ShareRing Uses Blockchain to Solve Self Sovereign Identity and Proof of Health Simultaneously – Forbes

Proof of Health to Travel

As the lockdown wears on and travel and tourism, a USD$9 trillion industry in 2019, continue to be restricted, ShareRing is one company that has been innovating to use blockchain technology to solve the issue. ShareRing is a platform that wants to take the hassle out of travel, with its all-inclusive travel app for both businesses and consumers led by CEO and Founder Tim Bos along with the other 5 founders including Jane Sadler-Kidd. The team recognized the potential to disrupt the fragmented sharing economy with blockchain technology and launched an enterprise-ready blockchain geared towards the travel, sharing and on-demand economies. According to Kidd ShareLedger is a custom-designed, immutable blockchain database built on top of the Tendermint blockchain. Its fast, highly scalable and extremely flexible compared to existing platforms such as Ethereum.

Imagine stepping off the plane and knowing all your travel needs can be securely booked and managed from your phone. No more juggling handing over passports, travel documents or bank cards. ShareRings travel app will create a more cohesive customer experience by bringing all the necessary activities and bookings into one ecosystem, including hotel check-ins, flights, visa and tourist applications, Covid-19 tests, self-sovereign digital identity cards, mobile wallets, payment solutions and vehicle rentals.

They are also launching the world's first anonymous contact-tracing passport that can be integrated with e-visa on arrival systems (eVOA), travel insurance companies, airlines, hotels and retail shops. While contact-tracing applications have undergone harsh scrutiny since the pandemic began, with studies showing many tracing applications lack adequate security, are manual and expensive to execute. ShareRings self-sovereign identity storing model overcomes the major hurdle of securing data integrity by ensuring data privacy through anonymous distributed ledger cryptography.

Travelers Proof of Health is tied safely to a QR code which is scanned by airports, hotels or shops to reveal the status of their test, allowing for more freedom of movement and interaction with customers. Identity information is never stored on the blockchain and cannot be altered, preventing falsification and fraud where other contact tracing apps had third party storage of data. According to Kidd When someone signs up for a ShareRing ID, we take their photo, video selfie, name, DOB, address, etc and store it in an encrypted file that never leaves the users device. We also take a fingerprint of the data and documentation and store that on the blockchain. The file is encrypted with your public key, so only you can access it. You can also back it up to your Google Drive, or other cloud storage. If any information is changed it will not be recognized by the blockchain and the user will be forced to recreate their ShareRing ID. When you use one of our services like the COVID-19 app, the app will send only the necessary information to the government (anonymously) to allow others to be notified if they have been in contact with you. This is critical while many governments are considering mandating, and some have, health certificates in order to ease lockdown measures and re-open borders and struggling economies safely. As Kidd explains We have designed this application with government, tourism and health regulator requirements in mind. Our Covid-19 passport is perfectly suited to their standards, very low-cost, built to be easily integrated into any application, and encourages adoption among the population by building it in a way that provably safeguards their privacy. This should enable them to safely screen travelers and keep their essential workers protected in the event of an outbreak.

The app is part of a broader ecosystem of blockchain products the company has built. ShareRings application has already been integrated with more than 2.6 million hotel and activity providers around the world and they already have a sharing marketplace removing middlemen like Uber and AirBnb. SharePay is their stablecoin which 'hides' the confusion of cryptocurrency from the end-user. The payment of services and goods between user and service provider will be made in SharePay.

See the article here:
ShareRing Uses Blockchain to Solve Self Sovereign Identity and Proof of Health Simultaneously - Forbes

Global Quantum Cryptography Solutions Market Demands,Growth Prediction, Outlook 2020 Drivers Are Responsible to for Increasing Market Share, Forecast…

Global Quantum Cryptography Solutions Market presents comprehensive insights into the present and upcoming industry trends, enabling the readers to identify the products and services, hence driving the revenue increase and effectiveness. The research report presents a complete breakdown of all the major factors affecting the market on a global and regional scale, including drivers, constraints, threats, challenges, opportunities, and Quantum Cryptography Solutions industry-specific trends. Further, the report mentions global facts and figures along with downstream and upstream analysis of leading players.

The study gives answers to the following key questions:

Request For Free Sample copy of this report::

https://www.globalmarketers.biz/report/service-&-software/global-quantum-cryptography-solutions-market-2020-by-company,-regions,-type-and-application,-forecast-to-2024/140490#request_sample

Major Players:

ID QuantiqueQubitekkMagiQ TechnologiesQuantum XCQuintessenceLabs

This research presents Quantum Cryptography Solutions market growth rates and the market value based on market dynamics, growth factors. The complete knowledge is based on the newest innovation in the business, opportunities, and trends. In adding up to SWOT analysis by key suppliers, the report contains an all-inclusive market analysis and major players landscape.

Ask For Discount: https://www.globalmarketers.biz/discount_inquiry/discount/140490

The regional segmentation covers:

Segmentation by Type:

NetworkApplication Security

Segmentation by Application:

G&PDefenseBFSITelecom

Any Query Or Specific Requirement? Ask to our Research expert @

https://www.globalmarketers.biz/report/service-&-software/global-quantum-cryptography-solutions-market-2020-by-company,-regions,-type-and-application,-forecast-to-2024/140490#inquiry_before_buying

Report Objectives

Global Quantum Cryptography Solutions Market Size, Status and Forecast 2020-2024

Browse Detailed TOC & Table Of Figures

https://www.globalmarketers.biz/report/service-&-software/global-quantum-cryptography-solutions-market-2020-by-company,-regions,-type-and-application,-forecast-to-2024/140490#table_of_contents

Go here to see the original:
Global Quantum Cryptography Solutions Market Demands,Growth Prediction, Outlook 2020 Drivers Are Responsible to for Increasing Market Share, Forecast...

Cryptocurrencies and Cryptoassets: Freezing Orders, Disclosure Orders and the Instruction of Experts – Family Law Week

Home > Articles

Andrzej Bojarski of 36 Family and Byron James of Expatriate Law.

Introduction

Cryptocurrencies and cryptoassets are radically different from other forms of property. Indeed, some have questioned whether they are properly to be defined as 'property' at all. Take for example the most well-known cryptocurrency: Bitcoin.

