‘He’s Developing Blinkers’: Has Ron DeSantis Let All the Winning Go to His Head? – POLITICO

Its hardly just Republicans who think so. Ione Townsend, the chair of the Hillsborough County Democratic Party, told me she knows three or four people who she said voted for DeSantis in 2018 but wont this year because of this because of the action he took against Warren. She also said they didnt want to talk about it publicly. I heard a lot of this from a lot of people.

They absolutely exist, she said, as if she were speaking about some scarce species.

But enough of them? To make a difference come November? Townsend doubted it.

Were too polarized. There are people who come hell or high water theyre going to vote Republican or theyre going to vote Democrat. No matter what. Because were in our silos. There are too many Fox News watchers who believe Democrats are pedophiles and eat babies, she said. Its really discouraging.

When something like this happens, you can for a moment lose your faith in politics, Warren told me. But Ive been encouraged and had my faith restored by not just all the people whove rushed to my defense but people who have told me, I didnt vote for you, but I know this is wrong. Ive had people tell me, I wont vote for the governor again because of this.

Supporters, former voters, for DeSantis? Who are not anymore? Because of this? I said.

Correct.

But again how many?

I dont know, he said.

It sounded at least to me like a tacit recognition that for every Republican or independent who is outraged by these power plays by DeSantis there probably are at least as many voters who are cheering him on or just dont know or care. If there is, then, true political peril, it more realistically plays out over a longer arc of time.

If Warren comes back as state attorney in any way, shape or form, I think thats a loss, a former DeSantis aide told me. Like, Charlie Crist couldnt take him down Covid couldnt take him down but Andrew Warren took him down? the aide said. Andrew Warren cant be his first loss.

Hes developing blinkers where hes not seeing the board, in my judgment.

Mac Stipanovich

I dont know that well find out this year, or when well find out, but has he gone, or will he go, too far? Mac Stipanovich said. Hes developing blinkers where hes not seeing the board, in my judgment. Now, it hasnt cost him anything so far, he keeps being rewarded, and so he keeps up the behavior that produces those rewards. But I think hes missing things that could come back to bite him.

It is in the end, of course, not about the Warren case as such, or even its eventual upshot. Its about the precedent.

If Andrew Warren could be suspended for what he did, Stipanovich said, then any public official could be suspended for almost anything that they said.

Excerpt from:

'He's Developing Blinkers': Has Ron DeSantis Let All the Winning Go to His Head? - POLITICO

York County agrees to improve public access to criminal court records in response to suit by Spotlight PA, others Spotlight PA – Spotlight PA

Spotlight PA is an independent, nonpartisan newsroom powered by The Philadelphia Inquirer in partnership with PennLive/The Patriot-News, TribLIVE/Pittsburgh Tribune-Review, and WITF Public Media. Sign up for our free newsletters.

YORK Information on criminal cases will be available faster and with fewer redactions under a settlement agreement between the York County Clerk of Courts and five newsrooms including Spotlight PA that had sued alleging First Amendment violations.

The settlement will bring York County in line with First Amendment and Pennsylvania Constitution requirements when granting access to criminal court records, said Sasha Dudding, a legal fellow for the Reporters Committee for Freedom of the Press.

Thats important for both members of the media who are reporting on criminal cases in York County and also members of the public who are entitled to know whats happening in their community, said Dudding, whose organization provides free legal resources to journalists.

Earlier this year, Spotlight PA joined four other state newsrooms to sue York County Clerk of Courts Daniel J. Byrnes after he shut down free, easy access to criminal court records and instituted practices and policies that slowed the release of documents, according to the federal lawsuit filed in March.

Byrnes office also improperly withheld documents and redacted nonconfidential information, obscuring public access that is critical to reporting on the details of a case, the lawsuit alleged.

Dudding and attorney Paula Knudsen Burke both represented Spotlight PA, the York Daily Record, The York Dispatch, LNP Media Group, and public media organization WITF in the lawsuit. Byrnes, an elected Republican who took office in 2020, was the sole defendant.

Byrnes initially called the lawsuit frivolous and said his office has actually expanded free public access to the public, especially to those facing a financial barrier to information.

The Plaintiffs are essentially disgruntled by not having unfettered and immediate access to all records within the Clerk of Courts Office, an attorney for Byrnes wrote in a March 2022 court filing.

In an email Tuesday, Byrnes said his office will continue to reflect our adherence to professional practices that serve the media and general public as accorded by law.

Attorneys for the news organizations pointed to numerous instances where they say the office delayed access to, improperly restricted, and overcharged for judicial records.

During a three-week period in September 2021, journalists from the five news organizations requested access to 42 judicial records. The office provided six the same day, denied access to another six, and redacted information in 32, according to the lawsuit. The lawsuit said the office improperly redacted details in several cases, including the name of an adult victim of an alleged property crime and the address of a shooting.

In court filings, attorneys for Byrnes wrote that the office complied with the requirements of the statewide court system and Pennsylvania law, but acknowledged a few isolated errors.

As part of the settlement, Byrnes agreed to provide the news organizations with a copy of a policy notifying the public how to access judicial records, and a fee schedule that aligns with statewide court policies.

The agreement also addresses the timeline for obtaining records. Byrnes office will make all reasonable attempts to respond to requests on the same business day on which the request is made, and when not practicable, on the next business day, excepting inconsequential deviations and extraordinary circumstances which may delay access.

The office must also adopt a written policy outlining how it will respond to requests for judicial records made in person and by email.

Byrnes also agreed to pay $6,796.52 for costs and expenses incurred by the Reporters Committee for Freedom of the Press.

