No Real Value: Former Bitcoin Core Developer Peter Todd Asserts Ripples XRP Doesnt Need To Exist – ZyCrypto

Ripple has been one company working hard to revolutionize global funds transfer. The company has also been making efforts to boost XRP adoption, and it has already won over a good number of clients and partners willing to utilize XRP in cross-border payments. However, there have been some objections from various people who think XRP isnt really what its expected to be. One such person is Peter Todd, a former Bitcoin Core developer, and cryptography consultant.

In a recent post on Twitter, Todd shared views made by one Larry Cermak, another personality who thinks XRP doesnt have much value to investors.

According to Larry, Ripple will be the only beneficiary if ever its project works and its technology gets adopted. As such, its the people who will have accumulated XRP that will be left holding massive bags.

Larry went on to point out that Ripples continued sale of XRP has so far earned it around $1.2 billion. Ripple uses the proceeds of these sales to fund its projects as well as support strategic startups and partners like MoneyGram.

While sharing Larrys remarks about Ripple and XRP, Peter Todd opined that just like most ICOs, XRP doesnt really need to exist, claiming that the crypto itself doesnt offer any real rights of ownership to buyers.

However, the cryptography consultant agreed that Ripples technology could be useful as a fault-tolerant database, but it doesnt need XRP to work. For one, just like with any other cryptos, the early adopters gain when the tokens value increases as demand rises.

That said, its still not clear if XRPs value will be influenced by an impending bull run thats expected to boost Bitcoins market as the top coin prepares for the next block reward halving slated for May 2020. If the effect affects the rest of the market, XRP could gain in the process.

Get Daily Crypto News On Facebook | Twitter | Telegram | Instagram

See original here:
No Real Value: Former Bitcoin Core Developer Peter Todd Asserts Ripples XRP Doesnt Need To Exist - ZyCrypto

History, technology and the shackles of the present – The Hindu

For the historian of science and technology, the Narendra Modi governments ambitious push for electric vehicles (EVs) should ring a bell. After many decades, India is witnessing once again the unseemly fraternisation of high technology and authoritarian governance. On the one hand, the government has championed EV, Artificial Intelligence (AI), and packaged sundry technologies into neat acronyms. On the other, it has clipped Internet access to towns and villages when confronted with non-violent protests against the Citizenship (Amendment) Act, 2019.

In Indias case, history is merely repeating itself. In 1976, as India sank deep into the recesses of the Emergency, a group of bureaucrats and scientists sat down to ponder the future of technology in the country. The irony of analysing technologies that would unshackle the Indian economy, when basic rights of its citizenry were suppressed, was lost on the establishment. In fact, while the Indira Gandhi government built a surveillance state, Silicon Valley saw the birth of public key cryptography, used in modern-day encryption. India, it seemed, had regressed into the darkest chapter of its political history, just as the world began to use technology to preserve human rights.

This dissonance did not seem to bother the high-profile group that had been brought together by the National Committee on Science and Technology (NCST). Its mandate: study the outlook for India in 2000 A.D. The group, set up in 1973, took seven years to submit their report, publishing an interim document during the Emergency. The Indian governments commissioning a futures study was in step with the times. Futurology the use of computer models for forecasting scenarios became fashionable after the Club of Rome, a group of economists and planners, published its famous Limits to Growth report in 1972. The report painted a doomsday scenario of acute food and water scarcity in 2000. Unsurprisingly, this period also witnessed the new wave of science fiction, set in dystopic lands and featuring post-apocalyptic visions. Another kind of dystopia was unfolding in Indias present while the civil liberties of Indians were cast aside, the government was busy discussing EVs and self-driving cars.

It may seem straight out of the pages of a sci-fi novel, but the first official assessment of EVs in India was likely published during the Emergency. The Committee on Futurology, as it was known, analysed long-term projections for many sectors, including transportation. This sectors problems were two-fold. To begin with, there were just not enough vehicles for the larger public in India. Three decades after Independence, India had only 1,00,000 buses on its roads. (In other words, there was one bus for every 6,500 Indians). However, the number of cars and jeeps totalled nearly 750,000. In a still-impoverished country, the wealthy and powerful elite enjoyed vastly better mobility than the majority of the population.

Rising fuel prices presented the second problem. The NCST deliberated in the shadow of the oil crisis of 1973, brought on by a crude embargo imposed by the Organisation of the Petroleum Exporting Countries (OPEC). Faced with the problem of scarcity and costs, the committee argued India was better served in the long run by developing renewable alternatives to petrol.

