Google’s BigQuery Introduces Column-Level Encryption Functions and Dynamic Masking of Information – InfoQ.com

Google recently released new features for its SaaS data warehouse BigQuery which include column level encryption functions and dynamic masking of information. These features add a second layer of defense on top of access control to help secure and manage sensitive data.

Specifically, dynamic masking of information can be used for real-time transactions whereas column level encryption provides additional security for data at rest or in motion where real-time usability is not required.

These new features could be useful for companies that store personally identifiable information (PII) and other sensitive data such as credit-card data and biometric information. Companies that store and analyze data in countries where data regulation and privacy mandates are evolving, face ongoing risks from data breaches and data leakage and need to control data access, and these companies may also benefit from the new features.

Column-level encryption enables the encryption and decryption of information at column level, which means that the administrator can select which column is encrypted and which is not. It supports the AES-GCM (non-deterministic) and AES-SIV (deterministic) encryption algorithms. Functions support AES-SIV to allow for grouping, aggregation, and joins on encrypted data. This new feature enables some new use cases: when data is natively encrypted in BigQuery and must be decrypted when accessed, or where data is externally encrypted, stored in BigQuery, and must then be decrypted when accessed.

Column-level encryption is integrated with Cloud Key Management System (Cloud KMS) to provide the administrator more control, to allow management of the encryption keys in KMS, and to enable on-access secure key retrieval as well as detailed logging. Cloud KMS can be used to generate the KEK (key encryption key) that encrypts the DEK (data encryption key) that encrypts the data in BigQuery columns. Cloud KMS uses IAM (identity and access management) to define roles and permissions. KEK is a symmetric encryption keyset that is stored in Cloud KMS, and referencing an encrypted keyset in BigQuery reduces the risk of key exposure.

The BigQuery documentation explains:

At query execution time, you provide the Cloud KMS resource path of the KEK and the ciphertext from the wrapped DEK. BigQuery calls Cloud KMS to unwrap the DEK, and then uses that key to decrypt the data in your query. The unwrapped version of the DEK is only stored in memory for the duration of the query, and then destroyed.

In one example of a use case, the ZIP code is the data to be encrypted and a non-deterministic functions decrypt data when it is accessed by using the function in the query that is being run on the table.

From BigQuery documentation

In a second example, the AEAD deterministic function can decrypt data when it is accessed by using the function in the query that is being run on the table and supports aggregation and joins using the encrypted data.

From BigQuery documentation

In this way even a user who is not allowed to access the encrypted data can perform a join.

Before the release of column level encryption feature, the administrators need to make copies of the datasets with data obfuscated in order to manage the right accesses to groups. This creates an inconsistent approach to protecting data, which can be expensive to manage. Column level encryption increases the security level because each column can have its own encryption key instead of a single key for the entire database. Using column level encryption allows faster data access because theres less encryption data.

Dynamic masking of information, released in preview, allows more control to administrators who can choose, combined with the column-level access control, to grant full access, no access to data or masked data extending the column-level security. This capability selectively masks column-level data at query time based on the defined masking rules, user roles and privileges. This feature allows the administrators to obfuscate sensitive data and control user access while mitigating the risk of data leakage.

Thanks to this new feature, sharing data is easier, because the administrators can hide information selectively and the tables can be shared with large groups of users. At application level, the developers dont need to modify the query to hide sensitive data, after the data masking is configured at BigQuery level, the existing query automatically hides the data based on the roles the user is granted. Last but not least, the application of security is more easy, because the administrator can write the security rule once and then apply it to any number of columns with tags.

Any masking policies or encryption applied on the base tables are carried over to authorized views and materialized views, and masking or encryption is compatible with other security features such as row-level security.

Both new features can be used to increase security, manage access control, comply with privacy law, and create safe test environments. Allow a more consistent way to manage tables with sensitive data, the administrators dont need to create multiple datasets with encrypted (or not) data and share these copies with right users.

Read the original post:
Google's BigQuery Introduces Column-Level Encryption Functions and Dynamic Masking of Information - InfoQ.com

Tech world may face huge fines if it doesn’t scrub CSAM from encrypted chats – The Register

Tech companies could be fined $25 million (18 million) or ten percent of their global annual revenue if they don't build suitable mechanisms to scan for child sex abuse material (CSAM) in end-to-end encrypted messages and an amended UK law is passed.

The proposed update to the Online Safety bill [PDF], currently working its way through Parliament, states that British and foreign providers of a "regulated user-to-user service" must report any shared child sexual exploitation and abuse (CSEA) content to the country's National Crime Agency. The amendment to the legislation makes it clear that companies must develop software capable of peering into messages, even end-to-end encrypted chatter, to actively detect and report CSEA material to the authorities or face sanctions.

Truly secure end-to-end encrypted messages can only be read by those participating in the conversation, not network eavesdroppers nor the app's makers. However, it is possible for chat software developers to add a filter, potentially on each device, that automatically scans for certain illegal material before it's encrypted and sent or after it's received and decrypted.

How well that computer-vision process would work in practice, and whether the false positive rate causes people's private and lawful chatter to be beamed to the government, remains to be seen. Netizens may also not trust that just CSEA content is being reported.

Alternatively, an app maker could engineer their service and code to intercept and inspect the messages as they whiz between a conversation's participants, but that would undermine the whole end-to-end nature. And stuff that isn't end-to-end encrypted can be monitored as the app or service provider chooses.

