The Web3 Foundation taps edX for free courses on blockchain and Polkadot – Cointelegraph

The Web3 Foundation and the global online learning platform edX launch a series of foundational courses in blockchain technology and the Polkadot platform. The four-part series, called Web3x, will cover the fundamentals of blockchain and explore the Substrate software development kit and the Rust programming language.

At the time of publication, the Web3x webpage contains only the first two courses: Introduction to blockchain and Web3 and Introduction to Polkadot. The former course explains the history and key terminology of blockchains, Bitcoin, Ethereum and Web3, and the technologies behind them. The latter provides the learners with the key terminology behind Polkadot (DOT) the concepts of shared security, interoperability, cryptography, consensus and the networking aspects of it.

The specific choice comes as no surprise the Polkadot layer-0 blockchain network is the flagship protocol for Web3 Foundation. Both courses start on Oct. 27 and can be joined for free.

Commenting on the launch of the joint initiative, Web3 Foundation CEO Bertrand Perez emphasized the importance of edXs expertise in online learning:

Web3 Foundation was established in 2017 in Zug, Switzerland, by Ethereum co-founder and former chief technology officer Gavin Wood. Since that time, it has supported with grants more than 300 projects in 50 countries. It also works as a research group, focusing on cryptography, networking and decentralized algorithms.

Related: BNB Chain to boost European Web3 startups with DApp incubator program

In a recent survey, the online educational platform Study.com found that 64% of the parents and 67% of the college graduates surveyed believed that cryptocurrencies should be part of mandatory education. Both groups had a slightly different view when it came to the blockchain, the Metaverse and nonfungible tokens (NFTs). However, only around 40% believed those subjects should be included in the curriculum as well.

View post:
The Web3 Foundation taps edX for free courses on blockchain and Polkadot - Cointelegraph

CoinGeek Weekly Livestream: Jad Wahab and Marcin Zarakowski discuss honest nodes and their role in Bitcoin – CoinGeek

This week, Kurt Wuckert Jr. hosted a special episode of the CoinGeek Weekly Livestream, where he talked to two guests from the BSV Blockchain Association, Jad Wahab and Marcin Zarakowski, about what it means to run honest nodes and their role in Bitcoin.

The history of honest nodes

Wuckert begins by asking Jad Wahab about the one return bug. This allowed anynodeto act either honestly or dishonestly and reassign anunspent transaction output(UTXO) just by doing it. He asks Wahab to explain this process and why some people think of this as a bug, whereas others see it as a feature.

Wahab describes this as a philosophical thing and says it doesnt make that much difference. The system lends itself to miners becoming huge entities, investing lots of resources into their operations. This incentivizes them to behave morally and legally.

The digital asset recovery tool

Zarakowski starts to answer this with a more philosophical contemplation: he explains what Bitcoin is. He says that while some people perceive it as an anarchistic network where you can send transactions, it is not that.

We dont believe this mantra of not your keys, not your Bitcoin, he elaborates, outlining the BSV Blockchain Associationsposition that the system must operate within the law, including property law.

The Digital Asset Recovery Tool is a toolset or a set of software elements that allow for freezing assets when there is a valid court order. The set of software tools is composed of three elements, he says.

1. First is the node software all miners require this to participate in the network and mine blocks.

2. The second element is a standalone software that operates in conjunction with SV Node software called Blacklist Manager.It automates the process of putting certain UTXOs on the blacklist.

3. The third element has not yet been released. Its commonly referred to as a notary tool. It translates valid court orders into a machine-readable format and broadcasts them to Blacklist Managers run by miners.

Right now, the freezing of digital assets is possible. However, in time, parties with a valid court order will be able to recover digital assets.

On court orders

Wuckert says that as a miner onBitcoin SV(BSV), he has talked to his legal counsel about what court orders to honor. He has said that, obviously, they would not honor such an order from North Korea, but the question remains whether they should honor one from a local jurisdiction. He wonders what it might look like when two jurisdictions disagree.

There is nothing special about Bitcoin that can put it outside the applicable laws, including property law, Zarakowski says. He asks us to imagine we are not talking about Bitcoin at all. He tells Wuckert to imagine he brought his car to the United Kingdom and lent it to someone who refused to give it back. He says Wuckert would simply go to court, provide sufficient evidence that it was his, and get a legal order to return it. While this would not be immediately valid in Norway, for example, most developed countries have processes for the domestication and recognition of foreign judgments.

