Cracking the code of cryptography and life The Irish Times – The Irish Times

Think about the humble envelope. For centuries this paper enclosure has shielded important information from prying eyes that might otherwise steal a glance at an unprotected note. Also, by placing information in an envelope, the sender effectively commits to and freezes this information until it gets to the recipient, assuming it is not tampered with or altered on its journey.

This system of secrecy served us well for centuries in an analogue world, but what about the digital environment in which we now communicate, shop and bank? Enter modern cryptography, which is the subject of this years Royal Irish Academy Hamilton Lecture by Israeli mathematician and computer scientist Prof Avi Wigderson. He will deliver his talk Cryptography: Secrets and Lies, Knowledge and Trust later this month at Trinity College Dublin.

Mathematician Avi Wigderson

Cryptography is nothing new, of course for centuries people have encoded information to scramble its contents, which can then be deciphered or unscrambled by a recipient who knows the key or rules to breaking that code. But cryptography developed a new dimension towards the end of the 20th century thanks to the marriage of computing power and complexity theory, and Wigderson has helped to shape its power.

Hard to solve, easy to verify

Imagine a tough Sudoku puzzle or a tough mathematical problem, he says. Most people may not be able to solve these, but if they saw the correct answer they could check and verify that it was correct. Such problems are of extreme importance in complexity theory.

Modern cryptography often makes use of such hard problems; difficult to solve but relatively easy to verify once solved, explains Wigderson, who is Herbert H Maass professor of mathematics at the School of Mathematics the Institute for Advanced Study, Princeton, New Jersey.

About 40 years ago, people started understanding that introducing computational complexity, namely the fact that some problems are easy and some are hard for us and for computers, could be used as a basis for cryptography, he says.

Cloaking information in such hard-to-solve problems is akin to the sender sealing the envelope in the analogue world. Here one uses specific hard problems with extra structure such as factoring integers into primes which enable encoding any number by another which, like an envelope, obscures the original to anyone else, but commits the encoder to that value, he says.

In a similar way tough mathematical problems can shield information as it travels digitally, and the solutions can be rapidly verified when the information lands.

That complexity-based approach provides a system for secrecy without the need for physical means, and it allows us to do many more things than just send secret messages around, says Wigderson. You can use it to protect a vast array of transactions you might want to carry out in a digital world, and it led eventually to the revolution of online shopping and internet security.

Hamiltonian paths

Much like cryptography, the notion of hard-to-solve problems is not new. Irish mathematician William Rowan Hamilton, after whom the Hamilton Lecture is named, made contributions to the field in the 19th century, particularly with his exploration of Hamiltonian Paths, Wigderson says.

Think of a map with several cities on it, he says. Can you trace an unbroken route through those cities and visit each city only once? If there are 1,000 cities on this map, then it becomes a very hard problem to solve you seem to need to try all possible routes an astronomical number.

But if a solution, namely a route, is provided, then you can look at the map and quickly check that no city has been visited twice in the unbroken route. This was the kind of hard-to-solve but easy-to-verify problem that Hamilton explored. Today we know it to be a prototypical example of problems of this type it is as hard as any of them.

The mystery of A to B

One of the great mysteries of the field of complexity is what goes on between point A and point B, where some seemingly hard problems are solved. This, he says, has ramifications for questions far beyond cryptography, including climate, neuroscience, artificial intelligence and medicine.

How do you explain why a particular drug works to cure a disease, or how actions in the atmosphere affect weather and climate, or how a thought is generated in the brain, or how a neural network can beat a world champion at chess, he asks. It may be easy to verify that these things happen, but how do they happen?

Nor can we explain exactly how scientific luminaries such as Newton, Hamilton, Pasteur and Einstein came up with their insights and theories, he adds. They were extremely successful in explaining things that people hundreds and thousands of years before them couldnt explain that way, Wigderson points out. They came up with something that it seems was much easier to verify than to find.

Complexity and curiosity

He distinguishes between the questions of finding an algorithm that works, and the question of how it works. I think many people would be extremely happy if some black box would solve all their problems, making them happy and healthy and living for 100 years, even if they didnt quite understand how this algorithm came up with it, he says. I think that would be big progress.

But Wigderson, who in 2021 shared the prestigious Abel Prize with Lszl Lovsz for their foundational contributions to theoretical computer science and discrete mathematics, and their leading role in shaping them into central fields of modern mathematics, also wants to understand the how of the complexity that underpins outcomes. And his drive is simple: he is curious. I think it is the most natural thing in the world to want to understand how everything happens.

That curiosity continues to drive Wigderson: I am totally fascinated by computation and what it can and cannot do. And by computation, I do not necessarily mean computers; every physical and natural process that happens ocean waves or the weather or the evolution of growth of embryo in the uterus, or the leaves on a plant or the formation of seashells or viruses causing disease all these processes are computations, in that they evolve in a sequence of simple, local steps like a computer programme.