Both sides agreed that the clerks office will provide redacted versions of documents in order to protect the identities of victims of human trafficking and minor victims of physical or sexual abuse. But the office agreed to not withhold those documents entirely.

Byrnes on Tuesday said his office is pleased that the lawsuit has been resolved with all parties supporting and acknowledging that the Clerk of Courts has a legal and ethical duty to protect the identity of crime victims, particularly minors as specified in the laws of the Commonwealth of PA.

Byrnes office and the newsrooms agreed to have employees who make or fulfill requests for court records participate in training within 30 days.

Hopefully that will sort of bring everybody to the same understanding, Dudding said.

WHILE YOURE HERE… If you learned something from this story, pay it forward and become a member of Spotlight PA so someone else can in the future at spotlightpa.org/donate. Spotlight PA is funded by foundations and readers like you who are committed to accountability journalism that gets results.

Originally posted here:

York County agrees to improve public access to criminal court records in response to suit by Spotlight PA, others Spotlight PA - Spotlight PA

Elon Musk And Grimes Relationship Timeline: All About Their On-And-Off Dating – TheTealMango

In recent history, few celebrity couples have been more unexpected than the pairing of the musical genius Grimes and the Tesla founder Elon Musk, considered one of the worlds highest-earning individuals.

One of the most fun aspects of watching the love story of these two is trying to figure out whether they are coming together as a couple or whether they are not at any particular time during the story. At the 2018 Met Gala, Grimes and Musk made a stunning debut in front of the public as a couple making their official public debuts.

It has been revealed that the couple welcomed their first child together in May 2020 a son, X Eight Sider Musk, who was called X, and a daughter, Y, who was named Y in December 2021. Upon Grimes tweet of a breakup clarification on March 11 this year, a report was released stating that Grimes had started dating the infamous leaker Chelsea Manning. However, both celebs have been seen to be friendly with one another on Twitter, as observers have noticed.

As a former U.S. soldier, activist, and whistleblower, Manning is well known for releasing secret military documents in 2010 that were made public via WikiLeaks. In 2017, Manning was released after serving seven years in prison.

During their relationship, Musk and Grimes have both experienced ups and downs.

Since their romance began in 2018, the pair have remained dedicated to one another through various means, including unfollowing each other on Instagram and posing for a photo shoot where Grimes reads The Communist Manifesto shortly after their semi-separation.

Here is what they had in common to provide a timeline of Grimes and Musks relationship.

It is no secret that Musk was always a fan of Grimes work even before they became romantically involved. As a result, he tweeted on March 31 of this year a link to the video she had released for the single Venus Fly, on which she collaborated with Janelle Mona back in 2015.

He called it one of the best music videos he has seen in the last few months. Even though the artist did not publicly reply when he praised him, it didnt matter when they ended up talking about the matter when they finally managed to get in touch.

According to a media report, Musk and Grimes met through Twitter at the beginning of April and reportedly began a casual dating relationship at the end of April. According to reports, the pair formed a bond over a game called Rokos Basilisk, which is a game about artificial intelligence.

According to a source, Elon Musk was looking into the idea of joking about Rococo Basilisk, and when he noticed that Grimes had already made jokes about it, he decided to reach out to her about it. According to Grimes, the trick was understood for the first time in three years, who said the joke had not been understood for years. Both of them were poking fun at artificial intelligence at the same time.

It was news that shocked the world when Grimes and Musk announced their union in May 2018 when they announced their union during one of the worlds biggest public platforms of the year, the Met Gala, one of the worlds most glamorous events. In addition to the musicians Tesla choker, a bold way to make a statement about the couples relationship, the couple walked the red carpet together in custom-made looks and accessories.

There was also an after-party for Rihannas Met Gala that the couple attended together. To date, Grimes and Musk have only appeared together in public once, making this their first public appearance together.

Grimes spoke about her relationship with Musk for the first time in an interview with The Wall Street Journal, where she admitted that she was unprepared and unprepared to be subjected to such intense scrutiny from the media associated with the relationship.

As stated in the statement, she said, just thought I could keep going along in my funny little way, and then you casually respond to someone in a tweet, and its on Fox News, and youre like, Ugh, you know? So that was an alarming moment.

After dating Musk for over a year and a half, Grimes and Musk announced on January 8, 2020, that they had announced their pregnancy and that they would be awaiting the birth of their first child together. So it was only fitting that Grimes announced her inspiring news in the most fantastic way possible, posting an image of her sonogram that was photoshopped on top of a topless selfie of her baby bump on Instagram.

A short time later, Instagram removed the post, which resulted in her reposting an edited image where her braids cover most of her nakedness. Censored for insta haha almost got away w it, she captioned.

Musks son, Xavier Musk, joined the family on May 4, with his name being announced as Xavier A-12 Musk via an announcement tweet, which Musk posted shortly after the birth. Thats the name he was given at birth, although California does not allow a number to be used as part of a birth name.

So they eventually decided that it was better to change his legal name to X L A X II Musk by simply substituting the 12 with the Roman numerals corresponding to his birth date. Musk then shared a picture of the baby on the same day and a photo of his face, which had been photoshopped with a face tattoo that he had not explained for whatever reason.

Whenever Musk is in the middle of a crisis on Twitter, he is constantly forced to step in to save himself, but there was once when even Grimes stepped in. It was on July 24 that he tweeted the words Pronouns suck in reply to him, which the musician deleted the answer. I love you but please turn off ur phone or give me a [c]all, she wrote. I cannot support hate. Please stop this. I know this isnt your heart. As a result, they both unfollowed each other on Twitter.

