This cryptocurrency exchange becomes the latest to set up shop in the UAE – AMBCrypto News

Blockchain.com, London-based crypto exchange, has been granted a provisional regulatory approval by the Virtual Assets Regulatory Authority (VARA), Dubai. With granted provisions, institutional and retail clients can use the crypt platform in the United Arab Emirates (UAE).

Blockchain.com, via ablogpost, stated that the organization is in the process of setting up a local office in the area. Furthermore, the company has full intentions of hiring for the same. The platform also underlined the importance of the licensing process as critical to its commitment to global compliance and regulation.

Peter Smith, CEO and co-founder, Blockchain.com appreciated the efforts of the local team via Twitter.

It was on 9 March 2022 that HH Sheikh Mohammed bin Rashid Al Maktoum, Vice President, Prime Minister and Ruler of Dubai approved the crypto assets law. Furthermore, with the establishment of VARA the goal of establishing the UAEs position as a global player in the virtual assets industry becomes easier.

The countrys crypto assets law necessitates cryptocurrency exchanges and users to register with the regulatory body before engaging in crypto-related activities, such as operating a crypto exchange, transferring crypto assets, and trading tokens or other assets. Since then, a number of cryptocurrency exchanges have been granted regulatory approval in the UAE by VARA.

Furthermore, on 3 June, Crypto.com received provisional approval of its Virtual Asset MVP from VARA. Thus, allowing crypto.com to offer crypto products and services. On 21 June, Hex Trust received a provisional approval from VARA.

On 14 July, crypto trading application OKX was provided a provisional virtual assets license by VARA. On 29 July, FZE, a division of the cryptocurrency exchange FTX, received the Minimal Viable Product (MVP) license by VARA. This proves that the country is open to offering virtual asset exchange products and services in the UAE.

In July, HH Sheikh Hamdan bin Mohammed bin Rashid Al Maktoum announced a new metaverse strategy. This strategy aims at increasing the number of blockchain and metaverse companies by 5x in the next five years.

The plan also aims to generate $4 billion. He further added that the move will help Dubai become a metaverse leader in the region. Thus, making it one of the 10 leading economies, besides generating 40,000 virtual jobs.

On 2 August, Blockchain.com successfully registered itself in the Cayman Islands to offer a range of crypto services to institutional clients. Soon after, the company secured regulatory approval from Italys Organismo Agenti e Mediatori (OAM) as a Virtual Asset Service Provider (VASP).

Blockchain.com said that the company is actively pursuing additional licenses in other countries as well. These include Germany, the Netherlands, France, Spain, and Ireland.

The crypto firm operates several offices in North America, Europe, South America, and Singapore.

Link:
This cryptocurrency exchange becomes the latest to set up shop in the UAE - AMBCrypto News

Roger Waters at the Moda Center on 09/10/22 – Oregon Music News

Home > Rock 09/12/2022

Photos and Review by Brent Angelo

To say that Roger Waters has had a huge impact on the culture of music is a major understatement.

As a founding member of Pink Floyd, he was a driving force in that band as a songwriter, co-lead singer, instrumentalist, and concept director. Pink Floyd pushed the limits of what was possible at that time.

Albums like 1973s Dark Side of the Moon remain one of the most respected and beloved albums of all time by both fans and critics. Pink Floyds success would grow through the seventies and by the eighties, Pink Floyd were one of the biggest bands in the world reaching a super stardom level that not too many have achieved.

In the mid-eighties, Roger Waters left Pink Floyd and would again then push musical boundaries on his own. In 1990 for example, he staged one of the biggest concerts ever done to celebrate the fall of the Berlin Wall. The Wall was an epic performance and done at pivotal time in world history.

Roger Waters' current tour is titled This Is Not a Drilladdresses many world issues and packs a lot of punches. The tour was originally scheduled to take place in 2020, but the Covid 19 pandemic pushed back those plans until this year. Portland just got its rescheduled show on September 10th at the Moda Center. The tours stage is set in the round stage and is adorned with large video screens filled with his stunning visuals. With the music of Pink Floyd and Roger Waters' solo work, the show is a brutally honest reminder of things going on in our world.

Right before the concert starts, he makes a public announcement over the speakers and on the video screens. The audio/visual message goes if you are one of those I love Pink Floyd but I cant stand Rogers politics you might do well to fuck off to the bar right now, which was followed by massive applause.

As the show began, video screens showed an animated city with its people, who were seen in the dark as Comfortably Numb filled the arena. That stripped-down version of the song along with that video created such a heavy mood in the arena and painted a dark picture of people in the world right now.