However which way it's implemented, the British Conservative government, or what's left of it after a ministerial revolt against Prime Minister Boris Johnson, wants communications, encrypted or not, to be screened for CSEA material, and has positioned its Online Safety bill to that effect.

"Things like end-to-end encryption significantly reduce the ability for platforms to detect child sexual abuse," the UK's Home Secretary Priti Patel well, Home Secretary at time of writing on Wednesday argued earlier in the day. "The Online Safety Bill sets a clear legal duty to prevent, identify, and remove child sexual abuse content, irrespective of the technologies they use. Nobody can sensibly deny that this is a moral imperative."

If the legislation is passed by Parliament, Ofcom the UK's communications watchdog will have the power to force tech companies to pay penalties if this inspection system isn't implemented. "The onus is on tech companies to develop or source technology to mitigate the risks, regardless of their design choices. If they fail to do so, Ofcom will be able to impose fines of up to 18 million or [ten percent] of the company's global annual turnover depending on which is higher," Patel warned.

"We do not want to censor anyone or restrict free speech, but we must do more to combat these foul, hugely destructive crimes," she added.

Building in automatic detection of CSEA content is controversial. Engineers, legal experts, and activists have highlighted the risks of developing such capabilities. It may torpedo users' privacy, and potentially gives government officials a foot in the door to monitoring people's conversations. For instance, these filters, once implemented, could be expanded beyond child abuse.

Patel, however, believes changes to encryption systems to support this scanning can still preserve users' privacy while combating CSEA: "The UK government wholeheartedly supports the responsible use of encryption technologies We, and other child safety and tech experts, believe that it is possible to implement end-to-end encryption in a way that preserves users' right to privacy, while ensuring children remain safe online."

"If end-to-end encryption is implemented without the relevant safety mitigations in place, this will become much harder. It will significantly reduce tech companies' and law enforcement's ability to detect child sexual abuse happening online. This is obviously unacceptable," she said.

Last year, Apple quietly paused plans to scan for CSAM on iPhones. Apple's detection scheme was heavily criticized by academics and advocacy groups.

"Once this capability is built into Apple products, the company and its competitors will face enormous pressure and potentially legal requirements from governments around the world to scan photos not just for CSAM, but also for other images a government finds objectionable," declared a letter signed by more than 90 human-rights groups.

The Online Safety bill also attempts to tackle disinformation by getting social networks to filter out state-made interference, and reduce the distribution of stolen information for the purposes of undermining democracy.

The likes of YouTube may also be banned from removing news content until publishers and outlets have had a chance to appeal.

Read the original post:
Tech world may face huge fines if it doesn't scrub CSAM from encrypted chats - The Register

Proxies vs VPN: What is the difference? – TechRadar

The proxy vs VPN debate addresses two different methods of accessing the internet anonymously. Both make it appear as if you've established a connection from a different IP address by routing traffic through a remote server. This may be particularly important if youre concerned about the privacy of your personal data and your browsing habits.

However, while these technologies do similar things, they dont work in the same way, and knowing the difference can have significant implications for your online security. In this article, we take a closer look at the differences between proxies and VPNs, how they can be best used, and who will find them most useful. Lets see how they stack up against one another.

A proxy is a type of server that acts as a middle-man for internet traffic and data. It redirects internet traffic from a particular application to a different location before routing it to its eventual destination. By masking your IP address, it gives the impression that the traffic originated somewhere else.

There are various types of proxies, each with different features. For example, a proxy may be what is referred to as transparent. With a transparent proxy, the connection between your computer and the internet is intercepted. You might request to view a certain website page, but this is not delivered to you directly from that websites server, but rather via a transparent proxy running on your network. However, because your experience of using that website is exactly the same, the proxy is transparentyou are possibly even entirely unaware that it is there. However, the owner of the network on which the transparent proxy is running will be able to monitor your activity.

On the other hand, with a non-transparent proxy, you will have been required to first configure your browser to send its requests explicitly to the proxys IP address and sometimes to enter authentication details in your settings.

VPN stands for virtual private network. Similar to a proxy, a VPN also acts as a go-between for internet traffic and data. The main distinction is how they utilize encryption. VPNs tend to be significantly more secure than proxies because, at the same time as concealing your IP address, they also build an encryption tunnel between your computer and the server, making data interception nearly impossible. NordVPN (opens in new tab)and ExpressVPN (opens in new tab) are powerful examples of platforms that do this.

Its also important to note that a VPN protects your entire computer, redirecting and encrypting all your internet traffic rather than just that of a single application, as in the case of a proxy.

A VPN, therefore, serves as a secure gateway to the internet. Most popular devices, such as your phone, laptop, and desktop, can run VPN software. One thing to keep in mind is that a VPN service provider is not an internet service provider (ISP). To access the internet, you'll still need an ISPyour VPN will run atop that connection.

Deciding on whether to use a proxy or a VPN will depend on your individual needs. Let's use video streaming as an example. If youre out of the country, but want to stream video content that is exclusively available to users in the United States, you could use a US-based proxy server to access the streaming site. Certain platforms like SmartProxy (opens in new tab)excel at this, but some providers, like Netflix, are starting to block proxies.

Proxies can also help prevent users from being bombarded with unwanted advertisements, or to avoid the capture of IP-specific data. Large organizations often find transparent proxies especially beneficial. For example, they can be used in schools to restrict access to age-inappropriate websites, or businesses might use them to block the use of distracting social media platforms.