Almost concurrently, western laboratories had begun exploring the development of lithium-ion batteries, critical to EVs. The work of John B. Goodenough, Akira Yoshino and M. Stanley Whittingham who were jointly awarded the 2019 Nobel Prize in Chemistry for the development of these batteries was catalysed by the oil crisis of the 1970s. The NCST appears to have been mindful of such efforts: it is imperative that some concentrated R&D is performed in the area of high energy-high power batteries, it declared. The Committee even predicted EVs and self-driving cars - adaptive, automobile autopilots, as the report termed it would be commercially available from the early 1980s.

Is it surprising the Indian government conjured up visions of technological advancement, while suppressing democracy? Hardly. Several autocratic regimes have tread down the same path, using technology as a totem to rally disaffected populations. But while the NCST made grand claims about the future, the government was actually clamping down on technology in the present. Indira Gandhis government, under pressure from labour unions, viewed computers with suspicion, and discouraged PSUs from adopting them. The Futurology Committees view too was jaundiced by the Emergency. Not all technologies were neutral and useful to society, the committee declared, citing the TV as an example. Meanwhile, Doordarshan had become an instrument of state propaganda. Faced with a financial crunch, the government also championed appropriate technologies that were small-scale solar cookers and mechanised bullock carts but did little to boost productivity. The left hand did not know what the right was doing: some sections of the government were trumpeting the arrival of self-driving cars, while others told the public to be wary of computers.

Despite this politicking over technology, Indians were, in fact, beginning to embrace machines. As C.R. Subramanian has noted, the import of computers tripled during the Emergency. The number of automobiles plying on Indian roads in the 1980s increased by a staggering 400% over the previous decade. The seeding of doubt against big technology by the government in the minds of citizens did little to improve prospects for scientific breakthroughs. If only Indians had the political agency to form their own views of technology, India may well have had a shot at developing EVs. It is a lesson todays government too should learn: one cannot aspire to a Digital India if technologies are wantonly used for mass surveillance, or cut off altogether when faced with non-violent, democratic protests.

Arun Mohan Sukumar is a PhD candidate at The Fletcher School, and the author of Midnights Machines: A Political History of Technology in India

You have reached your limit for free articles this month.

Register to The Hindu for free and get unlimited access for 30 days.

Find mobile-friendly version of articles from the day's newspaper in one easy-to-read list.

Enjoy reading as many articles as you wish without any limitations.

A select list of articles that match your interests and tastes.

Move smoothly between articles as our pages load instantly.

A one-stop-shop for seeing the latest updates, and managing your preferences.

We brief you on the latest and most important developments, three times a day.

Not convinced? Know why you should pay for news.

*Our Digital Subscription plans do not currently include the e-paper ,crossword, iPhone, iPad mobile applications and print. Our plans enhance your reading experience.

Read the rest here:
History, technology and the shackles of the present - The Hindu

NTT Research to Expand its Silicon Valley Footprint in 2020 – Yahoo Finance

Move to larger office and MEI Lab hires are high on agenda, after strong 2019 launch

NTT Research, Inc., a division of NTT (TYO:9432), today announced its plan to move to a facility in Sunnyvale in mid-2020 to better accommodate a growing number of researchers, including medical scientists it expects to hire for its Medical and Health Informatics (MEI) Lab. These priorities follow six months of progress in all three labs at NTT Research since its official launch in July 2019.

To recap, NTT Research has signed an Industrial Partnership between its Cryptography and Information Security (CIS) Lab and the Simons Institute for the Theory of Computing at UC Berkeley; set up joint research agreements between its Physics and Informatics (PHI) Lab and six universities (CalTech, Cornell, Michigan, MIT, Stanford and Swinburne), one US Federal Agency (NASAs Ames Research Center) and one private quantum computing software company (1QBit); and reached another joint research agreement between the MEI Lab and the Technical University of Munich (TUM). The need for a larger facility, in part, reflects this activity.

"We are aiming for a research-friendly space to hire more excellent scientists," said Kei Karasawa, NTT Researchs Vice President of Strategy. "We need both private offices as well as collaboration space to accelerate research with partners, whether professors, NTT colleagues or other stakeholders in our three research domains."

NTT Research has already hired more than 20 scientists, about half of whom are university professors and senior researchers. With the PHI and CIS Labs both on pace in terms of staffing, NTT Research plans to focus on talent acquisition for the MEI Lab in the new year. The ultimate target for the entire organization is about 50 scientists.

Based on the joint agreement between the MEI Lab and TUM, NTT Research will send two of its researchers to Munich in Q1 2020. The initial phase of that long-term research project involves screening and optimizing materials that can eventually be used for three-dimensionally transformable and implantable electrodes. The project leader in Germany is Dr. Bernhard Wolfrum, Professor of Neuroelectronics at TUM in the Department of Electrical and Computer Engineering and the Munich School of BioEngineering (MSB).

