Elon Musk blames communism in schools and universities for strained relationship with daughter – indy100

Elon Musk has blamed "full-on communism" in schools and universities for his estranged relationship with his daughter.

Speaking with the Financial Times as part of its "Lunch with the FT" series published on Friday (October 7), the Tesla and Space X CEO discussed politics and described his political views as moderate.

The publication noted he is "considering setting up 'the Super Moderate Super Pac' to support candidates with moderate views."

Sign up to our free Indy100 weekly newsletter

After this, the political discussion then moved on as the publication noted Musk's belief that his strained relationship with his teenage daughter is down to the left-wing elite schools and universities in the US (though didn't specify which ones).

Its full-on communism . . . and a general sentiment that if youre rich, youre evil, Musk told the FT. It [the relationship] may change, but I have very good relationships with all the others [children].

"Cant win them all," he concluded on the matter.

In April, Musk's 18-year-old daughter Vivian filed for a name change in Los Angeles and also requested for her gender to be changed on her birth certificate.

The reason his daughter gave behind her name change was that she didn't want "to be related to my biological father in any way, shape or form."

Ahead of publishing a story on his daughter's name change, The Daily Beast approached Musk for comment where he responded: "Please dont out someone against their will its not right.

"She does not want to be a public figure. I think it is important to defend her right to privacy."

Meanwhile, Musk has previously been criticised for previously tweeting that "pronouns suck and added they are an "aesthetic nightmare," which many slammed as transphobic.

In June, Chelsea Manning slammed Musk for a tweet that "seemed transphobic."

Have your say in our news democracy. Click the upvote icon at the top of the page to help raise this article through the indy100 rankings.

The rest is here:
Elon Musk blames communism in schools and universities for strained relationship with daughter - indy100

Elon Musk And Grimes Relationship Timeline: All About Their On-And-Off Dating – TheTealMango

In recent history, few celebrity couples have been more unexpected than the pairing of the musical genius Grimes and the Tesla founder Elon Musk, considered one of the worlds highest-earning individuals.

One of the most fun aspects of watching the love story of these two is trying to figure out whether they are coming together as a couple or whether they are not at any particular time during the story. At the 2018 Met Gala, Grimes and Musk made a stunning debut in front of the public as a couple making their official public debuts.

It has been revealed that the couple welcomed their first child together in May 2020 a son, X Eight Sider Musk, who was called X, and a daughter, Y, who was named Y in December 2021. Upon Grimes tweet of a breakup clarification on March 11 this year, a report was released stating that Grimes had started dating the infamous leaker Chelsea Manning. However, both celebs have been seen to be friendly with one another on Twitter, as observers have noticed.

As a former U.S. soldier, activist, and whistleblower, Manning is well known for releasing secret military documents in 2010 that were made public via WikiLeaks. In 2017, Manning was released after serving seven years in prison.

During their relationship, Musk and Grimes have both experienced ups and downs.

Since their romance began in 2018, the pair have remained dedicated to one another through various means, including unfollowing each other on Instagram and posing for a photo shoot where Grimes reads The Communist Manifesto shortly after their semi-separation.

Here is what they had in common to provide a timeline of Grimes and Musks relationship.

It is no secret that Musk was always a fan of Grimes work even before they became romantically involved. As a result, he tweeted on March 31 of this year a link to the video she had released for the single Venus Fly, on which she collaborated with Janelle Mona back in 2015.

He called it one of the best music videos he has seen in the last few months. Even though the artist did not publicly reply when he praised him, it didnt matter when they ended up talking about the matter when they finally managed to get in touch.

According to a media report, Musk and Grimes met through Twitter at the beginning of April and reportedly began a casual dating relationship at the end of April. According to reports, the pair formed a bond over a game called Rokos Basilisk, which is a game about artificial intelligence.

According to a source, Elon Musk was looking into the idea of joking about Rococo Basilisk, and when he noticed that Grimes had already made jokes about it, he decided to reach out to her about it. According to Grimes, the trick was understood for the first time in three years, who said the joke had not been understood for years. Both of them were poking fun at artificial intelligence at the same time.

It was news that shocked the world when Grimes and Musk announced their union in May 2018 when they announced their union during one of the worlds biggest public platforms of the year, the Met Gala, one of the worlds most glamorous events. In addition to the musicians Tesla choker, a bold way to make a statement about the couples relationship, the couple walked the red carpet together in custom-made looks and accessories.

There was also an after-party for Rihannas Met Gala that the couple attended together. To date, Grimes and Musk have only appeared together in public once, making this their first public appearance together.

Grimes spoke about her relationship with Musk for the first time in an interview with The Wall Street Journal, where she admitted that she was unprepared and unprepared to be subjected to such intense scrutiny from the media associated with the relationship.

As stated in the statement, she said, just thought I could keep going along in my funny little way, and then you casually respond to someone in a tweet, and its on Fox News, and youre like, Ugh, you know? So that was an alarming moment.

After dating Musk for over a year and a half, Grimes and Musk announced on January 8, 2020, that they had announced their pregnancy and that they would be awaiting the birth of their first child together. So it was only fitting that Grimes announced her inspiring news in the most fantastic way possible, posting an image of her sonogram that was photoshopped on top of a topless selfie of her baby bump on Instagram.

A short time later, Instagram removed the post, which resulted in her reposting an edited image where her braids cover most of her nakedness. Censored for insta haha almost got away w it, she captioned.