There was an exclusive interview with Musk published by the New York Times the next day, where he clarified that the couple was happy together, even though she had been taking care of most of the baby care duties.

Grimes attended a sketch on Saturday Night Live, where she appeared in a role as Princess Peach opposite Musks Wario, who was on trial for killing Mario on Saturday. This was Musks first time hosting an episode featuring Miley Cyrus as the musical guest on May 8, and it was a privilege for her to be in Studio 8H to support her beau, as well as appear in a sketch as Princess Peach, who was facing Musks Wario in a courtroom.

In the days following the show, Musk took to Twitter in an attempt to reveal that the Nintendo-themed drawing was his favorite.

As reports of a split between Musk and Grimes began to circulate, it was reported on September 24 that Musk and Grimes had been semi-separated after dating for an extended period. It was clarified by him, however, that they are still in love with one another, see each other frequently, and have a good relationship, especially when it comes to co-parenting, and they are on good terms.

My work at SpaceX and Tesla requires me to be primarily in Texas or traveling overseas, and her work is primarily in L.A. Shes staying with me now, and Baby X is in the adjacent room. According to him.

By avoiding the publicity surrounding Grimes and Musks second pregnancy, the couple managed to keep their babys arrival a secret because Grimes and Musk avoided the public eye, which meant they could conceal her birth from the public.

The news was first revealed in Vanity Fairs March 10, 2022, cover story, in which it was revealed that Grimes had never planned to disclose Y to the world and that she was likely to remain a secret to this day if she hadnt started crying during her in-person interview at her empty home, as she did during the interview itself.

Upon the daughters birth, Grimes spoke about the relationship between her and Musk, saying the two had reconciled and that she had relocated to Austin with Musk to co-parent with him without putting any labels on the relationship.

After the publication of the cover story for Vanity Fair, Grimes took to Twitter to elaborate on a couple of things, including her status regarding Musks current relationship. Me and E have broken up again since the writing of this article haha, but hes my best friend and the love of my life, and my life and art are forever dedicated to The Mission now, as she put it.

As a follow-up to her initial tweet, she explained that she aimed to make humanity more sustainable, make it a multi-planetary species, and preserve any consciousness it might have.

There is such confusion in the relationship between this great couple. The two are not yet together, but many fans have seen them conversing on Twitter while they are apart. The singer shared a picture of her daughter wearing a pink headband and a black dress.

Do you think they make a good couple? Would you mind telling me what you think about their relationship? Please let us know in the comments section.

Read more here:
Elon Musk And Grimes Relationship Timeline: All About Their On-And-Off Dating - TheTealMango

Elon Musk blames communism in schools and universities for strained relationship with daughter – indy100

Elon Musk has blamed "full-on communism" in schools and universities for his estranged relationship with his daughter.

Speaking with the Financial Times as part of its "Lunch with the FT" series published on Friday (October 7), the Tesla and Space X CEO discussed politics and described his political views as moderate.

The publication noted he is "considering setting up 'the Super Moderate Super Pac' to support candidates with moderate views."

Sign up to our free Indy100 weekly newsletter

After this, the political discussion then moved on as the publication noted Musk's belief that his strained relationship with his teenage daughter is down to the left-wing elite schools and universities in the US (though didn't specify which ones).

Its full-on communism . . . and a general sentiment that if youre rich, youre evil, Musk told the FT. It [the relationship] may change, but I have very good relationships with all the others [children].

"Cant win them all," he concluded on the matter.

In April, Musk's 18-year-old daughter Vivian filed for a name change in Los Angeles and also requested for her gender to be changed on her birth certificate.

The reason his daughter gave behind her name change was that she didn't want "to be related to my biological father in any way, shape or form."

Ahead of publishing a story on his daughter's name change, The Daily Beast approached Musk for comment where he responded: "Please dont out someone against their will its not right.

"She does not want to be a public figure. I think it is important to defend her right to privacy."

Meanwhile, Musk has previously been criticised for previously tweeting that "pronouns suck and added they are an "aesthetic nightmare," which many slammed as transphobic.

In June, Chelsea Manning slammed Musk for a tweet that "seemed transphobic."

Have your say in our news democracy. Click the upvote icon at the top of the page to help raise this article through the indy100 rankings.

The rest is here:
Elon Musk blames communism in schools and universities for strained relationship with daughter - indy100

Facing the warmongers: An Assange update – newagebd.net

CounterPunch

ON THE latest slimed path Julian Assange has been made to trod, a few things have presented themselves. The rusty sword of Damocles may be suspended above him (he, we are informed, has contracted Covid-19), but there are those, in the meantime, willing to defend him with decent conviction against his dispatch to the United States, where he is certain to perish.

From the side of decent conviction and steadfastness came the October 8 protests across a number of cities, attended by thousands. A human chain numbering some 7,000 persons formed around the Houses of Parliament in London demanding the release of the WikiLeaks publisher from Belmarsh Prison.

Then there was the Boadicea-like performance that his wife is becoming famous for. On the ideologically dry-cured medium of Piers Morgans Uncensored Program, a taster of that vengeance US justice is famous for could be gathered from an encounter between Stella, and the trumpeting warmonger and failed Trump advisor, John Bolton.

Bolton, it should be remembered, was the only evidence that president George W Bush, dyslexic and reformed drunk, had a mild sense of humour. Sending that man to the United Nations as US ambassador was the equivalent of appointing a randy, murderous fox to guard unsuspecting chickens. That appointment had it all: resentment, masochism and disgust for that concept known as international law.

