Speak, assemble, petition and register to vote | Smyth County News & Messenger | swvatoday.com – Southwest Virginia Today

Since 2012, National Voter Registration Day has been observed each September to encourage us all to vote.

Perversely, the idea of voter registration started with the opposite idea in mind: creation of a system to prohibit voting of recent immigrants, Black Americans and lower-income people.

The registration system or systems, because each state controls how its voters register also has been used to spur participation. The Voting Rights Act of 1965 voided many discriminatory practices. Mail-in and motor-voter provisions made it easier to register. Extensions of the time period for registration addressed attempts to exclude groups of the working poor who often were not at home when registrars visited.

In 1993, President Bill Clinton signed the National Voter Registration Act, which mandated that states allow citizens to register to vote by mail, at the department of motor vehicles or other local public offices and helped more than 9 million new voters.

People are also reading

Today, National Voter Registration Day provides information that can help you register to vote. The organization says nearly 4.7 million Americans have used the day to register, including 1.5 million in 2020.

Voting and being able to register to vote seem obvious extensions of First Amendment rights. What good are the rights to freely think, speak, write, gather, and seek change in our government if we are unable to choose the people who carry out its policies?

Still, as my colleague Lata Nott has observed, The First Amendment protects so many activities that are adjacent to voting spending money to influence voters, expressing political views near polling stations, signing petitions to put initiatives on a ballot but stops short of voting itself.

Voter registration continues to be a contentious issue. Courts have delved into battles over gerrymandering aimed at splitting certain voter groups into differing districts to dilute those groups influence. Now, mail-in voting is the subject of scrutiny as mostly Republican state leaders defend limits on certain registration efforts seen as more favorable to likely Democratic voters.

The U.S. Supreme Court has not risen as the champion of registration and voter rights, either directly under the First Amendment or through the 14th Amendments guarantee of due process for all. (The 15th Amendment does make it clear that racial discrimination in registration and voting is illegal.)

The high court generally subjects most election-related First Amendment restrictions on campaign finance and even the wearing of election-related T-shirts in polling places to the highest bar. But it has used lesser standards in direct registration and voting cases, sometimes accepting unsupported claims of potential registration and/or voter fraud in deferring to restrictive state laws.

The voting battles around the 2022 midterm elections will be around more restrictive voter registration laws and new limits on pre-election and absentee ballots adopted in 17 states, and whether voting groups seeking to increase voting by people of color and new citizens can find ways to counter the effect of those new laws.

A 2021 USA TODAY analysis found that while some states passed post-2020 laws to expand voting access, 55 million eligible voters faced new anti-voter laws limiting access to the ballot last year. Americans overall lost more than 160 days in absentee-voting availability with the changes.

And a report by the Brennan Center found that new laws seen as restricting voting opportunities were more often sponsored or supported in state legislatures by elected officials representing the most racially diverse areas of their respective states.

The inherent values of voting and being registered to vote have been hailed since the nations early days. Alexis de Tocquevilles Democracy in America, first published in 1835, had great hopes for American democracy to succeed, based on a principle of constitutionally protected independent thinking and actions and what he called the reconciliation of personal interests and the public good.

Starting with our First Amendment freedoms, the nations founders devised a system of free exchange of views to create an informed electorate, who could then exercise self-governance through the process of elections.

Registering to vote is the first step in reconciliation of our individual views and needs against the overall needs of our society. Voting is the next step: the ultimate expression of our First Amendment right of the people peaceably to assemble, and to petition the government for a redress of grievances.

So dont let Tocqueville, your fellow citizens or democracy down. Register. Vote.

Gene Policinski is a senior fellow for the First Amendment at the Freedom Forum. A version of this column was first published in September 2020.

Get local news delivered to your inbox!

Read the original post:

Speak, assemble, petition and register to vote | Smyth County News & Messenger | swvatoday.com - Southwest Virginia Today

Enjin co-founder: Use NFTs to track users in the metaverse – Cointelegraph

For all the hype around the metaverse, it is easy to forget it is still in its infancy. While the term has only recently entered the broad public consciousness, its impact on how we interact with technology is already expected to be deeply consequential. McKinsey & Company estimates that annual global spending within the metaverse could reach $5 trillion by 2030 across domains as broad as gaming, social, fitness, commerce and remote learning.

The question of how to define and build technology with such broad capabilities is in flux. While a number of games such as Roblox, Fortnite and Minecraft have been hailed as early examples of successful metaverse platforms, a more holistic approach would see unrestricted interaction for players across these games. Interoperability between metaverse platforms is one key component that should be considered.

While only recently entering the public lexicon, the metaverse is not a new concept. The term was originally used to describe a fictional break from reality in Neil Stevensons Snow Crash. The popularity of digital entertainment surged massively during the pandemic. From games like Among Us to services like Netflix Party and Zoom, the opportunity to socialize virtually was highly appealing to many during a time of deep isolation.

Related: AI will help realize the true vision the metaverse hopes to achieve

These changes have fundamentally reshaped our ideas of how we socialize and work together, with enduring habits formed in connecting and collaborating virtually an important factor accelerating engagement with the metaverse. Virtual experiences such as Travis Scotts Fortnite concert have made positive steps forward in developing in-game socially immersive experiences. However, a multi-platform hypersocial virtual experience has yet to reach the market.