Musks son, Xavier Musk, joined the family on May 4, with his name being announced as Xavier A-12 Musk via an announcement tweet, which Musk posted shortly after the birth. Thats the name he was given at birth, although California does not allow a number to be used as part of a birth name.

So they eventually decided that it was better to change his legal name to X L A X II Musk by simply substituting the 12 with the Roman numerals corresponding to his birth date. Musk then shared a picture of the baby on the same day and a photo of his face, which had been photoshopped with a face tattoo that he had not explained for whatever reason.

Whenever Musk is in the middle of a crisis on Twitter, he is constantly forced to step in to save himself, but there was once when even Grimes stepped in. It was on July 24 that he tweeted the words Pronouns suck in reply to him, which the musician deleted the answer. I love you but please turn off ur phone or give me a [c]all, she wrote. I cannot support hate. Please stop this. I know this isnt your heart. As a result, they both unfollowed each other on Twitter.

There was an exclusive interview with Musk published by the New York Times the next day, where he clarified that the couple was happy together, even though she had been taking care of most of the baby care duties.

Grimes attended a sketch on Saturday Night Live, where she appeared in a role as Princess Peach opposite Musks Wario, who was on trial for killing Mario on Saturday. This was Musks first time hosting an episode featuring Miley Cyrus as the musical guest on May 8, and it was a privilege for her to be in Studio 8H to support her beau, as well as appear in a sketch as Princess Peach, who was facing Musks Wario in a courtroom.

In the days following the show, Musk took to Twitter in an attempt to reveal that the Nintendo-themed drawing was his favorite.

As reports of a split between Musk and Grimes began to circulate, it was reported on September 24 that Musk and Grimes had been semi-separated after dating for an extended period. It was clarified by him, however, that they are still in love with one another, see each other frequently, and have a good relationship, especially when it comes to co-parenting, and they are on good terms.

My work at SpaceX and Tesla requires me to be primarily in Texas or traveling overseas, and her work is primarily in L.A. Shes staying with me now, and Baby X is in the adjacent room. According to him.

By avoiding the publicity surrounding Grimes and Musks second pregnancy, the couple managed to keep their babys arrival a secret because Grimes and Musk avoided the public eye, which meant they could conceal her birth from the public.

The news was first revealed in Vanity Fairs March 10, 2022, cover story, in which it was revealed that Grimes had never planned to disclose Y to the world and that she was likely to remain a secret to this day if she hadnt started crying during her in-person interview at her empty home, as she did during the interview itself.

Upon the daughters birth, Grimes spoke about the relationship between her and Musk, saying the two had reconciled and that she had relocated to Austin with Musk to co-parent with him without putting any labels on the relationship.

After the publication of the cover story for Vanity Fair, Grimes took to Twitter to elaborate on a couple of things, including her status regarding Musks current relationship. Me and E have broken up again since the writing of this article haha, but hes my best friend and the love of my life, and my life and art are forever dedicated to The Mission now, as she put it.

As a follow-up to her initial tweet, she explained that she aimed to make humanity more sustainable, make it a multi-planetary species, and preserve any consciousness it might have.

There is such confusion in the relationship between this great couple. The two are not yet together, but many fans have seen them conversing on Twitter while they are apart. The singer shared a picture of her daughter wearing a pink headband and a black dress.

Do you think they make a good couple? Would you mind telling me what you think about their relationship? Please let us know in the comments section.

Read more here:
Elon Musk And Grimes Relationship Timeline: All About Their On-And-Off Dating - TheTealMango

Cracking the code of cryptography and life The Irish Times – The Irish Times

Think about the humble envelope. For centuries this paper enclosure has shielded important information from prying eyes that might otherwise steal a glance at an unprotected note. Also, by placing information in an envelope, the sender effectively commits to and freezes this information until it gets to the recipient, assuming it is not tampered with or altered on its journey.

This system of secrecy served us well for centuries in an analogue world, but what about the digital environment in which we now communicate, shop and bank? Enter modern cryptography, which is the subject of this years Royal Irish Academy Hamilton Lecture by Israeli mathematician and computer scientist Prof Avi Wigderson. He will deliver his talk Cryptography: Secrets and Lies, Knowledge and Trust later this month at Trinity College Dublin.

Mathematician Avi Wigderson

Cryptography is nothing new, of course for centuries people have encoded information to scramble its contents, which can then be deciphered or unscrambled by a recipient who knows the key or rules to breaking that code. But cryptography developed a new dimension towards the end of the 20th century thanks to the marriage of computing power and complexity theory, and Wigderson has helped to shape its power.

Hard to solve, easy to verify

Imagine a tough Sudoku puzzle or a tough mathematical problem, he says. Most people may not be able to solve these, but if they saw the correct answer they could check and verify that it was correct. Such problems are of extreme importance in complexity theory.

Modern cryptography often makes use of such hard problems; difficult to solve but relatively easy to verify once solved, explains Wigderson, who is Herbert H Maass professor of mathematics at the School of Mathematics the Institute for Advanced Study, Princeton, New Jersey.

About 40 years ago, people started understanding that introducing computational complexity, namely the fact that some problems are easy and some are hard for us and for computers, could be used as a basis for cryptography, he says.

Cloaking information in such hard-to-solve problems is akin to the sender sealing the envelope in the analogue world. Here one uses specific hard problems with extra structure such as factoring integers into primes which enable encoding any number by another which, like an envelope, obscures the original to anyone else, but commits the encoder to that value, he says.