There is much to say that former president Donald Trump, for all his insufferable foibles, insoluble perversions and naggingly vicious pettiness, never embarked on the eschatological murderous destiny that Bolton believes the US is destined for. The messianic types always find some higher meaning for death and sacrifice, as long they are not the ones doing it. The difference between the suicide bomber and the deskbound scribbler keen on killing is one of practice, not conviction. Both believe that there is a higher meaning written in blood, inscribed in the babble of post-life relevance and invisible virtue. For us humble folk, life is good enough, and should be preserved.

According to Bolton, the 175 years Assange might receive for exposing the abundant dirty laundry known as US foreign policy and imperial violence was hardly sufficient. He would, naturally, get a fair trial in the United States (never explain the ideologically self-evident), though absolute fairness was dependent on him receiving 176 years. Well, I think thats a small amount of the sentence he deserves. With such a fabulous nose for justice, Bolton shares common ground with the commissars and gauleiters.

Unsurprisingly, Stella Assange had a view markedly at odds with such an assessment. Her husband was being pursued, For receiving information from a source and publishing it, and it was in the public interest. It was US war crimes in Iraq and Afghanistan, and he revealed tens of thousands of civilian deaths that had not been acknowledged before.

Morgan, an incarnation of that guttersnipe, sewerage swilling demon virtually unsurpassed in modern British media, tried to sound cerebral and moral at points. Did WikiLeaks redact the material from Chelsea Manning, one of the key sources for the disclosures? Or had WikiLeaks been drunkenly cavalier in exposing all and sundry to the world? Best ignore reading trial transcripts, Piers. Knowledge drawn upon the cobblestones of truth is bound to be rough.

To those familiar with WikiLeaks, its practices and, indeed, the trial at the Old Bailey regarding Assanges extradition, such claims could only be seen as decidedly weak. Stella explained that WikiLeaks did redact all of those documents that Manning gave to WikiLeaks, and in fact it was in cooperation with those newspapers. The trial itself made it clear that the secret spiller, as Assange has often been accused of being, was none other than the Guardian itself, whose journalists had left, with tantalising promise, the decryption key in their book WikiLeaks: Inside Julian Assanges war on secrecy.

Stella, aflame with purpose and aware of her brief, also reminded the audience who she was talking to. Bolton, she shot with acid fury, sought to undermine the international legal system, sought to ensure that the US is not under the International Criminal Courts jurisdiction.

Then came the well fashioned grenade, pin removed. And if it was, Mr Bolton might in fact be prosecuted under the ICC [International Criminal Court]. He was one of the chief cheerleaders of the Iraq war, which Julian then exposed through these leaks, so he has a conflict of interest.

There have been other befouling episodes that can only be of concern to Assange and his family. It has now come to light that security officials, in Australias Parliament, were under significant pressure to seize books from the Assange delegation during their August visit to Canberra. A letter to Greens Senator David Shoebridge by the Department of Parliamentary Services explained that it was all linked to a protest.

The nature of the bureaucrats tone is to mock the valuable and diminish the relevant. In the considered view of the secretary of the department of parliamentary services, Rob Stefanic, I appreciate that Assanges family may not have viewed the screening procedure in a positive light, but having reviewed the processes followed by security staff, I am confident they performed their duties with respect and due diligence. Such reasoning would suffice for most police states, where bureaucrats sup at the same table with the security wonks.

The department, it transpired, had tripped up. The claim about the protest was inaccurate, as neither Assanges father, John Shipton, nor his brother, Gabriel, had attended any protests. It is apparent that there are factual inaccuracies in the letter to Senator Shoebridge and the secretary will be writing to correct the record.

The world has turned full circle. Those opening the cabinet of secrets are considered the nasty tittle-tattles, who simply revealed the fact that daddy fiddled and mummy drank. In this world, homicidally excited types like Bolton revel in expressing unsavoury views in the open; those who expose the bankruptcy of such views are to be punished. We await the next grotesquery with resigned disgust.

CounterPunch.org, October 13. Binoy Kampmark was a Commonwealth Scholar at Selwyn College, Cambridge. He lectures at RMIT University, Melbourne.

Link:
Facing the warmongers: An Assange update - newagebd.net

Dutch influence standards for post-quantum cryptography – ComputerWeekly.com

The US National Institute of Standards and Technology (NIST) has chosen the first group of encryption tools designed to withstand the attack of a future quantum computer, which could potentially crack the security used to protect privacy in the digital systems we rely on today.

Lo Ducas, senior researcher in the cryptology group at the Netherlands Centrum Wiskunde & Informatica (CWI),the national research institute for mathematics and computer science, is involved in the two most important algorithms of the upcoming NIST portfolio one for public key encryption and one for digital signatures.

According to Ducas, who is also a professor at the University of Leiden, these new standards are inevitable because there is nervousness about the arrival of quantum computing. We know quantum computing will not be rife tomorrow, but this standardisation procedure and its deployment take time, he said. Obviously there is certain sensitive information that needs to be secure and confidential not just at present, but in the future as well. Take state secrets, for instance.

Cyber security experts have warned that hackers are stealing data now to decrypt it in the future, when quantum computing could render modern encryption methods obsolete. A report published by NIST in April 2016 cited experts that acknowledged the possibility of quantum technology rendering the commonly used RSA algorithm insecure by 2030. We need to be ready for that, said Ducas. This means we have to anticipate now.

The announcement of the chosen tools follows a six-year effort managed by NIST, which started in 2016 with a call for the worlds cryptographers to devise and then vet encryption methods that could resist an attack from a future quantum computer. A total of 23 signature schemes and 59 encryption schemes were submitted, of which 69 were deemed complete and proper. The NIST competition consists of four rounds, during which some schemes are discarded and others studied more closely.

