PhD Position in Multi-User, Multi-Device, and Multi-Service Coordination job with NORWEGIAN UNIVERSITY OF SCIENCE & TECHNOLOGY – NTNU | 275352 -…

About the position

At the Department of Information Security and Communication Technology we have a vacancy for a PhD Candidate in the topic of Multi-User, Multi-Device, and Multi-Service Coordination in a Digital Homecare Environment.

For a position asaPhD Candidate,the goal is acompleted doctoral education up toan obtaineddoctoral degree.

The position's working place is NTNU campus in Gjvik.

You will report to the Head of the Department.

Duties of the position

The PhD candidate will work on challenging research problems related to technical coordination of an open homecare environment with its cybersecurity context when the hospital-centralized healthcare services are migrating towards municipality and home oriented future services. This includes research on (1) abstracting cybersecurity threats and defense models for a complex and open homecare environment, and (2) developing efficient technical and non-technical security and privacy controls in order to structure the open healthcare environment in a trusted way including protecting the users privacy in a multi-sensor context.

Other duties include:

Required selection criteria

The appointment is to be made in accordance with the regulations in force concerningState Employees and Civil ServantsandRegulations concerning the degrees ofPhilosophiaeDoctor (PhD)andPhilosodophiaeDoctor (PhD) in artistic researchnational guidelines for appointment as PhD, post doctor and research assistant

Preferred selection criteria

Personal characteristics

We offer

Salary and conditions

PhD candidates are remunerated in code 1017 and are normally remunerated at gross from NOK 491 200 per annum before tax, depending on qualifications and seniority. From the salary, 2% is deducted as a contribution to the Norwegian Public Service Pension Fund.

The period of employment is 3years.

Appointment to a PhD position requires that you are admitted to the PhD programme in Information Security within three months of employment, and that you participate in an organized PhD programme during the employment period.

The engagement is to be made in accordance with the regulations in force concerning State Employees and Civil Servants, and the acts relating to Control of the Export of Strategic Goods, Services and Technology. Candidates who by assessment of the application and attachment are seen to conflict with the criteria in the latter law will be prohibited from recruitment to NTNU. After the appointment you must assume that there may be changes in the area of work.

The position is co-funded by the two RCNs IKTPLUSS projects Health Democratization and DigiRemote, RFF-Innlandet research project Internet of My Things, and NTNU Department of Information Security and Communication Technology. The position is also supposed to contribute to the SFI NORCICS in the task of Distributed Care Demonstration.

It is a prerequisite you can be present at and accessible to the institution daily.

About the application

The application and supporting documentation to be used as the basis for the assessment must be in English.

Publications and other scientific work must follow the application. Please note that applications are only evaluated based on the information available on the application deadline. You should ensure that your application shows clearly how your skills and experience meet the criteria which are set out above.

The application must include:

Joint works will be considered. If it is difficult to identify your contribution to joint works, you must attach a brief description of your participation.

In the evaluation of which candidate is best qualified, emphasis will be placed on education, experience and personal suitability.

If all,or parts,of your education has been taken abroad, we also ask you to attach documentation of the scope and quality of your entire education, both bachelor's and master's education, in addition to other higher education. Description of the documentation required can befoundhere. If you already have a statement fromNOKUT,pleaseattachthisas well.

NTNU is committed to following evaluation criteria for research quality according toThe San Francisco Declaration on Research Assessment - DORA.

General information

Working at NTNU

A good work environment is characterized by diversity. We encourage qualified candidates to apply, regardless of their gender, functional capacity or cultural background.

The city of Gjvikhas a population of 30 000 and is a town known for its rich music and cultural life. The beautiful nature surrounding the city is ideal for an active outdoor life! The Norwegian welfare state, including healthcare, schools, kindergartens and overall equality, is probably the best of its kind in the world.

As an employeeatNTNU, you must at all times adhere to the changes that the development in the subject entails and the organizational changes that are adopted.

In accordance with The Public Information Act (Offentleglova), your name, age, position and municipality may be made public even if you have requested not to have your name entered on the list of applicants.

If you have any questions about the position, please contact Associate ProfessorBian Yang,telephone +47 61135486, email bian.yang@ntnu.no. If you have any questions about the recruitment process, please contact Katrine Rennan e-mail: Katrine.rennan@ntnu.no

Please submit your application electronically via jobbnorge.no with your CV, diplomas and certificates. Applications submitted elsewhere will not be considered. Diploma Supplement is required to attach for European Master Diplomas outside Norway. Chinese applicants are required to provide confirmation of Master Diploma fromChina Credentials Verification (CHSI).

If you are invited for interview you must include certified copies of transcripts and reference letters. Please refer to the application number2021/60466when applying.

Application deadline: 10.01.2022

NTNU - knowledge for a better world

The Norwegian University of Science and Technology (NTNU) creates knowledge for a better world and solutions that can change everyday life.