Freedom, community and collaboration are all defining characteristics of the metaverse. Achieving this requires infrastructure that can support the transfer of sensitive metadata across different blockchain protocols, metaverse platforms and gaming ecosystems in a blend of social media, crypto wallets and decentralized applications. So, before an interoperable metaverse introduces new business models and cross-platform capabilities, the issue of multichain identity and moderation must be addressed.

Decentralization brings with it the opportunity to experiment with community-led tactics, incentivizing certain behaviors and allowing the collective to dictate its own preferences. PubDAO, a publishing collective launched in conjunction with Decrypt, provides a good example of how these structures can function. Significantly, it makes a clear distinction between moderation and censorship. Pubbers are like-minded individuals, writers in this case, who get screened, onboarded and integrated into the culture of the community.

Scaling this model up to billions of people creates problems, as individual screening is unfeasible. Legacy social media is plagued with this issue, deploying shadow banning and other censorship tools to deal with the issue. A common solution proposed by Web3 advocates involves algorithmic detection and incentivized moderation to counteract abuse, and yet this fails to account for the nature of a multichain metaverse.

Even when done transparently and equitably, far too many abuses would slip through the net. Using the same machinations of the infamous Tornado Cash mixer, the laundering tool of choice for 52% of nonfungible token (NFT) scam proceeds prior to being sanctioned, one would be able to hide the origin of abusive messages in the name of free speech. Even if the perpetrator got doxed on one chain, they could hop to the next. This is not the type of metaverse anyone wants to inhabit.

The potential solution lies in moving moderation tools upstream. Twitter has trialed such a process with success. By providing warning prompts prior to publishing tweets, 9% of users were encouraged to cancel their posts. Overall, the study concluded that there was a 6% reduction in offensive tweets as a result of this mechanism.

Implementing a metadata standard and infusing it with decentralized identifiers (DIDs) could provide an avenue for ethical moderation, one that does not impose on privacy but ensures accountability. Such a multichain technical standard would ensure that tokens minted on any chain can be traced back to their origin within the metaverse. NFTs could be infused with verifiable credentials, enabling platforms to afford privacy to their users and define the terms in which these rights would be forfeited.

Related: Get ready for the feds to start indicting NFT traders

More importantly, at a time where cybersecurity is an increasingly greater concern, a metadata standard would afford individual users more protection. Data breaches in gaming are notoriously common, with more than half of frequent gamers targeted by hacks, according to a 2020 report from Akamai. The wealth of victims and the prevalence of in-game microtransactions make a lucrative target for cybercriminals. On top of that, users tend to use the same password across accounts, making credential stuffing a serious issue with the potential to percolate across industries.

While certainly not a panacea, an interoperable standard would go a long way to consolidating individual security needs. Web3 is set up to accommodate an identity system that removes the need for sensitive data to be stored on centralized servers, making it harder for hackers to access. In the event that personal assets are compromised, a metadata standard imbued with DIDs would enable traceability across the multichain metaverse.

Data standards will dictate the evolution of the web, so it is important that we get them right. Interoperability is easier to set up from the outset than retrofitting it in. By learning the lessons offered by the development of the internet, we can together build a revolutionary metadata standard that fosters a positive, shared techno-social experience on Web3.

Witek Radomski is the chief technology officer and a co-founder of Enjin, a blockchain tech company building products for next-generation NFTs. Witek is the author of the ERC-1155 token standard, the only token standard that enables the configuration of both fungible tokens and NFTs in a single smart contract.

This article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the authors alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.

Originally posted here:

Enjin co-founder: Use NFTs to track users in the metaverse - Cointelegraph

Protect Reproductive Rights By Electing More Black Women – NewsOne

In just a few months, the legislatures of all 50 states will reconvene at their capitol buildings to set their policy agendas for the year. While the actions of the federal government usually steal the spotlight, state government often has the most significant impact on our everyday lives.

The Supreme Courts recent decision to overturn Roe v. Wade and eliminate 50 years of legal precedent guaranteeing the right to an abortion has given states the green light to wage an all-out war on reproductive rights the latest in a long line of efforts to control the decision making ability of what we do with our bodies. Already, more than a dozen states have passed bills effectively banning abortion, with more soon to follow (and efforts to pass a nationwide abortion ban prove beyond a shadow of a doubt that abortion has always been about control, not states rights).

No one will be more impacted by these attacks on health care than Black women, who, even before Dobbs, faced atrocious reproductive and maternal health barriers. Thats why, to protect essential health care like abortion, we must have Black women representing us in our state legislatures.

Its no coincidence that the states actively working to deteriorate the health of Black women are run by mostly white, male and relatively well-off legislators. Black women, despite being one of the most politically active groups in the country, hold less than 5% of state legislative seats nationwide, meaning their voices are largely excluded from policy discussions. This disparity between political engagement and political power reveals the true inequity in our state legislatures.