In July this year, NIST announced the first group of winners from its competition, which included Crystals-Kyber and Crystals-Dilithium, both developed by an international collaboration in which CWI participated. Other team members are ENS Lyon, Radboud University, Ruhr University Bochum, University of Waterloo, IBM, NXP, ARM, SRI International, Florida Atlantic University and Tsinghua University.

It was a rather big team, but that was the key aspect, said Ducas. It consisted of both industrial and academic people, and all their knowledge was necessary to develop the algorithms we have. Take NXP, for example they build chips and already use cryptology to embed in those chips. We needed their knowledge for the design, because it is essential that what we develop not only fits into devices like smartphones and laptops, but also in other places where chips are being used, like in the automotive industry. Fitting cryptology can be a big challenge.

Apart from the two algorithms in which CWI was involved, two further algorithms for signatures were selected by NIST Falcon and Sphincs+. Sphincs+ also was partially conceived in the Netherlands, led by Andreas Hsling from TU Eindhoven.

Ducas added: The selection of our schemes as a standard means that it will be deployed globally, protecting the privacy of billions of users. Fundamental research rarely gets such a direct and broad impact. The credit should go to the whole cryptographic research community. Whe schemes we proposed are merely the crystallisation of decades of scientific effort.

The algorithms developed by the international team are based on lattices, one of Ducas specialities. Both were designed together and share more than just the same mathematical platform, he said. We tried to make them look alike, so they will be easy to implement together. The Falcon algorithm designed for signatures also uses a lattice platform.

But that is where the similarity ends, said Ducas. This algorithm has different advantages and drawbacks.

One of his biggest concerns is that this algorithm computes with floating point numbers, as opposed to integers. Computers are obviously equipped to do this, but it is a real challenge for cryptology, said Ducas. Rounding can differ from computer to computer, so it has challenges for implementation. But because of its shorter keys, it was also selected for the NIST portfolio.

Now the four algorithms have been selected, they need to be written down into proper standards. This is obviously where NIST comes in, whereas we are mainly academics and technicians, said Ducas. NIST will draft up the ultimate text for the standard, but it will be in coordination with us.

NIST hopes to publish the standardisation documents by 2024 but, according to Wikipedia, may speed up the process if there are major breakthroughs in quantum computing.

After the release of the standards, the industry needs to be pushed to put them to use, said Ducas. I have a suspicion that most companies will want to be post-quantum resistant, so I think these standards will be easier to push than, for example, the hash function update from SHA-1 to SHA-2, he said. Moreover, I think IBM and NXP will incorporate their own designs within their own products.

Eventually, NIST is pushing the core of the new standard, the mathematical knowledge, but on top of that, there are a lot of things that are involved, like protocols, documentation, and so on. It might even evolve into an ISO standard, who knows, but NIST is leading the crowd.

So, will the new standards ensure we will be safe from quantum computers ability to possibly crack the RSA encryption? This is related to the P versus NP problem, said Ducas. The best guarantee we can have are the years of documented failures. This is the case with existing cryptology, and still is the case with post-quantum cryptology.

There is reasonable confidence to deploy, but no absolute mathematical guarantee. This is why we often say that cryptographers seldom sleep at night.

Read more from the original source:
Dutch influence standards for post-quantum cryptography - ComputerWeekly.com

Cracking the code of cryptography and life The Irish Times – The Irish Times

Think about the humble envelope. For centuries this paper enclosure has shielded important information from prying eyes that might otherwise steal a glance at an unprotected note. Also, by placing information in an envelope, the sender effectively commits to and freezes this information until it gets to the recipient, assuming it is not tampered with or altered on its journey.

This system of secrecy served us well for centuries in an analogue world, but what about the digital environment in which we now communicate, shop and bank? Enter modern cryptography, which is the subject of this years Royal Irish Academy Hamilton Lecture by Israeli mathematician and computer scientist Prof Avi Wigderson. He will deliver his talk Cryptography: Secrets and Lies, Knowledge and Trust later this month at Trinity College Dublin.

Mathematician Avi Wigderson

Cryptography is nothing new, of course for centuries people have encoded information to scramble its contents, which can then be deciphered or unscrambled by a recipient who knows the key or rules to breaking that code. But cryptography developed a new dimension towards the end of the 20th century thanks to the marriage of computing power and complexity theory, and Wigderson has helped to shape its power.

Hard to solve, easy to verify

Imagine a tough Sudoku puzzle or a tough mathematical problem, he says. Most people may not be able to solve these, but if they saw the correct answer they could check and verify that it was correct. Such problems are of extreme importance in complexity theory.

Modern cryptography often makes use of such hard problems; difficult to solve but relatively easy to verify once solved, explains Wigderson, who is Herbert H Maass professor of mathematics at the School of Mathematics the Institute for Advanced Study, Princeton, New Jersey.

About 40 years ago, people started understanding that introducing computational complexity, namely the fact that some problems are easy and some are hard for us and for computers, could be used as a basis for cryptography, he says.

Cloaking information in such hard-to-solve problems is akin to the sender sealing the envelope in the analogue world. Here one uses specific hard problems with extra structure such as factoring integers into primes which enable encoding any number by another which, like an envelope, obscures the original to anyone else, but commits the encoder to that value, he says.

In a similar way tough mathematical problems can shield information as it travels digitally, and the solutions can be rapidly verified when the information lands.