The MEI Lab is directed by Hitonobu Tomoike (M.D., Ph.D), former Director of the Sakakibara Heart Institute, Director Emeritus at the National Cerebral and Cardiovascular Center in Japan, and former Professor of Cardiology at Yamagata University. Dr. Tomoike is known for his work in precision medicine involving bio-sensors and analytics.

One goal of the MEI Lab is to explore the potential of "bio digital twin". Already applicable in the field of business transformation it is one of NTT Ltd.s Intelligent Business: 2020 technology trends bio digital twin in the medical domain is the idea of scanning an individual and creating a replica, which medically-guided supercomputing and artificial intelligence (AI) can then examine, diagnose and treat as a roadmap to caring for a human. "In a smart world, our digital twin will be second-nature technology," Dr. Tomoike said.

In addition to the move to Sunnyvale and the plan to hire more scientists for the MEI Lab, NTT Research expects to announce several more joint research agreements in early 2020. Throughout the year, NTT Research scientists will continue to submit papers and attend conferences in the United States and around the world.

About NTT Research

NTT Research opened its Palo Alto offices in July 2019 as a new Silicon Valley startup to conduct basic research and advance technologies that promote positive change for humankind. Currently, three labs are housed at NTT Research: the Physics and Information Science (PHI) Lab, the Cryptography and Information Security (CIS) Lab, and the Medical and Health Informatics (MEI) Lab. The organization aims to upgrade reality in three areas: 1) quantum information, neuro-science and photonics; 2) cryptographic and information security; and 3) medical and health informatics. NTT Research is part of NTT, a global technology and business solutions provider with an annual R&D budget of $3.6 billion.

NTT and the NTT logo are registered trademarks or trademarks of NIPPON TELEGRAPH AND TELEPHONE CORPORATION and/or its affiliates. All other referenced product names are trademarks of their respective owners. 2019 NIPPON TELEGRAPH AND TELEPHONE CORPORATION

View source version on businesswire.com: https://www.businesswire.com/news/home/20191220005076/en/

Contacts

NTT Communications:Chris ShawDirector of MarketingNTT Research +1-312-888-5412chris.shaw@ntt-research.com

Media:Barrett AdairWireside CommunicationsFor NTT Ltd. & NTT Research+1-804-591-0689badair@wireside.com

Link:
NTT Research to Expand its Silicon Valley Footprint in 2020 - Yahoo Finance

WireGuard to be merged with Linux net-next tree and will be available by default in Linux 5.6 – Packt Hub

On December 9, WireGuard announced that its secure VPN tunnel kernel code will soon be included in Linux net-next tree. This indicates, WireGuard will finally reach the mainline kernel with the Linux 5.6 cycle kicking off in late January or early February!, reports Phoronix.

WireGuard is a layer 3 secure networking tunnel made specifically for the kernel, that aims to be much simpler and easier to audit than IPsec.

On December 8, Jason Donenfeld, WireGuards lead developer sent out patches for the net-next v2 WireGuard. David Miller has already pulled in WireGuard as the first new feature in net-next that is destined for Linux 5.6 now that the 5.5 merge window is over, the email thread mentions.

While WireGuard was initiated as a Linux project, its Windows, macOS, BSD, iOS, and Android versions are already available. The reason behind the delay for Linux was that Donenfeld disliked Linuxs built-in cryptographic subsystem citing its API is too complex and difficult.

Donenfeld had plans to introduce a new cryptographic subsystem his own Zinc library. However, this didnt go down well with several developers as they thought that rewriting the cryptographic subsystem was a waste of time. Fortunately for Donenfeld, Linus Torvalds was on his side.

Torvalds stated, Im 1000% with Jason on this. The crypto/model is hard to use, inefficient, and completely pointless when you know what your cipher or hash algorithm is, and your CPU just does it well directly.

Finally, Donenfeld compromised saying, WireGuard will get ported to the existing crypto API. So its probably better that we just fully embrace it, and afterward work evolutionarily to get Zinc into Linux piecemeal. Hence a few Zine elements have been imported into the legacy crypto code in the next Linux 5.5 kernel.

This laid the foundation for WireGuard to finally ship in Linux early next year. WireGuard works by securely encapsulates IP packets over UDP. Its authentication and interface design has more to do with Secure Shell (SSH) than other VPNs. You simply configure the WireGuard interface with your private key and your peers public keys, and youre ready to securely talk.

