Atakama Announces It Will Be Offering Its Encryption Software To Businesses In Need For Free – Salamanca Press

NEW YORK, June 4, 2020 /PRNewswire/ -- ATAKAMA Inc., a data security company based in NYC, announced today that for the duration of the COVID-19 pandemic, it will be offering its groundbreaking new data security software for free to businesses in need while workers remain at home.

Atakama provides businesses with unparalleled protection for confidential, proprietary and client files all without disrupting how users interact with their data. Atakama's one-of-a-kind information security solution is designed to keep business data safe from attacks, even when other security fails. Atakama offers customizable security policies to best fit individualized business needs and user workflows.

Founded in 2017 by a team of entrepreneurs, engineers, and cryptographers, Atakama has since developed a software that enables each file to be encrypted individually without employing passwords or centralized key storage. Its patent-pending distributed key management software seamlessly distributes pieces of encryption keys to physical devices controlled by the user. By eliminating the need for passwords, Atakama ensures that data is protected even when other cybersecurity measures fail.

"Granular, file-level encryption is one of the most powerful yet underutilized tools available for information security," says Atakama's CEO, Daniel H. Gallancy. "Its underutilization has been a consequence of cumbersome deployment requirements, scalability difficulties and concerns about lost encryption keys. By making use of threshold cryptography, Atakama eliminates the barriers to the successful use of file-level encryption. In today's environment, where a significant percentage of the workforce is remote, businesses need to bolster their security systems, both as a means of protecting a distributed workforce and as a means of defending against an unfortunate opportunistic increase in attacks. I have been overwhelmed by the entire Atakama team's outspoken desire to provide assistance to businesses in need. We've decided to offer Atakama for free for the duration of the COVID-19 pandemic."

The company is offering a version of their software free to businesses for a limited period. To learn more and to request a live demo and installation of the software, visit http://www.atakama.com/data-security, or email info@atakama.com.

About Atakama:

Atakama Inc. is an information security software company that provides unparalleled data protection for businesses. By employing a file-by-file encryption design, Atakama eliminates the ability for attackers to directly profit off of confidential data, and substantially mitigates the damage of unpreventable attacks. Atakama's encryption solution helps companies adhere to mandatory compliance regulations and in the process, provides best-in-class protection for sensitive and non-public information. Atakama's distributed key management protocols can be customized based on company or department needs, seamlessly integrates with existing cybersecurity stacks, and can be deployed within hours. Undeniably, a vast improvement over the status quo.

Continue reading here:
Atakama Announces It Will Be Offering Its Encryption Software To Businesses In Need For Free - Salamanca Press

Will COVID-19 finally usher in the age of the cryptocurrency? – The New Economy

By law, financial firms are required to collect personal information about their customers, which ultimately ends up in online databases. Cryptocurrencies could create a more open financial system with improved consumer privacy protections

Even as all of humanity mobilises against COVID-19, thoughts are turning to how the world will be different after the crisis. As businesses rush to adapt to the new world of social distancing, the pandemic has accelerated an already inexorable trend towards digital commerce. This broader shift should also include the widespread adoption of digital currencies, which provide stronger consumer financial and privacy protections.

For most of the 20th century, encryption was reserved for national security needs. Cryptography helped the Allies win the Second World War, and then protected secret communications during the Cold War. Until as recently as 1992, the US, as a matter of national security, did not allow cryptographic technology to be exported. Encrypted communication was not widely available, and anyone using it was assumed to have something to hide.

But starting in the 1990s, early internet entrepreneurs began calling for encryption to be used in e-commerce, arguing that it was needed in order to protect customer credit card numbers, passwords and other information entered online. It turned out that the same encryption technology that had been created in academic labs where trust and collaboration reigned could be useful to everyone.

Cryptocurrencies hold the promise of creating a more open financial system with worldwide access, instantaneous fund transfers, lower costs and vastly improved consumer privacy protections

Changing expectationsUS policymakers and law enforcement initially balked at this push towards widespread encryption. In their view, privacy for everyone meant privacy for terrorists, drug dealers and money launderers. As then FBI Director Louis J Freeh told Congress in 1994, preserving the US Governments ability to intercept internet communications was the number one law enforcement, public safety and national security issue facing us.