A Bitcoin is based on cryptographic code (capable of being expressed and recorded as a long line of letters and numbers) which has been created (or rather 'mined' in the jargon) by powerful computers. The code forms a 'blockchain', which is a form of cryptography based on distributed ledger technology.

The 'distributed ledger' refers to the fact that the blockchain code and each alteration to it are recorded on numerous computers around the world. By reason of being distributed in this way the record of the blockchain is made definite and immutable, but without the need for any central 'official' ledger to confirm ownership as is the case with many other forms of property, including bank accounts. The ledger is definitive because it is recorded independently by numerous machines: hence the 'ledger' is 'distributed'.

At heart, therefore, a Bitcoin is merely data. There is no tangible asset as with real property or tangible assets. Nor is there any reciprocal obligation as with a chose in action (for example, a share or a bond carries certain rights with it, and money deposited in a bank is a debt owed by the bank to the customer).

The fact that a cryptocurrency is essentially a form of data has practical important practical implications which family lawyers need to grasp. Access to and control of the data which forms the cryptoasset is fundamental to the control, use and tracing of the asset itself. Without control of the data there is no access to the asset. If the data is lost, the asset is lost.

In fact, the blockchain on which Bitcoin and most other cryptoassets is built consist not of one single line of code, but two. Each is called a key. The 'public key' is visible to anyone who views the Bitcoin blockchain. The corresponding 'private key', however, is not publicly visible by anyone. The linking of the public key to a private key is how an individual proves ownership and control of the relevant number of units of Bitcoin. The private key can be stored anywhere convenient. The place it is stored is known in the jargon as a 'wallet', but that wallet might be in any one of many varied forms. It might just be a piece of paper with the key written on it, but more likely it will be stored in digital form on a computer or USB device, or where the crypto-currency is bought via an online exchange that exchange may itself provide facilities for storing the private key in an online wallet. Similarly, there may be many copies of the private key, but anyone who has a copy of the key can deal with the Bitcoin.

Once a transaction has occurred on the blockchain it is immutable and irreversible. It may be impossible to trace the wallet into which a new private key which related to that cryptoasset has been placed. All this makes it unusually important to ensure that appropriate steps are taken to control this novel class of assets.

The question of whether cryptoassets are 'property' is of more than academic jurisprudential interest. It has practical implications for lawyers who need to preserve, trace or otherwise deal with cryptoassets. The standard form of freezing order is in many ways inadequate to properly prevent dealings with cryptoassets. Likewise, conventional approaches to obtaining disclosure of assets and the instruction of experts need to be adapted to take into account the unconventional nature of cryptoassets.

This article

In this article we consider some of the areas where the conventional freezing order precedent needs to be adapted to deal with cryptoassets. Lawyers may also need to be prepared to deal with the prospect of making orders against 'persons unknown' in cases where the identity of a person to whom control of Bitcoin has been transferred is not known. We also propose precedents for directions dealing with disclosure and expert evidence relating to cryptoassets.

Readers will find precedent orders in the appendices as follows:

-Appendix 1: Freezing order in respect of cryptocurrency;

-Appendix 2: Disclosure/Preservation order in relation to cryptoassets and the devices which contain the 'keys' to such assets;

-Appendix 3: Order for instruction of an expert to analyse cryptoasset 'wallets' and to trace transactions in cryptoassets.

In order to put those precedent orders into their proper context, it is necessary to consider a number of jurisprudential questions which apply to cryptoassets.

Is Cryptocurrency a legally recognizable form of 'property'?

The following features render cryptocurrency different in nature to other 'traditional' assets (e.g. fiat currency):

oThey are not a chose in possession, because they are virtual and not tangible. It is not possible to possess the asset itself but rather only possess access to it via a key to a wallet which could be stored, arguably, on any storage type device (AA et al [2019] EWHC 3556, para 55);

oThey are not a chose in action, because they do not contain or provide or entitle any enforceable right to the bearer (Ibid).

For cryptocurrency to be properly defined therefore, in English law terms, as capable of being termed 'property' it is perhaps required to either extend the definition of a chose in action or create a third classification of intangible property.

One of the earliest judicial recognitions of cryptocurrency as 'property' in a common law jurisdiction is believed to be in the case of B2C2 v Quoine Pty (2019) from the Singapore International Commercial Court, which established both that cryptocurrencies are capable of being determined as property and also can be held within a trust.

In the course of making a freezing injunction in respect of a number of Bitcoin obtained by unknown individuals in a ransomware attack in AA et al (Ibid) Bryan J found, that cryptocurrencies

"meet the four criteria set out in Lord Wilberforce's classic definition of property in National Provincial Bank v Ainsworth [1965] 1 AC 1175 as being definable, identifiable by third parties, capable in their nature of assumption by third parties, and having some degree of permanence. That too, was the conclusion of the Singapore International Commercial Court in B2C2 Limited v Quoine PTC Limited [2019] SGHC (I) 03 [142]."

In Vorotyntseva v Money-4 Limited [2018] EWHC 2596 (Ch), para 13Birss J held that

"there [is not] any suggestion that cryptocurrency cannot be a form of property or that a party amenable to the court's jurisdiction cannot be enjoined from dealing in or disposing of it. I am satisfied that the court can make such an order, if it is otherwise appropriate."

Whilst there is no known Family Division authority dealing with the status of cryptocurrency as property, it should now be considered that the courts in England and Wales will consider it to be a form of property capable of being subject to a proprietary freezing injunction.

Form of freezing order

Practitioners are required to use a standard form of wording in the precedent for a proprietary freezing injunction when seeking to restrict the use of specified assets. Indeed, in UL v BK (Freezing Orders: Safeguards: Standard Examples) [2013] EWHC 1735 (Fam) at [48] Mostyn J cited with approval the requirement stated in the White Book that "any departure from the standard wording must be drawn to the attention of the judge hearing the without notice application".

The standard precedent for a freezing order contained in the suite of standard family orders as "3.1 Order" and the operative parts of the order feature in paragraphs 19 and 20 of the precedent:

Until the return date or further order of the court, the respondent must not remove from England and Wales or in any way dispose of, deal with or diminish the value of the following assets which are in England and Wales, namely:- [specify in detail]

If the total value free of charges or other securities ('unencumbered value') of the respondent's assets in England and Wales restrained by the preceding paragraph exceeds [amount], the respondent may remove any of those assets from England and Wales or may dispose of or deal with them so long as the total unencumbered value of the assets restrained by the preceding paragraph remains above [amount].

