilesChapter Thirteen: Market Forecast 2018-2025Chapter Fourteen: Analysts Viewpoints/ConclusionsChapter Fifteen: Appendix

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: +1 (972)-362-8199 ; +91 895 659 5155

Original post:
Cloud Encryption Software Market 2020-2025: by Key Manufacturers with Countries, Type, Application and Forecast Till 2025 Cole Reports - Cole of Duty

Exclusive: Zoom plans to introduce end-to-end encryption; in touch with Home Ministry – CNBCTV18

As many organisations have asked employees to work from home to stop the spread of coronavirus, this has led to a sharp rise in the use of online communication platforms such as Zoom for meetings, webinars etc. However, the Home Ministry recently raised alarm bells, flagging video conferencing software Zoom as unsafe and vulnerable to cybercrimes.

Harry Moseley, global CIO at Zoom cleared the air and spoke about how the company was planning to introduce end-to-end encryption.

We have always been very focused on safety and security for our professionals. We have done a couple of things, one is we have redirected our entire engineering team for 90 days beginning on April 1 to focus on bringing the necessary security controls right to the forefront, he said.

The Indian government has been critical of the video conference platform and issued an advisory directing staff to avoid using it for official purposes. We are in contact with Ministry of Home Affairs that issued the notification and we expect, as a consequence of these conversations, that things will change in time. But recently, the British parliament approved Zoom for their communications. That is just one of many examples around the world. So we do hope to see that change of mindset with the Ministry of Home Affairs, he stressed.

View original post here:
Exclusive: Zoom plans to introduce end-to-end encryption; in touch with Home Ministry - CNBCTV18

Is Zoom safe to use? Here’s what you need to know – starexponent.com

Zoom, a videoconferencing service created for corporate webinars and meetings, has grown into something more amid the coronavirus outbreak.

With the number of daily users exploding from 10 million to 200 million from December to March, it has become a forum for nearly every kind of social function, including happy hours, yoga sessions, school classes, funeral services as well as Passover, Easter and (soon) Ramadan rituals.

But no sooner had many tried Zoom for the first time than they began to hear reasons they might want to stay away.

Trolls have crashed meetings, flashing porn or racist slurs on screens. Security researchers released report after report on newly discovered vulnerabilities including leaked emails and bugs that might have allowed hackers to access webcams.

Earlier this month, Google warned employees not to use Zooms desktop application on their work computers due to privacy and security vulnerabilities. SpaceX, the U.S. Senate and New York Citys school district have enacted similar restrictions.

If youre among the tens of millions of people who have become regular Zoom users in recent weeks, you may be wondering what all this means for you. Heres a primer on some of the notable privacy and security lapses and how to keep your calls and data safe.

Is Zoom sending my data to Facebook?

A Vice investigation showed that Zooms app for iPhones sent data about users devices to Facebook, including about users who did not have Facebook accounts. The company was hit with at least two lawsuits in federal court, one by a California resident who alleges Zoom violated the states new Consumer Privacy Act by disclosing information to Facebook without providing consumers with adequate notice or the ability to opt out.

Zoom Chief Executive Eric Yuan said in a blog post March 27 that the company removed code that sent user data to Facebook in an updated version of the iOS app. The company updated its privacy policy March 29 after a swell of concern from users.

I think Zoom wasnt completely honest, Electronic Frontier Foundation senior technologist Bill Budington said. I think they are going through a lot of growing pains.

How else might my information have been compromised?

Reports of Zooms vulnerabilities predate the coronavirus crisis. Last July, security researcher Jonathan Leitschuh exposed a flaw that allowed hackers to take over Mac webcams through the app. The company fixed the problem after a public interest research center filed a complaint with the Federal Trade Commission.

Thousands of personal Zoom videos were left viewable on the open web, including one-on-one therapy sessions, telehealth calls and elementary school classes, the Washington Post reported. Peoples names, phone numbers and intimate conversations were revealed and childrens faces and voices were exposed.

Experts say the company now seems to be making more serious efforts to identify and quickly patch vulnerabilities. It formed an advisory council of chief security officers from other companies and hired Alex Stamos, Facebooks former chief security officer, as an adviser. Thats a lot of money being thrown at the problem to improve security. That is not insubstantial, said Leitschuh, who discovered the Mac camera vulnerability last year.

Are Zoom calls encrypted, and does that matter?

Zoom marketed its communications as protected by end-to-end encryption, which makes it, in effect, impossible for anyone, including the company itself, to spy on them. Recently, however, the Intercept revealed Zoom has been using a different type of encryption, called transport encryption, which enables the company to decode the content of calls.