Circling back to the example of a North Korean court order, Zarakowski says it would only be valid if it had been domesticated and recognized in the United States or another credible jurisdiction.

Delving into what this would look like from a practical standpoint, Wahab explains that there is no creation of new coins. He says to think of a bag that locks thetokens, which can then be unlocked later when the coins need to be moved. He says that, as a matter of fact, miners could already blacklist coins on any chain if they wanted.

Zarakowski adds that a court order from a jurisdiction like the U.S. would probably be enough to cause some publicly traded BTC miners to capitulate. While he thinks theyd put up a legal fight, he doesnt think theyd be successful.

Revolution, counter-revolution, and disagreements

Wuckert sees the potential for a miner civil war breaking out over this. He wonders what this might look like and whoKraken, Huobi, etc., might side with. Zarakowski says that he believes exchanges would abide by the relevant court orders as they are business entities and wouldnt want to accept the risk. He believes this would lead to a paradigm shift that would awaken many BTC advocates to the reality of how the law applies to Bitcoin.

Wuckert wonders what happens if stolen coins are moved on before a court order can be issued. Zarakowski says he isnt sure how this will play out in most jurisdictions. He says to remember that the fact we are talking about Bitcoin doesnt matter the same laws apply as they would to any other sort of asset.

Answering a viewers question on what the point of using Bitcoin is at all if governments can just confiscate it, Wahab asks us to imagine a world where we could have random people stealing coins with no hope of recovery. He reminds us that Bitcoin was not designed to be political and wont solve such issues. It records transactions; it does not govern them.

Wuckert wonders what would happen if all of the nodes colluded to make a change, such as adjusting the difficulty. Wahab replies that all of the controls are legal in nature. For example, they could get sued for damages by parties using the blockchain. He reminds us thatSatoshi Nakamotosaid the rules are set in stone.

Backdoors and cryptography

Wahab wants to address an earlier question Wuckert asked about backdoors and cryptography. He reminds us that Bitcoin is not a cryptographic algorithm but an economic system. Thus, backdoors cant be added as they can in encrypted systems.

By contrast, everything that happens on Bitcoin is logged, and so its publicly visible on the ledger.

Theres no encryption on Bitcoin, he says.

The Set in Stone Narrative

Wuckert says that he has always considered miners as the fiduciary notaries of the system. They receive what they obtain and relay what they can, advocating with the strength of their signal that theyre taking a fiduciary role. However, there are people in both camps saying that whats being attempted here is impossible or technically infeasible. He wants to know what parts are set in stone and whether its possible to be a protocol spec that legally determines what Bitcoin is.

Zarakowski says it would be best to ask Satoshi about this, drawing laughter. Wahab says that some people consider Set in Stone almost religiously, while others see it as a technical thing. He says it is neither. Instead, legal controls keep things set the way they are. As everyone has agreed to a unilateral contract and has used the Bitcoin system with certain set rules, changing those rules leads to legal repercussions.

Wuckert interjects here to say his DMs regularly blow up with accusations that all of these interviews are smoke and mirrors and that everyone ultimately works for Dr. Craig Wright, who is attempting to steal Satoshis coins. Zarakowski responds that the legal recovery process is open to anyone (not just Dr. Wright), so anyone is free to try to beat him to the punch. Secondly, he asks us to see the good side of it: families that know their loved ones had bitcoins but who do not know the private keys will be able to recover what is rightfully theirs.

Nodes and exchanges

Wuckert says that this coin recovery is possible on BTC and BCH as well. He also notes that there are differences in these chains, such as script. He asks Wahab whether this software will be available on these chains. Wahab says he doesnt spend much time focusing on them because they wont last long, but from a technical standpoint, it can be done.

Zarakowski notes that once it is demonstrated as possible on BSV, legal attempts to say it isnt possible on other chains will cease to be convincing.

Closing thoughts

Wuckert wraps this one up with some closing thoughts. He expresses his reservations about new ideas related to Bitcoin. He says there are some things he doesnt like about Bitcoin, but he accepts them as unique, and we just have to deal with them as we have to deal with properties of gold or silver we might not like.

We often have to deal with distasteful realities, and we often have to accept what we cant change. He again calls for Bitcoiners who disagree to see each other as humans and deal with each other respectfully.

Watch: Where does Blacklist Manager (BM) feature within DAR Process Explainer

New to Bitcoin? Check out CoinGeeksBitcoin for Beginnerssection, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.