Roger Waters then walked up on stage to start the show officially with The Happiest Days of Our Lives, which segued into, Another Brick in the Wall, Part 2. Roger Waters' solo song The Bravery Of Being Out Of Range called out recent US Presidents as War Criminals for things like the use of drone strikes. The first act would include a new Roger Waters song The Bar. The song was written during the pandemic lockdown period. This is Roger Waters explanation of the song.

The Bar is a place in my head, an imaginary place, but its also a real place. There are bars all over the world. In my head, its a place where you can maybe have a drink, certainly meet your friends, and hopefully meet strangers. You can exchange opinions with strangers and friends with no fear or favor, and its somewhere where you are welcome and can exchange your love for your fellow man without fear. There are two characters towards the end of this little bit of this song, and theyre two women. One of them is a homeless Black lady who lives in a cardboard box somewhere with a chihuahua. The other younger lady, a Lakota Sioux from North Dakota, sees this lady and decides to cross over and help her. She helps by bringing her to the bar, where we all look after her.

The first act would also see Pink Floyd classics like Wish You Were Here and Shine of You Crazy Diamond then close with Sheep before the show Intermission.

The second act would be hardest hitting. Run Like Hell would shine a light on the terrible story behind Chelsea Mannings leaked video of an US military attack on Iraqi civilians in Baghdad. It is a hard video to watch telling some awful truths about some of our own in the US military. First it was Rogers angry response to what happened, and it was also Rogers plea with the audience to get WikiLeaks founder Julian Assange set free from prison. Dj Vu would tackle tough issues as well with screens displaying Fuck the Supreme Court, Fuck Drones, and Fuck Your Guns. You could see the last one didnt sit too well with many in the crowd. Remember he warned you at the start of the show.

It was Pink Floyds Two Suns in the Sunset along with video animation that hit me the hardest. The video showed a van driving through an area that could be a forested area like we have in the Pacific Northwest. On that road, a van comes to a screeching halt, the driver gets out as he watches in horror as a nuclear bomb mushroom cloud goes up into the sky and now sees the fires of destruction are headed his way. It was a terrifying visual and one that could honestly happen with increased tensions in our world right now especially with Russia and Ukraine, Roger Waters argued that the US specifically Joe Biden and Vladimir Putin need to get together, have real talks, and bring an end to what is going on with Ukraine.

Roger Waters is very passionate about what he believes in. He continues to fight for the human rights of all people in our world and continues to use his musical theater as his way of getting his views through to the people. This Is Not a Drill delivers great music, amazing imagery and a hope for real changes to be made in our world.

Roger WatersThis Is Not a Drill (Tour 2022)Moda Center, Portland, OregonSeptember 10, 2022

Set OneComfortably Numb (Pink Floyd)The Happiest Days of Our Lives (Pink Floyd)Another Brick in the Wall, Part 2 (Pink Floyd)Another Brick in the Wall, Part 3 (Pink Floyd)The Powers That BeThe Bravery of Being Out of RangeThe Bar (new song)Have a Cigar (Pink Floyd)Wish You Were Here (Pink Floyd)Shine On You Crazy Diamond (Parts VI-IX) (Pink Floyd)Sheep (Pink Floyd)

Set TwoIn the Flesh (Pink Floyd)Run Like Hell (Pink Floyd)Dj VuDj Vu (Reprise)Is This the Life We Really Want?Money (Pink Floyd)Us and Them (Pink Floyd)Any Colour You Like (Pink Floyd)Brain Damage (Pink Floyd)Eclipse (Pink Floyd)Two Suns in the Sunset (Pink Floyd)The Bar (Reprise)Outside the Wall (Pink Floyd)

More here:

Roger Waters at the Moda Center on 09/10/22 - Oregon Music News

Life Sciences Increases its Doses of the Metaverse – RTInsights

The constellation of metaverse technologies includes extended reality, blockchain, artificial intelligence, digital twins, non-fungible tokens, and smart devices.

The potential value of the metaverse is still an uncertainty at best theres still more hype around it than there is real-life applications. However, thats not stopping one of the most research-intensive and cutting-edge industries life sciences from seriously studying leveraging components of the metaverse.

Thats the word from Accenture, which says the life sciences industry is getting bullish on the metaverse, with 91% of 100 medical technology and 85% of 100 biopharma executives anticipating metaverse-related technologies to have a positive impact on their industries. Such immersive technologies may play a role in helping to solve manufacturing and device problems, improve equity in clinical trial participation and build more resilient supply chains to provide patients and healthcare professionals with more personalized experiences.