In a similar way tough mathematical problems can shield information as it travels digitally, and the solutions can be rapidly verified when the information lands.

That complexity-based approach provides a system for secrecy without the need for physical means, and it allows us to do many more things than just send secret messages around, says Wigderson. You can use it to protect a vast array of transactions you might want to carry out in a digital world, and it led eventually to the revolution of online shopping and internet security.

Hamiltonian paths

Much like cryptography, the notion of hard-to-solve problems is not new. Irish mathematician William Rowan Hamilton, after whom the Hamilton Lecture is named, made contributions to the field in the 19th century, particularly with his exploration of Hamiltonian Paths, Wigderson says.

Think of a map with several cities on it, he says. Can you trace an unbroken route through those cities and visit each city only once? If there are 1,000 cities on this map, then it becomes a very hard problem to solve you seem to need to try all possible routes an astronomical number.

But if a solution, namely a route, is provided, then you can look at the map and quickly check that no city has been visited twice in the unbroken route. This was the kind of hard-to-solve but easy-to-verify problem that Hamilton explored. Today we know it to be a prototypical example of problems of this type it is as hard as any of them.

The mystery of A to B

One of the great mysteries of the field of complexity is what goes on between point A and point B, where some seemingly hard problems are solved. This, he says, has ramifications for questions far beyond cryptography, including climate, neuroscience, artificial intelligence and medicine.

How do you explain why a particular drug works to cure a disease, or how actions in the atmosphere affect weather and climate, or how a thought is generated in the brain, or how a neural network can beat a world champion at chess, he asks. It may be easy to verify that these things happen, but how do they happen?

Nor can we explain exactly how scientific luminaries such as Newton, Hamilton, Pasteur and Einstein came up with their insights and theories, he adds. They were extremely successful in explaining things that people hundreds and thousands of years before them couldnt explain that way, Wigderson points out. They came up with something that it seems was much easier to verify than to find.

Complexity and curiosity

He distinguishes between the questions of finding an algorithm that works, and the question of how it works. I think many people would be extremely happy if some black box would solve all their problems, making them happy and healthy and living for 100 years, even if they didnt quite understand how this algorithm came up with it, he says. I think that would be big progress.

But Wigderson, who in 2021 shared the prestigious Abel Prize with Lszl Lovsz for their foundational contributions to theoretical computer science and discrete mathematics, and their leading role in shaping them into central fields of modern mathematics, also wants to understand the how of the complexity that underpins outcomes. And his drive is simple: he is curious. I think it is the most natural thing in the world to want to understand how everything happens.

That curiosity continues to drive Wigderson: I am totally fascinated by computation and what it can and cannot do. And by computation, I do not necessarily mean computers; every physical and natural process that happens ocean waves or the weather or the evolution of growth of embryo in the uterus, or the leaves on a plant or the formation of seashells or viruses causing disease all these processes are computations, in that they evolve in a sequence of simple, local steps like a computer programme.

Taking a computational approach to the natural world can yield important insights, Wigderson believes. We saw in the 1950s how Alan Turing, a mathematician famous for deciphering code, proposed a simple model that shows how patterns such as spots and stripes on animals skin can evolve. Working with computation and complexity you can get profound insights into the natural world and many of the issues that are facing us today, and I find that fascinating.

Hamilton Lecture 2022

Prof Avi Wigderson of the Institute for Advanced Study, Princeton University will deliver the 2022 RIA Hamilton Lecture on Cryptography: Secrets and Lies, Knowledge and Trust on Monday, October 17th, 2022 at 6pm-7.30pm. Tickets are free

Originally posted here:
Cracking the code of cryptography and life The Irish Times - The Irish Times

Dutch influence standards for post-quantum cryptography – ComputerWeekly.com

The US National Institute of Standards and Technology (NIST) has chosen the first group of encryption tools designed to withstand the attack of a future quantum computer, which could potentially crack the security used to protect privacy in the digital systems we rely on today.

Lo Ducas, senior researcher in the cryptology group at the Netherlands Centrum Wiskunde & Informatica (CWI),the national research institute for mathematics and computer science, is involved in the two most important algorithms of the upcoming NIST portfolio one for public key encryption and one for digital signatures.

According to Ducas, who is also a professor at the University of Leiden, these new standards are inevitable because there is nervousness about the arrival of quantum computing. We know quantum computing will not be rife tomorrow, but this standardisation procedure and its deployment take time, he said. Obviously there is certain sensitive information that needs to be secure and confidential not just at present, but in the future as well. Take state secrets, for instance.

Cyber security experts have warned that hackers are stealing data now to decrypt it in the future, when quantum computing could render modern encryption methods obsolete. A report published by NIST in April 2016 cited experts that acknowledged the possibility of quantum technology rendering the commonly used RSA algorithm insecure by 2030. We need to be ready for that, said Ducas. This means we have to anticipate now.

The announcement of the chosen tools follows a six-year effort managed by NIST, which started in 2016 with a call for the worlds cryptographers to devise and then vet encryption methods that could resist an attack from a future quantum computer. A total of 23 signature schemes and 59 encryption schemes were submitted, of which 69 were deemed complete and proper. The NIST competition consists of four rounds, during which some schemes are discarded and others studied more closely.