Department of Information Security and Communication Technology

Research is vital to the security of our society. We teach and conduct research in cyber security, information security, communications networks and networked services. Our areas of expertise include biometrics, cyber defence, cryptography, digital forensics, security in e-health and welfare technology, intelligent transportation systems and malware. The Department of Information Security and Communication Technology is one of seven departments in theFaculty of Information Technology and Electrical Engineering.

Deadline10th January 2022EmployerNTNU - Norwegian University of Science and TechnologyMunicipalityGjvikTrondheimScopeFulltimeDurationTemporaryPlace of serviceNTNU Campus Gjvik

See the original post here:
PhD Position in Multi-User, Multi-Device, and Multi-Service Coordination job with NORWEGIAN UNIVERSITY OF SCIENCE & TECHNOLOGY - NTNU | 275352 -...

Top 10 Cheap Cryptocurrencies to Buy Before it Explodes in 2022 – Analytics Insight

Cryptocurrencies are gaining massive momentum lately with new investors entering the market almost every day

Cryptocurrenciesare all in rage these days, particularly with speculative investors. What earlier used to be a fringe investment is now in the front and centre of the financial revolution. Even top international and national press institutions keep a close eye on the daily movements of the crypto coins and other digital currencies. Bitcoin, being one of the most popular currencies is recognized and trusted by almost everyone. But new investors are always looking for affordable andcheap cryptocurrenciesto invest in. Keeping in mind that the crypto market is considered to be extremely volatile, these investors hesitate to risk it all the first time. So, in this article, we have listed thetop affordable cryptocurrencies investors can buy before it explodes in 2022.

XRP is an open-source cryptocurrency that uses an open-source distributed ledger called the XRP ledger. It is the native coin of Ripple, which is an enterprise blockchain company that facilitates global transactions. The creators claim that XRP was built for payments and can settle transactions faster than most other cryptocurrencies securely and efficiently.

Cardano is a research-based cryptocurrency built by engineers, mathematicians, and cryptography experts. It is open-sourced and decentralized, with consensus achieved using proof-of-stake. It can also facilitate peer-to-peer transactions with the ADA token.

According to its creators, the DOT token primarily serves three main purposes, which include providing governance for the network, operating the network, and creating parachains by bonding Polkadot tokens. The crypto has roughly gained 468% this year and continues to remain an affordable cryptocurrency with great potentials for 2022.

Dogecoin originated something out of a joke, but it quickly became quite real for those who are profiting from it. The current DOFE price is about 4,889% higher since the beginning of the year. Along with its success and affordability DOGE makes a lucrative career option. Earlier this year, DOGE rose to prominence after Musks tweet, which reassured his support towards this crypto, enabling it to gain real profits.

Shiba Inu is another meme cryptocurrency that is also one of the biggest rivals of Dogecoin. Despite its whimsical beginnings, SHIB has managed to gather a growing and faithful community, which is also one of its biggest selling points. The community has also created an NFT project around SHIB that has enabled it to gain more attraction from investors.

Avalanche is an Ethereum competitor that facilitates decentralized applications and the creation of custom blockchains on its ecosystem. Also, quite recently AVAX reached a record high value, overtaking several major cryptocurrencies. Although it is launched in 2020, Avalanche has shown great potential to grow.

Terra is one of the newer cryptocurrencies that is making headlines due to its recent successes. Just like Avalanche, Terra jumped over several cryptos in a single day and achieved a position among major cryptos for a short while. Experts believe that LUNAs recent launch of the Columbus-5 upgrade, the protocols upgrade to the IBC standard that opens up Terra to the Cosmos ecosystem, and the increase in DeFi applications have led to the recent growth of the crypto.

Polygon Matica is a framework and a protocol for building and connecting Ethereum-compatible blockchain networks which aggregate scalable solutions on Ethereums supporting ecosystem. Polygon creators have broadened their vision and reach by updating their system and bringing in metaverse designs and integrating the MATIC Plasma chain.

VeChain is the currency of the VeChain Thor blockchain, and it is considered the perfect choice for investors who want to invest in affordable, yet potential cryptocurrencies. VeChain facilitates the management of supply chains and other business processes.

Decentraland is the token behind an Ethereum blockchain-based virtual reality game by the same name. The crypto has been described as a 3D virtual world where users buy land on which to develop and monetize content, buy goods and services and visit other properties.

Share This ArticleDo the sharing thingy

Continued here:
Top 10 Cheap Cryptocurrencies to Buy Before it Explodes in 2022 - Analytics Insight

Sponsored post: Bitcoin fundamentals: What to know before it’s suddenly part of your everyday life – TechCrunch

Bitcoin isnt going anywhere. In fact, its about to go everywhere.

Monetary systems run by people tend to act like people. Subject to emotions and political pressures, their rules change whenever their rulers want them to change. Bitcoin is different. It more closely resembles the laws of physics than it does the fiats of governments. Transactions using Bitcoin cannot be subverted or changed haphazardly. The rules of the road are upfront and clear: every transaction requires consensus, and the rewards for those facilitating the transactions are hard-coded. In many ways, inflexibility is Bitcoins superpower.