The first step to making our state legislatures more representative is removing the barriers to entry for Black women. Heres what the roadblocks look like: today, most state lawmakers are severely unpaid or underpaid, and they are expected to work far beyond the hours of a part-time job, as these positions are often considered. Being a state legislator usually requires a pay cut and prior accumulated wealth, which deters a lot of people from taking up these positions in the first place. This is particularly impactful for Black women, who are the center of our communities the caretakers who arent often afforded the luxury of being able to take up a demanding job for little to no compensation.

Then, we must ensure that once people are elected to the statehouse, they are able to exercise their power. Currently, the Black women who have overcome barriers to take up jobs as state legislators face archaic hurdles within government. They are often relegated to the role of token person of color instead of being able to shepherd legislation or chair committees, inhibiting real change.

They are forced and even expected to show immense grace when their colleagues repeatedly push racist and anti-Black legislation. Without addressing these systemic barriers, people with real lived experience cannot make change as policymakers. It seems impossible to achieve fair and just policies on reproductive justice, affordable housing, and quality health care if we arent represented by state lawmakers who have needed these services themselves.

When Black women are boxed out of the policymaking process for generations, the impact on peoples lives is devastating. For example, Black women are nearly three times as likely to die during childbirth. And thousands of Black women experience near-fatal pregnancy-related complications.

Its well-documented that Black women are less likely to be believed by their health care providers, causing mistreatment and poor diagnoses. And now that abortion is set to be fully banned in states with some of the highest Black populations places like Mississippi, Georgia, and my home state of Alabama many more Black women will have to suffer the consequences of our broken medical system. These are policy problems with policy solutions.

The good news is that this sea change is already happening. 2020 saw the highest-ever number of Black women elected to Congress. Black women are also leading the charge at the state level. In Massachusetts, state Rep. Liz Miranda led the effort to create the countrys first state maternal health commission, which will provide policy recommendations to improve Black maternal health outcomes. Down in Florida, state Rep. Kamia Brown successfully passed her bill in the conservative lower chamber to unlock state funding for projects that work to reduce health disparities.

Even in ruby red states where progressive legislation has a slim chance of surviving, Black women have seen success. Tennessee state Sen. London Lamar introduced a bill to expand access to doulas, an increasingly sought-after service in rural and lower-income communities lacking hospitals and doctors. This was Sen. Lamars first bill, and it passed the conservative senate in three weeks. None of these accomplishments would have been possible had these legislators not brought their unique perspectives as Black women in America, and our nation as a whole is better for it.

Black women are fighting for reproductive justice in statehouses daily, and they need backup. Before legislative sessions start next January, nearly all of the countrys 7,000+ state legislators will face the voters in November. I urge you to look up who yours is.

Do they represent your values? Are they considering the needs of your community? Do you think your state government would benefit from a new perspective?

If so, its time to get involved and fight for the change you want to see in your state. Only when Black women are in significant seats of power at every table where decisions are made will we be able to build toward a more prosperous future for everyone.

Jennifer Driver is the Senior Director of Reproductive Rights at the State Innovation Exchange.

SEE ALSO:

Failure To Advance Womens Health Protection Act Puts Spotlight On Absence Of Black Women Senators

The Black Ballot: Debunking The Myth That Black Women Candidates Are Unelectable

See the original post:

Protect Reproductive Rights By Electing More Black Women - NewsOne

Phoenix Suns Governor Robert Sarver Banned For One Year And Fined $10M For Racist And Sexist Behavior | Weak Punishment By NBA Shows Where The Power…

The NBA announced the findings of its independent investigation into allegations that Phoenix Suns governor Robert Sarver created a racist and sexist atmosphere inside the Suns and Mercury organizations. The allegations became public in an expos by ESPN last year. As a result of the leagues findings, Sarver will be fined $10 million and suspended from his role as team governor for a year. This feckless and toothless punishment by the NBA reveals where the true power resides.

In 2014 in his first year as commissioner Adam Silver took the unprecedented step of banning then Los Angeles Clippers governor Donald Sterling for life. Private recordings of Sterling making racist comments were made public. This was hailed as a bold move by the new commissioner and it furthered the myth of the NBA as a progressive league unafraid to challenge its owners.

Of course Sterling was a known racist for decades by many in and around the NBA and found himself in court fighting allegations of racial discrimination towards minority tenants in his Los Angeles apartment complexes.

The only reason he was banned from the NBA is because those recordings became public and the league could no longer pretend it didnt know.

In 2014 when talk of Sterling being banned picked up steam, outspoken Dallas Mavericks governor Mark Cuban spoke out against the banning of Sterling, calling it a slippery slope.

Cuban was no ally of Sterlings, as he referred to his actions as abhorrent. But he was concerned about the precedent being set, and more broadly what this would mean for other governors.

In order for the commissioner to remove a governor from his position, he needs three-fourths of the governors to vote yes. Given what was said and the optics, the league is majority Black and, remember, players were planning to boycott playoff games finding 23 owners to vote yes was easy for Silver.

Apparently, in this instance with Sarver not so much. What Sarver did is no less abhorrent and egregious than Sterling.

The NBAs investigation revealed that on at least five separate occasions Sarver used the N-word. At least five, which means there were many more times. He made sexist comments towards women he employed, and revealed his genitalia to employees in the workplace.