In July this year, NIST announced the first group of winners from its competition, which included Crystals-Kyber and Crystals-Dilithium, both developed by an international collaboration in which CWI participated. Other team members are ENS Lyon, Radboud University, Ruhr University Bochum, University of Waterloo, IBM, NXP, ARM, SRI International, Florida Atlantic University and Tsinghua University.

It was a rather big team, but that was the key aspect, said Ducas. It consisted of both industrial and academic people, and all their knowledge was necessary to develop the algorithms we have. Take NXP, for example they build chips and already use cryptology to embed in those chips. We needed their knowledge for the design, because it is essential that what we develop not only fits into devices like smartphones and laptops, but also in other places where chips are being used, like in the automotive industry. Fitting cryptology can be a big challenge.

Apart from the two algorithms in which CWI was involved, two further algorithms for signatures were selected by NIST Falcon and Sphincs+. Sphincs+ also was partially conceived in the Netherlands, led by Andreas Hsling from TU Eindhoven.

Ducas added: The selection of our schemes as a standard means that it will be deployed globally, protecting the privacy of billions of users. Fundamental research rarely gets such a direct and broad impact. The credit should go to the whole cryptographic research community. Whe schemes we proposed are merely the crystallisation of decades of scientific effort.

The algorithms developed by the international team are based on lattices, one of Ducas specialities. Both were designed together and share more than just the same mathematical platform, he said. We tried to make them look alike, so they will be easy to implement together. The Falcon algorithm designed for signatures also uses a lattice platform.

But that is where the similarity ends, said Ducas. This algorithm has different advantages and drawbacks.

One of his biggest concerns is that this algorithm computes with floating point numbers, as opposed to integers. Computers are obviously equipped to do this, but it is a real challenge for cryptology, said Ducas. Rounding can differ from computer to computer, so it has challenges for implementation. But because of its shorter keys, it was also selected for the NIST portfolio.

Now the four algorithms have been selected, they need to be written down into proper standards. This is obviously where NIST comes in, whereas we are mainly academics and technicians, said Ducas. NIST will draft up the ultimate text for the standard, but it will be in coordination with us.

NIST hopes to publish the standardisation documents by 2024 but, according to Wikipedia, may speed up the process if there are major breakthroughs in quantum computing.

After the release of the standards, the industry needs to be pushed to put them to use, said Ducas. I have a suspicion that most companies will want to be post-quantum resistant, so I think these standards will be easier to push than, for example, the hash function update from SHA-1 to SHA-2, he said. Moreover, I think IBM and NXP will incorporate their own designs within their own products.

Eventually, NIST is pushing the core of the new standard, the mathematical knowledge, but on top of that, there are a lot of things that are involved, like protocols, documentation, and so on. It might even evolve into an ISO standard, who knows, but NIST is leading the crowd.

So, will the new standards ensure we will be safe from quantum computers ability to possibly crack the RSA encryption? This is related to the P versus NP problem, said Ducas. The best guarantee we can have are the years of documented failures. This is the case with existing cryptology, and still is the case with post-quantum cryptology.

There is reasonable confidence to deploy, but no absolute mathematical guarantee. This is why we often say that cryptographers seldom sleep at night.

Read more from the original source:
Dutch influence standards for post-quantum cryptography - ComputerWeekly.com

OPPO joins the FIDO Alliance, accelerating the arrival of a new era of passwordless sign-ins – Yahoo Finance

The replacement of traditional password-based authentication mechanisms with leading passwordless technology will allow OPPO users to benefit from faster, more convenient, and more secure logins across different accounts, services, and platforms

DUBAI, UAE, Oct. 14, 2022 /PRNewswire/ -- OPPO recently announced that it has joined the FIDO (Fast IDentity Online) Alliance, an open industry association with a mission to develop authentication standards that reduce the world's over-reliance on traditional passwords. As a member of the Alliance, OPPO will support the development and implementation of the latest FIDO standards for passwordless logins, utilizing basic public passkey cryptography and the protocols defined by FIDO, to provide users with a fast, user-friendly, and secure sign-in experiences across services.

OPPO joins the FIDO Alliance (PRNewsfoto/OPPO)

Today's average internet user has dozens of online accounts, making managing large numbers of passwords a very time-consuming and frustrating task for both users and organizations. At the same time, password-only authentication methods suffer a few severe setbacks from high administration costs involved in changing and resetting user passwords to the considerable security risks from weak passwords and password reuse across multiple accounts. As such, there have been calls across the technology industry to move towards a sign-in mechanism that can mitigate the reliance on passwords or even replace them entirely.

Founded in 2012 to help reduce the world's over-reliance on passwords, the FIDO Alliance works to develop standards for password-free identity authentication and login for websites, services, and applications worldwide. The Alliance's latest authentication specification, FIDO2, provides a secure and convenient technical framework supported by companies including Google, Microsoft, and Qualcomm.

Following its entry into the FIDO Alliance, OPPO will actively use FIDO standards across its smart devices and work on optimizing user experiences and improving authentication security. In the future, users can use OPPO smartphones to work as a "passkey" to log in to different services across browsers, apps, and platforms, which helps create a seamless connected experience. When using multiple smart devices, users can automatically access their FIDO credentials on the core OPPO device without re-enrolling every account on other OS platforms or browsers.

Story continues

As a member of the FIDO Alliance, OPPO will also join the different technical and regional FIDO working groups, through which OPPO will make technical contributions to bringing password-free login technology to more use cases and services.