However, proxies are not suitable for activities such as online banking and shopping. Here, your security may be jeopardized if your personal details aren't safeguardedand youll need encryption for this. A VPN is therefore a superior option for users who want to share sensitive information or engage in other activities where its important to keep data safe, such as torrenting. Theyre particularly useful when using public WiFi.

VPN companies also tend to be more proficient when it comes to accessing geo-locked content, as they provide a higher level of online anonymity and security. For this reason, a VPN may be best overall if you want to watch Netflix or Hulu from a different region.

One downside is that due to the encryption process, the use of a VPN can sometimes cause a noticeable decrease in internet speed. However, there are numerous fast VPN applications available, with speeds improving all the time. Because data encryption places a greater demand on your devices resources, VPNs can also be a slightly more expensive option than proxy servers. There are, however, many excellent inexpensive VPNs to choose from, as well as some good free ones.

Proxies and VPNs share similarities in that they both employ the use of a remote server to mask your IP address and redirect internet traffic through it. The major difference between the two is encryption, and it is for this reason that VPNs far outperform proxy servers (opens in new tab)when it comes to secure browsing, especially on public WiFi networks.

With a huge range of options available, its not always easy to choose the perfect software for you. To help you in the decision-making process, weve recommended some of our favorites. Take a look at our guides to the best VPN services and the best proxy services (opens in new tab) of 2022.

Read more:
Proxies vs VPN: What is the difference? - TechRadar

In the quantum era, cybersecurity is a race against the clock – Federal News Network

Quantum technologies are expected to unlock transformative opportunities in computing, sensing and communications. At the same time, they introduce unique challenges for current operating practices across government and industry. Perhaps most alarmingly, quantum computers capable of breaking encryption could exist as early as the end of the next decade. Thankfully, we already have a roadmap for protecting sensitive systems and data against this threat. Recognizing the complexity of translating this roadmap into practice, the White...

READ MORE

Quantum technologies are expected to unlock transformative opportunities in computing, sensing and communications. At the same time, they introduce unique challenges for current operating practices across government and industry. Perhaps most alarmingly, quantum computers capable of breaking encryption could exist as early as the end of the next decade. Thankfully, we already have a roadmap for protecting sensitive systems and data against this threat. Recognizing the complexity of translating this roadmap into practice, the White House has initiated several recent executive actions to accelerate whole-of-government preparation for quantum technology capable of disrupting U.S. infrastructure and interests.

In this article, we untangle how quantum technology threatens cybersecurity and outline what organizations can do today to begin protecting sensitive assets against quantum attacks.

The internet relies on multiple cryptographic techniques to meet different information storage and communications needs. Public key (or asymmetric) cryptography has become an especially popular mechanism for encrypting information in the digital age because it sidesteps symmetric cryptographys logistical challenge of sharing a single key. Public key cryptography rests on the assumption that we can effectively secure information behind certain difficult math problems, and it has successfully delivered on that promise since the 1970s. Certain calculations are so computationally onerous that they are practically impossible to solve, even with todays best supercomputers. But quantum technology is changing the rules of the game.

Quantum computers will solve certain types of problems exponentially faster than todays computers, which we call classical computers. But faster is a bit misleading; against certain problem sets, quantum computers enable entirely new capabilities. Some of these are incredibly exciting and offer opportunities to revolutionize public service missions. Others threaten the foundation of modern data protection as they decompose the difficult math problems we rely on for cybersecurity. Quantum changes what constitutes a hard math problem by requiring it to be difficult for both classical and quantum computers. To meet this new standard, the field must identify new cryptographic algorithms. Ultimately, this transition will require organizations to identify and update vulnerable cryptography with quantum-resistant alternatives, referred to as post-quantum cryptography (PQC). The urgency around PQC has grown tremendously in the last year, but weve been headed for this inflection point for a long time.

When we talk about the quantum cyber threat, we often talk about factoring. Factoring is one of the computationally intractable problems enabling public key encryption today. For example, RSA encryption uses factoring to establish a mathematical relationship between a public and private key. Without knowing one of the factors in the published public key, decomposing the large number into its primes is so computationally onerous that we have been able to effectively conceal information behind this calculation for half a century. However, in 1994, Peter Shor demonstrated that this approach would not remain secure forever. Quantum computers can solve these problems efficiently, leaving RSA-encrypted information vulnerable when the quantum hardware necessary to implement Shors algorithm reaches scale.

If weve known about this possibility since the 1990s, what changed to drive the urgency were seeing today? The simplest answer is quantum computing capacity. When Shor developed the algorithm capable of breaking RSA encryption, it was not clear if we would ever have a quantum computer capable of executing it. Today, we know that it is a question of when, not if. The National Institute of Standards and Technology and the Department of Homeland Security warn we could see a quantum computer capable of breaking current encryption methods as early as the end of the next decade. That may sound far away, but those familiar with the complexity of this and other cryptographic transitions know that were up against a challenging timeline to transition to PQC.

PQC refers to the suite of classical algorithms designed to be difficult for both classical and quantum computers. NIST is in the final stages of standardizing these algorithms and NSA has already recommended PQC as our front-line solution for quantum-safe cybersecurity. In parallel, DHS recently published guidance to help federal agencies begin planning for PQC. In January 2022, the White House issued National Security Memorandum VIII (NSM-8) updating Executive Order 14028 to include new PQC transition requirements for national security systems. Additional requirements followed in May 2022, continuing to build momentum for the whole-of-government transition required for post-quantum cybersecurity. The Executive Order on Enhancing the National Quantum Initiative Advisory Committee reinforced the strategic importance of this technology area by establishing that the committee shall now report directly to the President in addition to its previous duties. NSM-10 emphasizes the urgency of PQC transitions by establishing an annual assessment and review cadence to ensure progress in a national quantum-safe cyber posture. NSM-10 also reflects the importance of parallel efforts in the private sector and tasks NIST with creating public-private partnerships to encourage private entities adoption of shared PQC migration standards.