But interestingly enough, the 43-page report detailing investigation also said:

Say what now?

Your detailed investigation all but confirms the scathing ESPN report but Sarvers not a racist or a sexist?

Sure thing.

Like Sterling, Sarver and his exploits have been rumored and whispered about around the NBA for years. How do you think something like the ESPN story gets started?

Sarver has a penchant for lewdness and crassness at best, and at worst behavior far more abhorrent.

In 2021 at a luau-themed roast and memorial service for his deceased business partner Richard (Dick) Heckmann, Sarver left many of the guests uncomfortable with the sexual tales of his good buddy Dick.

Sarvers net worth is approximately $800 million. A $10 million fine is chump change, and his one-year suspension basically means he cant be seen in public around the team. His bidding will still be done through a proxy, because he is the governor.

The 30 governors of the NBA franchises are where the true power in the league resides. Silver works for them, despite the relationship he has with the players and the public appearance that he can hold the governors collective feet to the fire.

If the governors decided they wanted Sarver out, he wouldve already been voted out. But there is a saying about birds of a feather. Given that the other governors are also mostly wealthy white men, do you think Sarver is the only governor whose engaged in less than ideal behavior, to put it mildly?

Probably not. So there is no incentive for them to start what would essentially be voting against their own interests.

A fine, the largest amount that the league can levy, and a one-year suspension is the best the NBA could do to try and move past this situation. Because what they dont want is a full on deep probe with subpoenas, full electronic discovery. A thorough search under the hood with the CSI microscopes would reveal things theyd rather not know.

Read More TSL Stories:

I Regret What I Did | Former Chiefs Assistant Britt Reid Apologizes For Seriously Injuring 5-Year-Old Girl In Drunken Car Crash The Shadow League

T.I. And Atlanta Artists Rise Up Against The Falcons For Choosing Rotimi To Sing Their Team Anthem | What In The A-Town, Shawty? The Shadow League

Read the original post:

Phoenix Suns Governor Robert Sarver Banned For One Year And Fined $10M For Racist And Sexist Behavior | Weak Punishment By NBA Shows Where The Power...

The Supreme Courts order in the Yeshiva University case reads like an implicit threat – Vox.com

The Supreme Court handed down a brief and highly unusual order Wednesday evening that set the stage for more legal wrangling over the line between religious freedom and anti-discrimination laws.

The order itself is very narrow, giving lawyers for an orthodox Jewish university specific instructions on which motions they must file to ask New Yorks appeals courts to reconsider a decision against the university.

A state trial court ordered the university to recognize an LGBTQ student group, something the school refused to do on religious grounds. The school sought relief on the Supreme Courts shadow docket, a process for obtaining expedited relief from the justices without invoking the Courts ordinary processes. And the university actually had a strong case that the state court was at least partly in the wrong, under longstanding Supreme Court precedents.

While the Supreme Courts decision in Yeshiva University v. YU Pride Alliance is technically a loss for the university, because it leaves the trial courts order in place, the decision reads like an implicit threat to New Yorks appeals courts. It is very likely that, if New Yorks appeals courts do not step in to permit Yeshiva University to deny recognition to the pride group, the Supreme Court will do so in the near future.

Meanwhile, the four most conservative members of the Court dissented. They also joined an opinion by Justice Samuel Alito which, if it became law, would seriously damage many civil rights litigants ability to bring an anti-discrimination lawsuit against someone who claims that their discrimination is motivated by their religious faith. And Alitos approach could quite easily pick up the fifth vote it needs to become a majority opinion if the Yeshiva University case does return to the justices.

The case arises out of a dispute between Yeshiva, an Orthodox Jewish university in New York City, and a campus Pride Alliance group that wishes to be recognized as an official student organization by the university. The university refuses to do so, claiming that it would violate its sincere religious beliefs about how to form its undergraduate students in Torah values.

After the student group sued, a state trial court ordered the university to recognize the group, and two New York appeals courts denied the universitys efforts to swiftly block that order. That seemingly left the Supreme Court as the universitys last possible source of relief.

But the five justices in the majority the three liberals plus Chief Justice John Roberts and Justice Brett Kavanaugh denied the universitys request to block the trial courts decision, noting that the university technically could have filed additional motions in New Yorks appeals courts. Applicants may ask the New York courts to expedite consideration of the merits of their appeal, the Court wrote. They also may file with the Appellate Division a corrected motion for permission to appeal that courts denial of a stay to the New York Court of Appeals.

Thats an unexpected development. The Supreme Court typically does not provide lawyers with such detailed instructions on how they can navigate a states appellate process. Its a sign that this Court, with its recent extraordinary deference to religious conservatives, expects the university should prevail in state courts.

Moreover, Yeshiva actually made a fairly strong argument that the trial courts order violates longstanding doctrines giving religious institutions power to decide for themselves, free from state interference, matters of church government as well as those of faith and doctrine.

Should New Yorks appeals courts continue to deny Yeshiva the relief it seeks, the Supreme Court sent a fairly loud signal in its Wednesday order that it will not stay its hand a second time. If Yeshivas lawyers seek and receive neither expedited review nor interim relief from the New York courts, the Courts order states in its final line, they may return to this Court.