The constellation of metaverse technologies includes extended reality, blockchain, artificial intelligence, digital twins, non-fungible tokens, and smart devices. According to the report, life sciences leaders (91% of medical technology executives and 85% biopharma executives) expect the metaverse to have a positive impact on their organizations, while nearly half of the biopharma executives surveyed believe the metaverse will have a breakthrough or transformational impact on their organizations.

See also: Quantum Computing Acceleration of AI in Pharma on the Rise

The Accenture report says metaverse capabilities are evolving from four different directions:

Data collection: The internet is being reimagined with the metaverse as a platform for digital experiences that provide boundless places where people can meet and interact, and Web3 is reinventing how data can be owned by individuals and moved with the person and not the platform, the reports authors said. In the future, a new generation of digital devices will integrate into the metaverse and could include smart technology in everyday objects like home appliances, and smart cars that provide salient data on healthy human behaviors along with medically regulated devices such as Donisi, which can simultaneously detect and analyze multiple bio-parameters.

Programmable physical assets: Nearly nine in 10 of the MedTech and biopharma executives surveyed believe that programming the physical environment will emerge as a competitive differentiation in their industry, the report states. Augmented reality, 5G, ambient computing, 3D printing, and smart materials are converging in sophisticated ways, turning the physical world into an environment that is as smart, customizable, and as programmable as the digital one.

Artificial intelligence and its supporting data: Unreal qualities that are becoming fundamental to artificial intelligence, and even data, making the synthetic seem authentic, the report states. Synthetic data is being used to train AI models in ways that real-world data practically cannot or should not. Synthetic data can represent patient datasets for use in research, training, or other applications. This realistic (yet unreal) data can be shared, maintaining the same statistical properties while protecting confidentiality and privacy. It can be developed to accommodate increased diversity to counter bias, thus overcoming the pitfalls of real-world data. More than nine-tenths of biopharma (92%) and MedTech (91%) executives report that their organization is dependent on AI technologies to function effectively.

Quantum leaps: The metaverse will be boosted by a new class of machines quantum computing stretching the boundaries of what computers can do, the Accenture analysts state. Problems once thought impossible to solve because they require computing large, complex datasets are now in the realm of the possible. Nearly all the surveyed biopharma (94%) and MedTech (96%) executives are looking to deploy quantum-level power when it becomes available, the survey shows.

Link:
Life Sciences Increases its Doses of the Metaverse - RTInsights

IIT Madras 1st Indian institution to ride on IBM quantum network – Awaz The Voice

Bengaluru

IIT-Madras has become the first Indian institution to join IBM's quantum network to advance quantum computing skills development and research in the country, the tech major announced on Monday.

IIT Madras' Centre for Quantum Information, Communication and Computing (CQuICC) will focus on advancing core algorithms in research areas like quantum machine learning, quantum optimisation and applications research in finance.

IBM said that IIT Madras will get cloud-based access to its most advanced quantum computing systems and quantum expertise to explore practical applications for businesses and the society.

"This collaboration with the IBM Quantum Network marks an exciting new phase for our Centre. It builds on our successful collaboration on quantum computing education, last year, and promises to open up new avenues and directions for research and innovation," said Dr Anil Prabhakar, professor, Department of Electrical Engineering, IIT Madras.

They will use IBM Quantum services alongside the open-source 'Qiskit' framework to explore areas such as quantum algorithms, quantum machine learning, quantum error correction and error mitigation, quantum tomography, and quantum chemistry, and to also advance and grow the quantum computing ecosystem in the country.

Researchers from IIT Madras will contribute to the advancement of research in the application of quantum computing with support from IBM Research India in such domains that are relevant to India. "The collaboration will open new avenues to work with industry partners to accelerate research, make quantum real and create a vibrant quantum ecosystem in India," said Sandip Patel, managing director, IBM India.

IBM and IIT Madras have a long association in education and research areas like Artificial Intelligence and Machine Learning.A Last year, IIT Madras joined IBM's Quantum Education Programme to provide its students and faculty access to IBM quantum learning resources, quantum tools, and quantum systems for education and research purposes.

ALSO READ: Faqir Chand Book Store: A slice of Peshawar in Delhi

IBM Quantum and IIT Madras also jointly offered a course on quantum computing on the NPTEL Platform to over 10,000 participants. "This collaboration with the IBM Quantum Network marks an exciting new phase for our Centre" said Dr Anil Prabhakar, professor, Department of Electrical Engineering, IIT Madras.

