Artificial Intelligence, Machine Learning and the Future of Graphs – BBN Times

I am a skeptic of machine learning. There, I've said it. I say this not because I don't think that machine learning is a poor technology - it's actually quite powerful for what it does - but because machine-learning by itself is only half a solution.

To explain this (and the relationship that graphs have to machine learning and AI), it's worth spending a bit of time exploring what exactly machine learning does, how it works. Machine learning isn't actually one particular algorithm or piece of software, but rather the use of statistical algorithms to analyze large amounts of data and from that construct a model that can, at a minimum, classify the data consistently. If it's done right, the reasoning goes, it should then be possible to use that model to classify new information so that it's consistent with what's already known.

Many such systems make use of clustering algorithms - they take a look at data as vectors that can be described in an n-dimensional space. That is to say, there are n different facets that describe a particular thing, such as a thing's color, shape (morphology), size, texture, and so forth. Some of these attributes can be identified by a single binary (does the thing have a tail or not), but in most cases the attributes usually range along a spectrum, such as "does the thing have an an exclusively protein-based diet (an obligate carnivore) or does its does consist of a certain percentage of grains or other plants?". In either case, this means that it is possible to use the attribute as a means to create a number between zero and one (what mathematicians would refer to as a normal orthogonal vector).

Orthogonality is an interesting concept. In mathematics, two vectors are considered orthogonal if there exists some coordinate system in which you cannot express any information about one vector using the other. For instance, if two vectors are at right angles to one another, then there is one coordinate system where one vector aligns with the x-axis and the other with the y-axis. I cannot express any part of the length of a vector along the y axis by multiplying the length of the vector on the x-axis. In this case they are independent of one another.

This independence is important. Mathematically, there is no correlation between the two vectors - they represent different things, and changing one vector tells me nothing about any other vector. When vectors are not orthogonal, one bleeds a bit (or more than a bit) into another. One two vectors are parallel to one another, they are fully correlated - one vector can be expressed as a multiple of the other. A vector in two dimensions can always be expressed as the "sum" of two orthogonal vectors, a vector in three dimensions, can always be expressed as the "sum" of three orthogonal vectors and so forth.

If you can express a thing as a vector consisting of weighted values, this creates a space where related things will generally be near one another in an n-dimensional space. Cats, dogs, and bears are all carnivores, so in a model describing animals, they will tend to be clustered in a different group than rabbits, voles, and squirrels based upon their dietary habits. At the same time cats,, dogs and bears will each tend to cluster in different groups based upon size as even a small adult bear will always be larger than the largest cat and almost all dogs. In a two dimensional space, it becomes possible to carve out a region where you have large carnivores, medium-sized carnivores, small carnivores, large herbivores and so forth.

Machine learning (at its simplest) would recognize that when you have a large carnivore, given a minimal dataset, you're likely to classify that as a bear, because based upon the two vectors size and diet every time you are at the upper end of the vectors for those two values, everything you've already seen (your training set) is a bear, while no vectors outside of this range are classified in this way.

A predictive model with only two independent vectors is going to be pretty useless as a classifier for more than a small set of items. A fox and a dog will be indistinguishable in this model, and for that matter, a small dog such as a Shitsu vs. a Maine Coon cat will confuse the heck out of such a classifier. On the flip side, the more variables that you add, the harder it is to ensure orthogonality, and the more difficult it then becomes determine what exactly is the determining factor(s) for classification, and consequently increasing the chances of misclassification. A panda bear is, anatomically and genetically, a bear. Yet because of a chance genetic mutation it is only able to reasonably digest bamboo, making it a herbivore.

You'd need to go to a very fine-grained classifier, one capable of identifying genomic structures, to identify a panda as a bear. The problem here is not in the mathematics but in the categorization itself. Categorizations are ultimately linguistic structures. Normalization functions are themselves arbitrary, and how you normalize will ultimately impact the kind of clustering that forms. When the number of dimensions in the model (even assuming that they are independent, which gets harder to determine with more variables) gets too large, then the size of hulls for clustering becomes too small, and interpreting what those hulls actually significant become too complex.

This is one reason that I'm always dubious when I hear about machine learning models that have thousands or even millions of dimensions. As with attempting to do linear regressions on curves, there are typically only a handful of parameters that typically drive most of the significant curve fitting, which is ultimately just looking for adequate clustering to identify meaningful patterns - and typically once these patterns are identified, then they are encoded and indexed.