The debate about end-to-end encryption is still raging. But, crucially, consumer expectations have changed since the 1990s. The overwhelming majority of internet traffic is now encrypted, and most of us have been trained to look for the closed-lock icon in our browser before entering sensitive information. Popular apps like WhatsApp, Telegram, iMessage and Signal have led the way in normalising private messaging that cant be tracked by third parties.

But there is one area of our lives where privacy is not yet the norm: our personal financial information. By law, financial firms are required to collect reams of personal information about their customers. This information ultimately ends up in online databases, where it presents a tempting target for hackers. In 2017, the credit rating firm Equifax revealed that a data breach had exposed sensitive information about more than 147 million consumers, or just under half of the US population. That followed a similar breach in 2013, when hackers famously obtained the names, credit card numbers and other information about tens of millions of Target customers.

Anonymous moneyFortunately, a solution is on the horizon. Cryptocurrencies hold the promise of creating a more open financial system with worldwide access, instantaneous fund transfers, lower costs and vastly improved consumer privacy protections. When bitcoin first gained popularity, many people incorrectly assumed that it was anonymous money. In fact, as a blockchain technology, it uses a public ledger that records a digital trail of every transaction. Blockchain analytics firms are thus now helping law enforcement track down criminals who thought their trail was covered. And cryptocurrency exchanges like Coinbase have instituted robust anti-money-laundering and Know Your Customer programs that rival those of any financial institution.

Several more recent developments in cryptocurrency technologies promise to take consumer privacy to even higher levels, and they are sure to be controversial. First, privacy coins such as Zcash and Monero offer new cryptocurrency protocols that make every transaction untraceable. Other cryptocurrencies aspire to replicate these features, and even JPMorgan Chase has explored private transactions through its Quorum cryptocurrency. This shift is a bit like when websites moved from HTTP to HTTPS as the global standard: it lets consumers know that their information is protected by default.

For countries thinking about cryptocurrency policy, the best approach will be to strike a balance between law enforcement, cybersecurity, privacy, innovation and economic competitiveness

Second, so-called non-custodial cryptocurrency wallets now enable customers to store their own private keys (which allow one to move funds) instead of relying on a third party. By not actually storing customer funds, the providers of non-custodial wallets are aiming to position themselves as software companies rather than financial institutions subject to regulation. In the past, non-custodial wallets required a certain degree of technical sophistication to operate, limiting their use. But, like encrypted messaging apps, they are becoming increasingly accessible to a mass market.

A new generationUnsurprisingly, these innovations have alarmed banks, regulators and law enforcement agencies. But just as the early internet needed encryption to enable digital commerce, cryptocurrencies need privacy protections to unlock their full power and potential. Whether one needs to guard against authoritarian regimes, data harvesters or criminals, the best way to ensure that sensitive financial data isnt hacked is to avoid having to collect it in the first place.

Enhancing consumer financial protections does not mean giving free rein to criminals. Law enforcement agencies still have a wide range of tools at their disposal, from subpoenaing cryptocurrency exchanges to examining conversions into and out of fiat currencies (which are likely to remain the choke points for law enforcement). And these exchanges will continue to be regulated as financial services, regardless of whether consumers are using privacy coins or non-custodial wallets.

Having watched the US benefit enormously from the creation of the worlds leading internet companies, many countries are now working to attract the next generation of cryptocurrency firms. For countries thinking about cryptocurrency policy, the best approach, as always, will be to strike a balance between law enforcement, cybersecurity, privacy, innovation and economic competitiveness.

Consumers in a free society will always demand and expect reasonable levels of privacy. Our financial lives are no exception. Fortunately, cryptocurrencies can fix some of the most vexing issues in financial services. As we plan to rebuild economically after the COVID-19 crisis, we must allow these technologies to grow.

Project Syndicate 2020

View original post here:
Will COVID-19 finally usher in the age of the cryptocurrency? - The New Economy

Ethereum-based exchange DeversiFi gets an upgrade, targets pro traders – Decrypt

Decentralized exchanges are getting a little more professional.

DeversiFi announced yesterday the mainnet launch of new upgrades to the DeversiFi decentralized exchange, bringing a host of new features to create a professional-grade exchange platform with experienced traders in mind.