Continued here:
CoinGeek Weekly Livestream: Jad Wahab and Marcin Zarakowski discuss honest nodes and their role in Bitcoin - CoinGeek

What Is Cryptography? Definition & How It Works | Okta

Modern cryptography is a method of sending and receiving messages that only the intended receiver and sender can read to prevent third-party access. It often involves encryption of electronic data, which commonly creates ciphertext by scrambling regular text. Then, it uses a decryption key of some form to return it to readable format on the receiving end. Cryptography can involve either a symmetric key system, which is the simplest, or an asymmetric key system, which is typically more secure. Cryptography provides methods for secure communication and electronic data that malicious adversaries cannot read, interpret, or access.

Cryptography is used to keep messages and data secure from being accessible to anyone other than the sender and the intended recipient. It is the study of communications and a form of security for messaging. Ultimately, cryptography can keep data from being altered or stolen. It can also be used to authenticate users. Cryptography often uses encryption and an algorithm to keep electronic data and messages secure and only readable by the intended parties. Cryptography has been around for centuries. The term itself comes from the Greek word kryptos, which translates to hidden. Today, cryptography is based on computer science practices and mathematical theory.

There are two main types of cryptography used for digital data and secure messages today: symmetric cryptography and asymmetric cryptography. Hash functions, a third type, doesnt involve use of a key.

The intention of cryptography is to keep data and messages secure and inaccessible to potential threats or bad actors. It is often working behind the scenes to encrypt and decrypt data you are sending through social media, applications, interactions on websites, and email. Symmetric cryptography can be used for these purposes:

Asymmetric cryptography can be used for the following purposes:

Cryptography strives for private communications and data security to protect digital information from being altered, accessed, or read by anyone other than those with legitimate access. These are key principles of cryptography:

Messages and data should always be encrypted to ensure privacy and security. The best practices for cryptography include using an entire cryptographic system, or cryptosystem, that regularly uses multiple forms of encryption to keep data and communications safe and secure. This system should have an easy-to-use interface along with strong cryptographic algorithms that conform to the industrys best practices. For symmetric encryption, this means using AES with 128, 192, or 256-bit keys. For asymmetric encryption standards, it should include elliptical curve cryptography (ECC) and RSA. These are examples of files and data that should be encrypted and protected with cryptography:

Cryptographic methods need to be effective, but also user-friendly to ensure that they are actually going to be used as intended. Using encryption functions can also help to prevent the loss or theft of data even if the hardware itself is stolen or compromised. A strong cryptosystem should be able to hold up to the security community and not rely on security through obscurity. Instead, the system should be known, and the only thing kept secret and private are the actual keys. The public key can be publicized, but the secret or private key should be protected. These are methods for keeping your keys secure:

Cryptography is a necessary form of cybersecurity that uses encryption methods to keep digital data and communications secure and out of the hands of potential threats or bad actors. Data protection is highly important in this digital era where so much information is stored on computers, in the cloud, and on the internet. Data security is important to businesses, industries, companies, and individuals alike. Cryptography is a form of securing digital data and messages often using special keys that only the sender and recipient have access to. Cryptography uses mathematical systems and algorithms to encrypt and decrypt data. Symmetrical cryptography uses the same key for both encryption and decryption. It can quickly encrypt and decrypt data, and it is easy to use. It can also be compromised if a third party gains access to the key, however. It is important to keep your data encryption keys safe and secure. Sending your encryption key in a plain text form along with your encrypted message, for example, is similar to leaving your front door key in plain sight in front of your locked door. Keep your keys safe to keep your data safe. Asymmetrical cryptography is a step further than symmetrical cryptography, using different keys for encryption and decryption. The encryption key is public, and everyone has access to it. The decryption key is kept private, and only intended recipients can have access to this secret key. While this adds an extra layer of security, it can also take longer to encrypt and decrypt data, so it is regularly used for smaller bits of data. A strong cryptosystem often uses multiple forms of encryption and cryptographic methods to keep digital data private and secure from adversaries. Cryptography is a vital component of digital security.

Definition of Cryptography. (January 2022). The Economic Times.

Security Component Fundamentals for Assessment. (2020). Security Controls Evaluation, Testing, and Assessment Handbook (Second Edition).

Advanced Encryption Standard (AES). (2001). National Institute of Standards and Technology (NIST).

Compliance FAQs: Federal Information Processing Standards (FIPS). (November 2019). National Institute of Standards and Technology (NIST).

Security and Privacy in the Internet of Things. (2016). Internet of Things.

Elliptical Curve Cryptography ECC. (June 2020). National Institute of Standards and Technology (NIST).