See more here:
IIT Madras 1st Indian institution to ride on IBM quantum network - Awaz The Voice

Amazon’s Ring video doorbells now have end-to-end encryption but they’re still unsafe – Mashable

Ring, everyone's least favorite technological narc, seems to be making steps to keep its footage secure.

The Amazon-owned home security system company now offers end-to-end encryption of the video and audio collected on its battery-powered video doorbells and security cameras. This comes about a year after it enabled end-to-end encryption on its plug-in devices.

End-to-end encryption prevents anyone from grabbing videos or messages as they travel between you and the person you're sending them to. That means it ensures that no one including hackers, government officials, or, ideally, the company that owns the device can read your message or watch your video while it's being sent.

This newly enabled privacy feature also means the video picked up from a Ring camera can only be accessible from the iOS or Android device linked to an owner's account. According to the Verge, if you have end-to-end encryption enabled on your Ring camera, no one but you can access the recorded footage. This change is basically increasing the security features on Ring, which already encrypts video and audio recordings by default when they're uploaded to the cloud or stored on Ring's servers.

"Even if law enforcement asked Ring, or its parent company Amazon, for the video, they couldn't provide it," according to the Verge. "Only the enrolled mobile device can unlock the video."

As Mashable previously explained, end-to-end encryption "basically takes your message, jumbles it up, sends it, and unjumbles it once it reaches your recipient. So anyone who tries to intercept your message in between you and your recipient just gets a bunch of mess instead of the message itself."

That doesn't mean your Ring video cameras are completely harmless or safe from bad actors, though. End-to-end encryption protects your privacy against anything trying to mess with your messages while they're in transit, but it doesn't protect the video metadata and also can't do anything about the recipient of your message sharing whatever information you send them.

And, ultimately, even with end-to-end encryption, there are plenty of problems tied to having a video camera doorbell like Ring.

See original here:
Amazon's Ring video doorbells now have end-to-end encryption but they're still unsafe - Mashable

Kingston Announces Hardware-Encrypted IronKey Keypad 200 USB Drive – Business Wire

FOUNTAIN VALLEY, Calif.--(BUSINESS WIRE)--Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., a world leader in memory products and technology solutions, today announced the release of the Kingston IronKey Keypad 200 (KP200), the industrys first drive to deliver the latest FIPS 140-3 Level 3 security for your data.

The IronKey Keypad 200 is built with robust protection and flexibility of use in mind offering XTS-AES 256-bit hardware-based encryption in a feature-rich and OS-independent alphanumeric keypad. KP200 incorporates a built-in rechargeable battery, so users can unlock the drive using the keypad for easy-to-use PIN access, without using software. Once unlocked, users can access their data by plugging the drive into any device that supports USB Type-A Flash storage, making it a plug-and-play device across IT ecosystems.

KP200 is FIPS-140-3 Level 3 (Pending) certified for military-grade security, and the drives circuitry is coated with tamper-evident, tough epoxy to prevent access to its internal components without damaging them. For another level of protection, the keypad is coated with a protective polymer layer to prevent the analysis of fingerprints on the keys.

KP200 supports a multi-PIN option, allowing the use of separate Admin or User PINs. KP200 locks the User PIN after ten failed login attempts, but if both PINs are enabled the Admin can be used to restore a User PIN and access to the drive. If the Admin PIN itself is incorrectly entered ten times in a row, the built-in Brute Force attack protection will crypto-erase the drive, permanently destroying the data and resetting the device. Additionally, KP200 can safeguard against malware from untrusted systems with two different Read-Only modes, empowering Admin to write-protect the drive during a specific session or globally across all User sessions.

The Kingston IronKey KP200 is the first drive to successfully pass certification lab testing for the latest FIPS 140-3 Level 3 military-grade security level from NIST, said Richard Kanadjian, encrypted unit manager at Kingston. With no need for software and ease of use of the keypad, KP200 is the best solution for those looking for flexibility while maintaining the highest-level security for storing sensitive data on the go.

KP200 adds security enhancements for FIPS 140-3 Level 3:

- Minimum PIN length goes from 7 to 8 digits (max is 15) for stronger PIN security- No factory-preset PIN User must set up PIN upon first use- Periodic self-testing to ensure fully-functional security features KP200 will shut down if a problem is detected- Automatic shutdown under excessive thermal and voltage conditions- Enhanced Random Number Generator to strengthen encryption key generation

The Kingston IronKey Keypad 200 has available storage capacities ranging from 8GB - 128GB and is backed by a limited three-year warranty, with free technical support, and the legendary Kingston reliability. For more information, visit kingston.com.