Facial recognition, for instance, is considered a branch of machine learning, but for the most part it works because human faces exist within a skeletal structure that limits the variations of light and dark patterns of the face. This makes it easy to identify the ratios involved between eyes, nose, and mouth, chin and cheekbones, hairlines and other clues, and from that reduce this information to a graph in which the edges reflect relative distances between those parts. This can, in turn, be hashed as a unique number, in essence encoding a face as a graph in a database. Note this pattern. Because the geometry is consistent, rotating a set of vectors to present a consistent pattern is relatively simple (especially for modern GPUs).

Facial recognition then works primarily due to the ability to hash (and consequently compare) graphs in databases. This is the same way that most biometric scans work, taking a large enough sample of datapoints from unique images to encode ratios, then using the corresponding key to retrieve previously encoded graphs. Significantly, there's usually very little actual classification going on here, save perhaps in using courser meshes to reduce the overall dataset being queried. Indeed, the real speed ultimately is a function of indexing.

This is where the world of machine learning collides with that of graphs. I'm going to make an assertion here, one that might get me into trouble with some readers. Right now there's a lot of argument about the benefits and drawbacks of property graphs vs. knowledge graphs. I contend that this argument is moot - it's a discussion about optimization strategies, and the sooner that we get past that argument, the sooner that graphs will make their way into the mainstream.

Ultimately, we need to recognize that the principal value of a graph is to index information so that it does not need to be recalculated. One way to do this is to use machine learning to classify, and semantics to bind that classification to the corresponding resource (as well as to the classifier as an additional resource). If I have a phrase that describes a drink as being nutty or fruity, then these should be identified as classifications that apply to drinks (specifically to coffees, teas or wines). If I come across flavors such as hazelnut, cashew or almond, then these should be correlated with nuttiness, and again stored in a semantic graph.

The reason for this is simple - machine learning without memory is pointless and expensive. Machine learning is fast facing a crisis in that it requires a lot of cycles to train, classify and report. Tie machine learning into a knowledge graph, and you don't have to relearn all the time, and you can also reduce the overall computational costs dramatically. Furthermore, you can make use of inferencing, which are rules that can make use of generalization and faceting in ways that are difficult to pull off in a relational data system. Something is bear-like if it is large, has thick fur, does not have opposable thumbs, has a muzzle, is capable of extended bipedal movement and is omnivorous.

What's more, the heuristic itself is a graph, and as such is a resource that can be referenced. This is something that most people fail to understand about both SPARQL and SHACL. They are each essentially syntactic sugar on top of graph templates. They can be analyzed, encoded and referenced. When a new resource is added into a graph, the ingestion process can and should run against such templates to see if they match, then insert or delete corresponding additional metadata as the data is folded in.

Additionally, one of those pieces of metadata may very well end up being an identifier for the heuristic itself, creating what's often termed a reverse query. Reverse queries are significant because they make it possible to determine which family of classifiers was used to make decisions about how an entity is classified, and from that ascertain the reasons why a given entity was classified a certain way in the first place.

This gets back to one of the biggest challenges seen in both AI and machine learning - understanding why a given resource was classified. When you have potentially thousands of facets that may have potentially been responsible for a given classification, the ability to see causal chains can go a long way towards making such a classification system repeatable and determining whether the reason for a given classification was legitimate or an artifact of the data collection process. This is not something that AI by itself is very good at, because it's a contextual problem. In effect, semantic graphs (and graphs in general) provide a way of making recommendations self-documenting, and hence making it easier to trust the results of AI algorithms.

One of the next major innovations that I see in graph technology is actually a mathematical change. Most graphs that exist right now can be thought of as collections of fixed vectors, entities connected by properties with fixed values. However, it is possible (especially when using property graphs) to create properties that are essentially parameterized over time (or other variables) or that may be passed as functional results from inbound edges. This is, in fact, an alternative approach to describing neural networks (both physical and artificial), and it has the effect of being able to make inferences based upon changing conditions over time.

This approach can be seen as one form of modeling everything from the likelihood of events happening given other events (Bayesian trees) or modeling complex cost-benefit relationships. This can be facilitated even today with some work, but the real value will come with standardization, as such graphs (especially when they are closed network circuits) can in fact act as trainable neuron circuits.