Facilitating widespread access to Bitcoin, therefore, is a massive challenge but an equal opportunity for positive change. Universal adoption of Bitcoin could transform the lives of billions of people around the world. It could make for fairer, more equitable global financial systems. It could quite literally lift people from poverty.

Thats why companies like NYDIG are working to make Bitcoin a usable resource for everyday people in everyday life. (And so far, its working.) Here are three things to know before Bitcoin becomes a part of your banking, credit card, and even paycheck world.

Image Credits: Nigel Sussman / TechCrunch

Bitcoin is secure in ways the mind can hardly fathom. But fathom this: a Bitcoin key, or the private value associated with your supply of Bitcoin, is just one of 2^256 possible combinations. Thats a lot. Thats a lot more than a lot.

Or as Brian Langel, the Chief Technology Officer at NYDIG bluntly points out, The number of atoms in the perceivable universe is likely smaller than that number.

Furthermore, when your Bitcoin key is used in a transaction, the inherent anonymity of the key is further obscured through a process of cryptography. (This is where crypto comes from.) Cryptography is not new at all; it has been around for decades. Its the coding system that underpins a myriad of other secure networks everything from diplomatic cables sent by intelligence services to VPN addresses used by remote employees. Even when you move money between accounts on your online banking app, the information you share is made secure with methods of cryptography.

Cryptography performed on Bitcoin transactions is unique in that its all done in a decentralized manner. The version of cryptography at play for Bitcoin on the blockchain is called Elliptic Curve Digital Signature Algorithm (ECDSA). The blockchain incentivizes other actors (miners) to validate Bitcoin transactions. Miners collectively manage the flow of all Bitcoin transactions without interference. Their consensus ensures your transaction is protected from outside influence.

Ultimately what makes Bitcoin so secure is (1) the sheer impossibility of guessing a Bitcoin key, (2) the sophisticated cryptography of the blockchain, and (3) the decentralized nature of validation.

Image Credits: Nigel Sussman / TechCrunch

Although the properties of Bitcoin make for unprecedentedly secure transactions, there is one catch: you have to know that random number. What happens if you dont store it correctly?

Most commonly there are two ways of storing Bitcoin keys, explains Langel. Hot wallets and cold storage.

Hot wallets are ways to store your private key on a routable network like the Internet. Its inherently less secure because there are more ways to attack, says Langel, but there are perceived tradeoffs. With a hot wallet, you can quickly and programmatically interact with your key. If you wanted to move funds quickly, you could.

Cold storage, on the other hand, reduces the risk of hacking by simply removing the key from the online realm and placing it into a physical Fort Knox-esque vault. Cold storage might seem like it slows down accessibility, but thats not always the case.

Explaining NYDIGs cold storage system, Langel says, We start with an online system that verifies intention and integrity. And then we take that instruction and literally print it out. That information then interacts with various physical controls inside a secure storage facility. Inside, we utilize access controls, separation of duties, multiple actors, and hardware security modules that were built for storing cryptographic material prior to cryptocurrency even existing.

On top of the un-guessability of a Bitcoin key and its cryptographic controls online, cold storage provides a tried-and-true method for security. If you look at the arc of human existence, weve been refining physical controls for a long time, says Langel. Theres a lot of history there.

Image Credits: Nigel Sussman / TechCrunch

If the monetary system of Bitcoin is so (purposefully) friction-filled, then how could it ever replace a debit card?

At its core, Bitcoin does not offer a breezy mode for paying for things. Rather, its the so-called Layer 2 Technologies sitting across Bitcoins sturdy foundation that bring the power and fairness of Bitcoin to everyday life. The most widely used Layer 2 Technology is called The Lightning Network, and its what makes Bitcoin into an actual medium of exchange.

You can think of Layer 2 Technologies like the protocols that run atop the Internet. Opening Gmail, for example, engages multiple fast-moving protocols on top of the base network; these are protocols like IP, HTTP, or even the Gmail app. Without them, it might take a very long time to get to your email.

In terms of Bitcoin, the Lightning Network speeds up the process of a transaction by allowing a transaction to take place atop the network before anything is recorded on the Blockchain. Theyre then recorded in bulk. Its like opening a line of credit with a coffee shop, explains Langel. The fees are amortized over the transactions.

The applicability of Bitcoin powered by the Lighting Network spans well beyond you saving on fees at the coffee shop. Its through this added layer of technology that the greatest everyday impact can be made. The Lightning Network can empower media companies, for example, to sell articles by micropayments. It can make loyalty rewards transferable instantly. Already, the cost remittances to El Salvador are made cheaper through Bitcoin and the applied Layer 2 Technologies.