Kingston IronKey Keypad 200

Part Number

Capacity

IKKP200/8GB

8GB IronKey Keypad 200

IKKP200/16GB

16GB IronKey Keypad 200

IKKP200/32GB

32GB IronKey Keypad 200

IKKP200/64GB

64GB IronKey Keypad 200

IKKP200/128GB

128GB IronKey Keypad 200

Kingston IronKey Keypad 200 Features and Specifications:

Kingston IronKey Keypad 200 incorporates DataLock Secured Technology licensed from ClevX, LLC. http://www.clevx.com/patents

1 Some of the listed capacity on a flash storage device is used for formatting and other functions and thus is not available for data storage. As such, the actual available capacity for data storage is less than what is listed on the products. For more information, go to Kingstons Flash Memory Guide.2 Speed may vary due to host hardware, software, and usage.3 Product must be clean and dry before use.4 Compatible systems.

About Kingston Technology Company, Inc.

From big data, to laptops and PCs, to IoT-based devices like smart and wearable technology, to design-in and contract manufacturing, Kingston helps deliver the solutions used to live, work and play. The worlds largest PC makers and cloud-hosting companies depend on Kingston for their manufacturing needs, and our passion fuels the technology the world uses every day. We strive beyond our products to see the bigger picture, to meet the needs of our customers and offer solutions that make a difference. To learn more about how Kingston Is With You, visit Kingston.com.

See the original post:
Kingston Announces Hardware-Encrypted IronKey Keypad 200 USB Drive - Business Wire

Beware, That VPN May Not Be What You Think It Is – CNET

There are some excellent, well-tested virtual private networks we recommend you try. But if you're exploring the competitive market of VPNs on your own, you're likely to find some shoddy VPNs companies that scatter hints of their dubiousness everywhere they go. Learning to identify a few of these red flags can save you hours of research and a hefty annual subscription cost for supposedly getting connected to the internet more securely.

Is the price too good to be true? Has the company been caught keeping logs? How are your connection speeds?

To save you time, here are a few of the biggest red flags to watch out for when taking your new VPN out for a test drive. And on the flip side, here are three things to look for in a VPN.

Read more: Best iPhone VPN of 2022

There's no such thing as a free lunch. Maintaining the hardware and expertise needed for large VPN networks isn't cheap. As a VPN customer, you either pay for a premium service with your dollars, or you pay for free services with your usage data when it's collected by the free VPN and bargained away to advertisers or malicious actors.

As recently as August 2019, 90% of apps flagged as potentially unsafe in Top10VPN's investigation into free VPN ownership still posed a privacy risk to users. Free VPNs can also leave you open to quiet malware installation, pop-up ad barrages and brutally slow internet speeds.

Read more: Best Free VPN 2022: Try These Risk-Free Services for a Privacy Boost

If a VPN is caught keeping or sharing user activity logs, I won't recommend it. While most VPN services claim they don't track or keep logs of user activity, that claim can sometimes be impossible to verify. In other instances, the claim falls apart publicly when a VPN company hands over internet records to law enforcement.

The latter has happened in a few cases. EarthVPN, Hide My Ass VPN and PureVPN have all been clocked by privacy advocates for handing over logs to authorities, as hasIPVanish.

To be clear, it is entirely possible to be grateful for the arrest of reprehensible scumbags while ardently advocating for consumer privacy interests. My beef isn't with any VPN company helping cops catch a child abuser via usage logs; it's with any VPN company that lies to its customers about doing so. The lie that helps law enforcement in the US catch a legitimate criminal is the same lie that helps law enforcement in China arrest a person watching footage of the 1989 Tiananmen Square protests.

Ideally, the VPN you choose should have undergone -- and published the results of -- an independent third-party audit of its operations, including its use of activity logs.

Read more: All the VPN Terms You Need to Know

Now playing: Watch this: Top 5 Reasons to Use a VPN

2:42

Another red flag to watch for when choosing a VPN is shoddy encryption standards. Users should expect AES-256 encryption or better from VPN services. Nearly every web browser and app already uses AES, often touted as "military-grade" encryption, after it was adopted by the US government in 2002. If your VPN only offers PPTP and L2TP encryption, look elsewhere.