The upgrade includes support for StarkWares ZK-STARK layer 2 scaling solution, enabling more than 9,000 transactions per second on the decentralized exchange (DEX). Its sure to be a major player in the crypto exchange landscape, where the popularity of decentralized exchanges is already growing rapidly. (StarkWare, which raised $30 million in a Series A in 2018, is backed by Ethereum incubator ConsenSys, which also funds an editorially independent Decrypt.)

The DiversiFi upgrade also brings self-custodial control for digital assets, allowing users to make trades without needing to first send their tokens to a wallet controlled by DeversiFi, as is required to trade on centralized competitors like Binance or Poloniex. Other changes include API improvements, improved market order mechanisms, and support for Ledger hardware wallets.

Commercial grade Defi needs robust cryptography and ZK-STARKs are fastest in class, post-quantum safe and can easily scale to tens of thousands of transactions per second with no trusted setup, StarkWare co-founder and president Eli Ben Sasson said in a statement.

Partnering with DeversiFi will bring the benefits of ZK-STARK technology into the hands of every trader. We are excited to see traders embracing self-custodial trading without sacrificing liquidity or speed.

Alternative decentralized exchanges, such as IDEX or Uniswap, enable basic token swapping, but often lack more advanced tools like order books, limit orders, and other tools often employed by professional traders. To achieve some of these features and the instantaneous settlement required for some advanced trading strategies, DeversiFi uses an off-chain order book, but still settles trades on the Ethereum blockchain.

ZK-STARK technology also offers greater privacy for DeversiFi users, as individual transactions are not visible on the blockchain, instead grouped into aggregate transaction blocks verified by hashes.

Before becoming DiversiFi, the decentralized exchange service was founded as Ethfinex in 2017 and incubated by the Bitfinex exchange for two years. DiversiFi became fully independent in August 2019.

The DiversiFi upgrade also introduces the Data Availability Committee (DAC), which records token balances off-chain (like tokens reserved for filling limit orders) to ensure that if the exchange goes offline, trades can still withdraw any tokens held in DeversiFi smart contracts. Members of the DAC include Infura, Nethermind, Cephalopod, and ConsenSys.

Read more:
Ethereum-based exchange DeversiFi gets an upgrade, targets pro traders - Decrypt

Trust Stamp launching Malta subsidiary with government support to deliver biometric ID to Africa – Biometric Update

Trust Stampis launching a wholly-owned subsidiary in the Republic of Malta to advance its biometric and cryptographic identity authentication technology.

The company has secured 1 million (roughly US$1.1 million) in funding in the form of a 200,000 ($227,000) grant and a low-interest loan of up to 800,000 ($908,000) to cover three-quarters of the salaries it pays Malta-based employees. The loan is repayable through 10 percent of the Maltese subsidiarys annual profits.

We have been working with Malta Enterprise for over a year and are very impressed both by Maltas commitment to the continued growth of their technology industry, and by our shared commitment to substantially increasing the participation of women in the technology sector, comments Trust Stamp CEO Gareth N. Genner. In recent months, we have engaged with many of Maltas government departments and we have executed a letter of intent to work together on a broad range of technology initiatives.

Trust Stamp is reported to be preparing for a $32 million IPO in Ireland this year. The AIID symbol, combining Trust Stamps focus on AI and ID, has been reserved for its listing. The company is planning to raise $7 million or more in a Series A funding effort recently launched to the SeedInvest platform, with direct investments from Mastercard International, Second Century Ventures and FSH Capital.

Malta will not only host an expanded R&D team including our new Post-Doctoral Fellowship Program but will also serve as the base for our public-benefit subsidiary AiiD to work with NGOs and governments throughout Africa, Genner added. Malta has a long-term commitment to working with a number of African governments, and there are tremendous opportunities for us to partner with both the Malta government and other Maltese enterprises.

Africa | authentication | biometrics | cryptography | Malta | research and development | Trust Stamp

Read the original here:
Trust Stamp launching Malta subsidiary with government support to deliver biometric ID to Africa - Biometric Update

Quantum Cryptography Services Market (Covid-19 Updated) to witness great expansion over the forecast through 2026 | Quantum XC, Crypta Labs, Qubitekk,…

The Quantum Cryptography Services market has been changing all over the world and we have been seeing a great growth In the Quantum Cryptography Services market and this growth is expected to be huge by 2026. The growth of the market is driven by key factors such as manufacturing activity, risks of the market, acquisitions, new trends, assessment of the new technologies and their implementation. This report covers all of the aspects required to gain a complete understanding of the pre-market conditions, current conditions as well as a well-measured forecast.