Organizations must start planning their transition today to ensure the appropriate protections are in place for their most sensitive assets before quantum computers capable of breaking public key encryption emerge. NIST suggests that it may be decades before the community replaces most of the vulnerable public-key systems currently in use given the complexity of transitioning to PQC. If we really do see cryptographically relevant quantum computers by the end of the decade, thats time we dont have. NIST also called special attention to the fact that the community cannot expect PQC algorithms to function as drop-in replacements. Every agencys migration will be unique, intensifying the importance of early prototypes to identify PQCs effects on application and network performance. By auditing their cybersecurity infrastructure, organizations can identify vulnerable cryptography and develop comprehensive strategies for prototyping, implementing and maintaining security against both quantum and classical threats.

Jordan Kenyon, PhD is a senior lead scientist at Booz Allen Hamilton. JD Dulny, PhD is a director and serves as Booz Allens firm-wide quantum lead. The Booz Allen quantum team focuses on the science and impact of quantum technologies to client missions.

Read more:
In the quantum era, cybersecurity is a race against the clock - Federal News Network

Free and Open Source Software (FOSS) – UNESCO

Software plays a crucial role in access to information and knowledge;

Different software models, including proprietary, open-source and free software, have many possibilities to increase competition, access by users, diversity of choice and to enable all users to develop solutions which best meet their requirements;

The development and use of open, interoperable, non-discriminatory standards for information handling and access are important elements in the development of effective infostructures;

The community approaches to software development has great potential to contribute to operationalize the concept of Knowledge Societies;

The Free and Open Source Software (FOSS) model provides interesting tools and processes with which people can create, exchange, share and exploit software and knowledge efficiently and effectively;

FOSS can play an important role as a practical instrument for development as its free and open aspirations make it a natural component of development efforts in the context of the Sustainable Development Goals (SDGs);

Consistent support plays an important role in the success and sustainability of FOSS solutions;

All software choices should be based upon the solution's ability to achieve the best overall return on technology investments.

Go here to see the original:
Free and Open Source Software (FOSS) - UNESCO

Internal Twitter messages show employees targeting Libs of TikTok …

Leaked internal messages between Twitter employees on the business messaging channel Slack showed them bragging about "successfully" deplatforming former President Donald Trump and debating about permanently banning conservative influencer Libs of TikTok.

Libs of TikTok, the Twitter account dedicated to reposting videos and events from left-wing activists, has been suspended from Twitter three times and is now facing a potential permanent ban according to the leaked internal Twitter chats.

The Twitter employees, who appear to be far-left activists based off of their internal discourse, said that Libs of TikTok should be permanently banned for encouraging violence against marginalized community membersa common accusation expelled by far-left activists.

"This has been escalating for months...but our expectations out of twitter are so low right now that the devil himself is having to squat to get to their level," a Twitter employee said on Slack.

"Like I don't get how this account, which exists solely to generate targeted violence at marginalized people, continues to be allowed to post," they added.

Employees furthered their debate about deplatforming Libs of TikTok but questioned if the decision would reveal the company's bias against conservative users.

"But if we deplatform this account we might erode trust in our platform from users who already think we're irredeemably biased against conservatives," an employee stated.

Another employee then responded to the discussion bragging about how Twitter "successfully" deplatformed former president Donald Trump following the Jan. 6 riot at the US Capitol in 2021.

"I mean we successfully deplatformed Trump - I don't think deplatforming Libs of TikTok is going to cause a mass exodus but I guess it may not be in our 'fiduciary' interest to enact a ban on a high profile account right now...," another employee said in regards to the potential buyout from Space X and Tesla CEO Elon Musk.

Employees say that Libs of TikTok, who frequently exposes inappropriate behavior from within the LGBTQ community through using their own videos, is trying to enact genocide against the trans community.

"Trans people are being targeted for genocidal violence during pride month," an employee wrote.

Another employee responded and said, "I despise and despair the activity that is currently flourishing on our platform and empowering white supremacists /fascists to act with impunity in conducting harmful emotional and physical violence on trans folx and the broader LGBTQ+ community."

The internal chats were first published by Libs of TikTok on Substack Monday night where they stated that they confirmed the identities and employment of all individuals in the group message before redacting their names and photos.

The discussion for a potential ban came mere hours after Media Matters employees took to Twitter to say the Libs of TikTok account was going to be responsible for the death of LGBTQ+ individuals. Ari Drennen, the LGBTQ Program Director for Media Matters posted a series of tweets attacking Libs of TikTok account and the woman who runs it, Chaya Raichik. "Chaya Raichik of Libs of Tik Tok is going to get someone killed," Drennen said.

Drennen accompanied the post with news of a Drag Queen Story Hour being protested in San Francisco. Drennen didn't stop there and claimed Libs of TikTok is "hard at [work] making sure that far right militias have their next target."

"This right-wing lady is inciting violence," added Drennen in her Twitter rant. Drennen has also retweeted and amplified other journalists calling Libs of TikToks actions "terrorism," and claiming that the content posted by the account is "trying to spark a genocide."

Media Matters has written four hit pieces on Libs of TikTok in recent months but has ramped up its efforts to get the account nuked by attempting to pin the account to acts of harassment and violence, despite Libs of TikTok only reposting content and provided limited, if any, commentary.