That means the company could hypothetically be susceptible to pressure from government authorities to disclose communications, said Bill Marczak, a fellow at the Citizen Lab and a postdoctoral researcher at UC Berkeley.

That doesnt make those calls uniquely vulnerable, however. Cellphone calls and Skype calls on default settings, for example, arent encrypted end to end either, and its unlikely the average person would need this type of security. But reporters or dissidents under oppressive regimes, government officials discussing classified information or big companies that want to keep their business strategies confidential might want to use a more secure platform, Budington said.

What information does Zoom give my boss or co-workers?

If youve been part of a long, boring webinar, you perhaps thought there would be no harm in checking your email or your Facebook feed to pass the time. So many were alarmed at the revelation of an attention tracking feature that allowed the meeting host to see when participants clicked away from the active Zoom window for more than 30 seconds. The company announced it had removed the feature in an April 2 blog post.

Thats not the only way hosts can gather information on attendees. They can also record audio and video from meetings and save a record of group chats. Some Zoom users were surprised to learn that if they use a tool that allows them to save the chat log from a call on their local deviceswhich many use as a way to document meeting minutesthat record will include private chats theyve sent in addition to messages the group has sent.

What is Zoombombing?

Because Zoom is so easy to use, it has also been easy for people to exploit the app to sow mischief or chaos. Zoombombing is when uninvited participants interrupt or derail a meeting. Sometimes its harmless trolling, but often it rises to the level of harassment.

As USC and local school districts transitioned to online meetings, they reported getting Zoombombed with racist taunts and pornographic images. Recently, Berkeley High School students were in the middle of a video conference when a man joined the Zoom meeting, exposed himself and shouted obscenities, the Mercury News reported.

The New York Times found scores of accounts on Instagram and on Reddit and 4Chan message boards where users coordinated to share meeting passwords and derail Zoom meetings.

Zooms default setting allowed anyone to join video calls if they had the meeting ID, which is a number 9 to 11 digits long. These meeting IDs are easy to guesswith an automated tool (called war-dialing), one could access thousands of meetings within a day by simply making a lot of guesses.

What are some steps I can take to make Zoom safer to use?

Be careful about how you share meeting IDs. Dont post them publicly.

Generate a new ID for every meeting you launch using the options panel, instead of using your personal meeting ID. That way, if someone gets ahold of your personal ID, future meetings wont be disrupted by Zoombombers.

You can toggle settings to ensure meeting participants need a password to access the meeting, which will further protect from disruption.

Enable Zooms Waiting Room feature, which lets meeting hosts keep would-be participants in a digital queue until they approve them to join the session. Beginning April 4, Zoom enabled the Waiting Room feature by default, requiring additional password settings for free users. Zoom has a guide to the feature on its website.

You can switch off a host of features that could be abused, if needed, including private chats, file transfers and custom backgrounds. The annotation feature, for example, could allow trolls to draw offensive shapes. You can also toggle the allow removed participants to rejoin option. Zoom has a guide to host controls on its website.

Keep your desktop app up to date, so that any patches Zoom makes to security vulnerabilities are added to your device.

If you want to be extra careful, use Zoom only on a mobile device, such as an iPad or an Android phone, because these versions go through review in the app stores.

What are some alternative platforms?

Signal and WhatsApp communications are encrypted end to end. WhatsApp allows encrypted calls with as many as four people. This is a suitable option for highly sensitive conversations.

There are also other video chatting services, such as Skype, Google Hangouts, Webex from Cisco, and FaceTime on Apple devices. Microsoft also offers powerful web, audio and video conferencing tools through its Microsoft Teams platform.

Whats the bottom line?

The reality is you cant see your friends, your classmates and maybe your co-workers right now. You cant eat at restaurants and you definitely cant go to bars. Zoom is one of the platforms people have ubiquitously adopted to replace these in-person interactions amid the coronavirus outbreak. And it works relatively well.

Its OK to use Zoom, experts say. Just be thoughtful about what youre using it for and observe a few precautions.