A fairer financial future is no longer on the horizon its here. From ecommerce to insurance to banking and non-profit management, entities all over the globe are bolstered by Bitcoin. Guided and protected by purpose-driven custodians like NYDIG, more and more people are not only reaffirming the security of Bitcoin as a currency but also seeing how it can level the financial landscape for billions.

Link:
Sponsored post: Bitcoin fundamentals: What to know before it's suddenly part of your everyday life - TechCrunch

How To Ensure Emerging Technology Will Benefit Your Business – Forbes

Ongoing technological advancement is perhaps the single biggest force shaping the modern business landscape. Breakthroughs in artificial intelligence, cryptography, robotics, virtual reality, and countless other fields seem to happen every day, creating new business opportunities and altering consumer behavior in the process.

Given the ever-increasing pace of change, you must constantly scan the horizon for the next big tech trend as a business leader. However, many individuals place undue emphasis on the future without fully understanding how existing digital tools impact their organizations. If you haven't thought about how your company currently uses tech, you might need to reconsider the adoption process.

How to successfully adopt new technology

In 2011,Marc Andreessen predictedthat the leading companies of the future would be those that capitalized on innovative digital tools. This proved to be truejust look at today's most valuable companies for proof. But the ones that are falling behind aren't necessarily technology-averse. Rather, they might be investing heavily in digital transformation.

The problem is technology investments that aren't guided by a thoughtful strategy can create more issues than solutions. With that in mind, here are three tips you can use to ensure new technology investments truly benefit your business:

1.Audit existing workflows and consider what resources your teams need to do their jobs.

Data from arecent McKinsey & Co. surveyof global executives suggests that the COVID-19 pandemic rapidly accelerated enterprise technology adoption. Since the beginning of the crisis, the share of digital or digitally enabled products in company portfolios has advanced by about seven years. In theory, this means companies are operating faster and more efficiently than before. But in reality, the new technology could be hampering your employees' productivity.

According to research from Qatalog, a London-based startup,43% of employeesreport spending too much time moving between digital tools. Ryan OHara, vice president of growth and marketing at LeadIQ, cautions leaders against burdening their teams with more software.

"When companies start to look at each new tool against the backdrop of all the other technologies employees must learn and use, they begin to realize that theyre breaking a cardinal rule of technology design: Dont add too many steps for the end user,saysOHara. Its a lesson numerous startup founders have learned the hard way."

As you evaluate existing workflows, map out every single step and look for bottlenecks. You might find that these can be addressed through a process of subtractioneither by ditching unused tools or consolidating fragmented workflows onto one platform.

2. Talk to and get feedback from employees.

Tim Scott, head of product strategy and design at Frogslayer, says that getting feedback from employees who are essential to operations is the key to successful digital transformation efforts. Not only will your employees know exactly which tools are creating unnecessary friction, but they might also have ideas about how to replace problematic technologies.

They might have already built or obtained tools that allow them to be more productive at work (such as spreadsheets, third-party applications, etc.),saysScott. These tools can tell leaders what stakeholders really need and help them generate ideas for building technologies that unlock even greater productivity."

Too often, leaders invest in new technologies without first consulting the employees who will use them. Then, they spend the next several months trying to force the tool into existing workflows while lamenting the lack of proactive adoption. To avoid this scenario, you should communicate openly with employees before and after technology investments. Your goal should be to figure out and articulate why new tools are improvements over existing processes.

3.Be wary of data privacy regulations.

Regulations in Europe and California have created new frameworks for prosecuting companies that misuse consumer data, but theres still no universal privacy legislation. This means you must monitor several organizations and municipalities to ensure you're compliant with new mandates.

The easiest way to avoid issues is by making data privacy a core company value and business objective. By implementing policies that promote privacy by design, you can begin cultivating a culture of compliance. You can also choose to avoid collecting data altogether. Asokan Ashok, founder and CEO of UnfoldLabs Inc., advises leaders to carefully consider why they need to acquire data.

There are so many companies capturing all kinds of data without knowing if they really need it or will use it,saysAshok. I would recommend not going after big data. Rather, go after smart datadata that is really needed for the organization. By limiting the amount of information your company collects from its customers, you can limit your exposure to regulatory risk as well.

Too much technology can be a bad thing. If your digital transformation efforts don't have a purpose, you might end up complicating processes and hampering employees' productivity. But by following these three steps, you can ensure you're investing in and implementing the technology that will net you success.

Continue reading here:
How To Ensure Emerging Technology Will Benefit Your Business - Forbes

HS2 uses blockchain technology to increase trust and efficiency in the supply chain – New Civil Engineer

HS2 Ltd has successfully implemented blockchain in a section of its procurement pipeline to increase trust, efficiency and value. It hopes to expand its use of the technology to wider processes on the supply chain.

HS2 Ltd head of innovation Howard Mitchell spoke at NCEs TechFest on 2 December, alongside Costain strategic growth manager Charlie Davies and blockchain lead for Deloittes real assets advisory practice Alexander Marx. Together, they explained the objectives and outcomes of the blockchain trial undertaken by the Skanska, Costain, Strabag joint venture, alongside Deloitte, on High Speed 2 (HS2).