The report has been segmented as per the examined essential aspects such as sales, revenue, market size, and other aspects involved to post good growth numbers in the market.

Top Companies are covering This Report:- QuintessenceLabs, Quantum XC, Crypta Labs, Qubitekk, Qasky, NuCrypt.

Get Sample PDF Brochure@https://www.reportsintellect.com/sample-request/849890

Get this report now @ https://www.reportsintellect.com/buynow/849890

Description:

In this report, we are providing our readers with the most updated data on the Quantum Cryptography Services market and as the international markets have been changing very rapidly over the past few years the markets have gotten tougher to get a grasp of and hence our analysts have prepared a detailed report while taking in consideration the history of the market and a very detailed forecast along with the market issues and their solution.

The given report has focused on the key aspects of the markets to ensure maximum benefit and growth potential for our readers and our extensive analysis of the market will help them achieve this much more efficiently. The report has been prepared by using primary as well as secondary analysis in accordance with porters five force analysis which has been a game-changer for many in the Quantum Cryptography Services market. The research sources and tools that we use are highly reliable and trustworthy. The report offers effective guidelines and recommendations for players to secure a position of strength in the Quantum Cryptography Services market. The newly arrived players in the market can up their growth potential by a great amount and also the current dominators of the market can keep up their dominance for a longer time by the use of our report.

Quantum Cryptography Services Market Type Coverage:

Consulting and AdvisoryDeployment and IntegrationSupport and Maintenance

Quantum Cryptography Services Market Application Coverage:

G&PDefenseBFSITelecom

Market Segment by Regions, regional analysis covers

North America (United States, Canada, Mexico)

Asia-Pacific (China, Japan, Korea, India, Southeast Asia)

South America (Brazil, Argentina, Colombia, etc.)

Europe, Middle East and Africa (Germany, France, UK, Russia and Italy, Saudi Arabia, UAE, Egypt, Nigeria, South Africa)

Discount PDF Brochure @https://www.reportsintellect.com/discount-request/849890

Competition analysis

As the markets have been advancing the competition has increased by manifold and this has completely changed the way the competition is perceived and dealt with and in our report, we have discussed the complete analysis of the competition and how the big players in the Quantum Cryptography Services market have been adapting to new techniques and what are the problems that they are facing.

Our report which includes the detailed description of mergers and acquisitions will help you to get a complete idea of the market competition and also give you extensive knowledge on how to excel ahead and grow in the market.

Why us:

Reasons to buy:

About Us:

Reports Intellect is your one-stop solution for everything related to market research and market intelligence. We understand the importance of market intelligence and its need in todays competitive world.

Our professional team works hard to fetch the most authentic research reports backed with impeccable data figures which guarantee outstanding results every time for you.So whether it is the latest report from the researchers or a custom requirement, our team is here to help you in the best possible way.

Contact Us:sales@reportsintellect.comPhone No: + 1-706-996-2486US Address:225 Peachtree Street NE,Suite 400,Atlanta, GA 30303

More:
Quantum Cryptography Services Market (Covid-19 Updated) to witness great expansion over the forecast through 2026 | Quantum XC, Crypta Labs, Qubitekk,...

Cryptocurrency And Blockchain Technology Market size Reap Excessive Revenues size COVID-19 2022 – Cole of Duty

Overview:

Cryptocurrency is a digital currency that utilizes cryptography techniques to make the transactions secure and to limit the creation of additional units of currency. Cryptocurrency is decentralized and there is no third-party/central body/governing body involved in producing new currency, verifying transactions, and protecting the currency supply. The blockchain acts as a ledger that shows the transaction activities between the peers. Cryptocurrency opts as a future revenue stream in the digital finance world. Furthermore, cryptocurrency is not bound by any rules or regulations of any specific government or exchange rates, interest rates, and country to country transaction fee, which makes international transactions faster. The prime drivers of the cryptocurrency market include proper security, authentication and ease of transactions. The Cryptocurrency and Blockchain technology allows the users to send exactly what they want without involvement of third party.Globally, more than 70% of the mobile phone users prefer transactions over their phones, which is one of the major drivers for the cryptocurrency market growth.