Taking a computational approach to the natural world can yield important insights, Wigderson believes. We saw in the 1950s how Alan Turing, a mathematician famous for deciphering code, proposed a simple model that shows how patterns such as spots and stripes on animals skin can evolve. Working with computation and complexity you can get profound insights into the natural world and many of the issues that are facing us today, and I find that fascinating.

Hamilton Lecture 2022

Prof Avi Wigderson of the Institute for Advanced Study, Princeton University will deliver the 2022 RIA Hamilton Lecture on Cryptography: Secrets and Lies, Knowledge and Trust on Monday, October 17th, 2022 at 6pm-7.30pm. Tickets are free

Originally posted here:
Cracking the code of cryptography and life The Irish Times - The Irish Times

Dutch influence standards for post-quantum cryptography – ComputerWeekly.com

The US National Institute of Standards and Technology (NIST) has chosen the first group of encryption tools designed to withstand the attack of a future quantum computer, which could potentially crack the security used to protect privacy in the digital systems we rely on today.

Lo Ducas, senior researcher in the cryptology group at the Netherlands Centrum Wiskunde & Informatica (CWI),the national research institute for mathematics and computer science, is involved in the two most important algorithms of the upcoming NIST portfolio one for public key encryption and one for digital signatures.

According to Ducas, who is also a professor at the University of Leiden, these new standards are inevitable because there is nervousness about the arrival of quantum computing. We know quantum computing will not be rife tomorrow, but this standardisation procedure and its deployment take time, he said. Obviously there is certain sensitive information that needs to be secure and confidential not just at present, but in the future as well. Take state secrets, for instance.

Cyber security experts have warned that hackers are stealing data now to decrypt it in the future, when quantum computing could render modern encryption methods obsolete. A report published by NIST in April 2016 cited experts that acknowledged the possibility of quantum technology rendering the commonly used RSA algorithm insecure by 2030. We need to be ready for that, said Ducas. This means we have to anticipate now.

The announcement of the chosen tools follows a six-year effort managed by NIST, which started in 2016 with a call for the worlds cryptographers to devise and then vet encryption methods that could resist an attack from a future quantum computer. A total of 23 signature schemes and 59 encryption schemes were submitted, of which 69 were deemed complete and proper. The NIST competition consists of four rounds, during which some schemes are discarded and others studied more closely.

In July this year, NIST announced the first group of winners from its competition, which included Crystals-Kyber and Crystals-Dilithium, both developed by an international collaboration in which CWI participated. Other team members are ENS Lyon, Radboud University, Ruhr University Bochum, University of Waterloo, IBM, NXP, ARM, SRI International, Florida Atlantic University and Tsinghua University.

It was a rather big team, but that was the key aspect, said Ducas. It consisted of both industrial and academic people, and all their knowledge was necessary to develop the algorithms we have. Take NXP, for example they build chips and already use cryptology to embed in those chips. We needed their knowledge for the design, because it is essential that what we develop not only fits into devices like smartphones and laptops, but also in other places where chips are being used, like in the automotive industry. Fitting cryptology can be a big challenge.

Apart from the two algorithms in which CWI was involved, two further algorithms for signatures were selected by NIST Falcon and Sphincs+. Sphincs+ also was partially conceived in the Netherlands, led by Andreas Hsling from TU Eindhoven.

Ducas added: The selection of our schemes as a standard means that it will be deployed globally, protecting the privacy of billions of users. Fundamental research rarely gets such a direct and broad impact. The credit should go to the whole cryptographic research community. Whe schemes we proposed are merely the crystallisation of decades of scientific effort.

The algorithms developed by the international team are based on lattices, one of Ducas specialities. Both were designed together and share more than just the same mathematical platform, he said. We tried to make them look alike, so they will be easy to implement together. The Falcon algorithm designed for signatures also uses a lattice platform.

But that is where the similarity ends, said Ducas. This algorithm has different advantages and drawbacks.

One of his biggest concerns is that this algorithm computes with floating point numbers, as opposed to integers. Computers are obviously equipped to do this, but it is a real challenge for cryptology, said Ducas. Rounding can differ from computer to computer, so it has challenges for implementation. But because of its shorter keys, it was also selected for the NIST portfolio.

Now the four algorithms have been selected, they need to be written down into proper standards. This is obviously where NIST comes in, whereas we are mainly academics and technicians, said Ducas. NIST will draft up the ultimate text for the standard, but it will be in coordination with us.

NIST hopes to publish the standardisation documents by 2024 but, according to Wikipedia, may speed up the process if there are major breakthroughs in quantum computing.

After the release of the standards, the industry needs to be pushed to put them to use, said Ducas. I have a suspicion that most companies will want to be post-quantum resistant, so I think these standards will be easier to push than, for example, the hash function update from SHA-1 to SHA-2, he said. Moreover, I think IBM and NXP will incorporate their own designs within their own products.