Blockchain is a form of cryptography that links together blocks of information in a secure chain, where each piece of information is given specific timestamp and transaction data that is practically impossible to hack or alter. This means that that any data being input to the blockchain only has to be inserted once and it can never be altered again, preventing any tampering or human error as the information gets shared throughout the network of parties who need to access it.

As for its use on HS2, Marx explained: It was really about whats the value case what does blockchain do better than other technologies that makes it worth the effort of putting it in place? For us that was trust, transparency and accountability.

Trust because you create a single version of the truth that everyone shares, and its verified.

Transparency because you can share information across that network to encourage collaboration

And finally accountability, because you can trace the business process from start to finish with clear and undeniable records of whats been done when.

Marx outlined three key uses for blockchain in HS2 and potentially all construction projects in the future.

The first is to identify points in the supply chain where there are bottlenecks where information or processes are held up. This provides an ability to spot trends that could be stamped out to improve efficiency.

Secondly, he explained how having complete confidence in the data being shared means that they can start to use smart contracts and payment automation. For example, with blockchain baked into the technology, data will be created about when contractors arrive on site and leave with undeniable accuracy, meaning payments can be directly automated no timesheets or administrators necessary. HS2 says using blockchain has reduced the total number of business processes for timesheets and invoices from 24 to 11.

The third main use of blockchain is material origination. Every single item, even down to a lowly bolt, will have its information inserted to the blockchain, and from that point a record is kept on when and where it was manufactured, where its transported, where its included in the assembly, that assemblys transport to the construction site, and ultimately its location in the final structure.

Material origination data will be particularly useful as we move towards greater implementation of digital twins, as the information for each little piece of a building will have robust data behind it that can be mirrored in the digital version. Origination data, including how it has been manufactured and where it has been transported, will also give much more detailed results when calculating carbon emissions for any given building.

HS2 has started putting blockchain into use with one of its plant suppliers, Lynch. By ensuring that everyone in this section of the supply chain is using the same, secure information, they have been able to crack down on bottlenecks and start using more automated processes.

Davies explained: We really innovated and connected up the supply chain in terms of proving this concept out; working with finance teams and working with commercial teams, as the gap between the two is sometimes not quite understood.

This increased speed of payments by 50-60%. He added: What that amounted to over the lifetime of [HS2s] SES sections 1 and 2 main works so Euston out to the M25 was quite considerable savings.

They now envision expanding this much further.

Mitchell, speaking on behalf of HS2 Ltd, said: As a client, were not just looking for the benefit to be a proof of concept or isolated just within one part of the route. We are now looking to expand the learning that we have from this particular case and cookie cutter it.

So, we will lift throughout the first phase of the programme and then also start the dialogue with the second phase of the programme, where this should become more of the norm.

But this is just one use case against many.

Marx underlined this by explaining: What we hope to do in the next few years is expand out in terms of its features and functions.

It can be applied more broadly to other areas of timesheets and invoicing, while also looking at the rest of the process to move towards a one stop shop, essentially, for how you procure plant.

He also said that in time it will expand into other processes, such as different types of procurement or how to capture carbon.

Marx also wanted to highlight that this wont just have positive impacts for HS2, but all layers of the supply chain. Paying for supplies faster, that has benefits not just for the cost of doing so but also for their costs when it comes to things like trade finance and all other things associated with it, he said.

In conclusion, he wanted to emphasise the potential for blockchain to bring a new level of standardisation to the construction industry. What this really is for us is a move away from one project, once programme, one organisations style of technology implementation, and to much more of an ecosystem-driven approach, he said.

We can start standardising the way we do things especially in these more administrative tasks, which is something manufacturing has done so well [to drive] their productivity forward, he said. If we can build an ecosystem which is fair and equitable to everyone, theres no reason we cant adopt a similar approach.

Like what you've read?To receive New Civil Engineer's daily and weekly newsletters click here.

Here is the original post:
HS2 uses blockchain technology to increase trust and efficiency in the supply chain - New Civil Engineer

Cryptographers are not happy with how youre using the word crypto – The Guardian

The stadium that is home to the Los Angeles Lakers is getting a new name: the Crypto.com Arena. The name reflects the arenas new sponsorship agreement with a Singapore-based cryptocurrency trading platform. That may be good news for cryptocurrency fanatics but perhaps not so much for another faction within the digital landscape: cryptographers.

Look up the word crypto in Websters dictionary, and youll see it refers to cryptography, which in turn is defined as the computerized encoding and decoding of information. Search crypto on Google, however, and youll see a host of top results pointing to cryptocurrencies like bitcoin and ethereum.

This lexical shift has weighed heavily on cryptographers, who, over the past few years, have repeated the rallying cry Crypto means cryptography on social media. T-shirts and hoodies trumpet the phrase and variations on it; theres a website dedicated solely to clarifying the issue.