While you're snooping around for encryption details, keep an eye out for one of our favorite phrases, "Perfect Forward Secrecy." Those three little words can have a hefty impact on your privacy: If one of your VPN's servers is ever breached, Perfect Forward Secrecy ensures that any keys used to decrypt private internet traffic quickly become useless -- giving you more security.

Read more: How We Evaluate and Review VPNs

With just a little bit of elbow grease, any moderately skilled internet jerk can throw together a service that looks like a VPN but is actually little more than a proxy service reselling your internet bandwidth. Not only can that slow your internet speed, it could potentially leave you on the legal hook for whatever they do with that resold bandwidth.

Hola's case was the most famous. The company was caught in 2015 quietly stealing users' bandwidth and reselling it to whatever group wanted to deploy its user base as a botnet. Hola CEO Ofer Vilenski admitted it'd been had, but contended this harvesting of bandwidth was typical for this type of technology.

Read more:How to Set up a VPN on our iPhone or Android Phone: Yes, You Need One

"We assumed that by stating that Hola is a (peer-to-peer) network, it was clear that people were sharing their bandwidth with the community network in return for their free service," he wrote.

Nearly all VPNs slow your browsing speed, some by as much as half. But a brutal crawl can be a sign of something worse than a simple lack of servers. So if being pressed into service as part of a botnet isn't your cup of tea, double-check those suspiciously slow speeds and the reputation of the VPN you're paying for.

For more VPN buying advice, here's how to pick the right VPN for your work-from-home setup. Plus, why we don't recommend US-based VPNs, and three things a VPN can't help you with.

See the rest here:
Beware, That VPN May Not Be What You Think It Is - CNET

Comprehensive Analysis on Email Encryption Software Market based on types and application – NewsOrigins

Added A New Report On Email Encryption Software Market That Provides A Comprehensive Review Of This Industry With Respect To The Driving Forces Influencing The Market Size. Comprising The Current And Future Trends Defining The Dynamics Of This Industry Vertical, This Report Also Incorporates The Regional Landscape Of Email Encryption Software Market In Tandem With Its Competitive Terrain.

Theresearch reporton the Email Encryption Software market includes crucial information on recent events that will havean impact on the industry dynamics between 2022 and 2026, thereby assisting stakeholders and investors in making informed decisions. Additionally, it offers a thorough examination of the major market divisions, looks at the problems that rival firms confront, and place particular emphasis on the regional context.

In essence, the study presents a thorough analysis of the regional and competitive environments, along with relevant driving forces. Lastly, the impact of COVID-19 outbreak on this marketplaceisextensively documented.

Request Sample Copy of this Report @ https://www.newsorigins.com/request-sample/61564

Important pointers from COVID-19 impact analysis:

Regional analysis overview

Other crucial aspects in the Email Encryption Software market report:

FAQs

Key insights this study will provide:

Request Customization for This Report @ https://www.newsorigins.com/request-for-customization/61564

View post:
Comprehensive Analysis on Email Encryption Software Market based on types and application - NewsOrigins

What Is RCS Messaging and Why Is Google Pushing Apple To Use It? – Popular Mechanics

Constantine JohnnyGetty Images

To say we all text or at least know about texting is an understatement. Most of us use apps such as Apples iMessage for iPhone users or WhatsApp to send our messages. However, that doesnt mean the 1992-born classic SMS (short message service) is dead, even if Google wants it to be.

Dont miss our latest tech news. Learn more with usjoin Pop Mech Pro.

Cue up the RCS vs. SMS debate and Googles shaming of Apple, trying to persuade the digital giant to drop SMS altogether and join Android users in the RCS world. So whats the difference, you may ask. While we may all just see green and blue bubbles, theres more behind the scenes.

That 160-character limit, thats SMS. Debuting in 1992, SMS enabled mobile devices to do more than just talk. It introduced an entirely new world of communication with the text message. The limits of SMS are byproducts of its age, even with the early 2000s introduction of MMS (multimedia messaging service) that introduced the ability to send small files of multimedia (think low-resolution photos or video snippets). After all this time, you can point to many age-induced drawbacks of SMS: a limit on media types supported; no messaging with Wi-Fi since it relies on a cellular connection; and a frustrating mess of additional problems, such as difficulties with group chats, a lack of read receipts, and none of those fancy bouncing dots letting us know somebodys cooking up a new message.

Add the fact that SMS texts arent secure, and the billions of SMS messages sent every day in the U.S. alone causes concern about privacy more than features.