Eventually, NIST is pushing the core of the new standard, the mathematical knowledge, but on top of that, there are a lot of things that are involved, like protocols, documentation, and so on. It might even evolve into an ISO standard, who knows, but NIST is leading the crowd.

So, will the new standards ensure we will be safe from quantum computers ability to possibly crack the RSA encryption? This is related to the P versus NP problem, said Ducas. The best guarantee we can have are the years of documented failures. This is the case with existing cryptology, and still is the case with post-quantum cryptology.

There is reasonable confidence to deploy, but no absolute mathematical guarantee. This is why we often say that cryptographers seldom sleep at night.

Read more from the original source:
Dutch influence standards for post-quantum cryptography - ComputerWeekly.com

Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution – Business Wire

SCOTTSVILLE, Va.--(BUSINESS WIRE)--Castle Shield Holdings, LLC., a leader in Zero Trust and cybersecurity solutions, today announced that its Aeolus VPN solution now supports additional post-quantum cryptography (PQC) algorithms selected by the National Institute of Standards and Technology (NIST).

Last year, prior to the conclusion of the third round of the NIST PQC Standardization, we announced the successful integration of the Saber algorithm into Aeolus VPN. Reference our October 11, 2021, press release.

NIST has now selected two primary PQC algorithms for most use cases: CRYSTALS-KYBER and CRYSTALS-Dilithium. In addition, the signature schemes FALCON and SPHINCS+ were standardized as well. Kyber and Dilithium were both selected for their strong security and excellent performance, and NIST expects them to work well in most applications. Therefore, we have integrated Kyber (i.e., Kyber1024) and Dilithium (i.e., Dilithium5) algorithms into Aeolus VPN as well.

Aeolus VPN protects data between two or more network points. It offers a streamlined approach to privacy which results in more stability and lower latency that is a perfect addition to enterprise data-in-motion security for both classic and post-quantum computing environments. Aeolus VPN offers point-to-point asymmetric PQC and symmetric encryption for UDP and TCP on Windows, Linux and macOS platforms.

At Castle Shield, we are encryption agnostic. As NIST selects new PQC standards, we will add them to our suite of solutions that further demonstrates the cryptographic agility of our products. Our primary focus is to seamlessly integrate the best encryption algorithms available with our solutions to protect our customers data for today and tomorrow, said Dr. Milton Mattox, Chief Technology Officer at Castle Shield, Holdings, LLC.

Aeolus VPN with PQC continues to be available today for testing, proofs of concept, and production installations.

About Castle Shield Holdings, LLC

Founded in 2019, Castle Shield offers a complete range of enterprise-grade cybersecurity solutions that protects enterprises and consumers against all internal and external cyber threats. Our quantum-resistant solutions (Fides) stand strong as the last line of defense for enterprise and consumer data in the emerging quantum computing threat landscape. Legion, our Security Information Event Management or (SIEM) product portfolio and Fides work together to strengthen your overall data security. We monitor and address threat vectors through our scalable, multi-tenant SIEM platform, protecting enterprise systems and data in an efficient, cost-effective manner. In addition, we utilize an advanced compliance platform (Senate) and expert analysis with an in-depth understanding of dynamic compliance standards and industry best practices to highlight cyber risk factors. Our Senate system provides comprehensive ratings for third party vendors based on technical risk scores, compliance, and financial impact in the event of a breach. Our 360 proactive security solutions are what sets Castle Shield apart independent of your IT backbone whether cloud, hybrid or premise based. For further information, please go to http://www.castle-shield.com

Read more from the original source:
Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution - Business Wire

Yale increases investment in blockchain research – Yale Daily News

Yale, which was ranked 34 in Coindesks 2022 Best Universities for Blockchain, has invested significantly in the rapidly growing field.

Alex Ye 12:08 am, Oct 12, 2022

Staff Reporter

Zoe Berg, Senior Photographer

This time last year, Yale was unranked in CoinDesks Best Universities for Blockchain. A year later the University places 34th overall, on par with Harvard and other major universities around the world.

The reports results recognize Yales recent significant investments into blockchain research, including the hiring of four new blockchain experts to the Computer Science faculty, Ben Fisch, Charalampos Papamanthou, Katerina Sotiraki and Fan Zhang one of whom is leading a project that has received a $5.75 million grant for blockchain development.

In the last few years, blockchain, as an interdisciplinary field, has spurred a huge amount of development in distributed systems and cryptography and their intersection, said Fisch. This is also why its such a fascinating academic topic, because it ties together so many different fields, not only from computer science, but also from economics, law and policy. Yale has a very unique combination of strengths in all these different areas, especially at present.

In August, Yale blockchain researchers accepted a $5.75 million grant from the Algorand Foundation, a not-for-profit organization focused on the development of blockchain technology.

The grant will support PAVE: A Center for Privacy, Accountability, Verification and Economics of Blockchain Systems, which will be led by Papamanthou. PAVE will bring together a cross-disciplinary team of experts from four institutions Yale, Columbia University, the City College of New York and the Swiss Federal Institute of Technology Lausanne, with Yale being the leading institution to advance research of blockchain systems.