Crypto for decades has been used as shorthand and as a prefix for things related to cryptography, said Amie Stepanovich, executive director of Silicon Flatirons Center at the University of Colorado Law School and creator of the pro-cryptography T-shirts, which have become a hit at conferences. In fact, in the term cryptocurrency, the prefix crypto refers back to cryptography.

Its often a losing battle, and that appears to have played out in the case of crypto.com itself.

Beginning in 1993, as the Verge reported, the crypto.com domain was owned by Matt Blaze, a cryptography expert who repeatedly rejected would-be buyers even as the rise of cryptocurrency meant he could have made millions of dollars.

I think calling cryptocurrencies crypto is a poor choice, with bad consequences for both cryptography and cryptocurrencies, he tweeted in 2018. Ultimately, however, the domain was sold, and now if you go to Crypto.com youll see a giant video of Matt Damon indicating that investing in cryptocurrencies is roughly as courageous as scaling an icy cliff or blasting into space.

Yet there remains an internecine feud among the tech savvy about the word.

As Parker Higgins of the Freedom of the Press Foundation, who has spent years involved in cryptography activism, pointed out, the cryptography crowd is by nature deeply invested in precision after all, designing and cracking codes is an endeavor in which, if you get things a little wrong, it can blow the whole thing up.

There are global debates over both cryptography for instance, questions over whether chat services should offer backdoors that skirt encryption and the regulation of cryptocurrency. There is a need to distinguish between those two areas to avoid absolutely foreseeable confusion, Stepanovich said, a particular issue when it comes to legislators and regulators who are not always subject matter experts in these areas, even if they are charged with overseeing them.

Higgins agreed. Crypto as shorthand for cryptography really was in widespread use. You could talk about crypto even on Capitol Hill and people would know what you were talking about that really did hold a lot of, forgive this, but currency.

And at a time when many still arent sure what cryptocurrency is, the confusion over the terms just makes things muddier. Strong cryptography is a cornerstone of the way that people talk about privacy and security, and it has been under attack for decades by governments, law enforcement, and all sorts of bad actors, Higgins said. For its defenders, confusion over terminology creates yet another challenge.

Stepanovich acknowledged the challenge of opposing the trend, but said the weight of history is on her side. The study of crypto has been around for ever, she said. The most famous code is known as the Caesar cipher, referring to Julius Caesar. This is not new. Cryptocurrency, on the other hand, is a relatively recent development, and she is not ready to concede to a concept that may or may not survive government regulation.

She remains invested in the linguistic debate because its so closely linked to policy. Allowing people to develop and use encryption is hugely important in protecting human rights, privacy and protecting the basis on which cryptocurrency has been built, Stepanovich said.

We all have hills we are willing to die on this might be mine.

More here:
Cryptographers are not happy with how youre using the word crypto - The Guardian

Career Insights: All You Need to Know About a Cryptographer – Analytics Insight

Want to know about cryptographer and his role? Check out the article and learn about cryptography

Roles and Responsibilities: A cryptographer develops security systems using algorithms and ciphers to encrypt sensitive data. This professional should make sure that all the important data, which includes financial, personal, business, and military, is safe from hackers. While the specific job duties differ from one organization to the other, a cryptographer needs to have a good grasp of cybersecurity systems and other related algorithms to design robust and secure systems that are not vulnerable to penetration and hacking.

Master Mathematical Cryptography 2020 by Udemy: In this course, you will learn all of the old and modern security systems that have been used and are currently being used. You also learn how to crack each one and understand why certain security systems are weak and why others are strong. You will also understand RSA, AES, and ECC which are the three main modern cryptography systems used today.

Introduction to Applied Cryptography by Coursera: In this specialization, students will learn basic security issues in computer communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, authentication, and digital signatures. These topics should prove useful to those who are new to cybersecurity, and those with some experience.

Share This ArticleDo the sharing thingy

About AuthorMore info about author

Analytics Insight is an influential platform dedicated to insights, trends, and opinions from the world of data-driven technologies. It monitors developments, recognition, and achievements made by Artificial Intelligence, Big Data and Analytics companies across the globe.

Read more:
Career Insights: All You Need to Know About a Cryptographer - Analytics Insight

Parfin and Sepior Partner to Bring Institutional Grade Digital Asset Custody Solutions to Latin America, North America and Europe – The Tokenizer

Partnership combines Parfins cutting-edge banking and fintech expertise with Sepiors world-renowned MPC cryptography expertise to deliver the industrys most secure digital asset solutions

Parfin, the British-Brazilian fintech company building digital asset solutions for institutional customers, has announced today a partnership with Sepior, a Danish company specialized in Multiparty Computation (MPC) for Threshold Cryptography.

The partnership will enable the offering of a world-class custody solution that can be installed on-premises as a software-only product. The solution is aimed at traditional financial institutions such as banks, asset managers and hedge funds as well as major players in the rapidly evolving digital asset space.