In the digital world, greater information flows lead to greater security challenges. Through its brand proposition of "Inspiration Ahead," OPPO will work with partners across the industry to create more secure and convenient password-free connected experiences that enable new intelligent experiences for more users.

About OPPO

OPPOis a leading global technology brand since 2004, dedicated to providing products that seamlessly combines art and innovative technology.

OPPO is on a mission to build a multiple-access smart device ecosystemfor the era of intelligent connectivity. The smartphone deviceshave simply been a gateway for OPPO to deliver a diverse portfolio of smart and frontier technologies in hardware, software and system. In 2019, OPPO launched a $7 Billion US Dollar three-year investment plan in R&D to develop core technologies furthering design through technology.

OPPOis firmly pursuing the creation of the best technology products and technological artistry for global users. Based on the brand elements of leading, young and beautiful, OPPO dedicates to the mission of letting extraordinary users enjoy the beauty of technology.

For the last 10 years, OPPO has focused on manufacturing smartphoneswith camera capabilities that are second to none. OPPO launched the first mobile phone, the Smile Phone, in 2008, which marked the launch of the brand's epic journey in exploring and pioneering extraordinary technology. Over the years, OPPO has built a tradition of being number one, which became a reality through inventing the world's first rotating camera smartphoneway back in 2013, launching the world's then thinnest smartphone in 2014, being the first to introduce 5X Zoom 'Periscope' camera technology and developing the first 5G commercial smartphonein Europe.

Today, OPPO was ranked as the number four smartphone brand globally. OPPO brings the aesthetics of technology to global consumers through the ColorOS system Experience, and Internet services like OPPO Cloud and OPPO+.

OPPO's business covers 60 countries and regions, with more than 40,000 dedicated employees to create a better life for customers around the world.

About OPPO MEA

OPPO started its journey in the Middle East and Africa (MEA) region in 2015 after setting up its regional office in Egypt. Following the immense success of the brand's sales centre in Cairo in the first year, OPPO accelerated its expansion plan across the MEA region and inaugurated its country operations in the UAE in 2019. Now OPPO is physically present in more than 14 markets across the region, including Egypt, Algeria, Tunisia, Morocco, Bahrain, Saudi Arabia, UAE, Oman, Kuwait, Qatar, Kenya, Nigeria, South Africa and the Levant.

To empower its presence in the region in line with its product localisation strategy, OPPO further invested in MENA and set up its very own factory in Algeria in 2017, thus, becoming the first Chinese brand to build a manufacturing premise in North Africa. Based on insights of local consumers in each country, OPPO has evolved the progress of product localisation, taking into consideration several perspectives towards each market, including product localisation, to further meet the core needs of users; marketing localisation, to better communicate with local young customers; and talent localisation, to understand local consumers further and provide optimum customer service.

Within the last year, OPPO has started to adjust its product line in the Middle East region specifically. This has included the launch of its flagship OPPO Find X Series and the introduction of the OPPO Reno Series. OPPO will continue to evolve its local product line to offer more premium series to consumers in the region.

A forward-thinking international technology company, OPPO strives to be a sustainable company that contributes to a better world and has enacted positive change in every way possible through activating local community initiatives and humanitarian, and charity campaigns.

Photo - https://mma.prnewswire.com/media/1921432/OPPO_joins_the_FIDO_Alliance.jpgLogo - https://mma.prnewswire.com/media/1451542/OPPO_Logo.jpg

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/oppo-joins-the-fido-alliance-accelerating-the-arrival-of-a-new-era-of-passwordless-sign-ins-301649591.html

SOURCE OPPO

See the original post here:
OPPO joins the FIDO Alliance, accelerating the arrival of a new era of passwordless sign-ins - Yahoo Finance

Yale increases investment in blockchain research – Yale Daily News

Yale, which was ranked 34 in Coindesks 2022 Best Universities for Blockchain, has invested significantly in the rapidly growing field.

Alex Ye 12:08 am, Oct 12, 2022

Staff Reporter

Zoe Berg, Senior Photographer

This time last year, Yale was unranked in CoinDesks Best Universities for Blockchain. A year later the University places 34th overall, on par with Harvard and other major universities around the world.

The reports results recognize Yales recent significant investments into blockchain research, including the hiring of four new blockchain experts to the Computer Science faculty, Ben Fisch, Charalampos Papamanthou, Katerina Sotiraki and Fan Zhang one of whom is leading a project that has received a $5.75 million grant for blockchain development.

In the last few years, blockchain, as an interdisciplinary field, has spurred a huge amount of development in distributed systems and cryptography and their intersection, said Fisch. This is also why its such a fascinating academic topic, because it ties together so many different fields, not only from computer science, but also from economics, law and policy. Yale has a very unique combination of strengths in all these different areas, especially at present.

In August, Yale blockchain researchers accepted a $5.75 million grant from the Algorand Foundation, a not-for-profit organization focused on the development of blockchain technology.

The grant will support PAVE: A Center for Privacy, Accountability, Verification and Economics of Blockchain Systems, which will be led by Papamanthou. PAVE will bring together a cross-disciplinary team of experts from four institutions Yale, Columbia University, the City College of New York and the Swiss Federal Institute of Technology Lausanne, with Yale being the leading institution to advance research of blockchain systems.

Apart from the technical agenda, PAVE will also host hackathons, symposiums and blockchain summer schools.