Request for Report Sample:https://www.trendsmarketresearch.com/report/sample/9796

Market Analysis:

The Worldwide Crypto-currency and Blockchain Technology Market is estimated to witness a CAGR of 35.2% during the forecast period 20162022. The crypto-currency market is analyzed based on two segments verticals and regions. The increasing online transaction, less transaction fees, easy and faster transaction, changing consumer and business landscape have led the demand for the market growth.

Regional Analysis:

The regions covered in the report are Americas, Europe, Asia Pacific and Middle East & Africa; along with the analysis of major countries in each region. The Americas is set to be the leading region for the cryptocurrency market growth followed by Europe. The Asia Pacific and MEA are set to be the emerging regions. India is set to be the most attractive destination and in Africa, the popularity and the usage of various cryptocurrencies are expected to increase in the coming years. The MEA market revenue is expected to reach $3.02 billion by 2022. The major countries covered in this report are the US, Canada, Argentina, the UK, Germany, Italy, France, Poland, China, Japan, Singapore, Vietnam, GCC Countries, Africa and Others.

Vertical Analysis:

Day-to-day, the consumers demands are changing and they are looking for the best and less time-consuming services to make their life easier. With these changes, the industry players have started moving towards the online business services and are adopting mobile based technology in their business units to reach their customer demands. In the current market scenario, the rise of online transactions has led the demand for the cryptocurrency and blockchain technology market. The major verticals covered are BFSI, retail, media & entertainment, gaming industry, healthcare, travel & tourism, transportation & logistics and education. Globally, the industry players are showing interest towards the blockchain and crypto-currency acceptance and making a partnership and discussing with value chain players in order to understand the benefits of blockchain technology. Additionally, few of the verticals have already started the acceptance of crypto-currencies (e.g. Bitcoin) as a payment option. Especially, the retail industry is set to be the leading vertical after BFSI for the crypto-currencies acceptance and the retail market revenue is expected to reach $10,447.2 million by 2022.

Key Players:

Zebpay, Coinsecure, Coinbase, Bitstamp Ltd., Litecoin, Poloniex Inc., Bitfury Group Limited, Unocoin, Ripple, Bitfinex, Global Area Holding Inc., BTL Group Ltd., Digital Limited, IBM Corp., Microsoft Corp. and other predominate and niche players.

Competitive Analysis:

In the current market scenario, the crypto-currency and blockchain technology market is at a nascent stage. But, a lot of new players are entering the market as it holds huge business opportunities. Especially, new start-ups are coming with new products/services in the market and they are expecting to see a double-digit growth in the upcoming years. In this space, venture funding in this market is expected to grow and collaborations, merger & acquisition activities are expected to continue.

Benefits:

The report provides complete details about the usage and adoption rate of crypto-currency and blockchain technology in various industry verticals and regions. With that, key stakeholders can know about the major trends, drivers, investments, vertical players initiatives, government initiatives towards the crypto-currency market adoption in the upcoming years. In other end, the report provides details about the major challenges that are going to impact on the market growth. Furthermore, the report gives the complete details about the key business opportunities to key stakeholders to expand their business and capture the revenue in the specific verticals. In addition, each vertical provides the key reason for the crypto-currency adoption, key opportunities, and government bodies information. This will help the key stakeholders to analyze before investing or expanding the business in this market.

More Info of Impact [emailprotected]https://www.trendsmarketresearch.com/report/covid-19-analysis/9796

Original post:
Cryptocurrency And Blockchain Technology Market size Reap Excessive Revenues size COVID-19 2022 - Cole of Duty

Health Information and Sharing Center (H-ISAC) partners with SAFE Identity to help health sector members safeguard their healthcare identities and…

ORMOND BEACH, Fla. and RESTON,Va., June 01, 2020 (GLOBE NEWSWIRE) -- Health Information and Sharing Center (H-ISAC), a global non-profit organization that provides the health sector a trusted community for combating cyber and physical threats, today announced that the organization has agreed to partner with SAFE Identity, formerly known as SAFE-BioPharma, an industry consortium and certification body supporting identity and cryptography in healthcare. As part of this agreement, H-ISAC members are able to take advantage of SAFE Identity programs at a reduced rate.