Excerpt from:
What Is Cryptography? Definition & How It Works | Okta

What Is Cryptography in Cyber Security: Types, Examples & More

Cryptography is one of the oldest and most widely used tools for safeguarding IT assets. Nearly every business relies on cryptography to secure sensitive data and IT infrastructure. So, what is cryptography in cyber security, and how can it help you optimize your security posture? Put simply, its a way to make information unreadable by attackers, even if it is compromised.

Cryptography in computer network security is the process of protecting sensitive information from unauthorized access when it is at rest or in transit by rendering it unreadable without a key. Leveraging encryption, cryptography helps users secure data transmission over networks, ensuring that only individuals with designated keys can access encrypted data.

To answer the question, what is cryptography in cyber security?, this blog will:

In most cases, cryptography needs will vary depending on an organizations structure, security controls, and broader governance requirements. Partnering with a managed security services provider (MSSP) is the best way to optimize cryptography protection to your specific needs.

There is no shortage of methods of cryptography available on the market, so you might be wondering which cryptography types will work best for your organizations security needs.

In general, there are two types of cryptography widely used for cybersecurity applications:

Also called secret key cryptography, symmetric cryptography functions via cryptographic key sharing between users. In this method, the same key is used to encrypt and decrypt data and is typically shared between users. In theory, only an individual with a unique cryptographic key should be able to decrypt the encrypted data. Symmetric cryptography is often used to safeguard the local storage of sensitive data on drives or servers.

On another level, asymmetric cryptography is typically used to safeguard the transmission of sensitive data across public networks. Asymmetric cryptography is also called public key cryptography because its users must have two keys. One of the keys is considered a public key that can be provided to anyone either user communicates with. However, the second key decrypts the encrypted data and is meant to be kept private.

So how exactly does cryptography work? In practice, as with the primary types, there are two primary approaches or methods of cryptography, which work hand in hand to secure data:

Data encryption refers to the process of using an algorithm to convert binary data from one form to another, accessible only by a specific key. For encryption to work, an algorithm converts plaintext into a difficult-to-decipher form (also called ciphertext), which can only be converted back to plaintext with a cryptographic key. Developing complex encryption algorithms will help increase the security of data transmission and minimize the risks of data being compromised.

Decryption essentially reverses encryption. Using a cryptographic key that matches the encryption algorithm, a user can decrypt sensitive data whether at rest or in transit.

Depending on the complexity and robustness of the algorithms you use, both encryption and decryption in cryptography will help optimize your security posture and safeguard sensitive data.

With wide-reaching applications, cryptography can help secure a wide range of sensitive digital environments, regardless of organization size, business needs, or industry. Your choice of cryptographic solutions will depend on the type of security controls you need to implement.

Below are some of the common uses of cryptography:

Bring Your Own Device (BYOD) policies enable employees to use their own personal phones and computers at work or for workon premises and, potentially, for completing work tasks. But BYOD devices are at high risk for security threats if theyre used on unsecured, public networks.

The risk of data breaches is even higher if employees transmit sensitive data on these devices.

You should consider implementing BYOD device encryption if your employees can work remotely using their personal devices or bring them into work environments altogether.

Any emails containing sensitive data should be secured using industry-standard encryption algorithms that minimize the chances that cybercriminals will access the emailsor be able to read and use data within if they are accessed. End-to-end encryption tools can help secure sensitive emails, especially if private and public keys used to encrypt the emails are kept safe.

Encryption also extends to databases containing sensitive information such as:

Database encryption is critical to mitigating threat risks to data at rest across on-premise and cloud databases.

Encryption is also an essential tool for safeguarding your companys sensitive data such as:

One of the most common database encryption tools is transparent data encryption (TDE), which encrypts most SQL-based databases.

Secure websites are typically encrypted by the HTTPS protocol, which helps safeguard the confidentiality, integrity, and authenticity of transactions on the Internet.

HTTPS encryption also helps mitigate attacks like DNS spoofing, where cybercriminals attempt to direct users to unsecured websites to steal their sensitive information. HTTPS encryption is also widely implemented in customer-facing industries like retail, where customers can immediately identify an unsecured website based on the https in a websites URL.

Cryptography protection keeps your data confidential and maintain its integrity. Below are some benefits of email encryption, which can also apply to other forms of cryptography:

Encryption helps keep sensitive data confidential and minimize any risks of the data being exposed to cybercriminals. It is far easier to invest in a robust encryption method than risk compromising sensitive data belonging to valuable customers, vendors, or business partners.