The expansion of blockchain research at Yale coincides with the rise of the blockchain technology market. The value of blockchain technology in the banking, financial services and insurance sector market is expected to grow by $4.02 billion between 2021 and 2026, according to Technavio. The Technavio study found that easier access to technology and disintermediation of banking services will create more growth opportunities within the industry.

Papamanthou believes the hirings acknowledged the importance of blockchain, and that the University has more generally acknowledged the interdisciplinary nature of the blockchain space. He emphasized the University provides opportunities to explore the blockchain industry, such as interdisciplinary majors like computer science and economics.

Papamanthou spotlighted the newly established Roberts Innovation Fund created by the School of Engineering and Applied Sciences, which assists blockchain projects that could be commercialized through funding and mentoring.

An increasing number of students are interested in the field of blockchain, according to Mariam Alaverdian 23, president of the Yale Blockchain Club.

Alaverdian explained that because of the many applications of blockchain technology from personal identity security to healthcare to money transfers the emergence of blockchain into our lives is inevitable. She added that the Yale Blockchain Club has seen interested students come from a variety of backgrounds, with some having no prior exposure and others who already have startups in the space.

The Yale Blockchain Club started last spring and we received a lot of attention from Yale undergraduate and graduate students, Alaverdian wrote in an email to the News. We had 600 people sign up for our mailing list within a couple of weeks there is definitely a high demand from Yale students for educational materials and guidance.

As the blockchain industry has continued to grow, Yale has been a fierce advocate for blockchain research and development, Papamanthou noted.

Papamanthou explained that because Yales faculty is now made up of leaders in the field of

distributed computing and cryptography, the potential blockchain innovation at Yale could be unprecedented.

Its amazing that Yale has hired two phenomenal professors, Ben Fisch and Fan Zhang, whose research focuses on aspects of blockchains, said Roshan Palakkal 25, a student in Frontiers of Blockchain Research, a course taught by Fisch. Yale CS typically isnt known to be the best, but I think the new classes and faculty have positioned it to become one of the best universities for blockchain, with lots of potential for interdisciplinary collaboration in areas like economics, global affairs, and public policy.

Papamanthou added that students who are interested in blockchain have access to a variety of courses across the Computer Science and Economics Departments, as well as at the Yale School of Management and Yale Law School.

According to Fisch, from a computer science perspective, Yale is educationally competitive with any other university in the field of blockchain.

I will be offering a course in the spring that is comparable to the blockchain course thats offered by Stanford, Fisch said. And the research seminar that Im teaching now is uncommon at other universities, as it really goes in depth at a graduate level into all the most recent research topics that are being worked on currently.

The Yale Computer Science Department is located at 51 Prospect St.

Alex Ye covers faculty and academics. He previously covered the endowment, finance and donations. Originally from Cincinnati, Ohio, he is a sophomore in Timothy Dwight majoring in applied mathematics.

Here is the original post:
Yale increases investment in blockchain research - Yale Daily News

Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution – Business Wire

SCOTTSVILLE, Va.--(BUSINESS WIRE)--Castle Shield Holdings, LLC., a leader in Zero Trust and cybersecurity solutions, today announced that its Aeolus VPN solution now supports additional post-quantum cryptography (PQC) algorithms selected by the National Institute of Standards and Technology (NIST).

Last year, prior to the conclusion of the third round of the NIST PQC Standardization, we announced the successful integration of the Saber algorithm into Aeolus VPN. Reference our October 11, 2021, press release.

NIST has now selected two primary PQC algorithms for most use cases: CRYSTALS-KYBER and CRYSTALS-Dilithium. In addition, the signature schemes FALCON and SPHINCS+ were standardized as well. Kyber and Dilithium were both selected for their strong security and excellent performance, and NIST expects them to work well in most applications. Therefore, we have integrated Kyber (i.e., Kyber1024) and Dilithium (i.e., Dilithium5) algorithms into Aeolus VPN as well.

Aeolus VPN protects data between two or more network points. It offers a streamlined approach to privacy which results in more stability and lower latency that is a perfect addition to enterprise data-in-motion security for both classic and post-quantum computing environments. Aeolus VPN offers point-to-point asymmetric PQC and symmetric encryption for UDP and TCP on Windows, Linux and macOS platforms.

At Castle Shield, we are encryption agnostic. As NIST selects new PQC standards, we will add them to our suite of solutions that further demonstrates the cryptographic agility of our products. Our primary focus is to seamlessly integrate the best encryption algorithms available with our solutions to protect our customers data for today and tomorrow, said Dr. Milton Mattox, Chief Technology Officer at Castle Shield, Holdings, LLC.

Aeolus VPN with PQC continues to be available today for testing, proofs of concept, and production installations.

About Castle Shield Holdings, LLC

Founded in 2019, Castle Shield offers a complete range of enterprise-grade cybersecurity solutions that protects enterprises and consumers against all internal and external cyber threats. Our quantum-resistant solutions (Fides) stand strong as the last line of defense for enterprise and consumer data in the emerging quantum computing threat landscape. Legion, our Security Information Event Management or (SIEM) product portfolio and Fides work together to strengthen your overall data security. We monitor and address threat vectors through our scalable, multi-tenant SIEM platform, protecting enterprise systems and data in an efficient, cost-effective manner. In addition, we utilize an advanced compliance platform (Senate) and expert analysis with an in-depth understanding of dynamic compliance standards and industry best practices to highlight cyber risk factors. Our Senate system provides comprehensive ratings for third party vendors based on technical risk scores, compliance, and financial impact in the event of a breach. Our 360 proactive security solutions are what sets Castle Shield apart independent of your IT backbone whether cloud, hybrid or premise based. For further information, please go to http://www.castle-shield.com

Read more from the original source:
Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution - Business Wire

It’s Time To Trust Crypto. Here’s Why. – Entrepreneur

Opinions expressed by Entrepreneur contributors are their own.