Excerpt from:
Is Zoom safe to use? Here's what you need to know - starexponent.com

Quantum Technologies "made in Austria" – AIT coordinates pilot project of European Quantum Communication Initiative (QCI) – Quantaneo, the…

Magnus Brunner, State Secretary of the Austrian Federal Ministry for Climate Action, Environment, Energy, Mobility, Innovation and Technology (BMK), signed the EuroQCI Declaration on behalf of Austria in Brussels in late February 2020. In signing up to this European quantum communication infrastructure (QCI) initiative, 24 EU Member States have now confirmed their intention to create a European cybershield based on quantum communication infrastructure within the next 10 years. The AIT Austrian Institute of Technology, Austrias largest applied research organisation, has been running the first European pilot project in the EuroQCI initiative the Open European Quantum Key Distribution Testbed (OPENQKD) since September 2019. The project is aimed at deploying quantum encryption to create a secure networked Europe.

AIT expertise gained from many years of research will also play a key role in the first European QCI4EU study, which was launched in February 2020. This study aims to specify the user requirements and use cases which will drive development of the EuroQCI in close cooperation with the participating Member States. The findings will then be used to develop an overall system architecture for EuroQCI, composed of space-based and terrestrial solutions which are secure by design and will cover the entire European Union. The aim of EuroQCI is to facilitate the ultra-secure transmission and storage of information and data, and to link critical public communication assets throughout the entire European Union.

Over the past decade AIT has established an excellent international reputation as a quantum technologies specialist and coordinator of major European projects. They include the highly-competitive European Quantum Flagship programme aimed at developing quantum technologies for the mass market.

OPENQKD: quantum encryption for a secure networked Europe

In September 2019 the EU launched the EUR 15 million Horizon 2020 project OPENQKD. The findings of this 3-year project will flow directly into the EuroQCI initiative. The AIT-led consortium comprises 38 partners from 9 EU Member States, as well as the UK, Switzerland, Bosnia and Herzegovina, and Israel, consisting of manufacturers, network operators, system integrators, SMEs, research institutions, universities, certification and standardisation bodies, as well as end users, and together covering a broad range of expertise. Designed to establish a secure quantum communications network in Europe, as well as initiating a European ecosystem for quantum technology providers and application developers, the project will focus on developing a variety of demonstrators and future applications. They will include, amongst others, secure data transmission via telecommunication networks and appropriate storage in cloud infrastructures, the protection of sensitive medical information, official communication data, and the secure transmission of control signals used to operate critical infrastructure (telecommunication networks, energy supply). These activities are intended to protect Europes digital data economy against present and future threats, such as those from quantum computers, and to secure Europes strategic autonomy in the digital age. Further information: https://www.openqkd.eu

Quantum Flagship projects UNIQORN and CiVIQ

Launched in 2018 for a period of 10 years and with EUR 1 billion in funding, the Quantum Flagship programme is one of the European Commissions largest initiatives. Its goals include the development of a competitive European quantum technology industry, and establishing Europe as a dynamic and attractive region for quantum research.

The AIT-led project UNIQORN (Affordable Quantum Communication for Everyone: Revolutionizing the Quantum Ecosystem from Fabrication to Application) involves 17 partners from across Europe. It focuses on pioneering, user-focused research using photonic technologies to miniaturise quantum applications and create system-on-chip solutions. The aim is to optimise the costs of quantum technologies, making them available to the general public. Using specialised quantum-optical sources, miniaturised QKD transmission units and detector technologies on mainstream fabrication platforms, the project will provide important stimuli and breakthroughs, particularly for generating true random numbers, and thus for highly-secure key distribution. Further information: https://quantum-uniqorn.eu/aktuelle-news/

Research in the CiVIQ project focuses on the cost-efficient integration of quantum communication technologies in emerging optical telecommunication networks. A total of 21 partners, including leading telecom companies, integrators and QKD developers, are working to develop state-of-the-art flexible and cost-efficient systems for quantum key distribution (QKD), as well as novel quantum cryptography systems and protocols. In future, it should be possible to provide consumers, industry and institutions with innovative services which meet the needs of a secure telecommunications market. In this project, AIT is developing QKD prototypes and specialised software for field use. Further information: https://civiquantum.eu/

QUARTZ: quantum cryptography via satellite

Since 2018 AIT has played a significant role in a consortium coordinated by SES, the worlds leading satellite operator, which is using quantum encryption to develop a satellite-based cybersecurity system. The QUARTZ (Quantum Cryptography Telecommunication System) project is supported by the European Space Agency (ESA). In addition to AIT and project coordinator SES, the QUARTZ consortium comprises a further 8 prestigious research institutions, universities and companies. Together, they will work until 2021 to design solutions for the distribution of secure keys between optical terrestrial ground stations, each connected to a quantum-enabled satellite via quantum links, and to develop the first software and hardware components this requires. Unlimited satellite coverage will help overcome the limits of todays fibre-based QKD systems, which are only able to transmit over a range of a few hundred kilometres, while also providing a globally available cybersecurity system, including networks in geographically dispersed areas. Further information: https://www.ait.ac.at/quartz

Here is the original post:
Quantum Technologies "made in Austria" - AIT coordinates pilot project of European Quantum Communication Initiative (QCI) - Quantaneo, the...