The justices, in other words, appear to be delivering a thinly veiled threat to New Yorks appeals courts: Grant Yeshiva the relief it seeks, or else the Supreme Court will.

Its worth noting that this case arrived at the Supreme Court on its shadow docket, a mix of emergency orders and other expedited matters that the justices decide without full briefing or oral argument.

Historically, when the Court decided a case, it ordinarily did so after the case was fully considered by lower courts, and after the justices received full briefing, heard oral argument, and often spent months drafting an opinion. This lengthy process was intended to prevent the justices from making a careless error in their ultimate decision. Because the Supreme Court has the final word on questions of federal law, it makes sense for it to spend a considerable amount of time with each case because there is no easy way to reconsider a Supreme Court decision.

Beginning in the Trump administration, however, the Court started ignoring its normal practices to rule swiftly in Trumps favor when a lower court blocked one of his policies prompting Justice Sonia Sotomayor to warn that her Court was putting a thumb on the scale in favor of the Trump administration.

The data bears Sotomayors accusation out. During previous administrations, asking the Court to take up a case on its shadow docket was considered such an extraordinary act that even the federal government was reluctant to do it. According to a 2019 paper by University of Texas law professor Stephen Vladeck, during the sixteen years of the George W. Bush and Obama Administrations, the Solicitor General filed a total of eight such applications averaging one every other [Supreme Court] Term.

But Trumps Justice Department ignored this longstanding norm, filing at least twenty-one applications for stays in the Supreme Court over the course of less than three years, including 10 in just the year-long Supreme Court term that began in October of 2018. And the Courts Republican-appointed majority rewarded Trump for this behavior, handing his administration a full or partial victory in about two-thirds of cases, according to Vladeck.

One consequence of the Courts eagerness to decide cases quickly and without full deliberation is that conservative private litigants have also started bringing cases on the Courts shadow docket with increasing frequency. And that creates a ton of unnecessary work for the justices. The old norms, which discouraged lawyers from seeking shadow docket relief, didnt just help ensure that the justices fully considered a case before making a decision, they also protected the justices from a cascade of motions seeking their immediate attention.

The Courts order in the Yeshiva University case is consistent with its old practice of encouraging lawyers to seek every possible avenue of relief from lower courts before bringing a matter to the justices attention. But because the order seems designed to pressure lower courts into granting Yeshiva the relief that it seeks, it is unlikely to deter future litigants from bringing shadow docket cases in the future.

In a dissenting opinion joined by Justices Clarence Thomas, Neil Gorsuch, and Amy Coney Barrett, Alito claims that his Court should have granted immediate relief to Yeshiva. Thats unsurprising, as Alito frequently takes maximalist stances in favor of religious conservatives.

And, indeed, Alitos opinion takes a distinctly maximalist approach to this case, calling for a legal rule that would make it very difficult to enforce anti-discrimination laws against anyone who claims that their religion requires them to discriminate.

In Employment Division v. Smith (1990), the Supreme Court held that religious objectors typically must follow the same laws as everyone else. A state may not single out people of faith for inferior treatment that is not imposed on secular individuals or institutions, but religious objectors must follow all neutral law[s] of general applicability.

But Alito claims that New Yorks anti-discrimination law is not neutral or generally applicable because it does not apply to benevolent orders indeed, it does not apply to any club which proves that it is in its nature distinctly private.

These kinds of carveouts from civil rights laws for private clubs are exceedingly common. The federal law banning businesses that offer their services to the public from engaging in many forms of discrimination, for example, exempts a private club or other establishment not in fact open to the public. It is likely that the First Amendment, which grants rights of free association to membership organizations that do not apply to public businesses, forbids states from enacting anti-discrimination laws that require genuinely private clubs to accept members they do not want to accept.

Alito, in other words, is saying that, if a state enacts an anti-discrimination law that exempts private clubs which the Constitution most likely requires it to exempt, then it must also exempt religious objectors from that law. In practice, that means Alito would give all religious objectors fairly sweeping exemptions from huge swaths of anti-discrimination law.

In fairness, Alito did suggest in Burwell v. Hobby Lobby (2014) that bans on race discrimination, at least in the workplace, may still be applied to religious objectors. But the position he lays out in his Yeshiva University dissent would likely give religious conservatives a broad right to engage in discrimination against women, LGBTQ Americans, and other groups that are often protected by civil rights laws.

And, if New Yorks appellate courts do not rule in Yeshivas favor, Alito will get the chance to pick up the fifth vote he needs to turn his approach into the law, once this case returns to the Supreme Court.

Our goal this month

Now is not the time for paywalls. Now is the time to point out whats hidden in plain sight (for instance, the hundreds of election deniers on ballots across the country), clearly explain the answers to voters questions, and give people the tools they need to be active participants in Americas democracy. Reader gifts help keep our well-sourced, research-driven explanatory journalism free for everyone. By the end of September, were aiming to add 5,000 new financial contributors to our community of Vox supporters. Will you help us reach our goal by making a gift today?

Read more from the original source:

The Supreme Courts order in the Yeshiva University case reads like an implicit threat - Vox.com

Web Crypto API – Web APIs | MDN – Mozilla

The Web Crypto API is an interface allowing a script to use cryptographic primitives in order to build systems using cryptography.