The future of money is changing. Many people think it's already changed but it hasn't. Cryptocurrency is the future of money, but it still has a long way to go before its full potential can be realized.

Cryptocurrency is a digital currency that uses encryption to secure transactions and control the creation of new coins. The technology behind it is called blockchain, which is a digital ledger that records all the transactions. Cryptocurrency can be further defined as a decentralized system that uses cryptography to secure transactions and control the creation of new units of a particular cryptocurrency, referred to as "coins" or "bills."

Related: Smart Businesses Shouldn't Abandon Crypto. Here Are 3 Reasons Why.

The use of digital signatures provides powerful protection against fraud. However, there are other means by which an individual may attempt to gain unauthorized access or otherwise corrupt data within this system, such as altering transaction records after users have submitted them to take advantage of loopholes.

The first known use of cryptocurrency was in a paper published by Wei Dai in 1998 on "b-money," an early form of cryptographic currency based on proof-of-work. The idea was further popularized by Nick Szabo's description of "bit gold" and Hal Finney's reusable proof of work (RPOW) system in 1998. The first decentralized cryptocurrency created was Bitcoin, released in 2009 by Satoshi Nakamoto. At the time, it was worth less than one cent. Today it is worth over $20,000 per unit and is one of the most widely used cryptocurrencies on the market.

Cryptocurrency has moved from the realm of hackers and techies into the mainstream culture more quickly than anyone could have imagined. Countries are embracing it as an alternative monetary system, and many people in developing countries rely on cryptocurrency for their income due to its high volatility.

The potential for crypto as a medium of exchange is growing; tech giants Google and Facebook have announced their interest in the technology. Furthermore, major banks have begun integrating it into their business operations.

Cryptocurrency may become ubiquitous in the future, but there are still major hurdles to overcome before this happens. The biggest challenge for most people is understanding how crypto works. Many people won't use it unless they understand what the crypto is worth (or how much money you can get for it) or how easy it is to buy them with cash at a local ATM.

It also remains unclear whether governments will accept transactions using digital currencies like bitcoin. After all, if everyone began using them instead of government-issued money like dollars or euros, governments would lose control over monetary policy.

Related: 5 Tips for Using Cryptocurrency in Your Small Business

In centralized banking, corporate boards or governments control currency supply by printing units of fiat money or demanding additions to digital banking ledgers. If you were wondering, fiat means "by decree," so dollars are just pieces of paper with no intrinsic value. Their value comes from a government decree that they are legal tender.

However, cryptocurrency is becoming more viable. After all, it's a way for people to invest in the future of money. By investing in cryptocurrencies, folks are supporting the technology behind it and helping it succeed.

If you have followed developments in cryptocurrency over the past few years, you know that many countries are embracing this new monetary system. The most notable example would be Japan which has recently legalized Bitcoin as an official payment method. This means that all businesses therein now have to accept Bitcoin as a form of payment if they want to do business with local customers or government agencies who use Bitcoin as their official currency.

In many developing countries, cryptocurrency is a way to make money. It's a way to make money online, and it's also a way to make money from home. Cryptocurrency is a great way to start making extra income from home with no startup cost and no prior experience required. In addition, the crypto economy is growing exponentially, meaning anyone who gets in on the ground floor can reap huge profits for years into the future.

The future of cryptocurrency is exceptionally promising. With the rise of Bitcoin, we have seen that a new form of money can be created and distributed globally without any central control or regulation. However, the real value comes when you get people using it in their everyday lives because they believe in its use case as a currency or store of value. At this rate, that day may be sooner than we think.

Related: 5 Things to Know Before You Invest in Cryptocurrency

Excerpt from:
It's Time To Trust Crypto. Here's Why. - Entrepreneur

Algorand (ALGO) on its journey to breach the $0.4 mark! – CryptoNewsZ

The success of a cryptocurrency depends on the team of developers and marketers. Algorand has a strong team behind the network to run the project successfully for the long term. The founder of Algorand, Silvio Micali, was the faculty at Electrical and Computer Science, MIT.

He knows cryptography and other technologies to run the network. Moreover, he is the inventor of zero-knowledge-proof technology that is the anchor of many cryptocurrencies. He is working with another tech-savvy member Chris Peikert, the head of cryptography of this network.

Besides that, interoperability is a big factor that makes Algorand unique from other cryptocurrencies. Anything built on this platform can easily be connected to other blockchain systems. Experts think it is the heart of this blockchain, allowing the mass adoption of this blockchain facility.

Interoperability is the key to future success because when it comes to decentralized applications, one application that has been built on Ethereum must be connected to Cardano, Solana, and other platforms. The number of projects built on Algorand has grown exponentially in the last few years.

It is currently running some high-potential projects and decentralized applications which are used by financial institutions. From an investor perspective, you can consider that when high-potential projects grow, the value of Algorand will grow exponentially.

Cryptocurrencies that are listed in multiple exchanges are a sign of good fundamentals and popularity. The good news is major crypto exchanges have listed ALGO for trading and investing purposes.