Alex Buelau, CTO of Parfin said We have been working closely with Sepior for many months and have been impressed by their cryptographic technology and the phenomenal team of scientists that includes big names such as Ivan Damgrd, one of the worlds top cited academics publishing research in cryptography and recipient of several awards in the cryptography and mathematics fields.

MPC technology makes it possible to create blockchain transactions without ever generating a complete private key, relying instead on key shares that are stored and used in a distributed way and never recombined, significantly reducing the risks of loss and theft. Sepiors Advanced MPC provides future-proof and flexible custody infrastructure technology delivering the best possible security, scalability, and performance for online or offline transactions on any device from anywhere.

Parfin has created a powerful and unique platform that uses Advanced MPC by Sepior at its core, to provide custody services with a layer of governance, reporting and regulatory compliance that makes it ideal for institutional customers,said Ahmet Tuncay, CEO of Sepior. Parfins founders have a long and respected standing in banking and fintech, providing them with unmatched insight and relationships to perfectly align our joint technologies with the needs of our customers.

The product offering will be one of the very few MPC custody solutions in the market that can be fully installed by customers as a software-only solution on-premises or in a hybrid cloud setting.

The companies will continue to work together to improve the field of MPC custody, both from a scientific and business perspective. The goal is to offer a world-class, highly secure and efficient custody solution for digital assets including cryptocurrencies, tokens, NFTs, CBDCs and other types of assets says Marcos Viriato, CEO of Parfin.

Parfin is a British-Brazilian Fintech founded in 2019 that offers technology and service solutions for custody, trading and management of digital assets. The solutions are aimed at traditional financial institutions as well as blockchain and cryptocurrency companies.

Founded in 2014, in Aarhus, Denmark, Sepior is the provider of MPC by Sepior the leading key management solution using secure Multiparty Computation (MPC). Sepiors technologies enable trust for online financial transactions and enterprise data protection applications, such as cryptocurrency custodial wallets, public or private blockchains, and cloud-based SaaS offerings. Using patented threshold cryptographic protocols, Sepiors RSA award-winning team of renowned cryptography experts has revolutionized key protection and management required for online security and privacy. The result is a customer-definable security framework that operates with any hardware, virtual device, or platform, using a decentralized-trust model, optimized for current and emerging fintech, cloud, IoT, and distributed ledger applications and services, allowing multiple parties to transact with trust.

Photo byJeppe MnsteronUnsplash

Read More:Fernhill Corp Announces the Acquisition of MainBloq and New Additions to its Board of Directors

Akemona Announces That Its Tokenization Platform Is Live

Read more:
Parfin and Sepior Partner to Bring Institutional Grade Digital Asset Custody Solutions to Latin America, North America and Europe - The Tokenizer

Are you using one of these passwords? If so, its time for a change – Digital Trends

The most common passwords used in 2021 have been revealed, and to call them an embarrassment would be an understatement to say the least.

According to a new report from NordPass, a service that provides a password manager program, a worrying amount of users still rely on extremely weak passwords.

The top 200 most common passwords of 2021 study, covering 50 countries, reveals that 123456 remains as the most popular password for the second year running. More than 103 million people use it for log-in purposes, even though itd take less than a single second to crack it.

Other frequently used passwords within the top 10 list largely consist of number-based passes like 123456789, which is utilized by 46 million individuals. The only two that dont contain a numerical form are qwerty, and of course, password. Theyre applied by 22.3 million and 20.9 million users, respectively.

When it comes to other bad password choices, a stunning number of people opted to make their own names as their preferred password. Elsewhere, Ferrari and Porsche are the most popular car brands in regard to weak passwords.

Unfortunately, passwords keep getting weaker, and people still dont maintain proper password hygiene.

While the vast majority of the top 200 most common passwords can be cracked in less than a second or a few seconds in some cases there are some that would take considerably longer to gain access to. 1g2w3e4r and gwerty123, both used by a million people, would take three hours to crack. Interestingly, removing the 123 from gwerty makes it a much easier target, as itll only take five seconds to crack.

Rounding out the passwords in the list thatll take between 1-3 hours to penetrate are michelle, jennifer, myspace1, and zag12wsx.

NordPasss methodology for forming its research involved working with independent researchers who specialize in the cybersecurity incident research field. The most common password list was compiled via an evaluation of a 4TB database containing leaked passes.

Unfortunately, passwords keep getting weaker, and people still dont maintain proper password hygiene, Jonas Karklys, CEO of NordPass told Lifewire. Its important to understand that passwords are the gateway to our digital lives, and with us spending more and more time online, its becoming enormously important to take better care of our cybersecurity.

So, how does one go about adding additional layers of security that will better protect their passwords? It goes without saying that no one should use 123456 as their entry point for any account or any of the passwords in the aforementioned report for that matter. Password managers have become commonplace and are usually a reliable resort, while two-factor authentication should also be considered as another safety measure.