Warning: The Web Crypto API provides a number of low-level cryptographic primitives. It's very easy to misuse them, and the pitfalls involved can be very subtle.

Even assuming you use the basic cryptographic functions correctly, secure key management and overall security system design are extremely hard to get right, and are generally the domain of specialist security experts.

Errors in security system design and implementation can make the security of the system completely ineffective.

Please learn and experiment, but don't guarantee or imply the security of your work before an individual knowledgeable in this subject matter thoroughly reviews it. The Crypto 101 Course can be a great place to start learning about the design and implementation of secure systems.

Some browsers implemented an interface called Crypto without having it well defined or being cryptographically sound. In order to avoid confusion, methods and properties of this interface have been removed from browsers implementing the Web Crypto API, and all Web Crypto API methods are available on a new interface: SubtleCrypto. The Crypto.subtle property gives access to an object implementing it.

BCD tables only load in the browser

The rest is here:
Web Crypto API - Web APIs | MDN - Mozilla

Fundamental Cryptography in Theory and Python – iProgrammer

Learn to do Cryptography with Python and for free too. A course by computer scientist of ETH Zrich and cybersec expert Cyrill Gssi. He teaches the concepts of Cryptography with a practical approach.

And what better way of exploring the four classic concepts of Cryptography, that is confidentiality, integrity, authenticity and non-repudiation, than with Python.

Gssi developed this course with a few goals in mind. The first that by completing the course you would have gained a good understanding of cryptographyas a tool to realize the aims of information security. The second would be to furnish good knowledge about the existing fundamental cryptographic primitivesand an understanding of the security concerns associated with each of them. And, finally, the third goal would be to become able to apply that theoretical understanding of fundamental cryptographyby using the various cryptographic primitives in Python.

In concrete terms this would involve such things as symmetric, asymmetric, hybrid encryption and key exchanges or primitives such as the AES block cipher ,the RSA encryption scheme, and the Diffie-Hellman key exchanges EDH and ECDHE. All these relate toConfidentiality.

On the topic of Integrity, the cryptographic hash functions such as MD5, SHA-1, SHA-2 and SHA-3 are introduced.

As far as Authenticity is concerned, message authentication codes with HMACs, authenticated encryption with the Encrypt-then-MAC approach, and authenticated encryption with associated data with the GCM block cipher mode of operation, will be examined.

Finally on the Non-Repudiation front, we will have a close look at digital signatures based on RSA, DSA, Elliptic-Curve based DSA, Ed25519 and Ed448.

Theory and its practice in Python go hand in hand. Furthermore you will not just learn how to use the cryptographic primitives in Python, but you will additionally learn, how to implement most of these primitives in Python yourself.

The syllabus in detail:

1-Introduction and content of course2-Cryptography & its classic security goals3-Confidentiality as a security goal4-Symmetric encryption with AES and ECB/CBC5-Using insecure AES-ECB in Python6-Using secure AES-CBC in Python7-Implementing AES in Python #18-Implementing AES in Python #29-Implementing AES in Python #310-Implementing AES in Python #411-Implementing AES in Python #512-Implementing AES-ECB/CBC in Python #113-Implementing AES-ECB/CBC in Python #214-Asymmetric encryption with RSA15-Using RSA in Python16-Implementing RSA in Python #117-Implementing RSA in Python #218-Implementing RSA in Python #319-Hybrid encryption & key exchanges (EC)DHE20-Implementing hybrid RSA-AES encryption in Python21-Using EDH and ECDHE in Python22-Implementing a P-256 ECDHE in Python23-Integrity as a security goal24-Hash function structure and properties25-Hash function security26-Using MD5, SHA-1, SHA-2, SHA-3 in Python27-Implementing SHA-256 in Python #128-Implementing SHA-256 in Python #229-Authenticity as a security goal30-HMAC, Encrypt-then-MAC and GCM31-Using HMAC in Python32-Implementing HMAC in Python33-Implementing Encrypt-then-MAC in Python34-Using AES-GCM in Python35-Implementing AES-GCM in Python #136-Implementing AES-GCM in Python #237-Non-repudiation as a security goal38-Digital signatures39-Using RSA-PSS & Ed25519 signatures in Python40-Recap and summary

These 40 lessons of 2 up to 15mins in duration are provided as a Youtube playlist, while the accompanying Python code is up on its Github repo.

To sum it up, this is a great learning opportunity, combining two essential technologies, Cryptography and Python. Both very valuable for programming as well as careerwise forits students.

Fundamental cryptography with Python-Youtube playlist

Fundamental cryptography with Python-Github

Knock Yourself Out With 91 Python Videos

Play & Learn With CryptoHack

To be informed about new articles on IProgrammer,sign up for ourweekly newsletter,subscribe to theRSSfeedandfollow us on Twitter,Facebook orLinkedin.

Make a Comment or View Existing Comments Using Disqus

or email your comment to: comments@i-programmer.info

Read more:
Fundamental Cryptography in Theory and Python - iProgrammer

Cryptomathic appoints Laurent Lafargue as CEO of the pioneer in cryptography – FinanceFeeds

Every department in every organization from governments and banks to small businesses faces the same challenge: to secure their sensitive data.