Because of the lack of encryption, hackers can search for weak points anywhere along the virtual path between the sender and receiver, which includes a ton of different network devices and computing systems at many different providersonly one of which needs to be exploited via technical vulnerability, misconfiguration, social engineering or insider attack, says Christopher Howell, CTO of Wickr.

Still, many of us send most of our messages in over the top applications such as WhatsApp, iMessage, WeChat and others, that use internet protocols rather than the cellular networks used by SMS to transmit messages. This adds a stiffer layer of encryption and security, but it also ups the ability to bring in feature-rich add-ons that make the messaging more modern, even if it requires the person youre messaging to be using the same service as you.

Call it a rich communication system. Or, RCS, for short. The GSM Association, a trade group representing mobile networks, spent more than a decade fine-tuning RCS before it made its official debut in 2016. Its an attempt to provide an app-like service for what was the SMS market. And Google has embraced it, saying that Android phones now running RCS can easily text as if they were in these feature-welcoming apps, sending high-resolution photos and videos, emoji reactions, end-to-end encryption (for individual, not group, conversations), read receipts, and more.

Google believes RCS solves the problems associated with SMS.

With its reliance on iMessage, Apple still offers SMS for texting features when you message outside of this app (i.e. when Apple users must resort to a green-bubble conversation with an Android user).

Google wants that to change, saying that Apple refusing to adopt the modern RCS standards is holding back the world of texting. In fact, Google has created an entire public relations campaignGet The Messagesurrounding that effort.

Everyone should be able to pick up their phone and have a secure, modern messaging experience, writes Elmar Weber, a Google engineer, as part of the campaign. Anyone who has a phone number should get that, and thats been lost a little bit because were still finding ourselves using outdated messaging systems.

Of course, Googles big push to persuade everyone else to adopt RCS is self-serving, since it has adopted RCS for its own Messages app. Apple has been either silent or non-committal on dropping SMS for RCS. Detractors of RCS say it may fix some issues, but doesnt solve them all. In fact, RCS comes with its own drawbacks, they say, such as the fact that end-to-end encryption only works in one-on-one conversations, and that RCS has a propensity for opening the doors to spam messages.

Add in Apples blue-bubble domination, and the company has no real incentive to play nicely outside of its own sphereand certainly not if it creates a more seamless transition away from an iPhone and into an Android device.

Of course, Apple isnt the only non-RCS giant out there. WhatsApp, basically the global leader in messaging apps outside of the United States, is non-RCS compliant. Google isnt going after them.

Benedict Evans, an independent technology analyst, wrote on Twitter that when a company that lost (and Google has lost messaging, but mostly to FB [Facebooks parent company Meta owns WhatsApp], not Apple) asks a company that won to adopt a standard that it doesnt look like anyone uses, one should probably be a little cynical.

See the article here:
What Is RCS Messaging and Why Is Google Pushing Apple To Use It? - Popular Mechanics

GUEST BLOG: Five steps to take when securing your data with multi-factor authentication – Military Embedded Systems

Blog

September 06, 2022

Computer data exists in different states at different times: data in transit (information flowing through a network); data in use (active data that is being accessed and manipulated by a computer program); and data-at-rest, known as DAR, or data that is physically housed in a storage device like a solid-state drive. Many cybersecurity solutions focus on securing data in transit and data in use, but neglect securing DAR.

President Bidens Executive Order on Improving the Nations Cybersecurity, enacted on May 12, 2021, directs all branches of the federal government to improve their resilience to cybersecurity threats. This order directly calls out the need to secure data-at-rest (DAR) with encryption and multi-factor authentication (MFA).

MFA requires a user to provide multiple pieces of evidence that combine to verify a users identity. Depending on the application, MFA may be required at login or perhaps when trying to access an application or even a particular folder or file. MFA combines two or more independent credentials: what the user knows (password, for example), what the user has (an authentication app, for example), and what the user is (biometric palm vein scan, for example). Since most MFA implementations use two factors, its often called two-factor authentication, or 2FA.

There are five important considerations when protecting your data with MFA.

1. Understand the sensitivity of your data:First, note that not all data is subject to the same levels of protection. In the U.S., since all federal departments are part of the executive branch, the data-classification system is governed by executive order rather than by law. As of 2009, information may currently be classified at one of three levels: confidential, secret, and top secret. Subsequent executive orders may change these classifications and the levels of protection associated with each classification.