The content of these paragraphs are worthy of further thought in the context of the special nature of cryptoassets.

Proving ownership of the relevant cryptoasset is vital. In Vorotyntseva evidence was produced on the morning of the hearing to demonstrate the relevant cryptocurrency was in the possession or control of the proposed respondent. This produced by "that was provided during the morning in the form of e-mails with screenshots from a computer screen" (para 6, inter alia).

Thought must be given however to how a cryptoasset can be 'possessed' or 'within someone's control' in view of the fact that the asset has no physical form and consists entirely of cryptographic code, i.e data.

The most important point to grasp is that there is no centralised register of ownership for the cryptoasset, unlike money in a bank account where both the amount of money and the name of the account holder are held by the bank. Instead, the private key which allows control of a cryptoasset is stored somewhere; probably, but not necessarily, in digital form. It therefore must be established where and via what method is the cryptocurrency stored.

Control of the cryptoasset lies with anyone in possession of the private key. It is the private key which links to the public key in the blockchain and allows a person to deal with the asset, for example by transferring all or part of it to another person as payment for a service or for other goods. Such a transfer results in a new private key being created for the new holder of the cryptoasset. The old key ceases to function and the cryptoasset is now capable of being controlled by the anyone in possession of the new key.

The private key to the cryptoasset key is a set of numbers and letters. It can be held in a number of ways. In theory it could be written on a piece of paper or even memorised without being recorded in physical form anywhere, in the same way as a pin for an ATM or password for online banking (although it would be an impressive feat of memory). More commonly, however it is kept in digital form in a 'wallet'. This wallet can take many forms, from the third-party company holding it within an online trading account to a USB storage device which is kept in a pocket.

It may not be enough to specify in an order that the asset to be frozen is "X Bitcoin". Just as importantly, the private key which controls the cryptoasset (or more precisely the device which contains the wallet holding the private key) needs to be frozen.

The order may also need to prevent use of the private key which confirms control of those Bitcoin.

Accordingly, consideration should be given to specifically preserving any computer, USB device or other form of device where the private keys to the crypto currency may be recorded and held.

"the respondent must not"

Once it is established where the private key is stored, one then needs to determine how it is accessed. As noted above, each transaction with the asset on the blockchain results in a new key being generated. As we have noted above, conceivably, there could be no written record of this key and it may simply be memorised. More likely it will be held in digital form.

Often the cryptocurrency keys are held on an online exchange. Most retail investors in cryptocurrencies buy and sell via such online exchanges. In those cases the 'wallet' containing the private keys will be held by the online service. In such a case consideration needs to be given to ensuring the exchange is also bound by the terms of the order. Therefore, the "respondent must not" needs to be considered more widely. Are there other third parties that need to be considered as relevant parties and served with the order?

However, anyone who holds cryptocurrency which they wish to keep secret or untraceable is unlikely to use an online exchange. Such a person is more likely to wish to use a 'cold-storage' location which means the key is stored offline on a USB drive or similar device. If an online exchange is analogous to a bank, and cold-storage location is analogous to money stuffed under the floorboards or kept in a home safe.

In such a case taking control of the device which contains the wallet becomes fundamentally important. An order for delivery up and preservation of the device is likely to be required. There may be situations which make an Anton Piller Search Order appropriate. Accordingly, it become important to establish at an early stage whether there is an item, such as a USB stick or laptop computer, that requires physical possession as the starting point for protection.

"remove from England and Wales"

The international transfer aspect of a cryptocurrency is arguably of less relevance given the decentralised aspect of cryptoassets. A Bitcoin is held on the blockchain which is itself based on a distributed ledger spread across computers based all around the world. By its very definition, a cryptocurrency is not located in any single jurisdiction or any single place. It exists by the very fact that the blockchain ledger is distributed universally around the world. What is important is the location of the wallet holding the private key.

A private key can be emailed across the world in a matter of seconds. A transaction with a cryptoasset can be carried out without knowing the identity of the recipient. The whereabouts of the new private key held by the new holder of the cryptoasset may not be possible to determine from any publically available resource.

However, note the importance in the Liam David Robertson case of wallet being held with Coinbase in the UK. This created a far easier form of enforcement.

A transfer of the asset from one cryptofinancier in the UK to one based abroad could create further enforcement issues. Therefore, there is an importance of restricting the online transfer of the keys to the digital asset.

There is also arguably an importance in keeping a physical storage device within the jurisdiction, lest that then also becomes subject to further enforcement hurdles to overcome.

"or in any way dispose of, deal with or diminish the value..."

The concern differs on how the cryptoasset is held. If via a wallet held by an online third-party company, the issue is then onward transfer or sale, potentially to a company based abroad or an exchange into fiat money (as in the Liam David Robertson case). These actions would arguably be caught by the current drafting of the freezing order, but where an offline location for the wallet is being used the order needs to be considered further.

When faced with such a situation it is not sufficient to simply require there to be no disposal or dealing with the storage device to provide adequate protection. There are restrictive actions you can seek, such as not moving the cryptoasset keys from one storage device to another or preventing changing the key, both of which would potentially undermine the purpose of the order but arguably not fall within dispose, deal or diminish.

There are also positive actions that could be required too, absent a delivery up or Anton Piller order, there needs to be some form of preservation of the asset. If the cryptoasset on a USB stick is just left in an office drawer and then subsequently removed, how are you to prove that the respondent was responsible? The respondent themselves could have moved the USB stick to an unknown safe deposit box, arrange for a third party to do it or a third party could simply take it themselves. Whilst in the latter, this would only be of use if they had the key in addition, but it would still render the cryptoasset vanished and unavailable, even if also not available to the person who took it.

"the following assets.."

The correct way to draft the relevant paragraph of the proprietary injunction is to prohibit the disposal of the relevant quantities of cryptocurrency but it should not seek to prevent disposal of the combined sterling equivalent as at the date of the order in the sum of a stated monetary sum in the alternative, as this would be inconsistent with it being a proprietary injunction (Vorotyntseva, para 14).

The use of monetary sums is also likely to be inappropriate in the context of cryptoassets which tend to have highly volatile and fluctuating values. Within the last 5 years alone, the value of a single Bitcoin has swung between a low at around $200 to a high of nearly $20,000

Can a freezing injunction be granted against an unknown person?