Following today's onslaught from Drennen and others, Libs of TikTok reported receiving death threats en masse, including one individual saying they sent a pipe bomb to Libs of TikTok for "supporting nazi bigots," and "please kill yourself at your earliest convenience."

On Wednesday, the Libs of TikTok's Twitter account was suspended after activists mass-reported a tweet thread with a series of drag queen events involving children. Last month, the Libs of TikTok Instagram account was suspended but reinstated after an appeal. Libs of TikTok is permanently banned from TikTok.

This is far from the first time major media outlets have rallied against the account. In April, Washington Post reporter Taylor Lorenz doxxed the owner of Libs of TikTok, claiming she could have been a foreign actor. Lorenz also harassed and showed up at the home of the owner of Libs of TikTok before dropping the piece.

Many users have been trying to reach Elon Musk about the potential ban, as Musk previously admitted the suspension of the Babylon Bee was a motivating factor in his decision to buy Twitter. The CEO of the Babylon Bee, Seth Dillon, has been a staunch supporter of Libs of TikTok and pushing back against the hits from Media Matters in a series of tweets.

Originally posted here:

Internal Twitter messages show employees targeting Libs of TikTok ...

Leaked internal messages show Twitter employees debating whether to ban us

Conservative Twitter accounts are dropping like flies. Just today, Allie Stuckey was locked out for hateful conduct. Her crime? She criticized Fox News for celebrating a childs gender transition. There was nothing hateful about her tweet. She wasnt harassing anyone. She certainly didnt call for violence. She merely dissented.

Thats all it takes.

Project Veritas recently exposed Twitters bias with undercover video of an employee admitting they censor conservatives. But we really didnt need hidden camera footage. Their bias is blatant. Itd take effort to not see it.

Weve experienced our share of it firsthand. It started in April when we got two back-to-back suspensions. Following those suspensions, the Left was emboldened. Knowing I wanted to remain anonymous, they went on a mission to expose me in the hopes of intimidating me into silence. This culminated with my being doxxed by Taylor Lorenz at the Washington Post.

Instagram got on the censorship wagon as well. They mistakenly disabled our account and reinstated it after realizing their error. Linktree suspended us, too.

We received our third Twitter suspension just last week for posting fliers of pride events. I had created a mega drag thread which documented the sharp rise in drag events for kids. Its a disturbing trend; the Left has become obsessed with ensuring your 4-year-old has access to men dressed as women while dancing provocatively for cash. The fact that I was noticingand drawing attention to how widespread this trend really isseemed to trigger the Left. Big accounts on Twitter started calling for my suspension while labeling me a domestic terrorist.

The below Slack conversation between Twitter employees occurred today against this backdrop, and echoes some of the charges leveled at us by far left activists. It was shared with us by a Twitter employee, who wishes to remain anonymous. We verified the names and images of the employees before we obscured them.

There are a few tweeps (thats what Twitter employees call themselves) involved in this exchange. As you can see, theyre weighing the pros and cons of banning us. One of them expresses concern that a ban will only validate the charge that Twitter is biased against conservatives.

The reference to Trumps successful deplatforming is interesting. He was permanently banned for incitement to violence the same charge the Left hopes will stick to us.

Concern is then raised about fiduciary duties, but an ultra-woke tweep fires back: How dare you bring up fiduciary duties while trans people are literally being wiped off the face of the earth! Like a good little ally, the rebuked tweep apologizes and promises to do better in the future.

Perhaps most remarkable is how they parrot the same lines we hear from far-left activists. Theres no debate about whether were actually terrorists, bent on exterminating the entire LGBT community. In their view, thats just a given. They believe right along with the extremist activists that we exist solely to generate targeted violence at marginalized people. The only thing theyre willing to debate is what should be done about us. Do they take us out now for engaging in targeted genocidal violence, or wait for a more opportune time?

But again, you dont need leaked messages to know just how biased and agenda-driven these people are. The messages only confirm what we already see with our own eyes every day.

Continued here:

Leaked internal messages show Twitter employees debating whether to ban us

Bitcoin was supposed to hedge against inflationhere’s why it hasn’t worked that way – CNBC

Bitcoin has plunged in value this year, weakening the argument often made by crypto enthusiasts that it can be an effective hedge against inflation during times of economic turmoil.

Bitcoin advocates have long argued that its scarcity would protect its value during times of rising inflation. Unlike central banks which can increase the supply of money there are a fixed number of coins, which keeps them scarce.

Even before the market crashed, there was debate about whether or not bitcoin would hold its value. Billionaire investor Paul Tudor Jones was bullish on bitcoin as an inflation hedge, while Dallas Mavericks owner and investor Mark Cuban dismissed the idea as a "marketing slogan."

Another argument is that bitcoin, along with other similar cryptocurrencies, will have an intrinsic store of value over time as it becomes more accepted, like gold. Supporters believe it will be seen as an asset that won't depreciate over time.

However, this has not been proven to be true, at least not yet. The value of the cryptocurrency market overall has plummeted alongside rising inflation, with bitcoin losing half of its value since January. As of Friday, the price of bitcoin is $21,833, according to Coin Metrics.

With crypto, "the extent of [price] volatility is so significant, it's very hard for me to view it as a long-term store of value," Anjali Jariwala, certified financial planner and founder of Fit Advisors, tells CNBC Make It.