Apart from the technical agenda, PAVE will also host hackathons, symposiums and blockchain summer schools.

The expansion of blockchain research at Yale coincides with the rise of the blockchain technology market. The value of blockchain technology in the banking, financial services and insurance sector market is expected to grow by $4.02 billion between 2021 and 2026, according to Technavio. The Technavio study found that easier access to technology and disintermediation of banking services will create more growth opportunities within the industry.

Papamanthou believes the hirings acknowledged the importance of blockchain, and that the University has more generally acknowledged the interdisciplinary nature of the blockchain space. He emphasized the University provides opportunities to explore the blockchain industry, such as interdisciplinary majors like computer science and economics.

Papamanthou spotlighted the newly established Roberts Innovation Fund created by the School of Engineering and Applied Sciences, which assists blockchain projects that could be commercialized through funding and mentoring.

An increasing number of students are interested in the field of blockchain, according to Mariam Alaverdian 23, president of the Yale Blockchain Club.

Alaverdian explained that because of the many applications of blockchain technology from personal identity security to healthcare to money transfers the emergence of blockchain into our lives is inevitable. She added that the Yale Blockchain Club has seen interested students come from a variety of backgrounds, with some having no prior exposure and others who already have startups in the space.

The Yale Blockchain Club started last spring and we received a lot of attention from Yale undergraduate and graduate students, Alaverdian wrote in an email to the News. We had 600 people sign up for our mailing list within a couple of weeks there is definitely a high demand from Yale students for educational materials and guidance.

As the blockchain industry has continued to grow, Yale has been a fierce advocate for blockchain research and development, Papamanthou noted.

Papamanthou explained that because Yales faculty is now made up of leaders in the field of

distributed computing and cryptography, the potential blockchain innovation at Yale could be unprecedented.

Its amazing that Yale has hired two phenomenal professors, Ben Fisch and Fan Zhang, whose research focuses on aspects of blockchains, said Roshan Palakkal 25, a student in Frontiers of Blockchain Research, a course taught by Fisch. Yale CS typically isnt known to be the best, but I think the new classes and faculty have positioned it to become one of the best universities for blockchain, with lots of potential for interdisciplinary collaboration in areas like economics, global affairs, and public policy.

Papamanthou added that students who are interested in blockchain have access to a variety of courses across the Computer Science and Economics Departments, as well as at the Yale School of Management and Yale Law School.

According to Fisch, from a computer science perspective, Yale is educationally competitive with any other university in the field of blockchain.

I will be offering a course in the spring that is comparable to the blockchain course thats offered by Stanford, Fisch said. And the research seminar that Im teaching now is uncommon at other universities, as it really goes in depth at a graduate level into all the most recent research topics that are being worked on currently.

The Yale Computer Science Department is located at 51 Prospect St.

Alex Ye covers faculty and academics. He previously covered the endowment, finance and donations. Originally from Cincinnati, Ohio, he is a sophomore in Timothy Dwight majoring in applied mathematics.

Here is the original post:
Yale increases investment in blockchain research - Yale Daily News

OPPO joins the FIDO Alliance, accelerating the arrival of a new era of passwordless sign-ins – Yahoo Finance

The replacement of traditional password-based authentication mechanisms with leading passwordless technology will allow OPPO users to benefit from faster, more convenient, and more secure logins across different accounts, services, and platforms

DUBAI, UAE, Oct. 14, 2022 /PRNewswire/ -- OPPO recently announced that it has joined the FIDO (Fast IDentity Online) Alliance, an open industry association with a mission to develop authentication standards that reduce the world's over-reliance on traditional passwords. As a member of the Alliance, OPPO will support the development and implementation of the latest FIDO standards for passwordless logins, utilizing basic public passkey cryptography and the protocols defined by FIDO, to provide users with a fast, user-friendly, and secure sign-in experiences across services.

OPPO joins the FIDO Alliance (PRNewsfoto/OPPO)

Today's average internet user has dozens of online accounts, making managing large numbers of passwords a very time-consuming and frustrating task for both users and organizations. At the same time, password-only authentication methods suffer a few severe setbacks from high administration costs involved in changing and resetting user passwords to the considerable security risks from weak passwords and password reuse across multiple accounts. As such, there have been calls across the technology industry to move towards a sign-in mechanism that can mitigate the reliance on passwords or even replace them entirely.

Founded in 2012 to help reduce the world's over-reliance on passwords, the FIDO Alliance works to develop standards for password-free identity authentication and login for websites, services, and applications worldwide. The Alliance's latest authentication specification, FIDO2, provides a secure and convenient technical framework supported by companies including Google, Microsoft, and Qualcomm.