When integrated into email applications, encryption can help identify potential phishing attempts and verify the authenticity of email senders, links, and attachments. Encryption will also make it easier for your employees to identify phishing threats and prevent any full-blown attacks.

Encryption also helps preserve the integrity of your sensitive data. Specifically, data is susceptible to security risks when its stored locally or in the cloud and during its transmission from one party to another. Using industry-standard encryption algorithms will help keep your data secure at all stages of storage or transmission.

Cryptography protection can also provide non-repudiation assurance, ensuring both parties receive confirmation of data transmission. When transmitting highly sensitive data to business partners, customers, or vendors encrypting your emails will also help avoid any legal issues, should one party claim a message was not sent, received, or processed.

Back to the starting question: what is cryptography in cyber security? Its a set of tools to help your organization keep data and other sensitive IT assets safe. Partnering with RSI Security will help optimize your cryptography, in-house or outsourced. Our cryptography services include:

As an experienced MSSP, our team of experts understands just how cumbersome it is to manage the encryption of endpoints across an organization. As threats keep evolving in todays IT landscape, we help optimize cryptography and ensure that encryption tools work robustly within your cybersecurity framework. To learn more, contact RSI Security today!

Read the original here:
What Is Cryptography in Cyber Security: Types, Examples & More

Decentralized Identifiers (DIDs) is Officially an Internet Standard, Says The World Wide Web Consortium (W3C) – bitcoinke.io

The World Wide Web Consortium (W3C), an international organization thatcreates standards for the World Wide Web, has announced that Decentralized Identifiers (DIDs) v1.0 is now an official Web standard.

This new type of verifiable identifier, which does not require a centralized registry, will enable both individuals and organizations to take greater control of their online information and relationships while also providing greater security and privacy.

There is a historical analog to this announcement in the evolution of mobile phone numbers. Originally these were owned by the mobile carrier and rented to the individual. This required individuals to change numbers if they changed carriers. With the adoption of mobile phone number portability, individuals could now take their numbers with them when switching carriers.

The same is true of most email addresses and social network addresses today they are not owned by individuals and must be changed if the individual changes providers. By contrast, W3C Decentralized Identifiers can be controlled by the individuals or organizations that create them, are portable between service providers, and can last for as long as their controller wants to continue using them.

Whats more, DIDs have the unique property of enabling the controller to verify ownership of the DID using cryptography. This can enable any controller of a DID an individual, an organization, an online community, a government, an IoT device to engage in more trustworthy transactions online. For individuals in particular, DIDs can put them back in control of their personal data and consent, and also enable more respectful bi-directional trust relationships where forgery is prevented, privacy is honored, and usability is enhanced.

Fundamentally, Decentralized Identifiers are a new type of globally unambiguous identifier that can be used to identify any subject (e.g., a person, an organization, a device, a product, a location, even an abstract entity or a concept). Each DID resolves to a DID document that contains the cryptographic material and other metadata for controlling the DID. The foundational pillars of the DID specification are:

W3C Decentralized Identifiers, coupled with W3C Verifiable Credentials, are being used across a number of markets where identification and data authenticity is a concern:

W3C, composed of over 450 organizations, has made the investment in W3C Decentralized Identifiers and W3C Verifiable Credentials to ensure a more decentralized, privacy-respecting, and consent-based data sharing ecosystem.

Official standards work will continue on these technologies through the newly re-chartered W3C Verifiable Credentials 2.0 Working Group, which will focus on expanding functionality based on market feedback. Further incubation on future privacy-respecting technologies will occur through the W3C Credentials Community Group, which is open to participation by the general public.

_________________

The mission of the World Wide Web Consortium (W3C) is to lead the Web to its full potential by creating technical standards and guidelines to ensure that the Web remains open, accessible, and interoperable for everyone around the globe.

W3C well-known standards in HTML and CSS are the foundational technologies upon which websites are built. W3C works on ensuring that all foundational Web technologies meet the needs of civil society, in areas such as accessibility, internationalization, security, and privacy. W3C also provides the standards that undergird the infrastructure for modern businesses leveraging the Web, in areas such as entertainment, communications, digital publishing, and financial services. That work is created in the open, provided for free, and under the groundbreaking W3C Patent Policy.