Jariwala says that crypto in general is a new type of asset that doesn't yet function either as a sought-after commodity like gold, or even as a currency, "because it's not easily exchanged for a good or service." Despite its scarcity, the price of a cryptocurrency like bitcoin is still based largely on consumer sentiment, she says.

"It's tricky because it's supposed to act like a currency, it's taxed like property and some people compare it to a commodity. At the end of the day, it really is its own asset class that doesn't have a pure definition."

Another consideration is that cryptocurrencies like bitcoin have only been around for just over a decade. Because of this, "there isn't enough history there in terms of historical data to really understand what purpose it serves as an investment," Jariwala says.

While cryptocurrencies like bitcoin are "not proven" to be a reliable, long-term store of value, they could still gain acceptance over time and become less volatile, Omid Malekan, an adjunct professor at Columbia Business School specializing in crypto and blockchain technology, tells CNBC Make It.

"Once volatility smooths out, we will have a better picture of how it responds to macro developments, like the rate of inflation or what the Fed is doing," he says, cautioning that current crypto prices could reflect all sorts of inputs aside from inflation, like too many overleveraged cryptocurrency lenders or a lack of regulation.

Either way, crypto as a whole remains a highly speculative investment. Jariwala recommends only investing with money you're prepared to lose. She also says to think of crypto investing as a long-term strategy and "stick to that strategy even during times like this."

Cryptocurrency might evolve into a more mature asset that can be a hedge against inflation. But "we just don't know yet, until we see more of a track history with it," says Jariwala.

Sign up now:Get smarter about your money and career with our weekly newsletter

Don't miss:25-year-old TikTok creator with 7 million followers saves 50% of her income: 'I don't touch it'

See the original post here:
Bitcoin was supposed to hedge against inflationhere's why it hasn't worked that way - CNBC

Why Bitcoin Is Undervalued According To This Experts Conservative Model – NewsBTC

According to Fidelitys Jurrien Timmer, Bitcoin is currently undervalued. The benchmark crypto has been pushed back to 2020 levels after losing over 70% of its value in the past months.

Related Reading |Crypto Traders Lose $280 Million Following Bitcoins Break Above $22,000

At the time of writing, Bitcoin has begun showing some green as it makes its way back above its 2017 all-time high levels. The cryptocurrency trades at $21,900 with a 1% profit in the last 24 hours.

Via Twitter, Timmer wrote about the Crypto Winter and the reasons why BTCs price is undervalued according to his conservative price S-curve model. The expert designed this price model based on the exponential expansion of the internet and mobile phones.

As seen below, the recent downside Bitcoin price action seems to be following the internets demand model which could lead to slower network growth and modest price appreciation. If BTCs price continues to follow this model over the coming years, the cryptocurrency could be priced at around $100,000 by 2030

Despite the recent downside price action below its previous all-time high, Timmer claims Bitcoin continues to follow its demand curve. This means that people are still buying BTC despite the price crash.

The expert claims the cryptocurrency reached a 2013 valuation level. At the same time, the number of BTC non-zero addresses is trending to the downside. In other words, as BTCs price declines, people appear to be buying it. Timmer said:

I use the price per millions of non-zero addresses as an estimate for Bitcoins valuation, and the chart below shows that valuation is all the way back to 2013 levels, even though price is only back to 2020 levels. In other words, Bitcoin is cheap.

When Timmer compared BTCs price current valuation to that of Ethereum, he concluded that the second crypto by market cap could be even cheaper. ETHs price has experienced a similar drawdown to that of Bitcoin in 2018.

At that time, the number one crypto by market cap rallied from around $3,000 to $20,000. In subsequent years, it would revisit the former level.

Related Reading |Solana Glints With 14% 3-Day Rally Will SOL Keep On Beaming?

As seen below, Ethereum could be following this trajectory. Timmer explained:

If Bitcoin is cheap, then perhaps Ethereum is cheaper. If ETH is where BTC was four years ago, then the analog below suggests that Ethereum could be close to a bottom.

Visit link:
Why Bitcoin Is Undervalued According To This Experts Conservative Model - NewsBTC

The Bitcoin Conference And The Pursuit Of Hyperbitcoinization – Bitcoin Magazine

This is an opinion editorial by Chris Smith, the Events Ticketing Manager for BTC Inc. Disclaimer: BTC Inc. is the parent company of Bitcoin Magazine and the Bitcoin Conference.

The Bitcoin Conference is an annual tradition, a week-long extravaganza and a true celebration of freedom. The conference not only serves the bitcoin community but all who value freedom, individual sovereignty and the pursuit of hyperbitcoinization. With an event of this magnitude, there are thousands of hours poured into the product along the way toward the end goal. But, with the end goal being hyperbitcoinization, what exactly does that mean? According to the Bitcoin Magazine glossary, the definition is:

Hyperbitcoinization: The inflection point at which bitcoin becomes the worlds preferred medium of exchange.

With that understood, there is no hyperbitcoinization without the whole world being involved.

This historical event requires a reach to every continent, every nation, every language and every creed. With that goal set, the conference must go global and start reaching those with the shared vision of a hyperbitcoinized world.Thus, the spark of Bitcoin Amsterdam.

Bitcoin Amsterdam is going to make history in Europe, October 12-14, 2022. This will be a monumental event uplifting the trek of bitcoin to all nations and adoption to all people. With the magic that the team behind Bitcoin 2022 has brought in the past, the aim is to bring this same energy to the European stage with the goal of No region left behind.