If the evidence suggests that a spouse has divested assets to a third party, the absence of a centralized ledger of ownership may make it impossible to determine the identity of the person who now holds it. In such circumstances the order may need to be made against a person or persons unknown. This is an unusual order and not readily granted by the court without proper justification.

In the unreported case of, Liam David Robertson v Persons unknown (2019) CL-2019-000444 per Molder J. Liam Robertson, CEO of Alphabit Fund was granted an asset preservation order over 80 Bitcoin (then c. 1,000,000) fraudulently obtained from him by an unknown person via a phishing attack. It was possible to trace a further transfer of the Bitcoin to a wallet held in the UK by Coinbase, a cryptocurrency retailer and depository. This trace was achieved by Chainalysis Inc, a blockchain investigations firm operating in New York, Washington DC, Copenhagen, and London.

A freezing injunction was sought in Liam David Robertson but refused. Moulder J stated "[w]e know nothing about this person who perpetrated the fraud. We do not know his identity. We do not know his assets. We do not know if a Freezing Order would achieve anything whatsoever" and therefore the 'balance of convenience' and 'risk of dissipation' requirements needed for freezing orders could not be met. An Asset Preservation Order was granted in the alternative as such requirements are not required.

It is not possible to identify someone from a cryptocurrency address alone. Therefore, the simple address or key reveals nothing of the owner. It is common however to use depositories or third party cryptofinanciers (Bitfinex, Coinbase, etc). This is important as those companies are required to maintain KYC ("know your client") documents about their account holders. This is therefore a useful route to information about the possible human owner of the wallet, held with a company, into which the cryptocurrency is held. Vorotyntseva.

In the case of AA v Persons Unknown however, the court considered it appropriate to grant an injunction against persons unknown after a ransomware attack. Although such orders are likely to be rarely sought in financial remedy proceedings, cryptoassets by their nature render it possible that they will be appropriate in a limited number of cases.

Preservation of Physical 'Wallets', Disclosure and Experts

The difficulties which the intangible and highly complex nature of cryptoassets present in the context of freezing orders also extend into orders which deal with disclosure and the instruction of experts. Identification of cryptoasset holdings relies on possession of the relevant keys relating to those assets, and therefore the physical possession and analysis of the devices which contain the relevant 'wallets' is critical.

It is also important to remember the importance of preserving the physical devices which store the cryptoasset 'wallet'. In many cases obtaining custody and/or preservation of the physical 'wallet' will be of more practical importance and utility than a conventional freezing order. An order for custody and preservation of such a device is sanctioned by rule 20.2(1)(c)(i) of the Family Procedure Rules 2010 (based on the statutory powers contained in s.34 of the Senior Courts Act 1981)

At appendix 2 we provide a specimen precedent for an order which deals with the disclosure of cryptoassets and the preservation of relevant devices used as wallets for the storage of the relevant keys. This order can be used in addition to or instead of a freezing order, as the circumstances of each case demand. Indeed, in many cases this order will be used in precedence to a more generalised freezing order.

At appendix 3 we set out a precedent to be used when seeking directions for the instruction of an expert to analyse the storage devices or online accounts which contain cryptoassets in order to verify the holdings and to trace dealings with cryptoassets. Once again, parts of this order can be combined with clauses from the freezing order precedent or the disclosure precedent as required in each case.

31.7.20

Here is the original post:
Cryptocurrencies and Cryptoassets: Freezing Orders, Disclosure Orders and the Instruction of Experts - Family Law Week

Bitcoin (BTC) Down $78.19 Over Past 4 Hours, Moves Up For the 2nd Day In A Row; Pin Bar Pattern Appearing on Chart – CFDTrading

Bitcoin 4 Hour Price Update

Updated July 31, 2020 07:18 PM GMT (03:18 PM EST)

Bitcoins 3 four-hour candle positive streak has officially concluded, as the candle from the last 4 hour candle closed down 0.69% ($78.19). On a relative basis, Bitcoin was the worst performer out of all 5 of the assets in the Top Cryptos asset class during the last 4 hour candle.

Bitcoin is up 0.01% ($1.62) since the day prior, marking the 2nd day in a row an upward move has occurred. The price move occurred on volume that was down 26.94% from the day prior, but up 21.32% from the same day the week before. On a relative basis, Bitcoin was the worst performer out of all 5 of the assets in the Top Cryptos asset class during the day prior. The daily price chart of Bitcoin below illustrates.

Trend traders will want to observe that the strongest trend appears on the 14 day horizon; over that time period, price has been moving up. For additional context, note that price has gone up 11 out of the past 14 days. As for those who trade off of candlesticks, we should note that were seeing pin bar pattern appearing here.

Behold! Here are the top tweets related to Bitcoin:

GOLD about to pass $2000 all time high. BITCOIN pass $10,000. Why silver best. Silver supplies low. Silver used in tech, EVs medicine, water purification & money. Stock market about to crash. Silver at $25 below high of $45. Everyone can afford. Please do not miss opportunity.

Good news: Gold, Silver, #Bitcoin all hitting, or going, to new ATH Bad news: Its because global central banks are staging a debt-for-equity coup disenfranchising 7.6 billion people who will be left for dead unless they have some Gold, Silver, Bitcoin

Dont know why I said deleted lolI meant abandoned, because fuck that thingWouldnt want to rid you of the Sonic 06 series eitherthat and I could do with whatever bitcoin that thing can chuck out to keep the lights onHaving 11 cats and no brain cells doesnt come cheap

As for a news story related to Bitcoin getting some buzz:

Bitcoin. Thanks, but no thanks.. A brief history of disruption. | by Tyler Durden | The Crypto | Medium

Henry Ford had produced one of the modern worlds most important innovations and revolutionized American society and later, the whole world.American computer engineer Ray Tomlinson was working with his team on the development of an early computer operating system and he created two programs called SNDMSG and READMAIL.Steve Jobs, a modern day visionary imagined a future in which every home had a personal computer and Apple Computer, Inc.This was preceded by several years of strenuous campaigning by Sir Tim, now 62, to persuade professors, convince students, urge programmers and computer enthusiasts to create and build more servers and web browsers.Wed existed wonderfully for hundreds of years without the single most important technology of the 21st century coming along and creating all this new opportunity.Satoshi Nakamoto, an anonymous computer programmer produced and published a paper on a cryptography mailing list.