W3Cs vision for One Web brings together thousands of dedicated technologists representing more than 400 Member organizationsand dozens of industry sectors. W3C is jointly hosted by theMIT Computer Science and Artificial Intelligence Laboratory(MIT CSAIL) in the United States, theEuropean Research Consortium for Informatics and Mathematics(ERCIM) headquartered in France,Keio Universityin Japan andBeihang Universityin China.

For more information seehttps://www.w3.org/.

___________________________

Follow us onTwitterfor the latest posts and updates

Join and interact with ourTelegram community

___________________________

Read more:
Decentralized Identifiers (DIDs) is Officially an Internet Standard, Says The World Wide Web Consortium (W3C) - bitcoinke.io

Nobel Prize in Physics goes to scientists who paved the way for quantum computing – Space.com

Three scientists who laid the groundwork for the understanding of the odd "entangling" behavior of quantum particles have received the 2022 Nobel Prize in Physics.

French physicist Alain Aspect, Austria's Anton Zeilinger and American John Clauser were honored for their experiments exploring the nature of entangled quantum particles.

Defying the logic of our everyday reality, such particles behave like a single unit even when they are far away from each other. Engineers are currently working on harnessing this odd behavior in a range of revolutionary technologies, including quantum computing and quantum cryptography, a supposedly unbreakable technique of secure information coding.

The beginning of quantum theory dates back to the great physicists of the early 20th century, including Albert Einstein and Niels Bohr. But the generation represented by the three new Nobel Prize laureates bridged the gap between theory and practical experiments and applications.

Related: 10 mind-boggling things you should know about quantum physics

"Quantum information science is a vibrant and rapidly developing field. It has a broad range of potential implications in areas such as secure information transfer, quantum computing and sensing technology," Eva Olsson, a member of the Nobel Committee for Physics, said in a news conference on Tuesday(Oct.4). "This year's Nobel Prize in Physics honors the groundbreaking work and science of the central figures who took up the challenges and tackled them in laboratories."

One of the most mature applications of quantum technology is quantum cryptography, which takes advantage of the fact that changes made to one particle in an entangled system affect the other. Encryption keys to secret messages can therefore be encoded into the quantum states of such particles. These keys can be exchanged between the parties in the communication process securely, because any interception of the secret keys by a third party would inherently change the particles' quantum state and render the keys invalid.

Quantum key distribution via satellites was first demonstrated by China in 2016 as part of its Quantum Experiments at Space Scale project. Countries all over the world have since begun developing similar technologies.

Perhaps the most high-profile application of entangled quantum particles is in the nascent field of quantum computing. Quantum computers encode information into the quantum states of particles, which can lead to giant leaps in the speed of information processing.

Scientists believe that, once up and running, quantum computers will accelerate drug research, material science and lead to improvements in climate change modeling and weather forecasting, among other benefits.

"It has become increasingly clear that a new kind of quantum technology is emerging," Anders Irbck, chair of the Nobel Committee for Physics, said in a statement. "We can see that the laureates' work with entangled states is of great importance, even beyond the fundamental questions about the interpretation of quantum mechanics."

"This prize demonstrates the fundamental beauty of physics," Penelope Lewis, the chief publishing officer of the American Institute of Physics' publishing department, commented in a statement. "With their pioneering experiments in quantum entanglement, Aspect, Clauser, and Zeilinger brought quantum mechanics out of its philosophical beginnings dating back nearly a century and into the present day. Their experiments laid the groundwork for incredible advances in quantum computing and cryptography, technologies with the potential to transform the modern world."

Follow Tereza Pultarova on Twitter @TerezaPultarova. Follow us on Twitter @Spacedotcom (opens in new tab) and on Facebook (opens in new tab).

See the article here:
Nobel Prize in Physics goes to scientists who paved the way for quantum computing - Space.com

Cloudflares post-quantum cryptography protects almost a fifth of the internet – VentureBeat

Learn how your company can create applications to automate tasks and generate further efficiencies through low-code/no-code tools on November 9 at the virtual Low-Code/No-Code Summit. Register here.

The countdown to Y2Q, the day when quantum computers can decrypt public key algorithms, is on. While researchers dont know exactly when this will happen, the Cloud Security Alliance (CSA) estimates this could be as soon as April 14, 2030.

Although many organizations are waiting for post-quantum threats to become tangible before taking action against them, other providers like Content Delivery Network (CDN) giant Cloudflare are diving straight in and responding with quantum-safe solutions.

Today, Cloudflare announced it has launched post-quantum cryptography support for all websites and APIs served through its network. Essentially, this will introduce quantum computer-proof encryption for all sites using Cloudflare, which accounts for 19.1% of all websites according to W3Techs.