Hyperbitcoinization is not just an end goal, but a journey that is taking place right now. As bitcoin continues its world tour, the conference hopes to be alongside it every step of the way. Learn more about it, get involved and come join us in Miami and Amsterdam this year.

In April of this year, the Bitcoin 2022 Conference took place in Miami, Florida where 26,000 Bitcoiners gathered to learn, teach and celebrate bitcoin. This was the largest gathering of Bitcoiners the world had seen to date. For a week straight, a wave of orange engulfed the city of Miami.

Bitcoin 2022 - The LARGEST Bitcoin Event In History!

As we think about the future of the Bitcoin Conference, it is important to focus on three things:

Throughout this past cycle, the Bitcoin Conference has served as the largest in-person platform for bitcoin and the industry that has sprung up around it. It's been a place where Bitcoiners, ranging from curious to convicted, can meet, learn, teach, grab a drink and maybe a bite to eat.

A popular location to eat for the plebs at Miami 2022 was a food hall called Lincoln Eatery which accepted sats for payment via Lightning and on-chain. Spots like these are great for gatherings, meetups and enjoying the community. This also encourages other restaurants in Miami to accept bitcoin and it drives business; capitalism at its finest. Make sure you stop by the Lincoln Eatery next year and enjoy the ease of paying for food with bitcoin.

The Bitcoin Conference is the best annual event for networking in the bitcoin industry as a whole. The majority of attendees are players in the space and are actively looking for opportunities to collaborate. As long as you put yourself out there, youll meet amazing people who are interested in what you are doing.

A lot of the magic behind the week includes amazing satellite events hosted by sponsors and other members of the community. Most satellite events are structured around this conference and have been a great way for companies to make a name for themselves. The conference also offers a Pitch Day which takes place on the first day, Industry Day. It serves as a great place for larger players to provide investment opportunities to smaller bitcoin companies.

Another unique feature of Bitcoin 2022 was giving attendees the opportunity to sign a 9 x 12 edition of the Declaration of Monetary Independence (DoMI). I worked with the three co-authors Mark Maraia, Mike Hobart, Ulric Pattillo and the rest of the #DoMI crew to bring this experience to Miami. Initially, gathering signatures came slowly, but by the end of the conference, it was difficult to find space to sign your name. DoMI represents a very important aspect of the conference and our movement. Those who signed were essentially stating I trust math more than I trust central bankers.

Left (Chris Smith) Right (Ulric Pattillo)

DoMI became one of the many great experiences at Bitcoin 2022 and provided a focal point for thousands of attendees at the conference. It is now a conference staple and I hope to see it return for Bitcoin Amsterdam.

You can also sign it yourself online at declarationofmonetaryindependence.org

What the Conference has taught us has been a few interesting, but deserving, lessons that must be learned and recognized for growth and a bright future.

First, with all Bitcoin conferences, it is important to emphasize bitcoin and only bitcoin, along with of course freedom, self-sovereignty and other tangential aspects but no other cryptocurrency projects. The sea of cryptocurrencies is truly a distraction from the end goal of hyperbitcoinization. In contrast to the rest, Bitcoin exists as a bright light in a sea of garbage, and only through education and past experience can people come to that conclusion. It is important to emphasize what really matters and not allow distractions to disrupt us from the end goal.

Secondly, it is important to encourage all, even those without similar beliefs, to attend, enjoy and be made to feel welcome. Nothing is worse than a bad first impression, and bitcoin is ultimately for anyone.

Lastly, it is important to not get caught in the limelight. During high price increases and bull markets, bitcoin is all anyone can talk about. But when the bears start winning again, the media will call it dead. Stay connected and persist through the volatility and you will come out okay on the other end.

Looking to the future, I know the team is extremely excited about returning back to Miami for Bitcoin 2023, May 18-20. With the Bitcoin Conference spreading across the world, it is important that the flagship event stays in a unique but also accessible area for the strong orange wave that resides in the U.S.

As the conference branches off from Miami and explores new parts of the world, it is important to maintain education as a core concept. An amazing part of the Miami 2022 conference was led by Matt Odell where he facilitated the idea of the Open Source Stage, a stage dedicated to Bitcoin open-source projects.

For the most part, it was a high-level overview of the interaction of open-source software and the Bitcoin Core protocol. It also provided very helpful tips for newcomers to learn more about bitcoin from a technical lens. Matt included many amazing speakers and knocked it out of the park with this stage. Core concepts like open-source Bitcoin projects are crucial to give a spotlight to as the world adopts bitcoin.

As the conference continues to grow and expand, hopefully, more hands will touch bitcoin in the process. Learning from past mistakes is important to keep improving in the future, but the future of bitcoin is and has always been bright.

As the Bitcoin Conference begins going global, Europe seems to be the first stop on the journey. Bitcoin Magazine, organizers of the worlds largest and longest-running Bitcoin conference, Bitcoin 2022, announced last week, in collaboration with Amsterdam Decentralized and Westergas, the launch of its first European-focused event: Bitcoin Amsterdam.

Amsterdam is going to be an action-packed three days with more activations to see than time in the day. The city, for one, is going to be incredible to explore and enjoy. And with a European partner for the event, the presence of European Bitcoiners will be strong.

While Europe is lagging behind other regions in terms of regulatory and governmental acceptance, demand from ordinary investors and institutions is among the highest in the world, said David Bailey, CEO of Bitcoin Magazine. Whats more, the continents significant Bitcoin developer and innovator community is helping shape the future of the worlds preeminent digital currency which continues to rise.