Cryptomathic has appointed Laurent Lafargue as Chief Executive Officer as the cryptographic security solutions pioneer continues its high-growth trajectory across Europe and the United States.

The firm was founded in 1986 and specializes in four sectors: e-signatures, cryptographic key management, EMV payments and mobile security.

One of the first companies to commercialise cryptographic algorithms, Cryptomathic has built a strong portfolio of cybersecurity solutions over the past 35 years, having onboarded global household names in banking and technology.

Cryptomathic holds over 30 patents and has been named one of the worlds 40 most innovative companies by the World Economic Forum.

Bringing more than 20 years of managerial and executive experience to the chief executive role at Cryptomathic, Laurent Lafargue joins the firm after yearsat leading firms in semiconductors, smart cards, RFID, and electronics, including Infineon and Linxens.

Laurent Lafargue, Chief Executive Officer at Cryptomathic, commented:As the world races to go digital, the demand for cryptographic security solutions is exploding. Every department in every organization from governments and banks to small businesses faces the same challenge: to secure their sensitive data. Cryptography has emerged as the de-facto security model to meet this challenge wherever it presents itself, from protecting data in the cloud and on mobile devices, to safeguarding transactions and enabling the secure e-signing of legally binding documents.

Cryptomathic has operated at the bleeding edge of this field for over 35 years. Its solutions are trusted by governments, cloud service providers, and industry leaders in a host of sectors around the world, from financial services to automotive and aviation. It is a great privilege to lead the Cryptomathic team. Im hugely excited to play my part in driving the companys growth as it continues to shape the future of this industry.

The rest is here:
Cryptomathic appoints Laurent Lafargue as CEO of the pioneer in cryptography - FinanceFeeds

NTT Research Names Takashi Goto Head of the Technology Promotion Team – Business Wire

SUNNYVALE, Calif.--(BUSINESS WIRE)--NTT Research, Inc., a division of NTT (TYO:9432), today announced that it has named Takashi Goto as head of its Technology Promotion Team, a group set up to help productize well-developed research concepts. Mr. Goto was previously a director in the NTT R&D Planning Department and before that a senior manager and senior research engineer at the NTT Information Network Laboratory Group. He joined NTT Research on July 1, 2022, succeeding Dr. Kei Karasawa, who has taken an executive position at NTT R&D in Tokyo. Mr. Goto will join the executive team at NTT Research, where he will be responsible for exploring the market potential for technologies under development at NTT Research, as well as NTT R&D. One of the first targets for commercialization is attribute-based encryption (ABE), a form of cryptography that allows for sharing data while preserving the data owners privacy.

The mission of NTT Research is to conduct basic research tied to long-term goals, rather than specific product or service roadmaps. Yet, along the way, the companys researchers may generate technologies that have market potential. The purpose of the Technology Promotion Team is to test that hypothesis by interacting with a range of stakeholders involved in the commercialization of invented technologies or byproducts. Mr. Gotos task will be to interface with NTT operating companies, potential end users, possible third-party partners and standardization bodies. Technology promotion also involves feasibility studies, use-cases, competitive analysis, proof of concept (POC) demonstrations and related efforts.

We are very pleased to welcome Takashi Goto to our team in Sunnyvale, NTT Research President and CEO Kazuhiro Gomi said. He is a talented engineer and manager with significant experience at NTT R&D and a keen interest in technology promotion, making him a perfect fit for this important role.

A leading candidate for commercialization, ABE was Introduced in 2005 in a paper co-authored by NTT Research Cryptography & Information Security (CIS) Lab Director, Brent Waters. Two years ago, that paper was recognized with an International Association for Cryptologic Research (IACR) Test of Time Award. To date, NTT Research has been talking with NTT operating companies, on the assumption that ABE solutions could address security and privacy needs in the health care, medical, financial, education and government sectors. In November 2021, NTT announced an agreement with the University of Technology Sydney (UTS), which includes conducting a POC platform of ABE aimed at making the UTS internal systems more secure. NTT Research is planning a hackathon event around ABE, aimed at showcasing innovative ABE-related applications. Mr. Goto is currently engaged in planning that event.

I have long been interested in creating value and introducing NTTs superior technology to Japan and the world, so I am very excited about my new role at NTT Research, Mr. Goto said. My near-term plans include providing technical support for a commercialization project in Australia, evaluating recent technologies through the hackathon and improving the process of intellectual property management.

In addition to ABE, other NTT Research-related technologies with potential commercial byproducts include applications of multiparty computation (MPC), another area of research for CIS Lab cryptographers, and implementations of the coherent Ising machine (CIM), a quantum computing-related technology that is an area of focus for the NTT Research Physics & Informatics (PHI) Lab. Supporting Mr. Goto at NTT Research are Mr. Fang Wu, a consultant and technology veteran, formerly with NTT Global Networks, NTT America, Lucent and Bell Labs; and Dr. Yannis Rouselakis, a software architect specializing in cryptographic technologies. To advance NTT Researchs core scientific mission, the company, unique among industrial laboratories, has advanced an open lab vision and over the past three years has established more than 20 relationships with premier research organizations in the U.S., Japan and around the world.