Identity is the leading cause of breaches today but many health care organizations don’t understand why securing identity is so important, or where to get started,” said Denise Anderson, President and CEO of H-ISAC. Last fall, H-ISAC launched an initiative to educate the health care community on this topic and equip CISOs with tools to better approach the challenges of Identity and Access Management (IAM). H-ISAC’s partnership with SAFE is one element of this broader identity initiative.”

Defining common requirements for identity providers that align with Digital Identity Guidelines (SP 800-63-3) and certifying identity providers against these requirements is how SAFE is supporting a strong interoperable identity in healthcare. The re-envisioning of SAFE-BioPharma and the new SAFE Identity services are further explored in the recent SAFE Identity press release.

With the renewed SAFE Identity partnership, H-ISAC members can join the SAFE Policy Management Authority (PMA), the governing body of the SAFE Identity Trust Framework, to vote on identity policies, join working groups aimed at helping healthcare organizations implement strong identity solutions, and address identity challenges faced across healthcare. As part of the partnership, H-ISAC members can federate their existing compatible identity credentials with SAFE to achieve cross-organizational trust or join the PMA as relying parties, both at discounted rates.

H-ISAC offers a portfolio of products and services that have been identified and developed specifically for health sector members. Strategic in nature, these low cost or no-cost solutions help member organizations to develop and maintain an effective, long-term defense. SAFE furthers these goals by brokering identity services to healthcare organizations including the ability to rely on the SAFE Identity infrastructure and to consult the SAFE Qualified Products List (QPL), a list of certified products that have been lab-tested at SAFE for compliance against industry and member-driven requirements, both at no cost.

We are eager to start putting the re-envisioned SAFE ecosystem into practice,” said Kyle Neuman, the new managing director of SAFE Identity. Existing members can continue to utilize the ecosystem for the use cases and principles on which SAFE-BioPharma was founded while also taking advantage of the new capabilities SAFE is bringing to the table. As we examine the future, we look forward to advising H-ISAC on the principles necessary to leverage a federated infrastructure and start tackling the most pressing identity challenges in healthcare including TEFCA and health information exchange, identification of medical devices, blockchain technology, and achieving a true portable patient ID that can be used across healthcare.”

About Health Information Sharing and Analysis Center (H-ISAC) Created in 2010, Health Information Sharing and Analysis Center is recognized as the official ISAC for the health sector. H-ISAC is a member-driven organization that offers the sector a trusted community and forum for coordinating, collaborating, and sharing vital threat intelligence and best practices. Members are able to use this knowledge to strengthen their defenses and minimize the effect of threat actors around the world.

About SAFE Identity SAFE Identity provides an ecosystem for identity assurance in the health sector to enable trust, security, and user convenience. SAFE assures identities and data in virtual clinical trials, telehealth, medical devices, and trusted data exchanges in supply chains through free and membership-driven services. These services operationalize the use of SAFE Identity-certified credentials and applications tailored to healthcare organizations, partners, and patients.

SOURCE: Health Information Security and Analysis Center and SAFE Identity

Related Links https://www.h-isac.org https://makeidentitysafe.com

Contact Dana Kringel Montner Tech PR 203-226-9290 dkringel@montner.com

Originally posted here:
Health Information and Sharing Center (H-ISAC) partners with SAFE Identity to help health sector members safeguard their healthcare identities and...

What is WebAuthn? – Security Boulevard

As organizations leverage multi-factor authentication (MFA/2FA) to secure their employees, many consider using hardware security keys. Found to be the one of the most secure types of MFA, hardware keys, aka universal second factor (U2F) keys, rely on WebAuthn in order to be applied to web-based services. But what is WebAuthn anyways?

The Web Authentication API, colloquially known as WebAuthn, was created by the World Wide Web Consortium (W3C) and the FIDO (Fast IDentity Online) Alliance in collaboration with Microsoft, Google, Yubikey, Mozilla, et al. The protocol leverages public key cryptography to specifically authenticate access to web-based resources like applications and some Platform-as-a-Service and Infrastructure-as-a-Service (PaaS & IaaS) solutions.