Above all, the fact that a prominent security vendor like Cloudflare is committing to post-quantum cryptographyhighlights that enterprises should take the threat of malicious quantum computers seriously.

Low-Code/No-Code Summit

Join todays leading executives at the Low-Code/No-Code Summit virtually on November 9. Register for your free pass today.

The announcement comes shortly after Cloudflare announced the release of the first Zero Trust SIM to secure mobile devices, and a $1.25 billion funding program designed to help startups scale their businesses.

Now Cloudflare is the first content delivery network to support post-quantum TLS based on NISTs chosen cyber algorithm. While this decision may seem premature, its at the perfect time to prevent harvest now, decrypt later style attacks.

Currently, threat actors and nation-states can collect encrypted data with the intention to decrypt it once quantum computing advances to the level necessary to decrypt it.

There is an expiration date on the cryptography we use every day. Its not easy to read, but somewhere between 15 or 40 years, a sufficiently powerful quantum computer is expected to be built thatll be able to decrypt essentially any encrypted data on the Internet today, wrote Cloudflare in the announcement blog post.

Starting today, as a beta service, all websites and APIs served through Cloudflare support post-quantum hybrid key agreement. This is on by default; no need for an opt-in. This means that if your browser/app supports it, the connection to our network is also secure against any future quantum computer, the post said.

As quantum computers develop further, interest in post-quantum cryptography continues to grow, with researchers anticipating that the post-quantum cryptography market will reach a value of $476.8 million by 2030, growing at a compound annual growth rate (CAGR) of 18.67%.

Of course, Cloudflare isnt the only provider taking post-quantum threats seriously. Other vendors like PQShield, which announced raising $20 million in funding earlier this year, are leveraging post-quantum cryptography to enable enterprises to develop secure cryptographic solutions for messaging platforms, apps and mobile technologies.

Likewise, SandboxAQ, which Alphabet spun off at the start of this year with 9 figures in funding, is combining artificial intelligence and quantum computing together to offer next-generation encryption solutions.

The vendors Security AQ Analyzer creates a cryptographic inventory to understand an organizations cryptographic posture and helps plan the move to post-quantum cryptography. Its Security AW Maestro solution then uses machine learning to automate the orchestration of algorithms and protocols to optimize performance for end users.

However, Cloudflares widespread reach as one of the largest CDN providers in the market gives it the potential to contribute to the most widespread adoption of post-quantum cryptography yet.

VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Discover our Briefings.

See more here:
Cloudflares post-quantum cryptography protects almost a fifth of the internet - VentureBeat

The 2nd Annual Encryption Consulting Conference is Back! – PR Newswire

"A leading cryptography event delivering on key topics to secure and protect data information."

PROSPER, Texas, Oct. 4, 2022 /PRNewswire/ -- Encryption Consulting LLC specializes in assessing, strategizing, and building trusted protection plans for our clients. This year we host our second annual conference where we focus on hosting an event that highlights and discusses industry topics amongst the most expert speakers and notable organizations.

This event is for anyone with a desire to learn more about cryptography, PKI, Encryption, Data Protection, Cloud Key management, and other related topics. Our speakers range from leading global organizations and partners such as Thales, Protegrity, Anjuna, and more. Have your questions answered by speakers at our live Q&A.

The 2nd Annual Encryption Consulting Conference is Back!

Join us for this free 2-day virtual event happening from November 3 - 4. To register and learn more about the program and event details please visit the link below.

https://hopin.com/events/encryption-consulting-conference-2022/registration

See you there!

Contact: Puneet SinghCEO & President[emailprotected]469-400-7592

SOURCE Encryption Consulting

Read more:
The 2nd Annual Encryption Consulting Conference is Back! - PR Newswire

The Guardian view on the Rosetta Stone: a monument to code-breaking – The Guardian

This weeks 200th anniversary of the decoding of the Rosetta Stone is generating a rare level of patriotic excitement. A celebration is under way in Egypt, which has been petitioning for the return of the stone. A summer of love for its decoder, Jean-Franois Champollion, culminates in France this week with the opening of an exhibition at the Louvres satellite museum in Lens. Meanwhile, the British Museum where it has lain in state since docking on British shores is gearing up for its own blockbuster exhibition.

Yet the arrival of the very curious stone in the UK in 1802 warranted only the briefest of mentions in the London press, which reported that it was among a shipload of Egyptian antiquities collected by the French army that had become the property of the conquerors. These were spoils of a war, not against the Egyptians but against Napoleonic forces, signed over under the Treaty of Alexandria.