Europe has been at the forefront of financial and technological innovation for over 500 years, with Amsterdam playing a particularly noteworthy role in the development of modern banking, making it the perfect choice for our first European event, he continued. While Europes regulators have been so far slow to embrace the potential of Bitcoin, the combination of the continents history and its continued high demand for Bitcoin means that our community can give the support, collaboration and direction that European governments are failing to provide, and together pursue our shared goal of hyperbitcoinization.

Bitcoin Amsterdam is Bitcoin Magazines first attempt at bringing the conference out of the United States, and it aims to galvanize attendees from Europe one of the worlds most uncertain regulatory environments for Bitcoin with the message that there can be no region left behind in the pursuit of hyperbitcoinization, said Brandon Green, chief of staff at BTC Inc.

The Netherlands is a special place in the Bitcoin universe, as one of the oldest and most deep-rooted Bitcoin cultures in the whole world. It was the host of one of the first major bitcoin conferences ever, the Bitcoin 2014 Conference. Since block rewards were 25 BTC, Amsterdam has had its hands all over bitcoin and it only seemed right to return in fashion.

Bitcoin and Amsterdam just make sense.

The speakers for the event are going to be predominantly European based, with universal staples sprinkled throughout the agenda. Many European bitcoiners and media members will be involved, finally getting a chance to participate in the monumental movement. There may also be a banger concert after, but dont hold me to it.

Overall, the three-day extravaganza is going to be a must-add when you are filling out your fall calendar. No matter your exposure to bitcoin, if you are looking for a great opportunity to dive into the culture, this is your chance.

To the European Bitcoiners, I have read so many emails and comments about you not being able to get approved for travel to Miami for Bitcoin 2022. It was only right by you all to bring our event to you, so I hope you all are loving the insanely cheap prices right now. GA (general admission) tickets are only 249 during the public pre-sale, which is currently LIVE.

Europe is only a stop in this journey though, and I foresee Asia, Australia or South America as viable next targets. Wherever bitcoin spreads, gatherings will follow. The Bitcoin Conference plans to be at the cornerstone of this movement and truly spread hyperbitcoinization. Lower your time preference and get involved with the long-term mission.

With enough talk about how great it is, its also important to direct people to the right avenues so they can plug themselves into the community. Assuming you at least know how to buy some bitcoin and if you dont, you should take the 21 Days of Bitcoin course here are some thoughts on how to go about involving yourself in the community and the annual conference.

Join a local meetup. Before we even talk about the conference, its important to nail down the basics first. And the first step is to join a local bitcoin meetup. If you go to meetup.com, you can type in your city and find the nearest meetup. Do not be discouraged if you live outside of the U.S., give it a search as I know of many other meetups around the world.

Self-custody your bitcoin. It is the most important step in protecting your stack. For a great guide, here is BTC Sessions, Trezor Model T - How To Use A Bitcoin Hardware Wallet. Ben is great, so make sure you check out his other tutorials as well.

Have conversations. Encourage discourse and talk about bitcoin with your peers. Learning from others and challenging each other's thoughts and ideas only improve your understanding of bitcoin in the long term.

Something that goes hand-in-hand with this is a famous Chinese proverb: He who asks a question is a fool for five minutes; he who does not ask a question remains a fool forever.

Engage in self-education. Self-education is important, especially for Bitcoiners. There are many great authors, podcasts, and teachers in the space. Take advantage of this.

Work in the bitcoin space. Of course, you never have to work in the bitcoin space. Many great Bitcoiners work outside of the space and still manage to stay involved. But, working with like-minded individuals in pursuit of a similar goal or path as you cannot be understated in its rewards. And as Bitcoiners, we all want to see bitcoin succeed. Many job opportunities exist all over the space.

If youre interested, check out b./tc/jobs for new openings. Another great website is Bitcoiner Jobs.

Attend the conference. The most important part to engage in the conference is actually getting a ticket! Pre-sale tickets are live for Bitcoin 2023. It is always better to get these on the front end as most conferences do price increases to drive FOMO and demand.

Check out satellite events. The Bitcoin Conference does a great job at highlighting satellite events going on in Miami in what is referred to as Bitcoin Week. Here is where most of your schedule planning will occur outside of the conference agenda hours you wish to attend.

Get involved. There is also a Get Involved page where you can participate in multiple activations including volunteering, enrolling in hackathons, becoming an affiliate or hosting a satellite event yourself!

Give back. Lastly, as events like this arise, it is important to allow proper space to give back to those less fortunate. Giving Back was a project that coincided with the Built With Bitcoin Foundation. The Built With Bitcoin Foundation is, a humanitarian organization devoted to creating equitable opportunity by providing clean water, access to quality education, sustainable farming and humanitarian support all powered by Bitcoin

As bitcoin marches on, it is of the utmost importance that members of the bitcoin community continue meeting in person, face to face and celebrating the freedom that all who participate in bitcoin receive. Conferences are only one way to do this. Try and find a way to interact with the bitcoin community on a daily basis. This community is truly a group of critical thinkers, hard workers and flat-out winners.

When we look at the recent contagion that has hit the market, which companies have been the ones performing the best? The ones that stuck to the game plan, did not deviate or get distracted, stayed moral and focused on bitcoin and bitcoin only.

Bitcoin is the key to defeating the plague that has inhabited this earth fiat.

Lower your time-preference and get on board with hyperbitcoinization or get out of the way.

This is a guest post by Chris Smith. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

More:
The Bitcoin Conference And The Pursuit Of Hyperbitcoinization - Bitcoin Magazine