Read this article:
Bitcoin (BTC) Down $78.19 Over Past 4 Hours, Moves Up For the 2nd Day In A Row; Pin Bar Pattern Appearing on Chart - CFDTrading

One Pay FX, launched this week, could help modernise banking – CoinJournal

In collaboration with Ripple, Santander introduces the worlds first international payment app to use blockchain

Earlier this week, Santander released One Pay FX, an application that facilitates international payments through the use of blockchain technology. Partnering with Ripple, One Pay FX is designed to improve upon the legacy payment system to ensure efficient transaction speeds, low costs and transparency.

Traditionally, an international transaction would normally take three to five days with the exchange rate unspecified, leaving speculation and uncertainty of the total amount to reach the recipient. Furthermore, the fee amount could be unknown

Ed Metzger, Chief Technology Officer at One Pay FX commented:

Customers told us that they never knew how much money was going to get to their recipient because it was never clear what the exchange rate would be or what fees would be charged, Metzger continued, On top of that, they had no transparency about when the payment was going to get there. They just knew it would take three to five days. This type of feedback is standard across the industry. No one was solving the problem.

In simple terms, blockchain is a decentralised, distributed ledger platform. This means that when information is sent to the blockchain, it will be encrypted using cryptography and shared across all users of the blockchain. This results in transactions being tamper-proof and extremely secure.

Furthermore, when the blockchain facilitates the transaction, everything is automated and there will be no third-party charging unknown fees, in an attempt to create a transparent and safe process.

In a post made by Team Ripple, they observed that the success of the app is not due solely to speed, cost or transparency, but rather to the fluid, easy customer experience for mobile users.

Upon release, the application met with great results. Before this app, consumers only choices were remittances services with higher fees and little transparency. Now, user behaviour has completely changed.

Metzger stated:

They have so much confidence in the low cost, same day process, its no longer a big deal to send money abroad.

Santander ends its post by stating that blockchain is a basic need of every bank since it provides proficient security, speed and transparency. One Pay FX is currently the first application to provide international transactions through blockchain technology, but it may not be the last.

Link:
One Pay FX, launched this week, could help modernise banking - CoinJournal

IBM and University of Tokyo team up for Quantum Innovation Initiative Consortium – SmartPlanet.com

Big Blue and the University of Tokyo launched the Quantum Innovation Initiative Consortium (QIIC) on Thursday, in an effort to bring together industry, academics, and government to push forward quantum computing in Japan.

QIIC will be housed at the University of Tokyo and have access to the IBM Quantum Computation Center, which has 20 of Big Blue's "most advanced" quantum computers, according to IBM.

Joining the consortium, as well as IBM's Q Network, will be Toshiba, Hitachi, Mizuho, MUFG, JSR, DIC, Toyota, Mitsubishi Chemicals, and Keio University.

"I believe that Japan will play an important role in implementing quantum computing technology to society ahead of rest of the world, and that industry-academia-government collaboration is necessary for this," president of the University of Tokyo professor Makoto Gonokami said.

IBM and the University of Tokyo signed an agreement at the end of 2019 that would see a Q System One, owned and operated by IBM, installed in an IBM facility in Japan. At the time, it was said to be the third in the world after installations in the US and Germany. IBM said on Thursday the installation is planned for next year.

On Wednesday, Toshiba said it would lead a Global Quantum Cryptography Communications Network research project that was commissioned by the Japanese Ministry of Internal Affairs and Communications. Alongside Toshiba, NEC, Mitsubishi Electric, Furukawa Electric, Hamamatsu Photonics, University of Tokyo, Hokkaido University, Yokohama National University, Gakushuin University, the National Institute of Information and Communications Technology, the National Institute of Advanced Industrial Technology, and the National Institute of Materials and Technology will be involved in the project.

The project is set to run until the end of the 2024 financial year and will look to create a network of 100 quantum cryptographic devices and 10,000 users. Four areas of research have been identified: Quantum communication link technology; trusted node technology to ensure cryptographic keys are tamper resistant; quantum relay technology; and WAN construction and operation.

Toshiba said the project has a planned budget of 1.44 billion yen for its first year.

Elsewhere, the European arm of Japanese giant Fujitsu said it has signed up BBVA, Spain's second largest bank, for a proof of concept involving its digital annealer technology.

The annealer will be used to optimise asset portfolios and minimise risk.

"Finding the optimal selection from just 20 stocks generates the equivalent of over one quintillion (10 18) permutations," Fujitsu said. "Because of this complexity, portfolio optimisation has traditionally been a manual task, guided more frequently by guesswork than empirical data -- simply because the convoluted calculations far exceed the capabilities of regular computers."

"However, Fujitsu's digital annealer has been designed to process exactly this sort of complex combinatorial problem in just minutes."

The bank also intends to use the annealer to determine when is the best time to buy or sell assets, Fujitsu added.

"While true quantum computing as a technology is still in the laboratory testing phase, digital annealer represents a bridge to this future technology, thanks to its ability to evaluate multiple different combinations extremely rapidly," CTO for Fujitsu in Span Carlos Cordero said.

Beyond trying to define the stock market, the Japanese giant also said its annealer had previously been used to help optimise seams for welding robots in car making and find the best routes for delivery trucks. It has also been involved in helping pharmaceutical companies with discovering new substances.

UNSW offers Bachelor of Quantum Engineering degree

University says the degree will build a quantum workforce for Australia.

Q-CTRL launches service to help with cloud-based quantum computing

Meanwhile, UNSW has spun out an Internet of Things-focused security startup called CyAmst.

NEC to create hybrid quantum systems alongside D-Wave

Companies to look into developing services that combine Leap quantum annealing cloud with NEC supercomputers.

Quantum entanglement breakthrough could boost encryption, secure communications

Using quantum entanglement, a team of researchers has developed a new way to communicate via particles of light.

Honeywell claims to have world's highest performing quantum computer according to IBM's benchmark

Honeywell said JP Morgan Chase and other customers are using its quantum computer in production, which it claims is the most powerful currently in use based on a benchmark established last year by IBM.