Following its entry into the FIDO Alliance, OPPO will actively use FIDO standards across its smart devices and work on optimizing user experiences and improving authentication security. In the future, users can use OPPO smartphones to work as a "passkey" to log in to different services across browsers, apps, and platforms, which helps create a seamless connected experience. When using multiple smart devices, users can automatically access their FIDO credentials on the core OPPO device without re-enrolling every account on other OS platforms or browsers.

Story continues

As a member of the FIDO Alliance, OPPO will also join the different technical and regional FIDO working groups, through which OPPO will make technical contributions to bringing password-free login technology to more use cases and services.

In the digital world, greater information flows lead to greater security challenges. Through its brand proposition of "Inspiration Ahead," OPPO will work with partners across the industry to create more secure and convenient password-free connected experiences that enable new intelligent experiences for more users.

About OPPO

OPPOis a leading global technology brand since 2004, dedicated to providing products that seamlessly combines art and innovative technology.

OPPO is on a mission to build a multiple-access smart device ecosystemfor the era of intelligent connectivity. The smartphone deviceshave simply been a gateway for OPPO to deliver a diverse portfolio of smart and frontier technologies in hardware, software and system. In 2019, OPPO launched a $7 Billion US Dollar three-year investment plan in R&D to develop core technologies furthering design through technology.

OPPOis firmly pursuing the creation of the best technology products and technological artistry for global users. Based on the brand elements of leading, young and beautiful, OPPO dedicates to the mission of letting extraordinary users enjoy the beauty of technology.

For the last 10 years, OPPO has focused on manufacturing smartphoneswith camera capabilities that are second to none. OPPO launched the first mobile phone, the Smile Phone, in 2008, which marked the launch of the brand's epic journey in exploring and pioneering extraordinary technology. Over the years, OPPO has built a tradition of being number one, which became a reality through inventing the world's first rotating camera smartphoneway back in 2013, launching the world's then thinnest smartphone in 2014, being the first to introduce 5X Zoom 'Periscope' camera technology and developing the first 5G commercial smartphonein Europe.

Today, OPPO was ranked as the number four smartphone brand globally. OPPO brings the aesthetics of technology to global consumers through the ColorOS system Experience, and Internet services like OPPO Cloud and OPPO+.

OPPO's business covers 60 countries and regions, with more than 40,000 dedicated employees to create a better life for customers around the world.

About OPPO MEA

OPPO started its journey in the Middle East and Africa (MEA) region in 2015 after setting up its regional office in Egypt. Following the immense success of the brand's sales centre in Cairo in the first year, OPPO accelerated its expansion plan across the MEA region and inaugurated its country operations in the UAE in 2019. Now OPPO is physically present in more than 14 markets across the region, including Egypt, Algeria, Tunisia, Morocco, Bahrain, Saudi Arabia, UAE, Oman, Kuwait, Qatar, Kenya, Nigeria, South Africa and the Levant.

To empower its presence in the region in line with its product localisation strategy, OPPO further invested in MENA and set up its very own factory in Algeria in 2017, thus, becoming the first Chinese brand to build a manufacturing premise in North Africa. Based on insights of local consumers in each country, OPPO has evolved the progress of product localisation, taking into consideration several perspectives towards each market, including product localisation, to further meet the core needs of users; marketing localisation, to better communicate with local young customers; and talent localisation, to understand local consumers further and provide optimum customer service.

Within the last year, OPPO has started to adjust its product line in the Middle East region specifically. This has included the launch of its flagship OPPO Find X Series and the introduction of the OPPO Reno Series. OPPO will continue to evolve its local product line to offer more premium series to consumers in the region.

A forward-thinking international technology company, OPPO strives to be a sustainable company that contributes to a better world and has enacted positive change in every way possible through activating local community initiatives and humanitarian, and charity campaigns.

Photo - https://mma.prnewswire.com/media/1921432/OPPO_joins_the_FIDO_Alliance.jpgLogo - https://mma.prnewswire.com/media/1451542/OPPO_Logo.jpg

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/oppo-joins-the-fido-alliance-accelerating-the-arrival-of-a-new-era-of-passwordless-sign-ins-301649591.html

SOURCE OPPO

See the original post here:
OPPO joins the FIDO Alliance, accelerating the arrival of a new era of passwordless sign-ins - Yahoo Finance

It’s Time To Trust Crypto. Here’s Why. – Entrepreneur

Opinions expressed by Entrepreneur contributors are their own.

The future of money is changing. Many people think it's already changed but it hasn't. Cryptocurrency is the future of money, but it still has a long way to go before its full potential can be realized.

Cryptocurrency is a digital currency that uses encryption to secure transactions and control the creation of new coins. The technology behind it is called blockchain, which is a digital ledger that records all the transactions. Cryptocurrency can be further defined as a decentralized system that uses cryptography to secure transactions and control the creation of new units of a particular cryptocurrency, referred to as "coins" or "bills."

Related: Smart Businesses Shouldn't Abandon Crypto. Here Are 3 Reasons Why.