Hitachi Capital rolls out identity-as-a-service to handle huge rise in loan applications post-lockdown – www.computing.co.uk

Hitachi Capital is seeking to speed up the process of granting business loans

Hitachi Capital is one of the lenders being asked by the UK Government to help businesses survive the effects of the pandemic through the Coronavirus Business Interruption Loan Scheme (CBILS). As such, the financial service company has seen a massive increase in the number of applications since the lockdown started.

Applications for loans can come direct or via intermediaries such as brokers and other third parties. To verify quickly that applications are genuine, Hitachi Capital is deploying the services of Nomidio, a UK identity management start-up spun out of cryptography specialists Post Quantum.

Identity-as-a-Service (IDaaS) is a growing field in which responsibility for identifying and authenticating an individual is handed over to a third party. This means that credentials do not need to be held on the first party provider's servers, with all the security and regulatory risks that would entail. It also gives individuals more control over their online identity, since documentation and biometric credentials can be kept in one place, leaving them to grant or deny access as they see fit. Identity verification (IDV) is a subset of IDaaS which is used to ensure customers provide information that is associated with the identity of a real person.

See also: Working from home, staying secure: 14 Identity & Access Management tools to deal with the coronavirus fallout

Nomidio IDV verifies individuals through a combination of a photo-ID and biometric information such as face prints and voice recordings. In the Hitachi Capital case, users are required to upload a selfie taken on their smartphone as well as a picture of their passport. These are held in the company's cloud-based repository and protected by multi-party cryptography, with keys held on the applicant's device, meaning that no-one can access their biometrics without their consent. Nomidio IDV is available as a plugin to Avaya call centre software and also on AWS marketplace where it can be used in conjunction with the Amazon Connect virtual contact centre software.

Hitachi Capital originally deployed Nomidio IDV last year for direct sales but is now rolling it out to brokers and other 'introducers' following a quadrupling of demand for user verifications since the lockdown. "When it became clear we would need to support UK businesses incredibly quickly, at scale, as a partner in the CBILS we knew we needed a digital way to validate applicant identity for the vast majority of our business, which is handled in-directly via partners," said Jo Morris, Head of Marketing at Hitachi Capital Business Finance. "The decision was taken to roll-out Nomidio across the entire business in March and we did it in just 24 hours."

When an introducer submits a loan application on behalf of a business Hitachi Capital sends the applicant a link to undertake the Nomidio identity verification process, which involves uploading a passport photo plus a selfie. The system automatically verifies that the ID is genuine and that the photos match.

User's biometrics are protected by a "double layer of encryption", said Philip Black, commercial director at Nomidio.

"Each individual identity and the components of that identity - voice prints, face prints and so on - are separately encrypted, and the encryption keys that are used are effectively managed by the individual consumer. It's a self-sovereign identity model. Businesses using the service don't get to share the individual's identity. What they get is an attestation from Nomidio that the person is who they claim to be."

Beside security, the main advantage of the system, claimed Black, is that it does not require the user to download an app or for the business to install any additional infrastructure and so it can be rolled out very quickly.

"The whole of the identity management is delivered as a service, so there's no footprint in the business's contact centre or in their own IT estate to have to implement biometrics or customer management," he said.

Visit link:
Hitachi Capital rolls out identity-as-a-service to handle huge rise in loan applications post-lockdown - http://www.computing.co.uk

PUBG Mobile 0.18.0 update will be released on April 24 with Miramar 2.0, security encryption mode and more – NewsDio

PUBG Mobile is one of the most popular mobile games and added the new Arctic Mode on the Vikendi map last week. Now, details of his next update have reportedly been leaked. The next 0.18.0 update is rumored to be released on April 24 and may bring a couple of new modes, as well as a new version of the Miramar map. In particular, these changes are present in the beta version of PUBG Mobile, which is where all the new features that come to the game are tested.