Originally posted here:
IBM and University of Tokyo team up for Quantum Innovation Initiative Consortium - SmartPlanet.com

The future of encryption: Getting ready for the quantum computer attack – TechRepublic

PQShield, a spin-out from the UK's Oxford University, is developing advanced cryptographic solutions for hardware, software and communications to protect businesses' data from the quantum threat.

The development of quantum computers poses a cybersecurity problem such as the IT industry has never seen before. All stored data currently deemed secure by modern standards whether that's health records, financial data, customer databases and even critical government infrastructure could, in theory, be cracked by quantum computers, which are capable of effectively short circuiting the encryption we've used to protect that data until now.

Efforts to protect our data from the quantum threat are underway, though whether the issue is being looked at with the urgency it deserves is up for debate. PQShield, a post-quantum cryptography startup spun out of Oxford University, perceives a disconnect between the scale of the threat and the current cyber-readiness of most businesses in 2020, which it is now trying to address.

SEE: Quantum computing: Myths v. Realities (TechRepublic)

"The scale of the quantum attack is just too big to imagine," Dr. Ali Kaafarani, research fellow at Oxford's Mathematical Institute and founder of PQShield, tells TechRepublic.

"The most important part of what we're doing is to educate the market."

Kaafarani is a former engineer at Hewlett-Packard Labs and leads a team of 10 full-time quantum cryptographers, from what he estimates to be a worldwide pool of just a hundred or so. The company is busy working on the development of quantum-secure cryptography encryption solutions for hardware, software and communications that will secure information from future risk, yet can be implemented using today's technology.

This comprises a system on chip (SoC) and software development kit that allow companies to create secure messaging applications, protected by a "post-quantum" variant of the Signal cryptographic protocol. Central to PQShield's technology is that it is designed to work with both legacy systems as well as those expected in the years to come, meaning it could offer protection for everything from keyless cars and other connected devices, to data moving to and from cloud servers.

This, Kaafarani explains, is important owing to the fact that post-quantum cryptography cannot be retrospectively implemented meanwhile data encrypted by modern standards remains open to post-quantum threats. "What we're using right now as end-to-end encryption...is secure now, but people can intercept them and steal encrypted data," he says.

"Once they have access to a quantum computer, they can decrypt them, so confidentiality is threatened in retrospect, because whatever is considered confidential now can be decrypted later on."

Kaafarani also perceives an issue with the current attitudes to remediating cyberattacks, which he likens to applying a band-aid to a repeating problem.

SEE: SSL Certificate Best Practices Policy (TechRepublic Premium)

"That's why we started PQShield to fill in this gap, to lead the way to a smooth and secure transition to the quantum era. There is a real opportunity here to get things right from the beginning."

The startup recently completed a 5.5m funding round led by VC Firm Kindred Capital and has now secured German engineering company Bosch as its first OEM customer. While the exact details of the deal are still under wraps, Kaafarani says the deal is indicative of the threats businesses are beginning to identify as the age of quantum computing approaches.

"Their hardware may be built to last, but right now, their security isn't," he says.

"If you're designing a car that's going to go on the roads in the next three years, if you're doing security by design, you should be thinking of the next security standards: not the standards that are valid now, but the standards that will be valid in the next five, 10, 15 years," he says.

"Future-proofing is an imperative, just as it is for the banks and agencies that hold so much of our sensitive data."

Be in the know about smart cities, AI, Internet of Things, VR, AR, robotics, drones, autonomous driving, and more of the coolest tech innovations. Delivered Wednesdays and Fridays

Originally posted here:
The future of encryption: Getting ready for the quantum computer attack - TechRepublic

Quantum security: The end of security as we know it? | IT PRO – IT PRO

As Google and IBM race to become the first to create a fully functional quantum computer that can be applied to practical problems, voices warning the advancement of this technology could have very real unintended consequences are growing increasingly loud among cyber security professionals.

Virtually every aspect of our lives nowadays relies on strong encryption, from financial services to shopping sites, email and often elements of our work life such as HR or expenses systems. The security systems they use must be and largely are reliable and trusted.

Advertisement - Article continues below

To break the RSA public key cryptographic systems, for example, would take millions of years with the standard computers available today. A quantum computer able to run thousands of quantum bits (qubits) would be able to do it in a far more reasonable time, but with the leading developers claiming a maximum of 100 qubits with their implementations, we are far from building a quantum computer to challenge current security protocols. What of the future, though?

In its report, the RAND Corporation concludes steps must be taken today to meet the challenges of a post-quantum cryptographic security environment. "If an adequate implementation of new security measures has not taken place by the time capable quantum computers are developed, it may become impossible to ensure secure authentication and communication privacy without major, disruptive changes," said Michael Vermeer, lead author of the report and a physical scientist at RAND.

Advertisement - Article continues below

The security systems that businesses and individuals rely upon every day use two forms of encryption: symmetric and asymmetric. How you securely communicate with your bank or use your mobile phone without anyone eavesdropping on your calls will use a combination of these security systems.

Advertisement - Article continues below

Current security systems used to protect sensitive data typically use a combination of Advanced encryption standard (AES) developed back in 2001, RSA (RivestShamirAdleman) and Elliptic-curve cryptography (ECC). As financial services tend to use asymmetric cryptography such as RSA and ECC, these systems are vulnerable to attack by quantum computers. AES is less susceptible as the systems are symmetric, but could still be broken.

Speaking to IT Pro, Dustin Moody of the NIST Post-Quantum Cryptography (PQC) team, explains: A working, large-scale quantum computer would have some impacts on the crypto we currently use. First, such a computer would be able to run Shor's algorithm, which would break all currently deployed public-key cryptography. Second, a quantum computer would be able to run Grover's algorithm, which would have the effect of us having to use longer keys/hash functions for the algorithms we use for symmetric-key cryptography.

Moody continues: We use both public-key and symmetric-key cryptographic techniques to provide the security we expect today. If we made no changes in advance of this, then yes, security would be severely threatened. Note that we will need completely new quantum-resistant public-key crypto algorithms, while for the symmetric-key algorithms, we only need to use larger parameter sets. NIST has a post-quantum cryptography standardisation project ongoing to address these issues before a large-scale quantum computer comes into existence.

Estimates vary wildly regarding the timeframe for a practical working quantum computer. The timelines are even longer when quantum encryption systems are considered. The security community, in general, is advising we should be undertaking research into how a post-quantum encryption security environment could look like as NIST is currently doing.