After the arrival, WireGuard VPN can be expected to become the new standard for Linux VPNs with its key features, namely, tiny code-size, high-speed cryptographic primitives, and in-kernel design. With being super-fast, WireGuard for Linux would be secure too as it supports state-of-the-art cryptography technologies such as the Noise protocol framework, Curve25519, BLAKE2, SipHash24, ChaCha20, Poly1305, and HKD.

Donenfeld in the email thread writes, This is big news and very exciting. Thanks to all the developers, contributors, users, advisers, and mailing list interlocutors who have helped to make this happen. In the coming hours and days, Ill be sending followups on next steps.

ArsTechnica reports, Although highly speculative, its also possible that WireGuard could land in-kernel on Ubuntu 20.04 even without the 5.6 kernelWireGuard founder Jason Donenfeld offered to do the work backporting WireGuard into earlier Ubuntu kernels directly. Donenfeld also stated today that a 1.0 WireGuard release is on the horizon.

To know more about this news in detail, read the official email thread.

WireGuard launches an official MacOS app

Researchers find a new Linux vulnerability that allows attackers to sniff or hijack VPN connections.

NCSC investigates several vulnerabilities in VPN products from Pulse secure, Palo Alto and Fortinet

Follow this link:
WireGuard to be merged with Linux net-next tree and will be available by default in Linux 5.6 - Packt Hub

Global Quantum Cryptography Market 2019 by Manufacturers, Regions, Type and Application, Forecast to 2025 – PR Industry News

The Quantum Cryptography Market report gives a purposeful depiction of the area by the practice for research, amalgamation, and review of data taken from various sources. The market analysts have displayed the different sidelines of the area with a point on recognizing the top players (ID Quantique, SeQureNet, Quintessence Labs, MagiQ Technologies, Toshiba, QuantumCTek, Qasky) of the industry. The Quantum Cryptography market report correspondingly joins a predefined business market from a SWOT investigation of the real players. Thus, the data summarized out is, no matter how you look at it is, reliable and the result of expansive research.

This report mulls over Quantum Cryptography showcase on the classification, for instance, application, concords, innovations, income, improvement rate, import, and others (Financial, Government, Military & Defense, Others) in the estimated time from 20192025 on a global stage. In like manner, the overall Quantum Cryptography market report reveals knowledge identified with the type of product, its applications, customers, prime players, and various components agreeing with the account. This first data demonstrates critical contenders and their definite picture of the general Quantum Cryptography market. Other than this, the report further demonstrates expected market power, challenges, and prospects in the Quantum Cryptography market.

Request for Sample Report @https://www.intenseresearch.com/market-analysis/global-quantum-cryptography-market-2019-by-manufacturers-regions.html#request-sample

Types Segment:Table Pros, Table Cons

Key Market Features:

The scope of the report extends from market eventualities to a comparative rating between major players, price, and profit of the required market regions. This makes available the holistic view on competitive analysis of the market. Some of the top players involved in the market are profiled completely in a systematic manner. In the end, the report concludes the new project, key development areas, business overview, product/services specification, SWOT analysis, investment feasibility analysis, return analysis and development trends. The study also presents a round-up of vulnerabilities in which companies operating in the market and must be avoided in order to enjoy sustainable growth through the course of the forecast period.

The study provides a comprehensive analysis of the key market factors and their latest trends, along with relevant market segments and sub-segments. Market size is calculable in terms of revenue (USD Million) production volume during the forecast period.

Global Quantum Cryptography Market report provides a valuable source of insightful data for business strategists. It provides the industry overview with growth analysis and historical & futuristic cost, revenue, demand and supply data (as applicable). The research analysts provide an elaborate description of the value chain and its distributor analysis. The report also looks at the influential factors that are affecting the development of the Global Automotive Bumpers Market. This statistical report also offers various internal and external driving as well as restraining factors for this research report.

Get Exclusive Buying report:https://www.intenseresearch.com/market-analysis/global-quantum-cryptography-market-2019-by-manufacturers-regions.html#inquiry-for-buying

Essential application areas of Quantum Cryptography are also measured on the basis of their performance. Market forecasts along with the statistical nuances presented in the report render an insightful view of the Quantum Cryptography market. The market study on report studies present as well as coming aspects of the Quantum Cryptography Market mainly based upon factors on which the companies contribute to the market evolution, key trends, and segmentation analysis.

The scope of the report extends from market eventualities to a comparative rating between major players, price, and profit of the required market regions. This makes available the holistic view on competitive analysis of the market. Some of the top players involved in the market are profiled completely in a systematic manner.

Thanks for reading this article; you can also get individual chapter wise section or region wise report versions like North America, Europe or Asia.