The use of digital signatures provides powerful protection against fraud. However, there are other means by which an individual may attempt to gain unauthorized access or otherwise corrupt data within this system, such as altering transaction records after users have submitted them to take advantage of loopholes.

The first known use of cryptocurrency was in a paper published by Wei Dai in 1998 on "b-money," an early form of cryptographic currency based on proof-of-work. The idea was further popularized by Nick Szabo's description of "bit gold" and Hal Finney's reusable proof of work (RPOW) system in 1998. The first decentralized cryptocurrency created was Bitcoin, released in 2009 by Satoshi Nakamoto. At the time, it was worth less than one cent. Today it is worth over $20,000 per unit and is one of the most widely used cryptocurrencies on the market.

Cryptocurrency has moved from the realm of hackers and techies into the mainstream culture more quickly than anyone could have imagined. Countries are embracing it as an alternative monetary system, and many people in developing countries rely on cryptocurrency for their income due to its high volatility.

The potential for crypto as a medium of exchange is growing; tech giants Google and Facebook have announced their interest in the technology. Furthermore, major banks have begun integrating it into their business operations.

Cryptocurrency may become ubiquitous in the future, but there are still major hurdles to overcome before this happens. The biggest challenge for most people is understanding how crypto works. Many people won't use it unless they understand what the crypto is worth (or how much money you can get for it) or how easy it is to buy them with cash at a local ATM.

It also remains unclear whether governments will accept transactions using digital currencies like bitcoin. After all, if everyone began using them instead of government-issued money like dollars or euros, governments would lose control over monetary policy.

Related: 5 Tips for Using Cryptocurrency in Your Small Business

In centralized banking, corporate boards or governments control currency supply by printing units of fiat money or demanding additions to digital banking ledgers. If you were wondering, fiat means "by decree," so dollars are just pieces of paper with no intrinsic value. Their value comes from a government decree that they are legal tender.

However, cryptocurrency is becoming more viable. After all, it's a way for people to invest in the future of money. By investing in cryptocurrencies, folks are supporting the technology behind it and helping it succeed.

If you have followed developments in cryptocurrency over the past few years, you know that many countries are embracing this new monetary system. The most notable example would be Japan which has recently legalized Bitcoin as an official payment method. This means that all businesses therein now have to accept Bitcoin as a form of payment if they want to do business with local customers or government agencies who use Bitcoin as their official currency.

In many developing countries, cryptocurrency is a way to make money. It's a way to make money online, and it's also a way to make money from home. Cryptocurrency is a great way to start making extra income from home with no startup cost and no prior experience required. In addition, the crypto economy is growing exponentially, meaning anyone who gets in on the ground floor can reap huge profits for years into the future.

The future of cryptocurrency is exceptionally promising. With the rise of Bitcoin, we have seen that a new form of money can be created and distributed globally without any central control or regulation. However, the real value comes when you get people using it in their everyday lives because they believe in its use case as a currency or store of value. At this rate, that day may be sooner than we think.

Related: 5 Things to Know Before You Invest in Cryptocurrency

Excerpt from:
It's Time To Trust Crypto. Here's Why. - Entrepreneur

Algorand (ALGO) on its journey to breach the $0.4 mark! – CryptoNewsZ

The success of a cryptocurrency depends on the team of developers and marketers. Algorand has a strong team behind the network to run the project successfully for the long term. The founder of Algorand, Silvio Micali, was the faculty at Electrical and Computer Science, MIT.

He knows cryptography and other technologies to run the network. Moreover, he is the inventor of zero-knowledge-proof technology that is the anchor of many cryptocurrencies. He is working with another tech-savvy member Chris Peikert, the head of cryptography of this network.

Besides that, interoperability is a big factor that makes Algorand unique from other cryptocurrencies. Anything built on this platform can easily be connected to other blockchain systems. Experts think it is the heart of this blockchain, allowing the mass adoption of this blockchain facility.

Interoperability is the key to future success because when it comes to decentralized applications, one application that has been built on Ethereum must be connected to Cardano, Solana, and other platforms. The number of projects built on Algorand has grown exponentially in the last few years.

It is currently running some high-potential projects and decentralized applications which are used by financial institutions. From an investor perspective, you can consider that when high-potential projects grow, the value of Algorand will grow exponentially.

Cryptocurrencies that are listed in multiple exchanges are a sign of good fundamentals and popularity. The good news is major crypto exchanges have listed ALGO for trading and investing purposes.

Binance and Coinbase are two such crypto exchanges that regularly delist cryptocurrencies, but ALGO receives good volumes on these exchanges. In a market that is saturated with different types of projects, driving new investments is critical, but Algorand has been doing well since its launch.

At the time of writing this post, ALGO was trading around $0.328, above the support of $0.30. On the daily chart, Algorand candlesticks are in the lower range of the Bollinger Bands. Though MACD is bearish, and RSI is at 46, we think it is an ideal time to invest for the short term. Read our ALGO prediction for a more detailed future price projection of the token.