Advertisement - Article continues below

Advertisement - Article continues below

The cryptographic community is beginning to focus more on post-quantum cryptography, but more time and testing is needed to improve the efficiency and build confidence in post-quantum cryptography, as well improve its overall usability, says Kevin Curran, IEEE senior member and professor of cyber-security at Ulster University. We may very well find that we do not actually need post-quantum cryptography, but this is too risky if we do not conduct the research now, then we may lose years of critical research in this area later on.

Understanding the massive challenges still ahead to design and build a quantum computer that can perform useful work is critical to place the concerns regarding quantum computers and encryption into a realistic context.

Brian Hopkins, VP and principal analyst serving CIOs and technology leaders at IBM, explains: The market doesnt understand how frighteningly immature quantum computers are. We are all intrigued or concerned about some future powerful quantum computer with huge theoretical potential. But we have so far to go. For example, each qubit in an IBM quantum computer takes something like four physical cables to control. Each cable costs thousands of dollars. Thats to control 20 qubit machines. How will we scale this to millions of qubits in a cost-effective way? Millions of cables running into deep freezers on a quantum computer the size of a building? The truth is, nobody knows.

Advertisement - Article continues below

Hopkins concludes: Even the best firms say they won't get to quantum advantage in small scale NISQ (noisy intermediate-scale quantum technology) use cases for five-to-ten years. That's a lot of time for things to change. And all the while, classical computers are still getting more powerful and we are developing other types of computing neuromorphic chips, optical chips, memristor chips and so on that can do things like machine learning much better than quantum computers can.

Research from DigiCert revealed over 70% of respondents are aware of PQC, showing IT departments are already thinking about the possibility of future security breaches.

Advertisement - Article continues below

Doing business in a 'quantum-safe' environment will take shape as quantum computers themselves evolve. We already have security protocols that should be safe from attack from hackers equipped with a quantum computer. OASIS KMIP and IEEE std 1363.1 are leading the way to a future where reliable security systems continue as we use them today.

Advertisement - Article continues below

Distributed Ledger Technology (DLT) and the blockchain, meanwhile, have been heralded as the next evolution of data security. Moving away from centralised data stores that can be compromised to a distributed system is held by many as the solution to current data security challenges. Thankfully, they also seem to be resistant to the problem posed to security by practical quantum computers. In its 2018 report on the matter, Forrester states: Quantum computing isnt going to blow apart DLT-based systems today or even in the foreseeable future.

This doesnt mean businesses can be complacent, though. The systems being built today may well have to contend with an environment where practical quantum computing is real. Its critical, therefore, to think about how data security is being handled with technologies like DLT to understand how they could be impacted in a post-quantum landscape.

As NISTs Dustin Moody notes: Technologies like blockchains and the like use different cryptographic components. You have to examine the quantum threat for each component. In the simplest case, a blockchain requires computing hash functions and needs to use (public-key) digital signatures. The digital signatures will need to use quantum-resistant or quantum-safe algorithms to be protected from a quantum computer. The hash functions will need to use longer outputs, which is not too hard to do (ie you could use SHA-512 instead of SHA-256).

For now, the security platforms in use are more than adequate and it could be decades before we have to worry about the security protocols being rendered useless. Nevertheless, the future may require radical rethinking of how we approach every security system currently in use

The IT Pro guide to audio collaboration

Make audio a priority for a successful remote working strategy

How malware and bots steal your data

Protect your organisation with a layered defence

Modern networking for the borderless enterprise

5 ways top organisations are optimising networking at the edge

IT managers best practice guide to hybrid cloud

Your blueprint to hybrid cloud success

Read the original:
Quantum security: The end of security as we know it? | IT PRO - IT PRO

MIT Lightning Creator Unveils First Demonstration of Bitcoin Scaling Tech – Yahoo Finance

The infrastructure propping up Bitcoin might become easier for anyone to spin up and run.

Lightning creator Tadge Dryja has been working on a new design for a lighter weight Bitcoin full node, about which he first wrote a paper in 2019. Last week, he and a team of coders released a first version of the Utreexo software as a part of MIT Digital Currency Initiative (DCI), putting the idea of lighter nodes into working code.

Full Bitcoin nodes act like financial security systems, validating Bitcoin blockchain transactions and protecting users from being tricked into thinking they received money that they didnt. But they take up a lot of computing space and are quickly growing in size.

Related: OpenEthereum Supported 50% of Ethereum Classic Nodes. Now Its Leaving the Project

Since these nodes are the most trustless way of using Bitcoin, developers have long been trying to make them easier to use. Its one of Bitcoins nerdy holy grails.

Read more: Jonas Schnelli Wants You to Run a Bitcoin Full Node

Utreexo specifically tackles the size of the state of a full node, which shows up-to-date information about who owns how much bitcoin. Utreexo slashes this state size from roughly four gigabytes to less than a kilobyte. In that regard, it could be a big breakthrough.

Utreexo is a new scalability technology for Bitcoin, which can make Bitcoin nodes smaller and faster while keeping the same security and privacy as full nodes, Dryja wrote in the blog post announcing the release.

Related: NEAR Protocol Enlists Bison Trails for Validator Support as It Heads Toward Full Mainnet

But it hasnt been implemented fully yet, which is why it is a big deal to see Dryja releasing a first version of it. The project still has a long journey to go before users can begin using the nodes to plant a flag of financial self-sovereignty. But its a crucial first step.

Bitcoin full nodes hold every transaction ever made, clocking in at about 200 GB today.

Pruned full nodes are able to reduce the size of the transaction history to as low as a half a gigabyte, about the size required to store an episode of a TV show.

But this doesnt tackle the storage of Bitcoins Unspent Transaction Outputs (UTXOs), which tallies up how much bitcoin is linked to each bitcoin address. This batch of data takes up a little less than 4 GB of data.

This UTXO state has grown rapidly over time and it is likely to continue growing, making it harder to run full nodes.

Thats where Utreexo comes in. With the help of fancy, new cryptography, its possible to replace this bulk of state with one tiny cryptographic proof that takes up much less storage.

Read more: Lightning Co-Creator Releases Code for Bitcoin Scaling Concept

Utreexo is a novel hash based dynamic accumulator, which allows the millions of unspent outputs to be represented in under a kilobyte small enough to be written on a sheet of paper, Dryja explains on the MIT DCI website.