Sorry! The Author has not filled his profile.

Continued here:
Global Quantum Cryptography Market 2019 by Manufacturers, Regions, Type and Application, Forecast to 2025 - PR Industry News

What are security keys, how do they work, and which is the best to buy? – Pocket-lint

If you use two-factor authentication (also known as 2FA) on your online accounts, you may want to switch to a hardware security key instead.

When 2FA is enabled and you attempt to log into your account, like Twitter, a temporary code will be sent to your phone. You need to enter this code to sign in to your account. Since only you should have access to your phone/code (one factor) and your login credentials (the second factor), two factor essentially verifies your identity and ensures only you are logging into your account.

There are downsides to two-factor authentication. If you lose your phone, or if it's breached by a hacker who's swapped your SIM or somehow gained access to your device, they'll obviously be able to retrieve your code and potentially use it to hack into your account (especially if they also know your login credentials). Luckily, a security key can help you avoid this nightmare.

Hardware security keys (also called security keys, U2F keys, or physical security keys) add an extra layer of security to your online accounts. They protect against automated bots and targeted attacks by leveraging cryptography to verify your identity and the URL of a login page. They're therefore phishing-resistant, too, as they can ascertain whether you're trying to log into alegit service.

Security keys connect to your device via USB-A, USB-C, Lightning, NFC, and Bluetooth, and they're portable enough to be carried on a keychain. Most of them use an open authentication standard, called FIDO U2F (or the improved FIDO2 standard), and some even feature hardware that's designed to resist physical attacks aimedat extracting firmware and material from the key itself.

Hardware security keys are made by various manufacturers and work with the most popular web browsers, as well as hundreds of apps and online services. They can even help you log in to your workstation.Overall, they'renot hard to use and are relatively inexpensive. And all other forms oftwo-factor authentication (texts, authenticator apps, and notifications) don't offer the same level of protection.

You can use a single hardware security key for as many accounts as you like. Typically, you insert the security key into your device (or wirelessly connect it) and press a button on the key itself. The security key will then be presented with a challenge by your web browser or app. It will cryptographically sign this challenge, verifying your identity and whatever it is you're trying to access.

All this sounds complicated. But it happens in the background without any input from you, other than you inserting the hardware security key into your device. Hardware security keys also use original domains of sites to generate its keys, which means it can't be tricked by phishing sites.

Many online accounts, apps, services, and websites support hardware security keys, including Twitter, Facebook, Google, Instagram, GitHub, Dropbox, Electronic Arts, Epic Games, Microsoft account services, Nintendo, Okta, and Reddit. Most web browsers do too, like Google Chrome.

Be sure to do your research - look into whether your most-used online accounts and even whether your devices support security keys before you invest in one.You can use hardware security keys to log in to many computers and mobile devices, including Macs, Chromebooks, Windows 10 PCs, and Android and iOS devices. The FIDO2 standard on some security keys can work with Windows Hello and Microsofts Edge browser, too.

Your hardware security key works in addition to your account login credentials. So, if someone steals your key, they can't get into your accounts without knowing your logins. Also, if you've lost your security key, you can always resort to a backup method of two-factor authentication. You can then gain access to your online account, remove your lost or stolen security key, and either add another or continue using a backup method.

All hardware security keys tend to work the same, as we've detailed above, but setting them up varies by app and device. To give you an idea of how one works with an online account, we've detailed the exact steps for pairing a security key with Facebook and signing into your account.

There are several choices to choose from. Yubico, which helps develop is the FIDO U2F authentication standard, is one of the more popular options and has different models available. Google sells its own key, called the Titan, and it includes a spare key with Bluetooth functionality. Other security key manufacturers include Kensington and Thetis.

Here's our pick of the best ones you can buy:

See the original post:
What are security keys, how do they work, and which is the best to buy? - Pocket-lint

Crypto Innovation School 2019 to start this Friday – Cryptomorrow

The CIS 2019 event, which is co-organized by the Crypto Innovation School andPlatON, the global trustless computing network, will kick-off on Friday December 13 until Sunday, December 15, 2019 in Shanghai, China.

Accredited with the International Association for Cryptologic Research (IACR), CIS has been organised in collaboration with Tsinghua University and Shanghai Jiao Tong University.

Showcasing rising cryptography Talent, IACR-Accredited Crypto Innovation School Returns for a Second Year, and among those invited isTuring award-winning computer scientist and computational theorist Prof. Andrew Chi-Chih Yao who has been invited as the Honourary Chair of this years cryptographic research programme. This years programme aims to showcase the latest advancements and insights in the mathematical foundations of lattice-based cryptography.