That complexity-based approach provides a system for secrecy without the need for physical means, and it allows us to do many more things than just send secret messages around, says Wigderson. You can use it to protect a vast array of transactions you might want to carry out in a digital world, and it led eventually to the revolution of online shopping and internet security.

Hamiltonian paths

Much like cryptography, the notion of hard-to-solve problems is not new. Irish mathematician William Rowan Hamilton, after whom the Hamilton Lecture is named, made contributions to the field in the 19th century, particularly with his exploration of Hamiltonian Paths, Wigderson says.

Think of a map with several cities on it, he says. Can you trace an unbroken route through those cities and visit each city only once? If there are 1,000 cities on this map, then it becomes a very hard problem to solve you seem to need to try all possible routes an astronomical number.

But if a solution, namely a route, is provided, then you can look at the map and quickly check that no city has been visited twice in the unbroken route. This was the kind of hard-to-solve but easy-to-verify problem that Hamilton explored. Today we know it to be a prototypical example of problems of this type it is as hard as any of them.

The mystery of A to B

One of the great mysteries of the field of complexity is what goes on between point A and point B, where some seemingly hard problems are solved. This, he says, has ramifications for questions far beyond cryptography, including climate, neuroscience, artificial intelligence and medicine.

How do you explain why a particular drug works to cure a disease, or how actions in the atmosphere affect weather and climate, or how a thought is generated in the brain, or how a neural network can beat a world champion at chess, he asks. It may be easy to verify that these things happen, but how do they happen?

Nor can we explain exactly how scientific luminaries such as Newton, Hamilton, Pasteur and Einstein came up with their insights and theories, he adds. They were extremely successful in explaining things that people hundreds and thousands of years before them couldnt explain that way, Wigderson points out. They came up with something that it seems was much easier to verify than to find.

Complexity and curiosity

He distinguishes between the questions of finding an algorithm that works, and the question of how it works. I think many people would be extremely happy if some black box would solve all their problems, making them happy and healthy and living for 100 years, even if they didnt quite understand how this algorithm came up with it, he says. I think that would be big progress.

But Wigderson, who in 2021 shared the prestigious Abel Prize with Lszl Lovsz for their foundational contributions to theoretical computer science and discrete mathematics, and their leading role in shaping them into central fields of modern mathematics, also wants to understand the how of the complexity that underpins outcomes. And his drive is simple: he is curious. I think it is the most natural thing in the world to want to understand how everything happens.

That curiosity continues to drive Wigderson: I am totally fascinated by computation and what it can and cannot do. And by computation, I do not necessarily mean computers; every physical and natural process that happens ocean waves or the weather or the evolution of growth of embryo in the uterus, or the leaves on a plant or the formation of seashells or viruses causing disease all these processes are computations, in that they evolve in a sequence of simple, local steps like a computer programme.

Taking a computational approach to the natural world can yield important insights, Wigderson believes. We saw in the 1950s how Alan Turing, a mathematician famous for deciphering code, proposed a simple model that shows how patterns such as spots and stripes on animals skin can evolve. Working with computation and complexity you can get profound insights into the natural world and many of the issues that are facing us today, and I find that fascinating.

Hamilton Lecture 2022

Prof Avi Wigderson of the Institute for Advanced Study, Princeton University will deliver the 2022 RIA Hamilton Lecture on Cryptography: Secrets and Lies, Knowledge and Trust on Monday, October 17th, 2022 at 6pm-7.30pm. Tickets are free

Originally posted here:
Cracking the code of cryptography and life The Irish Times - The Irish Times

Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution – Business Wire

SCOTTSVILLE, Va.--(BUSINESS WIRE)--Castle Shield Holdings, LLC., a leader in Zero Trust and cybersecurity solutions, today announced that its Aeolus VPN solution now supports additional post-quantum cryptography (PQC) algorithms selected by the National Institute of Standards and Technology (NIST).

Last year, prior to the conclusion of the third round of the NIST PQC Standardization, we announced the successful integration of the Saber algorithm into Aeolus VPN. Reference our October 11, 2021, press release.

NIST has now selected two primary PQC algorithms for most use cases: CRYSTALS-KYBER and CRYSTALS-Dilithium. In addition, the signature schemes FALCON and SPHINCS+ were standardized as well. Kyber and Dilithium were both selected for their strong security and excellent performance, and NIST expects them to work well in most applications. Therefore, we have integrated Kyber (i.e., Kyber1024) and Dilithium (i.e., Dilithium5) algorithms into Aeolus VPN as well.

Aeolus VPN protects data between two or more network points. It offers a streamlined approach to privacy which results in more stability and lower latency that is a perfect addition to enterprise data-in-motion security for both classic and post-quantum computing environments. Aeolus VPN offers point-to-point asymmetric PQC and symmetric encryption for UDP and TCP on Windows, Linux and macOS platforms.

At Castle Shield, we are encryption agnostic. As NIST selects new PQC standards, we will add them to our suite of solutions that further demonstrates the cryptographic agility of our products. Our primary focus is to seamlessly integrate the best encryption algorithms available with our solutions to protect our customers data for today and tomorrow, said Dr. Milton Mattox, Chief Technology Officer at Castle Shield, Holdings, LLC.

Aeolus VPN with PQC continues to be available today for testing, proofs of concept, and production installations.