When factoring in their security deficiencies, passwords, in general, are naturally the most common target for hackers. In fact, 81% of hacking-related breaches are achieved through weak or stolen passwords.

The single most common security vulnerability today is still bad passwords.

Weak passwords are the entry point for the majority of attacks across enterprise and consumer accounts. There are a whopping 579 password attacks every second thats 18 billion every year, Microsoft detailed in September.

Apple, meanwhile, has integrated a newer form of tech into its devices through iCloud Passkey, which effectively getsrid of passwords and offers a more secure process via Public Key Cryptography.

Apple joins both Microsoft and Google in envisioning a future for passwordless authentication. Software giant Microsoft, for one, has already seen more than 200 million users enabling passwordless login for its services.

The single most common security vulnerability today is still bad passwords, Jen Fitzpatrick, senior vice president of core systems at Google, stated in May. Ultimately, were on a mission to create a password-free future.

See the original post here:
Are you using one of these passwords? If so, its time for a change - Digital Trends

What Europe can learn from France when it comes to quantum computing – Sifted

The French ambition to become a world leader in deeptech is one of Europes worst-kept secrets.

Not only does the country have one of the biggest deeptech funds in Europe, Bpifrance,but more importantly it has the people and the pipeline of talent through a best-in-breed university system, which is helping the country become a hotbed for innovation.

Quantum is one segment of deeptech where the French are leaving the rest of Europe, and in fact most other nations, far behind. The ambition to set up a quantum hub in the Paris region, linking large corporations and startups, is truly impressive and far-reaching.

Not only is the region focusing on nurturing homegrown talents, but they are also actively scouting for overseas companies to set up European headquarters in the cluster. How would we know? Well, we were one of the very few UK companies targeted.

France has always been at the forefront of cryptography and has one of the richest ecosystems for quantum pioneers. That history includes individuals ranging from the winners of the Nobel Prize in Physics, Albert Fert and Serge Haroche, to French National Centre for Scientific Research (CNRS) Gold Medallist Alain Aspects pioneering research on quantum entanglement and quantum simulators.

To build on this, earlier this year the French government announced a 1.8bn strategy to boost research in quantum technologies over five years. This will see public investment in the field increase from 60m to 200m a year.

Not only is investment increasing, but the often overlooked part is that funding is being funnelled into various fields of quantum computing.France recognises that quantum computing is not a homogenous industry and that various aspects require attention outside the development of actual quantum computers.

France is building a frameworkto make the country a key player across the entire quantum ecosystem

For example, one such area is security. Once a functioning quantum computer emerges, the cryptography that is used to secure all data and communications will become obsolete overnight.

Compounding this risk is the harvest now, decrypt later threat. Nefarious hackers might intercept data today and then hold onto it until quantum computers are advanced enough to decrypt it. To tackle this, new encryption methods are being developed that can stand against these new powerful computers, also known as post-quantum cryptography (PQC).

Its clear France recognises this threat, with plans to put 150 million directly to R&D in the field of PQC. This is in addition to the 780 million that is being devoted to developing computing alone, and the 870 million that is being set aside for sensor research, quantum communications and other related technologies.

Taken together, France is building a framework for industrial and research forces to make the country a key player across the entire quantum ecosystem, from computing development to post-quantum security.

So how does the rest of Europe compare? The short answer is that its lagging far behind.

Frances closest competitor is Germany, with its government recently pledging to invest 2bn in quantum computing and related technologies over five years. Thats a larger number than Frances commitment but it appears the scope is to only build a competitive quantum computer in five years while growing a network of companies to develop applications.

France is well on its way to protecting itself against the very real security threats quantum computers will pose

Investments by other individual governments across the rest of Europe are minimal, with many relying on the EUs Quantum Technologies Flagship programme to lead the way. However, with $1.1bn earmarked to cover 27 countries, little attention is being placed beyond computing R&D into adjacent fields like quantum security and communications.

Even if we focus on the security side of the coin, France is well on its way to protecting itself against the very real security threats quantum computers will pose, with the rest of Europe leaving themselves vulnerable.

It is also the case that France, in my opinion, is keeping pace with the traditional leaders the US, China and Canada and even pushing ahead in some areas.

While the US, Canadian and Chinese governments have committed impressive amounts to quantum, much of the focus in these countries is on developing a functioning computer, without recognising that a successful quantum strategy needs to be much broader. For example, although it has now developed a broad security roadmap, the US Department of Homeland Securitys budget for next year makes scant reference to quantum computing and the technology that is going to underpin post-quantum security.

If we measure success in quantum by not only how quickly we can develop such computers, but also how effectively they can be applied and how robust our protection is against the darker side of the technology, then Id argue that France has the worlds most balanced and systemic approach.

France is firmly Europes trailblazing nation; the rest of the continent ought to take note.

Andersen Cheng is CEO of Post-Quantum and Nomidio

Read the original:
What Europe can learn from France when it comes to quantum computing - Sifted