Renowned scholars and experts in the field are confirmed to be in attendance. This year, award-winning computer scientist and theorist Prof. Andrew Chi-Chih Yao has been invited as an Honourary Chair. A member of the US National Academy of Sciences and the Chinese Academy of Sciences, Yao was awarded the Knuth Prize in 1996 and the Turing Award in 2000 in recognition of his critical contributions to cryptography and computer science, such as Yaos Principle.

CIS 2019 co-chairs include International Association for Cryptologic Research (IACR) fellow Academician Xiaoyun Wang and Prof. Yu Yu, of Tsinghua University and Shanghai Jiao Tong University, respectively. PlatON CEO Lilin Sun will also be serving as Executive Chair. Dr. Xie will also be serving as an organising committee member as part of this years winter school.

PlatON Algorithm Scientist Dr. Xiang Xie said, With digital transformation at the forefront of the global business agenda, greater standards in information security, encryption, and data protection continue to be pioneered around the world. Despite being hidden from public view, cryptography has historically played a critical role in how digital communication and commerce has evolved throughout the years. At CIS, we allow some of the most promising minds in cryptography research to connect with renowned experts in the industry, as they work to examine and understand the current opportunities, risks, and challenges facing us today.

PlatONs trustless computing architecture leverages a broad range of cryptographic algorithms ranging from homomorphic encryption, zero-knowledge non-interactive proofs, and multi-party computation. Having previously sponsored prominent academic cryptography conferences in the past, such as IACR Crypto, Eurocrypt, Asiacrypt, and the ACM Conference on Computer and Communications Security (CCS), encouraging research and education is a key area of focus at PlatON. Its work with CIS strives to expand the influence and application of cryptographic mechanisms amid an increasingly data-driven world.

Open to researchers, students, and cryptography enthusiasts of all levels and from all around the globe, CIS 2019 is expected to host approximately 150 attendees. Last years CIS winter school saw a diverse cohort of over 130 researchers, graduate students, and post-doctoral researchers hailing from countries such as China, India, Singapore, Japan, Korea, France, Germany, and the United States. Hosted in Shenzhen, last years programme focused predominantly in areas of privacy-preserving cryptography and featured renowned academics and researchers.

PlatON is a next-generation computing architecture that aims to facilitate secure, seamless, and open data sharing for the public good. Through Privacy-Preserving Computation (PPC), PlatON breaks down data silos and enables secure data exchange and collaborative computing for enterprise users. With its open-source data marketplace, PlatON supports and incentivises individuals and businesses looking to both monetise and utilise data resources.

PlatON addresses limitations in scalability and security by way of Verifiable Computation and privacy-preserving encryption capabilities, currently enabling real-world usability across a variety of global industries, including advertising, healthcare data management, IoT and decentralised AI, financial services, as well as key management systems.

Crypto Innovation School (CIS) is a cryptology innovation school that looks to bring promising researchers from all over the world to gather and discuss groundbreaking research in cryptology today. Accredited with the International Association for Cryptologic Research (IACR), CIS is hosted by PlatON and is supported by leading local Chinese universities such as Tsinghua University, Shanghai Jiao Tong University, and the State Key Laboratory of Cryptology.

Post Views: 178

Link:
Crypto Innovation School 2019 to start this Friday - Cryptomorrow

Red Hat Extends the Security Profile of the Worlds Leading Enterprise Linux Platform, Renews FIPS 140-2 Validation for Red Hat Enterprise Linux 7.6 -…

Red Hat Enterprise Linux and many layered products continue to meet stringent software security criteria for public sector deployments

Red Hat, Inc., the world's leading provider of open source solutions, today announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validations for Red Hat Enterprise Linux 7.6. Driven by the National Institute of Standards and Technology (NIST), FIPS 140-2 is a computer security standard that specifies the requirements for cryptographic modules -- including both hardware and software components -- used within a security system to protect sensitive information.

This renewed validation maintains and extends Red Hats leadership in providing mission-critical-ready open source technologies to government agencies and regulated industries, such as healthcare and telecommunications. With Red Hats FIPS 140-2 validated solutions, these industries can better meet necessary information security guidelines without compromising on the need for innovative, flexible software solutions. Red Hat maintains a strong commitment to providing open, more secure IT innovation to the public sector, with the companys technologies now holding more than 20 active FIPS validations that meet the criteria for use by U.S. government agencies.