Binance and Coinbase are two such crypto exchanges that regularly delist cryptocurrencies, but ALGO receives good volumes on these exchanges. In a market that is saturated with different types of projects, driving new investments is critical, but Algorand has been doing well since its launch.

At the time of writing this post, ALGO was trading around $0.328, above the support of $0.30. On the daily chart, Algorand candlesticks are in the lower range of the Bollinger Bands. Though MACD is bearish, and RSI is at 46, we think it is an ideal time to invest for the short term. Read our ALGO prediction for a more detailed future price projection of the token.

On the weekly chart, ALGO candlesticks are forming around the baseline of the Bollinger Bands, but we do not think it is an ideal time to invest for the long term because it has been consolidating within a range with the strong support of $0.28. Algorand might not break the support soon, but you should invest for the long term when it exceeds at least the immediate resistance level.

Originally posted here:
Algorand (ALGO) on its journey to breach the $0.4 mark! - CryptoNewsZ

Bitt and IDEMIA: Winners of the G20 Central Bank Digital Currency TechSprint 2022 – Yahoo Finance

SALT LAKE CITY, Oct. 12, 2022 /CNW/ --Bitt and IDEMIA are pleased to have won the 2022 G20 TechSprint global CBDC competition. The announcement came ahead of the G20 Bali Summit from the Bank for International Settlements (BIS) and Bank Indonesia as they concluded their third annual contest, which received more than 100 submissions from many of the world's leading financial, technology, science, and marketing companies. An independent panel of 11 experts, convened by Bank Indonesia, assessed the developed prototypes from the shortlisted teams to determine the winners.

Bitt and IDEMIA joined forces to bring together Bitt's Digital Currency Management System (DCMS) and IDEMIA's secure solution for offline CBDC payments. The different components enable central banks to launch their CBDC with complete interoperability with current systems, to ensure low-cost access with a variety of easy-to-use payment devices and the best identity management verification available in full compliance with regulatory requirements.

This is the promise to offer a truly inclusive and convenient CBDC with no compromise on usability or security. "Bitt and IDEMIA are humbled to have been given such a prestigious award! Our solution gives everyone access to CBDC, even to those who cannot afford a smartphone. We help fulfill the vision to make digital cash available anywhere and anytime, with or without network coverage," says Jerome Ajdenbaum, VP Digital Currencies at IDEMIA.

Imran Khan, EVP of Partnerships of Bitt, says "We are honored to have Bitt recognized as one of the primary leaders in the CBDC space. Our partnership with IDEMIA propelled our organizations to develop and showcase our best work, and we look forward to offering offline payment solutions to the world's monetary authorities and financial institutions as we support them in expanding financial services to all members of society."

About IDEMIA As the leader in identity technologies, IDEMIA is on a mission to unlock the world and make it safer. Backed by cutting-edge R&D, IDEMIA provides unique technologies, underpinned by long-standing expertise in biometrics, cryptography, data analytics, systems, and smart devices. IDEMIA offers its public and private customers payment, connectivity, access control, travel, identity, and public security solutions. Every day, around the world, IDEMIA secures billions of interactions in the physical and digital worlds. With nearly 15,000 employees, IDEMIA is trusted by over 600 governmental organizations and more than 2,300 enterprises spread over 180 countries, with an impactful, ethical, and socially responsible approach.

Story continues

For more information, visit http://www.idemia.com

About BittBittis a financial technology company that provides digital currency solutions to central banks, financial institutions, and ecosystem participants worldwide. Bitt's Digital Currency Management System (DCMS) provides the secure infrastructure for monetary authorities to deploy CBDCs, and for financial institutions to integrate digital currencies into their financial service offerings. Bitt is a portfolio company of Medici Ventures, L.P., a blockchain-focused fund. The general partner of that fund is an entity affiliated with Pelion Venture Partners. Overstock.com, Inc. (NASDAQ:OSTK) is a limited partner of Medici Ventures, L.P. For more information on Bitt, please visit https://www.bitt.com.

About Overstock.comOverstock.com, Inc. (NASDAQ:OSTK) is an online retailer and technology company based in Salt Lake City, Utah. Its leading e-commerce website sells a broad range of new home products at low prices, including furniture, dcor, area rugs, bedding and bath, home improvement, and more. The online shopping features millions of products that tens of millions of customers visit each month. Overstock regularly posts information about the Company and other related matters on the Newsroom and Investor Relations pages on its website, Overstock.com.

O, Overstock.com, O.com, and Club O are registered trademarks of Overstock.com, Inc. Other service marks, trademarks and trade names which may be referred to herein are the property of their respective owners.

About Pelion Pelion Venture Partners is an early-stage venture capital firm. Currently investing out of their seventh fund, Pelion invests in Seed and Series A software companies across the United States. Notable investments include: Cloudflare, Riverbed, Divvy (acquired by Bill.com), and Weave.

Chris BurnettMarketing ManagerE-mail: pr@bitt.comWebsite: http://www.bitt.com

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/bitt-and-idemia-winners-of-the-g20-central-bank-digital-currency-techsprint-2022-301647584.html

SOURCE Bitt

Cision

View original content to download multimedia: http://www.newswire.ca/en/releases/archive/October2022/12/c9690.html

Read more from the original source:
Bitt and IDEMIA: Winners of the G20 Central Bank Digital Currency TechSprint 2022 - Yahoo Finance