Because it does what a pruned node does, plus more, one bitcoiner called it a super-pruned node, Dryja told CoinDesk.

Trying to shave down these hefty Bitcoin full nodes is far from a new pursuit. Simplified Payment Verification (SPV) is probably the most popular version of a lightweight node, used by Electrum and other wallets.

Utreexo is similar to SPV in that it doesnt require nearly as much computer storage space as a full node. But SPV nodes dont preserve user privacy as well and are more susceptible to attacks than Utreexo nodes are.

Since Utreexo offers these security benefits, Dryja hopes it might chip away at SPVs dominance in the space (as long as writing the Utreexo software goes as well as planned). I think it would be great if it replaced SPV to some extent, allowing an Electrum-like user experience but with Bitcoin Core security, he told CoinDesk.

Read more: Could SPV Support a Billion Bitcoin Users? Sizing up a Scaling Claim

But in the end, he doesnt think itll replace SPV completely, as SPV is still easier to run.

I think it will be a bit in between. [Utreexo nodes are] heavier than SPV but lighter than current full nodes, so some SPV users may switch to Utreexo, and some current full node users will switch as well, he said.

Story continues

He also imagines that since Utreexo nodes are so much easier to run, theyll be much more common than normal full nodes.

Longer term, I can definitely see almost all full nodes using a Utreexo-like design, and nodes which store the entire state and history would be more like current blockchain explorer websites or Electrum servers there will still be some, but no normal users will run their own, Dryja said.

Utreexo developers now put forward a proof of concept, showing that the idea can be turned into a real working product. But they still have a lot of work to do, including ironing out bugs to make the mini node suitable for real money.

The software also operates on testnet, the Bitcoin testing network, and is not recommended for use with real money. There are still plenty of known bugs and inefficiencies in the code, but were improving it at a rapid pace, Dryja writes.

Theyll eventually have to make the Utreexo node compatible with the nodes already running on the Bitcoin network. To do this, developers will eventually need to modify Bitcoin Core, the most popular Bitcoin node software.

But this could be dangerous. Utreexo is a significant re-thinking of how Bitcoin works, changing consensus-critical code, Dryja writes.

It is thus likely to be difficult to get Utreexo code into Bitcoin Core, and with good reason. We want to be very sure to not introduce problems into a system handling so many peoples money, Dryja said.

Thats why theyve decided to see if they can try to add Utreexos magical powers to alternative Bitcoin node software Btcd first, because its not used by nearly as many people to secure their money, and in the process learn more about how it affects full node operation, Dryja said. The next step will be eventually applying what they learned to Bitcoin Core.

Read the original:
MIT Lightning Creator Unveils First Demonstration of Bitcoin Scaling Tech - Yahoo Finance

DigiCert Helps Drive 5G Network Transformation with New IoT Device Manager Features – CIOReview

SINGAPORE - DigiCert, Inc., the worlds leading provider of TLS/SSL, IoT and other PKI solutions, has announced a robust set of features and capabilities in DigiCert IoT Device Manager that enable telecommunications providers to deploy 5G network services to cloud environments while maintaining security, compliance and performance. Hosted on the DigiCert ONE platform, IoT Device Manager provides support for strong authentication in dynamic, cloud-native environments, as well as scalability and operational integrity.

Todays telecommunication organizations face a variety of similar transformation challenges as they migrate to 5G using cloud data centers. Many are moving from primarily physical environments with primitive authentication techniques, minimal use of cryptography and pre-shared keys. These traditional infrastructures are capital-intensive to scale, inefficient and inflexible, slowing delivery of new services and time to market. Increasingly, they are moving toward more dynamic business models built around a DevOps mindset. These 5G and cloud environments are virtualized, dynamically scalable and enable unparalleled business agility and smooth scalability.

To support their transformation and enable more rapid time-to-market for products, telecommunication providers require a platform designed for todays highly dynamic, cloud-native, modern business models. The platform must provide strong authentication across on-premises and cloud environments, and the ability to perform at scale on the worlds largest networks. It needs to ensure operational integrity to help organizations meet compliance requirements and legal mandates.

IoT Device Manager on DigiCert ONE is built from the ground up to support transformative new models. It delivers:

Robust IoT security, establishing a root of trust through PKI for authentication, encryption and data integrity. A simple identity management tool, it lets organizations assign and manage device identity in large or small volumes at any stage of the lifecycle, operating with total visibility over certificates issued to devices.

Scalability for 5G and cloud environments, with support for a variety of certificate management protocols, including RESTful API, EST, CMPv2 and EST.

Support for broad operational integrity to meet compliance requirements and legal mandates. Utilizing metadata, IoT Device Manager enables a broader integration of tools that previously had been unable to share information and integrate smoothly with one another. By bringing together a diverse array of data from a variety of sources, it enables organizations to gain additional insight and value to support device management.

As telecommunications, manufacturers and other organizations move to increasingly dynamic models, the IoT Device Manager provides the flexibility and rapid scalability they need to support 5G and cloud migration, said DigiCert Senior Vice President of Product Brian Trzupek. DigiCert ONE delivers the features, compatibility and performance our customers need to accelerate their digital transformation and take advantage of compelling new business models.

IoT Device Manager uses a container-based, cloud-agnostic implementation and allows organizations to provision and embed device identity at any stage of the device lifecycle, from the factory to device deployment in a variety of environments. It lets customers simplify device identity, authentication, encryption and integrity with a single click, and marry device data visualization with cryptographic, manufacturing and factory process data. IoT Device Manager supports standards-based interoperability with many third-party manufacturing and provisioning systems.

IoT Device Manager is built on DigiCert ONE, a PKI management platform architected and released in 2020 to be the PKI infrastructure service for today's modern cloud-native challenges. DigiCert ONE offers multiple management solutions and is designed for all forms of PKI. It is flexible enough to be deployed on-premises, in-country or in the cloud to meet stringent requirements, custom integrations and airgap needs. It also deploys extremely high volumes of certificates quickly using robust and highly scalable infrastructure. DigiCert ONE delivers end-to-end centralized user and device certificate management, a modern approach to PKI.

Continue reading here:
DigiCert Helps Drive 5G Network Transformation with New IoT Device Manager Features - CIOReview