On the weekly chart, ALGO candlesticks are forming around the baseline of the Bollinger Bands, but we do not think it is an ideal time to invest for the long term because it has been consolidating within a range with the strong support of $0.28. Algorand might not break the support soon, but you should invest for the long term when it exceeds at least the immediate resistance level.

Originally posted here:
Algorand (ALGO) on its journey to breach the $0.4 mark! - CryptoNewsZ

Bitt and IDEMIA: Winners of the G20 Central Bank Digital Currency TechSprint 2022 – Yahoo Finance

SALT LAKE CITY, Oct. 12, 2022 /CNW/ --Bitt and IDEMIA are pleased to have won the 2022 G20 TechSprint global CBDC competition. The announcement came ahead of the G20 Bali Summit from the Bank for International Settlements (BIS) and Bank Indonesia as they concluded their third annual contest, which received more than 100 submissions from many of the world's leading financial, technology, science, and marketing companies. An independent panel of 11 experts, convened by Bank Indonesia, assessed the developed prototypes from the shortlisted teams to determine the winners.

Bitt and IDEMIA joined forces to bring together Bitt's Digital Currency Management System (DCMS) and IDEMIA's secure solution for offline CBDC payments. The different components enable central banks to launch their CBDC with complete interoperability with current systems, to ensure low-cost access with a variety of easy-to-use payment devices and the best identity management verification available in full compliance with regulatory requirements.

This is the promise to offer a truly inclusive and convenient CBDC with no compromise on usability or security. "Bitt and IDEMIA are humbled to have been given such a prestigious award! Our solution gives everyone access to CBDC, even to those who cannot afford a smartphone. We help fulfill the vision to make digital cash available anywhere and anytime, with or without network coverage," says Jerome Ajdenbaum, VP Digital Currencies at IDEMIA.

Imran Khan, EVP of Partnerships of Bitt, says "We are honored to have Bitt recognized as one of the primary leaders in the CBDC space. Our partnership with IDEMIA propelled our organizations to develop and showcase our best work, and we look forward to offering offline payment solutions to the world's monetary authorities and financial institutions as we support them in expanding financial services to all members of society."

About IDEMIA As the leader in identity technologies, IDEMIA is on a mission to unlock the world and make it safer. Backed by cutting-edge R&D, IDEMIA provides unique technologies, underpinned by long-standing expertise in biometrics, cryptography, data analytics, systems, and smart devices. IDEMIA offers its public and private customers payment, connectivity, access control, travel, identity, and public security solutions. Every day, around the world, IDEMIA secures billions of interactions in the physical and digital worlds. With nearly 15,000 employees, IDEMIA is trusted by over 600 governmental organizations and more than 2,300 enterprises spread over 180 countries, with an impactful, ethical, and socially responsible approach.

Story continues

For more information, visit http://www.idemia.com

About BittBittis a financial technology company that provides digital currency solutions to central banks, financial institutions, and ecosystem participants worldwide. Bitt's Digital Currency Management System (DCMS) provides the secure infrastructure for monetary authorities to deploy CBDCs, and for financial institutions to integrate digital currencies into their financial service offerings. Bitt is a portfolio company of Medici Ventures, L.P., a blockchain-focused fund. The general partner of that fund is an entity affiliated with Pelion Venture Partners. Overstock.com, Inc. (NASDAQ:OSTK) is a limited partner of Medici Ventures, L.P. For more information on Bitt, please visit https://www.bitt.com.

About Overstock.comOverstock.com, Inc. (NASDAQ:OSTK) is an online retailer and technology company based in Salt Lake City, Utah. Its leading e-commerce website sells a broad range of new home products at low prices, including furniture, dcor, area rugs, bedding and bath, home improvement, and more. The online shopping features millions of products that tens of millions of customers visit each month. Overstock regularly posts information about the Company and other related matters on the Newsroom and Investor Relations pages on its website, Overstock.com.

O, Overstock.com, O.com, and Club O are registered trademarks of Overstock.com, Inc. Other service marks, trademarks and trade names which may be referred to herein are the property of their respective owners.

About Pelion Pelion Venture Partners is an early-stage venture capital firm. Currently investing out of their seventh fund, Pelion invests in Seed and Series A software companies across the United States. Notable investments include: Cloudflare, Riverbed, Divvy (acquired by Bill.com), and Weave.

Chris BurnettMarketing ManagerE-mail: pr@bitt.comWebsite: http://www.bitt.com

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/bitt-and-idemia-winners-of-the-g20-central-bank-digital-currency-techsprint-2022-301647584.html

SOURCE Bitt

Cision

View original content to download multimedia: http://www.newswire.ca/en/releases/archive/October2022/12/c9690.html

Read more from the original source:
Bitt and IDEMIA: Winners of the G20 Central Bank Digital Currency TechSprint 2022 - Yahoo Finance

Crypto Hackers Gross Over $3 Billion From 125 Hacks so Far This Year Featured Bitcoin News – Bitcoin News

Data from blockchain analytics firm Chainalysis shows that October is the biggest month in the biggest year ever for hacking activity. The firm added that crypto hackers have grossed over $3 billion across 125 hacks so far this year.