2. Use self-encrypting drives:Sensitive data needs to be encrypted, executive orders notwithstanding. Self-encrypting drives (SEDs) encrypt data as its written to the drive, which has a self-contained drive encryption key (DEK). The key and encryption process are transparent to users.

SEDs encrypt everything on the drive, which is called full-disk encryption (FDE), including operating system (OS), applications, and data. On-drive encryption is called hardware FDE (HWFDE) and uses an embedded encryption engine (EE), which should provide 256-bit AES encryption.

An SED should adhere to the TCG Opal standard, a secure standard for managing encryption and decryption in the SED. SEDs are often certified to Federal Information Processing Standards (FIPS), developed by the National Institute of Standards and Technology (NIST). For example, a FIPS 140-2 L2 certification assures that the SEDs EE has been properly designed and secured; the L2 ensures that there is visible evidence of any attempt to physically tamper with the drive.

The National Information Assurance Partnership (NIAP) is responsible for the U.S. implementation of the Common Criteria (CC), an international standard (ISO/IEC 15408) for IT product security certification. CC is a framework that forms the basis for a government-driven certification scheme required by federal agencies and critical infrastructure.

3. Employ pre-boot authentication:A designated security officer or administrator will define the user roles and identity management used to authenticate access to the SED. The password security that forms part of an OS is notoriously weak and subject to hacking, so the first level of authorization acquisition (AA) should occur prior to the booting of the OS, in which case it is known as pre-boot authentication (PBA).

Each user should have an individually assigned password, which authorizes the SED to use its cryptographic key to unlock the data. The security officer should have the ability to add new users and revoke access to existing users. When a users access is revoked, that user wont even be able to boot the OS.

A more robust PBA implementation will include MFA.

4. Multi-factor authentication methods:In addition to a username/password, MFA requires another form of authentication. One approach is to use a security dongle, such as a YubiKey, containing a license key or some other cryptographic protection mechanism that the user plugs into a device USB port. The U.S. Department of Defense (DoD), including civilian employees and contractor personnel, uses a smartcard called the common access card (CAC), in which case the computer must be equipped with a physical card reader.

Other MFA methods include applications, often on smartphones, that provide a one-time code synced to the device or system asking for authentication. Also taking advantage of the ubiquity of smartphones is an SMS-based system that will include a one-time code in a text message.

5. Provide the ability to destroy the data:There are various scenarios in which it may be necessary to destroy any data stored on the SED. A benign case is when an organization decides to upgrade its computers and/or drives, transfer computers and/or drives within the organization, or dispose of or recycle the computers and/or drives outside the organization. A worst-case scenario is when an unauthorized entity gains control of the drive with the intent of accessing the data.

Using standard operating system-based delete functions to remove files and folders is not sufficient because experienced hackers can still retrieve some or all the data. SEDs that are used to store confidential data should support special hardware functions to perform secure erase (write zeroes into every area where data is stored on the drive) and crypto erase (wipe any cryptographic keys stored on the drive, thereby rendering any encrypted data stored on the drive unreadable and useless to a bad actor).

To address the worst-case scenario, the organizations designated security officer should have the ability to define erase procedures to be automatically initiated by the drive itself; for example, failing AA a specified number of times should cause the drive to self-erase.

In the case of a SED equipped with appropriate PBA, any data stored on the disk will essentially be invisible until AA has taken place, thereby preventing bad actors from cloning the drive to circumvent the restricted number of permitted attempts at AA.

To sum up

Some organizations mistakenly assume that employing MFA such as fingerprint scans or facial recognition after the OS has booted offers a high level of confidence. However, once the OS has booted, any data on its drives is exposed to sophisticated hackers or potentially nation-state bad actors.

The highest levels of confidence and security are achieved by using MFA as part of a PBA environment implemented using HWFDE realized on a FIPS + CC certified and validated SED. (Figure 1.)

[Figure 1|An example of a secure solid-state drive, part of the Citadel family of secure data storage. Photo courtesy CDSG.]

CDSG directorof marketing Chris Kruell leads the sphere of marketing activities, including corporate branding, corporate and marketing communications, product marketing, marketing programs, and marketing strategy. Chris previously was VPofmarketing at ERP-Link and hardware startup Lightfleet. He was a marketing director at Sun Microsystems andheldseveral marketing positions in the high-tech industry. Chris holds a BSdegree from Cornell University and an MA degree from Hamline University.

CDSG (CRU Data Security Group) https://cdsg.com/

Read more here:
GUEST BLOG: Five steps to take when securing your data with multi-factor authentication - Military Embedded Systems