About Castle Shield Holdings, LLC

Founded in 2019, Castle Shield offers a complete range of enterprise-grade cybersecurity solutions that protects enterprises and consumers against all internal and external cyber threats. Our quantum-resistant solutions (Fides) stand strong as the last line of defense for enterprise and consumer data in the emerging quantum computing threat landscape. Legion, our Security Information Event Management or (SIEM) product portfolio and Fides work together to strengthen your overall data security. We monitor and address threat vectors through our scalable, multi-tenant SIEM platform, protecting enterprise systems and data in an efficient, cost-effective manner. In addition, we utilize an advanced compliance platform (Senate) and expert analysis with an in-depth understanding of dynamic compliance standards and industry best practices to highlight cyber risk factors. Our Senate system provides comprehensive ratings for third party vendors based on technical risk scores, compliance, and financial impact in the event of a breach. Our 360 proactive security solutions are what sets Castle Shield apart independent of your IT backbone whether cloud, hybrid or premise based. For further information, please go to http://www.castle-shield.com

Read more from the original source:
Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution - Business Wire

Yale increases investment in blockchain research – Yale Daily News

Yale, which was ranked 34 in Coindesks 2022 Best Universities for Blockchain, has invested significantly in the rapidly growing field.

Alex Ye 12:08 am, Oct 12, 2022

Staff Reporter

Zoe Berg, Senior Photographer

This time last year, Yale was unranked in CoinDesks Best Universities for Blockchain. A year later the University places 34th overall, on par with Harvard and other major universities around the world.

The reports results recognize Yales recent significant investments into blockchain research, including the hiring of four new blockchain experts to the Computer Science faculty, Ben Fisch, Charalampos Papamanthou, Katerina Sotiraki and Fan Zhang one of whom is leading a project that has received a $5.75 million grant for blockchain development.

In the last few years, blockchain, as an interdisciplinary field, has spurred a huge amount of development in distributed systems and cryptography and their intersection, said Fisch. This is also why its such a fascinating academic topic, because it ties together so many different fields, not only from computer science, but also from economics, law and policy. Yale has a very unique combination of strengths in all these different areas, especially at present.

In August, Yale blockchain researchers accepted a $5.75 million grant from the Algorand Foundation, a not-for-profit organization focused on the development of blockchain technology.

The grant will support PAVE: A Center for Privacy, Accountability, Verification and Economics of Blockchain Systems, which will be led by Papamanthou. PAVE will bring together a cross-disciplinary team of experts from four institutions Yale, Columbia University, the City College of New York and the Swiss Federal Institute of Technology Lausanne, with Yale being the leading institution to advance research of blockchain systems.

Apart from the technical agenda, PAVE will also host hackathons, symposiums and blockchain summer schools.

The expansion of blockchain research at Yale coincides with the rise of the blockchain technology market. The value of blockchain technology in the banking, financial services and insurance sector market is expected to grow by $4.02 billion between 2021 and 2026, according to Technavio. The Technavio study found that easier access to technology and disintermediation of banking services will create more growth opportunities within the industry.

Papamanthou believes the hirings acknowledged the importance of blockchain, and that the University has more generally acknowledged the interdisciplinary nature of the blockchain space. He emphasized the University provides opportunities to explore the blockchain industry, such as interdisciplinary majors like computer science and economics.

Papamanthou spotlighted the newly established Roberts Innovation Fund created by the School of Engineering and Applied Sciences, which assists blockchain projects that could be commercialized through funding and mentoring.

An increasing number of students are interested in the field of blockchain, according to Mariam Alaverdian 23, president of the Yale Blockchain Club.

Alaverdian explained that because of the many applications of blockchain technology from personal identity security to healthcare to money transfers the emergence of blockchain into our lives is inevitable. She added that the Yale Blockchain Club has seen interested students come from a variety of backgrounds, with some having no prior exposure and others who already have startups in the space.

The Yale Blockchain Club started last spring and we received a lot of attention from Yale undergraduate and graduate students, Alaverdian wrote in an email to the News. We had 600 people sign up for our mailing list within a couple of weeks there is definitely a high demand from Yale students for educational materials and guidance.

As the blockchain industry has continued to grow, Yale has been a fierce advocate for blockchain research and development, Papamanthou noted.

Papamanthou explained that because Yales faculty is now made up of leaders in the field of

distributed computing and cryptography, the potential blockchain innovation at Yale could be unprecedented.

Its amazing that Yale has hired two phenomenal professors, Ben Fisch and Fan Zhang, whose research focuses on aspects of blockchains, said Roshan Palakkal 25, a student in Frontiers of Blockchain Research, a course taught by Fisch. Yale CS typically isnt known to be the best, but I think the new classes and faculty have positioned it to become one of the best universities for blockchain, with lots of potential for interdisciplinary collaboration in areas like economics, global affairs, and public policy.

Papamanthou added that students who are interested in blockchain have access to a variety of courses across the Computer Science and Economics Departments, as well as at the Yale School of Management and Yale Law School.

According to Fisch, from a computer science perspective, Yale is educationally competitive with any other university in the field of blockchain.

I will be offering a course in the spring that is comparable to the blockchain course thats offered by Stanford, Fisch said. And the research seminar that Im teaching now is uncommon at other universities, as it really goes in depth at a graduate level into all the most recent research topics that are being worked on currently.

The Yale Computer Science Department is located at 51 Prospect St.

Alex Ye covers faculty and academics. He previously covered the endowment, finance and donations. Originally from Cincinnati, Ohio, he is a sophomore in Timothy Dwight majoring in applied mathematics.