Chainalysis shared some crypto-related hacking statistics Wednesday. The blockchain data analytics firm explained that back in 2019, most hacks targeted centralized exchanges. However, a vast majority of targets are now decentralized finance (defi) protocols. Chainalysis wrote:

After four hacks yesterday, October is now the biggest month in the biggest year ever for hacking activity So far this month, $718 million has been stolen from defi protocols across 11 different hacks.

The four hacks that took place on Tuesday involved Rabby wallet, QANPlatform, Temple DAO, and Mango Markets. The biggest exploit of the four was the Solana-based defi protocol Mango Markets hack which saw about $115 million stolen.

Cross-chain bridges remain a major target for hackers, with 3 bridges breached this month and nearly $600 million stolen, accounting for 82% of losses this month and 64% of losses all year, Chainalysis detailed, elaborating:

At this rate, 2022 will likely surpass 2021 as the biggest year for hacking on record. So far, hackers have grossed over $3 billion dollars across 125 hacks.

What do you think about the findings by Chainalysis? Let us know in the comments section below.

A student of Austrian Economics, Kevin found Bitcoin in 2011 and has been an evangelist ever since. His interests lie in Bitcoin security, open-source systems, network effects and the intersection between economics and cryptography.

Image Credits: Shutterstock, Pixabay, Wiki Commons

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Read the original post:
Crypto Hackers Gross Over $3 Billion From 125 Hacks so Far This Year Featured Bitcoin News - Bitcoin News

White House Releases First-Ever Comprehensive Framework for Responsible Development of Digital Assets – Lexology

On Sept. 16, 2022, the White House released a comprehensive framework for responsible digital asset development and, in particular, cryptocurrency. Agencies across the federal government have been working for the past six months to develop frameworks and policy recommendations to advance the six key priorities identified in President Bidens March 9 executive order on Ensuring Responsible Development of Digital Assets: (1) consumer and investor protection, (2) financial inclusion, (3) promoting financial stability, (4) responsible innovation, (5) U.S. leadership in the global financial system and economic competitiveness, and (6) countering illicit finance. This framework comes weeks after the California Senate unanimously passed the Age-Appropriate Design Code Act on Aug. 29, 2022, reflecting an increased focus on platform accountability, transparency and consumer protection at both the state and federal levels.

This blog post will focus specifically on the frameworks implications for data, privacy and cybersecurity regulation under two large themes: (1) incoming federal guidance and (2) collaboration across federal agencies and across sectors. An alert on the potential enforcement implications of this framework can also be found here.

Upcoming Guidance

The framework indicates that agencies such as the Treasury and the Department of Commerce will issue guidance regarding responsible digital assets. Most of the proposed regulations are still developing for example, the framework indicates that agencies will issue guidance and rules to address current and emergent risks in the digital asset ecosystem but does not specify which agencies are involved or the types of risks to be addressed. That said, the framework does indicate that Congress will amend existing laws, such as the Bank Secrecy Act, anti-tip-off statutes and laws against unlicensed money transmissions, to apply explicitly to digital asset service providers, including cryptocurrency and nonfungible token platforms (NFTs). President Biden is also considering creating a federal framework to regulate nonbank payment providers. These upcoming regulatory changes may result in purveyors of digital assets being subject to new or additional information security protections.

Lastly, the framework also indicates that the Office of Science and Technology Policy (OSTP) and the National Science Foundation (NSF) will develop the Digital Assets Research and Development Agenda to research topics such as next-generation cryptography as well as cybersecurity and privacy protections. The agenda has not been released at this time, though it may give insight into any federal privacy legislation to come.

Cross-Collaboration

Regarding cross-collaboration, the framework indicates that federal agencies will work across sectors to better provide regulatory guidance on digital assets like cryptocurrency. Specifically, the Treasury will work with U.S. firms developing new financial technologies through things like U.S. regulation-oriented tech sprints and innovation contests. Additionally, the Department of Commerce will establish a forum for federal agencies, industry, academia and civil society to exchange knowledge and ideas that could inform federal regulation, standards, coordinating activities, technical assistance and research support. The framework also commits the U.S. to promoting values like data privacy and consumer protection at international organizations, pointing to a potential expansion of federal privacy regulation in the future.

Takeaway

While this framework specifies a path forward for financial technology firms, the broad nature of this developing framework may have ripple effects that touch many industries involved in data and privacy beyond crypto wallets and NFT creators. More light will be shed on what these effects will look like as more information comes out, particularly with respect to the OSTP/NSFs Digital Assets Research and Development Agenda and the Department of Commerces cross-sector standing forum.

Read more from the original source:
White House Releases First-Ever Comprehensive Framework for Responsible Development of Digital Assets - Lexology