When used for authentication, public key cryptography requires that a user present a pair of keys to gain access to a service: a public key and a private key. The public key is shared usually within the services the user accesses and is stored in relation to its respective user. When the user offers the private key upon login, the service combines it with the public key and checks the result against a stored value to authenticate the user.

Some forms of public key cryptography, like SSH keys, use complex digital keys that need to be managed. In contrast, WebAuthn can leverage physical hardware such as a USB drive that securely stores the private key until the user needs it. Regardless of how its implemented, public key cryptography is generally regarded as a more secure alternative to the username and password combination required at most logins.

Despite the fact that public key cryptography is more secure, the password prevails as the core authentication method for most services. With WebAuthn, IT admins can safeguard their users by adding an additional factor to their authentication process, often U2F keys.

Using WebAuthn to apply U2F keys to web resource access provides three core benefits to an organization. Lets go over each below.

While evaluating several forms of 2FA and (Read more...)

View post:
What is WebAuthn? - Security Boulevard

Controlling What You Reveal: How Zero Knowledge Proofs are Changing How We Spend the Currency We Now Call Data – Crowdfund Insider

When you go to a bar and give your ID to the bartender, do you ever think about how much youre giving away?

Lets say you use your driving license as your ID; youre letting the bartender know that youre not underage, but youre also giving them access to your date of birth, your full name, and your home address. Imagine if there was a way to only share the data you had to, rather than surrendering every piece of information.

From the UKs data protection acts, to the Cambridge Analytica scandal, its clear that the threat to user data is still front of mind for both citizens and regulators alike. Now more than ever, information capitalism means that data, whether rightly or wrongly, is a commodity. For instance, it emerged in 2019 that Facebook was sitting on a database of millions of user phone numbers, and in the same year the company admitted to listening to users conversations through messenger. Even biological information isnt safe after the DNA testing company FamilyTreeDNA admitted to sharing customers genetic data with the FBI in secret. In response, people are reconsidering how much they share online, and are looking for ways to ensure the privacy and security of their information.

Now more than ever, information capitalism means that data, whether rightly or wrongly, is a commodityClick to Tweet

With vast amounts of information moving around the world every second, ensuring its security is essential.

Being able to selectively provide data such as in the bar example, then, would be a huge step for data privacy. This is where cryptography comes in. Privacy is one of the core beliefs of the crypto space; its central in everything we do.

Cryptography is a key tool for keeping institutional powers in check and making sure that data is controlled by the people it belongs to. At my firm, we undertake research to investigate the technologies that could be used to improve privacy, inclusive accountability, and personal agency.

One area of research that weve been involved in is zero-knowledge proofs, specifically zk-SNARKs (a particular type of zero-knowledge proof) and smart contracts which could be applied to a blockchain setting. Zero-knowledge proofs can allow for greater privacy of information and data, which makes them especially interesting in todays climate.

Zero-knowledge proofs (ZKPS) are a technique in cryptography that makes blockchains scalable and ultra-private, allowing information to be verified without revealing it to anyone but the recipient; for instance, you could prove your age at a bar without having to reveal everything else that comes with an ID card, like address or date of birth.

Zero-knowledge proofs are a technique in cryptography that makes blockchains scalable and ultra-private, allowing information to be verified without revealing it to anyone but the recipientClick to Tweet

ZKPs use encryption to secure user data and ensure confidentiality when interacting with apps and financial processes. Its a zero-knowledge proof of knowledge you prove the information without giving any more than necessary away. This concept is powerful in itself, but especially in the age of information capitalism. People will still give up data in return for a service, as has been the case in previous years, but this will be much more selective. These ZKPS can be used to protect personal data, and are an exciting prospect not only for the crypto and blockchain space, but for any industry.

ZKPs also help to securely integrate smart contracts into the blockchain. Smart contracts, programmes which automatically execute the terms of an agreement, eliminate the need for third parties, are important for privacy and security. However, they require a large amount of computing power to maintain, and as blockchains grow in capability, more and more information must be recorded, which requires huge amounts of storage space. In some cases, this can limit the number of people who can access the technology. For companies like us, who want our platform to be accessible on cell phones for those in rural areas in countries like Uganda and Ethiopia, a solution needs to be found.