Here is the original post:
Yale increases investment in blockchain research - Yale Daily News

OPPO joins the FIDO Alliance, accelerating the arrival of a new era of passwordless sign-ins – Yahoo Finance

The replacement of traditional password-based authentication mechanisms with leading passwordless technology will allow OPPO users to benefit from faster, more convenient, and more secure logins across different accounts, services, and platforms

DUBAI, UAE, Oct. 14, 2022 /PRNewswire/ -- OPPO recently announced that it has joined the FIDO (Fast IDentity Online) Alliance, an open industry association with a mission to develop authentication standards that reduce the world's over-reliance on traditional passwords. As a member of the Alliance, OPPO will support the development and implementation of the latest FIDO standards for passwordless logins, utilizing basic public passkey cryptography and the protocols defined by FIDO, to provide users with a fast, user-friendly, and secure sign-in experiences across services.

OPPO joins the FIDO Alliance (PRNewsfoto/OPPO)

Today's average internet user has dozens of online accounts, making managing large numbers of passwords a very time-consuming and frustrating task for both users and organizations. At the same time, password-only authentication methods suffer a few severe setbacks from high administration costs involved in changing and resetting user passwords to the considerable security risks from weak passwords and password reuse across multiple accounts. As such, there have been calls across the technology industry to move towards a sign-in mechanism that can mitigate the reliance on passwords or even replace them entirely.

Founded in 2012 to help reduce the world's over-reliance on passwords, the FIDO Alliance works to develop standards for password-free identity authentication and login for websites, services, and applications worldwide. The Alliance's latest authentication specification, FIDO2, provides a secure and convenient technical framework supported by companies including Google, Microsoft, and Qualcomm.

Following its entry into the FIDO Alliance, OPPO will actively use FIDO standards across its smart devices and work on optimizing user experiences and improving authentication security. In the future, users can use OPPO smartphones to work as a "passkey" to log in to different services across browsers, apps, and platforms, which helps create a seamless connected experience. When using multiple smart devices, users can automatically access their FIDO credentials on the core OPPO device without re-enrolling every account on other OS platforms or browsers.

Story continues

As a member of the FIDO Alliance, OPPO will also join the different technical and regional FIDO working groups, through which OPPO will make technical contributions to bringing password-free login technology to more use cases and services.

In the digital world, greater information flows lead to greater security challenges. Through its brand proposition of "Inspiration Ahead," OPPO will work with partners across the industry to create more secure and convenient password-free connected experiences that enable new intelligent experiences for more users.

About OPPO

OPPOis a leading global technology brand since 2004, dedicated to providing products that seamlessly combines art and innovative technology.

OPPO is on a mission to build a multiple-access smart device ecosystemfor the era of intelligent connectivity. The smartphone deviceshave simply been a gateway for OPPO to deliver a diverse portfolio of smart and frontier technologies in hardware, software and system. In 2019, OPPO launched a $7 Billion US Dollar three-year investment plan in R&D to develop core technologies furthering design through technology.

OPPOis firmly pursuing the creation of the best technology products and technological artistry for global users. Based on the brand elements of leading, young and beautiful, OPPO dedicates to the mission of letting extraordinary users enjoy the beauty of technology.

For the last 10 years, OPPO has focused on manufacturing smartphoneswith camera capabilities that are second to none. OPPO launched the first mobile phone, the Smile Phone, in 2008, which marked the launch of the brand's epic journey in exploring and pioneering extraordinary technology. Over the years, OPPO has built a tradition of being number one, which became a reality through inventing the world's first rotating camera smartphoneway back in 2013, launching the world's then thinnest smartphone in 2014, being the first to introduce 5X Zoom 'Periscope' camera technology and developing the first 5G commercial smartphonein Europe.

Today, OPPO was ranked as the number four smartphone brand globally. OPPO brings the aesthetics of technology to global consumers through the ColorOS system Experience, and Internet services like OPPO Cloud and OPPO+.

OPPO's business covers 60 countries and regions, with more than 40,000 dedicated employees to create a better life for customers around the world.

About OPPO MEA

OPPO started its journey in the Middle East and Africa (MEA) region in 2015 after setting up its regional office in Egypt. Following the immense success of the brand's sales centre in Cairo in the first year, OPPO accelerated its expansion plan across the MEA region and inaugurated its country operations in the UAE in 2019. Now OPPO is physically present in more than 14 markets across the region, including Egypt, Algeria, Tunisia, Morocco, Bahrain, Saudi Arabia, UAE, Oman, Kuwait, Qatar, Kenya, Nigeria, South Africa and the Levant.

To empower its presence in the region in line with its product localisation strategy, OPPO further invested in MENA and set up its very own factory in Algeria in 2017, thus, becoming the first Chinese brand to build a manufacturing premise in North Africa. Based on insights of local consumers in each country, OPPO has evolved the progress of product localisation, taking into consideration several perspectives towards each market, including product localisation, to further meet the core needs of users; marketing localisation, to better communicate with local young customers; and talent localisation, to understand local consumers further and provide optimum customer service.

Within the last year, OPPO has started to adjust its product line in the Middle East region specifically. This has included the launch of its flagship OPPO Find X Series and the introduction of the OPPO Reno Series. OPPO will continue to evolve its local product line to offer more premium series to consumers in the region.

A forward-thinking international technology company, OPPO strives to be a sustainable company that contributes to a better world and has enacted positive change in every way possible through activating local community initiatives and humanitarian, and charity campaigns.

Photo - https://mma.prnewswire.com/media/1921432/OPPO_joins_the_FIDO_Alliance.jpgLogo - https://mma.prnewswire.com/media/1451542/OPPO_Logo.jpg

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/oppo-joins-the-fido-alliance-accelerating-the-arrival-of-a-new-era-of-passwordless-sign-ins-301649591.html

SOURCE OPPO

See the original post here:
OPPO joins the FIDO Alliance, accelerating the arrival of a new era of passwordless sign-ins - Yahoo Finance