According to a Fossbytes report, the 0.18.0 update is expected to be released on April 24 and could be larger than 2GB. New features that might be present in the update include a new version of the Miramar map called Miramar 2.0, a Security Coding Mode, and a Jungle Adventure Guide Mode, along with a few other minor changes. However, these features are already present in the beta version of PUBG Mobile and are expected to hit the standard version of the game on April 14.

Speaking of the new additions, the most notable is Miramar 2.0 which adds a racing ramp to the map, a new area called Water City, a vehicle called Golden Mirado, and vending machines. These vending machines can be used to obtain pain relievers and energy drinks. Safety Scramble mode is expected to be a new EvoGround mode. In this mode, there will be a blue zone within the playable safe zone and players must remain outside this new blue zone or take damage. This is already present in the PC version of PUBG as Bluehole mode.

Upon arrival in jungle adventure guide mode, this will be part of the Sanhok map and details on it are expected in the coming days. Some of the other changes include a new results screen, a new training mode, new achievements, plus a scope for the Win94 weapon, among others.

As of now, PUBG Mobile has not made an official announcement regarding the release of update 0.18.0, so this information should be taken with a pinch of salt.

Read the original post:
PUBG Mobile 0.18.0 update will be released on April 24 with Miramar 2.0, security encryption mode and more - NewsDio

Bitcoin Under Pressure After Oil Prices Crash to Record Lows – CoinDesk

Bitcoin is looking weak after Monday's big crash in the oil markets.

The top cryptocurrency by market value is changing hands near $6,820 at time of writing, having faced rejection above $7,200 yesterday., according to CoinDesk's Bitcoin Price Index.

Bitcoin's fall came as the price of oil, popularly known as "black gold," tanked on oversupply fears. Notably, traders fled from the May futures contract on the West Texas Intermediate's (WTI) crude, the main oil benchmark for North America, sending prices below zero for the first time on record.

The unprecedented sell-off has injected uncertainty into global financial markets. As a result, stocks dropped on Monday with the S&P 500 losing 1.8 percent of its value. The risk-off macro-environment has again strengthened bearish pressures for bitcoin.

"The downside in BTC ismore likely attributable to losses in the equities market, which may bedirectly or indirectly affected by Crude prices, than the downward trend forcrude directly," said Matthew Dibb, co-founder of Stack.

Bitcoin has largely moved in tandem with the stock markets, in particular the S&P 500 index, from the beginning of the coronavirus pandemic in the last week of February.

The latest drop in bitcoin prices marks a failure by the bulls to keep gains above the widely tracked 100-week average at $7,054.

Bitcoin closed last week above the 100-week average, having repeatedly failed to do so in the preceding four weeks. As a result, some observers were expecting the upward momentum to gather pace. That didn't happen, as noted.

The failed breakout is accompanied by a negative reading on the weekly chart's money flow index a sign that sellers have the upper hand right now.

As a result, further losses toward $6,472 (April 16 low) could be seen.

The bearish technical setup is accompanied by continued sell-off in equities and oil. While WTI's May futures contract, set to expire on Tuesday, has risen back above $1, the June contract is now facing increased selling pressure and is currently trading near $11.80, down 40 percent on the day.

Analysts at Goldman Sachs have warned the plunge in black gold is symptomatic of unprecedented supplies. Put simply, oil is likely to continue taking a beating in the short term.

Importantly, a cash crunch seems to be gripping the markets again, as is evident from the losses in traditional safe havens like gold, the Japanese yen and the Swiss franc alongside a 0.5 percent uptick in the dollar index.

"[Bitcoin] may go down to $6,400," Chris Thomas, head of digital assets at Swissquote Bank, told CoinDesk.

However, some observers are optimistic about bitcoin's future prospects. "The [miner reward] halving should help keep a bid to bitcoin in the coming months," Richard Rosenblum, co-head of trading at GSR, told CoinDesk.

Rosenblum added bitcoin is a futuristic product that will ultimately benefit from the growing prevalence of technology in consumers' everyday lives.

Meanwhile, Stack's CEO Matthew Dibb thinks bitcoin and other major digital assets have largely remained "out of harm's way" despite the oil crash. "While BTC is slightly down on todays markets, we are not seeing any significant correlation between the market and energy commodities," said Dibb, adding the cryptocurrency will remain bullish as long as prices are holding above $5,800.

Supporting these arguments is the recent decline in the number of bitcoins held on exchanges, which suggests a shift to the long-term holding strategies.

Disclosure:The author currently holds no cryptocurrencies.

The leader in blockchain news, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups.

See the article here:
Bitcoin Under Pressure After Oil Prices Crash to Record Lows - CoinDesk