Following the FIPS 140-2 validation of Red Hat Enterprise Linux 7.5 in November 2018, these cryptography re-validations cover Red Hat Enterprise Linux 7.6 and portfolio technologies that incorporate Red Hat Enterprise Linux 7.6. Additional products which use the FIPS 140-2 re-validated cryptography modules include, but are not limited to:

Red Hat Enterprise Linux 7.6 updates FIPS 140-2 validation for the following modules:

These modules retain FIPS 140-2 validation when used on these hardware configurations:

FIPS 140-2 validation is needed when agencies determine that specific information systems should use cryptography to protect data; if cryptography is required, then it must be validated. In order to achieve FIPS 140-2 validation, cryptographic modules are subject to testing by NIST-accredited independent Cryptographic and Security Testing Laboratories. The validation for Red Hat Enterprise Linux 7.6 was performed by Atsec information security corporations Cryptographic and Security Testing Laboratory in Austin, Texas. Atsec is an independent organization with long-standing experience in IT security standards.

In addition to the renewed certification of Red Hat Enterprise Linux 7.6, Red Hat Enterprise Linux 7.7 and Red Hat Enterprise Linux 8.1 are currently on the NIST "Implementation Under Test" list with the intent to extend FIPS 140-2 validation to the latest releases of the Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8 platforms.

Supporting Quote

Paul Smith, senior vice president and general manager, Public Sector, North America, Red Hat"For more than a decade, Red Hat has been helping to meet the technology needs of organizations where IT security is a primary concern, from executive agencies to state governments. The FIPS 140-2 re-certification of Red Hat Enterprise Linux 7.6 shows our continued commitment to delivering a more secure and product-ready set of open hybrid cloud technologies, all based on the foundation of the worlds leading enterprise Linux platform."

Additional Resources

Connect with Red Hat

About Red Hat, Inc.

Red Hat is the worlds leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Forward-Looking Statements

Certain statements contained in this press release may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements provide current expectations of future events based on certain assumptions and include any statement that does not directly relate to any historical or current fact. Actual results may differ materially from those indicated by such forward-looking statements as a result of various important factors, including: risks related to the ability of the Company to compete effectively; the ability to deliver and stimulate demand for new products and technological innovations on a timely basis; delays or reductions in information technology spending; the integration of acquisitions and the ability to market successfully acquired technologies and products; risks related to errors or defects in our offerings and third-party products upon which our offerings depend; risks related to the security of our offerings and other data security vulnerabilities; fluctuations in exchange rates; changes in and a dependence on key personnel; the effects of industry consolidation; uncertainty and adverse results in litigation and related settlements; the inability to adequately protect Company intellectual property and the potential for infringement or breach of license claims of or relating to third party intellectual property; the ability to meet financial and operational challenges encountered in our international operations; and ineffective management of, and control over, the Company's growth and international operations, as well as other factors. In addition to these factors, actual future performance, outcomes, and results may differ materially because of more general factors including (without limitation) general industry and market conditions and growth rates, economic and political conditions, governmental and public policy changes and the impact of natural disasters such as earthquakes and floods. The forward-looking statements included in this press release represent the Company's views as of the date of this press release and these views could change. However, while the Company may elect to update these forward-looking statements at some point in the future, the Company specifically disclaims any obligation to do so. These forward-looking statements should not be relied upon as representing the Company's views as of any date subsequent to the date of this press release.

Story continues

Red Hat, Red Hat Enterprise Linux, the Red Hat logo, Ceph, CloudForms, Gluster and OpenShift are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. The OpenStack Word Mark is either a registered trademark/service mark or trademark/service mark of the OpenStack Foundation, in the United States and other countries, and is used with the OpenStack Foundation's permission. Red Hat is not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.

View source version on businesswire.com: https://www.businesswire.com/news/home/20191210005610/en/

Contacts

John TerrillRed Hat, Inc.+1-571-421-8132jterrill@redhat.com

Read this article:
Red Hat Extends the Security Profile of the Worlds Leading Enterprise Linux Platform, Renews FIPS 140-2 Validation for Red Hat Enterprise Linux 7.6 -...

Nevermore Security Named One of Business Worldwide Magazine’s Most Innovative Companies to Watch 2019 – Yahoo Finance

LONDON, Dec. 11, 2019 /PRNewswire/ -- Cyber Security is a hot topic for organisations of all sizes, with the global cost estimated at over $600 billion. Nevermore Security specialises in helping the energy sector protect their businesses and customers from the ever-increasing threat of hacking, and Business Worldwide Magazine has ranked in its "20 Most Innovative Companies to Watch, 2019".

The list is a celebration of trailblazing organisations that are changing the game in their respective industries and altering the corporate landscape. From banking to industry, healthcare to energy, these companies are at the cutting edge of technology, innovation and business strategies. As individuals and as part of the larger global landscape, they demonstrate a shared goal of developing revolutionary products and tech with the power to drive scalable business models and disrupt established industries and markets.