ZKPs are the answer. They allow transactions on the blockchain to be truncated, or shortened. This means that despite growth of the blockchain, for instance as it comes to include identity and compatibility with many different types of asset, participants dont have to worry about storing information that would take up lots of space. As a result, the blockchains growth isnt compromised by a lack of storage space, and can scale as it needs to. By bringing together both scalability and privacy, zero-knowledge proofs can increase universal inclusion in blockchain.

ZKPs arent just for cryptocurrency. They are applicable to a range of global issues that could benefit from the use of blockchain.

ZKPs arent just for cryptocurrency. They are applicable to a range of global issues that could benefit from the use of blockchainClick to Tweet

Other than personal identification in a bar, for instance, ZKPs have the potential to be used in supply chains, healthcare, finance, and a range of other industries where the security of private information is essential.

Concerns around the misuse of private data in particular by the tech giants, or FAANGS are legitimate, and growing. As a result, its vital to investigate technologies to give people greater control over their own data. Personal sovereignty has long been an essential feature of blockchain, and this continues to be the case with zero-knowledge proofs.

Through ZKPs, privacy is always the priority, and the individual knows their information is safe without compromising their access to services that require identification or data. ZKPs scalability potential means that blockchains can continue to grow, giving people even more freedom and control of their information. As we move towards a more secure future, data privacy will be at the forefront of peoples minds; zero-knowledge proofs, then, will have an important role to play.

Charles Hoskinson is CEO at IOHK. Hoskinson is a Colorado-based technology entrepreneur and mathematician. He attended Metropolitan State University of Denver and University of Colorado Boulder to study analytic number theory before moving into cryptography through industry exposure. His professional experience includes founding three cryptocurrency-related start-ups Invictus Innovations, Ethereum and IOHK and he has held a variety of posts in both the public and private sectors. He was the founding chairman of the Bitcoin Foundations education committee and established the Cryptocurrency Research Group in 2013. His current projects focus on educating people about cryptocurrency, being an evangelist for decentralization and making cryptographic tools easier to use for the mainstream. This includes leading the research, design, and development of Cardano, a third-generation cryptocurrency that launched in September 2017.

The rest is here:
Controlling What You Reveal: How Zero Knowledge Proofs are Changing How We Spend the Currency We Now Call Data - Crowdfund Insider

Crown Sterling Completes Another Round Of Third-Party Validations For Cryptopgraphy Solutions – Stockhouse

NEWPORT BEACH, Calif., June 1, 2020 /PRNewswire/ --Crown Sterling today announced that the company has completed three new test validations for its cryptography solutions.

Three new tests were performed on CrownRing, the company's Cryptographically Secure Random Number Generator and all received a pass validation. The tests were performed by John D. Cook Ph.D., an independent expert based in Texas specializing in testing for encryption and data privacy solutions.

Crown Sterling's CrownRing passed in the three commonly used Random Number Generator test suites including:

Crown Sterling's CrownRing is a software which generates random numbers suitable for secured applications as recommended by the National Institute of Standards and Technology (NIST). Applications include "overlay" technology which can relatively easily upgrade outdated technologies.

This news comes on the heels of Crown Sterling recently receiving FIPS-140-2Encryption Validation and is now NIST Certified. NIST issued Certificate number 3635 to Crown Sterling for completing rigorous FIPS 140-2 testing processes.

"This battery of independent and successful testing of our Random Irrational Number Generator technology marks yet another important milestone and validation for the Company," said Robert Grant, CEO, Crown Sterling.

Based in Newport Beach, California, Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products. From irrational numbers that supercharge existing cryptography, to cutting-edge encryption products and developer tools, Crown Sterling aims to change the face of digital security with its proprietary, non-factor-based algorithms that leverage time, AI, and mathematical irrational numbers. For more information about Crown Sterling, please visit http://www.crownsterling.io.

For more information on John D. Cook Consulting, please visit http://www.johndcook.com.

View original content to download multimedia:http://www.prnewswire.com/news-releases/crown-sterling-completes-another-round-of-third-party-validations-for-cryptopgraphy-solutions-301068367.html

SOURCE Crown Sterling

Read more:
Crown Sterling Completes Another Round Of Third-Party Validations For Cryptopgraphy Solutions - Stockhouse