About NTT ResearchNTT Research opened its offices in July 2019 as a new Silicon Valley startup to conduct basic research and advance technologies that promote positive change for humankind. Currently, three labs are housed at NTT Research facilities in Sunnyvale: the Physics and Informatics (PHI) Lab, the Cryptography and Information Security (CIS) Lab, and the Medical and Health Informatics (MEI) Lab. The organization aims to upgrade reality in three areas: 1) quantum information, neuroscience and photonics; 2) cryptographic and information security; and 3) medical and health informatics. NTT Research is part of NTT, a global technology and business solutions provider with an annual R&D budget of $3.6 billion.

NTT and the NTT logo are registered trademarks or trademarks of NIPPON TELEGRAPH AND TELEPHONE CORPORATION and/or its affiliates. All other referenced product names are trademarks of their respective owners. 2022 NIPPON TELEGRAPH AND TELEPHONE CORPORATION

Continue reading here:
NTT Research Names Takashi Goto Head of the Technology Promotion Team - Business Wire

Blockchain and POW are the leading technology behind Bitcoin. – Deadline News

Blockchain has the power to revolutionize all supply chain relationships, as it cuts out many intermediaries and improves transparency. As you might have heard, this new type of technology does not rely on servers to store and manage data for it to work.Instead, each companys blockchain uses cryptography to create decentralized networks that allow for instant value transfer without relying on external intermediaries. In addition, Bitcoin introduced blockchain and proof of work, a consensus algorithm allowing the execution of transactions with utter security in a trustless manner. Both blockchain and proof of work are two core technology of the entire bitcoin ecosystem; lets discuss everything you should know about these fundamental technologies. But before that, if you are planning to start your bitcoin trading journey, you may use a trusted platform like bitalpha-ai.io

Blockchain:Blockchain is an exciting new technology that can potentially change many peoples lives globally. Through blockchain technology, companies can now have an accurate, efficient, and transparent way to manage the entire lifecycle of their products, from sourcing raw materials through manufacturing, distribution, and sales to ensuring that the proper payments are being made along the way.

As a result, supply chain management companies will have significant cost savings due to this new technologys ability to circumvent fraudulent activities. The medical industry is another one ripe for disruption in various ways by blockchain technology. It will likely help to save lives by making food, drug, and preventative care distribution more efficient, secure, and transparent.

The benefits of using a blockchain are numerous, and the cost savings are significant. Blockchain technology offers several potential benefits regarding supply chain management, including greater operational efficiency, reduced costs, and increased quality assurance in data management. In addition, it also offers improved visibility across supply chains as well as improved data integrity due to its transparency features. A blockchain is essentially an immutable log shared across a network of many different parties that dont rely on centralized control or storage.

Proof of work:

Proof of work is a validation method in which the validity of transactions is confirmed by solving complex computationally tricky problems. In other words, this algorithm approves that a transaction has taken place. Its important to understand that this algorithm doesnt rely on data stored in any centralized database to verify its validity but instead relies on the computing power required to solve these computationally tricky problems.The blockchain networks are secured by miners who are rewarded with new bitcoin or other cryptocurrencies for their services while keeping track of the ledger. Proof of work may seem like a relatively new concept, but it has been around for quite some time. This algorithm is often called the grandfather of cryptography and was first used over a decade ago. Unlike other types of encryptions where the data is scrambled and then decoded at the receiving end, miners are required to solve cryptographic puzzles to verify transactions in proof of work.

Proof-of-work systems utilize advanced technologies that require significant levels of computer processing power input for secure blockchains to function. Unfortunately, it means that mining is only accessible to people who are able and willing to invest in their computing rigs or those who can afford more powerful machines.

Why blockchain and proof of work are essential for the bitcoin ecosystem?Both blockchain and proof of work are fundamental technologies to the bitcoin ecosystem. Theyre both so important that without them, its hard to imagine a world where cryptocurrencies would exist. As such, it makes sense that novices must acknowledge blockchain and proof of work before going deeper into the topic of bitcoin and other cryptocurrencies.

Proof of work is essential for bitcoin because this system requires an enormous amount of processing power and electricity to function correctly. Essentially, everyone who owns even a small number of bitcoins has access to this technology. Still, only those who can afford or are willing to spend a significant amount on their infrastructure can harness its full potential. In short, proof of work maintains the security and efficiency of the bitcoin ecosystem by validating each transaction. Also, it creates a high entry barrier for miners to enter the mining process.

When a transaction occurs, its verified and stored on a distributed computer network that is constantly updating the blockchain. In addition, it provides miners with new bitcoins or other forms of cryptocurrency as a reward for their services every time they process transactions.

The underlying science proof of work and blockchain are pretty similar. Still, with proof of work, transactions are verified by solving complex math problems utilizing a single computer system (the miner). In contrast, blockchain is shared between multiple computers at once to verify transactions simultaneously. In short, to prevent double-spending, the concept of blockchain is essential for the bitcoin network.

Here is the original post:
Blockchain and POW are the leading technology behind Bitcoin. - Deadline News