Nevermore Security was founded by Annabelle Lee, a cyber security specialist with over 40 years of technical experience in IT system design and implementation. Throughout her career she has written many documents on cyber security, cryptography and testing, and has specialised in working with the electricity sector for the past 15 years.

There have been huge changes in the threat landscape over recent years, with cyber adversaries constantly coming up with more sophisticated ways to hack into organisations and compromise their valuable data. Threats like third party risks, data breaches and attacks on the Industrial Internet of Things (IIoT) are expected to increase in frequency over the coming years. Cyber security is essential to all industries, and the energy sector is no exception. Advancements in technology have delivered significant cost and production efficiencies, but the combination of new technology and legacy equipment have presented many security risks. The advent of smart technologies and IoT devices have exposed the sector to a new set of risks that did not exist even a decade ago - and that's where Nevermore Security comes in.

By helping electricity companies understand the threats and see their organisations from an attacker's perspective, Nevermore guides leaders on how to identify attack vectors and mitigate potential vulnerabilities. Annabelle explained, "What sets us apart is that we offer in-depth sector knowledge and specialist expertise, gained through continually changing technical and threat environment. It is essential to understand the distinction of the cyber security needs in the electric sector and OT environment as compared to the IT environment, and Nevermore Security has significant experience in this field."

For more information relating to Nevermore Security's cybersecurity offering, visit https://www.nevermoresecurity.com/

An article on the company can be found on the Business Worldwide website

Cyber Resilience for the Energy Sector

About Business Worldwide Magazine

Business Worldwide Magazine is the leading source of business and dealmaker intelligence throughout the world. Our quarterly magazine and online news portal enables an established audience of corporate dealmakers to track the latest news, stories and developments affecting the international markets, corporate finance, business strategy and changes in legislation. This readership includes of CEO/CFO - Banks, Corporate Lawyers and Venture Capital/Private Equity Companies to name a few.

ContactDavid Jones Awards DepartmentE:david.jones@bwmonline.com

W:http://www.bwmonline.com

View original content:http://www.prnewswire.com/news-releases/nevermore-security-named-one-of-business-worldwide-magazines-most-innovative-companies-to-watch-2019-300972522.html

SOURCE Business Worldwide Magazine

Read the rest here:
Nevermore Security Named One of Business Worldwide Magazine's Most Innovative Companies to Watch 2019 - Yahoo Finance

Security leaders fear that quantum computing developments will outpace security technologies – Continuity Central

DetailsPublished: Wednesday, 11 December 2019 07:59

More than half (54 percent) of cyber security professionals have expressed concerns that quantum computing will outpace the development of security technologies, according to new research from the Neustar International Security Council (NISC). Keeping a watchful eye on developments, 74 percent of organizations said that they are paying close attention to the technologys evolution, with 21 percent already experimenting with their own quantum computing strategies.

A further 35 percent of experts claimed to be in the process of developing a quantum strategy, while just 16 percent said they were not yet thinking about it. This shift in focus comes as the vast majority (73 percent) of cyber security professionals expect advances in quantum computing to overcome legacy technologies, such as encryption, within the next five years. Almost all respondents (93 percent) believe the next-generation computers will overwhelm existing security technology, with just 7 percent under the impression that true quantum supremacy will never happen.

Despite expressing concerns that other technologies will be overshadowed, an overwhelming number (87 percent) of CISOs, CSOs, CTOs and security directors are excited about the potential positive impact of quantum computing. The remaining 13 percent were more cautious and under the impression that the technology would create more harm than good.

At the moment, we rely on encryption, which is possible to crack in theory, but impossible to crack in practice, precisely because it would take so long to do so, over timescales of trillions or even quadrillions of years, said Rodney Joffe, Chairman of NISC and Security CTO at Neustar. Without the protective shield of encryption, a quantum computer in the hands of a malicious actor could launch a cyber attack unlike anything weve ever seen.

For both todays major attacks, and also the small-scale, targeted threats that we are seeing more frequently, it is vital that IT professionals begin responding to quantum immediately. The security community has already launched a research effort into quantum-proof cryptography, but information professionals at every organization holding sensitive data should have quantum on their radar. Quantum computing's ability to solve our great scientific and technological challenges will also be its ability to disrupt everything we know about computer security. Ultimately, IT experts of every stripe will need to work to rebuild the algorithms, strategies, and systems that form our approach to cyber security, added Joffe.

http://www.nisc.neustar

Read the original here:
Security leaders fear that quantum computing developments will outpace security technologies - Continuity Central