The stone had been discovered near the town of Rosetta, now Rashid, in the Nile delta just three years earlier. Of the three scripts with which it was inscribed Greek, Demotic and hieroglyphic only Greek was comprehensible; it would take another two decades for Champollion to have the eureka moment that would not only make the stone into one of the worlds most famous artefacts, but would add a new definition to the English language dictionary. Rosetta Stone: breakthrough or discovery that provides crucial knowledge for the solving of puzzles or problems.

In its metaphorical sense, the stone became a calling card for the science of code-breaking: and it is in this, rather than any quality intrinsic to the object itself, that its magic lies. Champollions decoding of a really rather dull decree by a council of priests, affirming the royal cult of the 13-year-old Ptolemy V, provided a key to the puzzle of hieroglyphics, and thereby opened out a whole new vista in the study of ancient Egyptian culture.

However, scientific breakthroughs are hardly ever the result of a single moment of inspiration, and Champollions was no exception. Several hieroglyphic characters had been identified by Arab scholars as far back as the 10th century. Meanwhile, Thomas Young, a doctor and physicist famously described as the last man who knew everything, worked out that sound played a role (alongside pictograms and idiograms), with a series of hieroglyphs sounding out the name Ptolemy. Though Youngs findings didnt go any further, he published them in the Encyclopaedia Britannica in 1819, so they would have fed into the French scholars thinking.

Through LGBTQ+ tours, which are shortly to recommence, the British Museum also recently began to honour another contributor to the stones history: William John Bankes, a wealthy gay Egyptologist who installed an obelisk on his Dorset estate and was early to suggest that the three texts on the Rosetta Stone might all say the same thing.

The anniversary should not just be seen as the story of one brilliant code-breaker and a broken slab of granodiorite, but as a chance to celebrate the collaborative genius of cryptography itself across continents and centuries.

This article was amended on 3 October 2022. The third script inscribed on the stone is Demotic, not Coptic as stated in an earlier version.

Read more from the original source:
The Guardian view on the Rosetta Stone: a monument to code-breaking - The Guardian

Cardano (ADA) and Algorand (ALGO) Are Two Blockchains To Watch Next Bull Cycle, Says Coin Bureau Here?… – The Daily Hodl

A popular crypto analyst thinks Cardano (ADA) and Algorand (ALGO) will be two blockchains to watch out for when the next bull market kicks off.

Pseudonymous Coin Bureau host Guy says in a new discussion with fellow crypto analyst Benjamin Cowen that both Ethereum (ETH) rivals have great teams behind them.

Long-term trend-wise, I think investors particularly institutional investors, which is obviously where Cardano is lacking in that respect but I think any investor will look at the likes of Ethereum and Cardano in the aftermath, when interest in crypto returns, and go, Well, these guys were able to execute these big upgrades, and they went flawlessly.

And I think that is a testament to the caliber of people working on those projects, and that I think will be a big part of peoples due diligence in the future. So although price hasnt done anything, I think its really, really positive, for Cardano especially.

ADA is trading for $0.43 at time of writing. The 8th-ranked crypto asset by market cap is down 0.72% in the past 24 hours.

Guy also notes that Algorands connections to the Massachusetts Institute of Technology (MIT) could open up possibilities for the project. Algorands founder, Silvio Micali, is a professor of computer science and cryptography at the university.

The Algorand team is not only very capable, but it also seems sort of really well connected, because MIT, as I understand it, is supposedly collaborating with the Federal Reserve on this upcoming digital dollar, this CBDC [central bank digital currency]. And I think that kind of opens up a lot of potential questions around Algorand, because there has been a lot of speculation that Algorand could be the blockchain for a US CBDC to eventually run on.

ALGO is trading for $0.3573 at time of writing, a negative change of 1% in the past 24 hours.

News broke in February that the U.S. Federal Reserve and researchers at MIT are collaborating on a central bank digital currency (CBDC) initiative called Project Hamilton.

I

Don't Miss a Beat Subscribe to get crypto email alerts delivered directly to your inbox Check Price ActionFollow us on Twitter, Facebook and TelegramSurf The Daily Hodl Mix

Featured Image: Shutterstock/Swill Klitch

Read more:
Cardano (ADA) and Algorand (ALGO) Are Two Blockchains To Watch Next Bull Cycle, Says Coin Bureau Here?... - The Daily Hodl