It is also likely that graphs will play a central role in Smart Contracts, "documents" that not only specify partners and conditions but also can update themselves transactional, can trigger events and can spawn other contracts and actions. These do not specifically fall within the mandate of "artificial intelligence" per se, but the impact that smart contracts play in business and society, in general, will be transformative at the very least.

It's unlikely that this is the last chapter on graphs, either (though it is the last in the series about the State of the Graph). Graphs, ultimately, are about connections and context. How do things relate to one another? How are they connected? What do people know, and how do they know them. They underlie contracts and news, research and entertainment, history and how the future is shaped. Graphs promise a means of generating knowledge, creating new models, and even learning. They remind us that, even as forces try to push us apart, we are all ultimately only a few hops from one another in many, many ways.

I'm working on a book calledContext, hopefully out by Summer 2020. Until then, stay connected.

Read more from the original source:
Artificial Intelligence, Machine Learning and the Future of Graphs - BBN Times

Microsoft throws weight behind machine learning hacking competition – The Daily Swig

Emma Woollacott02 June 2020 at 13:14 UTC Updated: 02 June 2020 at 14:48 UTC

ML security evasion event is based on a similar competition held at DEF CON 27 last summer

The defensive capabilities of machine learning (ML) systems will be stretched to the limit at a Microsoft security event this summer.

Along with various industry partners, the company is sponsoring a Machine Learning Security Evasion Competition involving both ML experts and cybersecurity professionals.

The event is based on a similar competition held at AI Village at DEF CON 27 last summer, where contestants took part in a white-box attack against static malware machine learning models.

Several participants discovered approaches that completely and simultaneously bypassed three different machine learning anti-malware models.

The 2020 Machine Learning Security Evasion Competition is similarly designed to surface countermeasures to adversarial behavior and raise awareness about the variety of ways ML systems may be evaded by malware, in order to better defend against these techniques, says Hyrum Anderson, Microsofts principal architect for enterprise protection and detection.

The competition will consist of two different challenges. A Defender Challenge will run from June 15 through July 23, with the aim of identifying new defenses to counter cyber-attacks.

The winning defensive technique will need to be able to detect real-world malware with moderate false-positive rates, says the team.

Next, an Attacker Challenge running from August 6 through September 18 provides a black-box threat model.

Participants will be given API access to hosted anti-malware models, including those developed in the Defender Challenge.

RECOMMENDED DEF CON 2020: Safe Mode virtual event will be free to attend, organizers confirm

Contestants will attempt to evade defenses using hard-label query results, with samples from final submissions detonated in a sandbox to make sure theyre still functional.

The final ranking will depend on the total number of API queries required by a contestant, as well as evasion rates, says the team.

Each challenge will net the winner $2,500 in Azure credits, with the runner up getting $500 in Azure credits.

To win, researchers must publish their detection or evasion strategies. Individuals or teams can register on the MLSec website.

Companies investing heavily in machine learning are being subjected to various degrees of adversarial behavior, and most organizations are not well-positioned to adapt, says Anderson.

It is our goal that through our internal research and external partnerships and engagements including this competition well collectively begin to change that.

READ MORE Going deep: How advances in machine learning can improve DDoS attack detection

See more here:
Microsoft throws weight behind machine learning hacking competition - The Daily Swig

19 Impact on Global Machine Learning Artificial intelligence Market to Grow at a Stayed CAGR from 2020 to 2026 – Cole of Duty

The 19 Impact on Global Machine Learning Artificial intelligence market research report added by Market Study Report, LLC, is a thorough analysis of the latest trends prevalent in this business. The report also dispenses valuable statistics about market size, participant share, and consumption data in terms of key regions, along with an insightful gist of the behemoths in the 19 Impact on Global Machine Learning Artificial intelligence market.

The 19 Impact on Global Machine Learning Artificial intelligence market report provides a granular assessment of the business space, while elaborating on all the segments of this business space. The document offers key insights pertaining to the market players as well as their gross earnings. Moreover, details regarding the regional scope and the competitive scenario are entailed in the study.

Request a sample Report of 19 Impact on Global Machine Learning Artificial intelligence Market at:https://www.marketstudyreport.com/request-a-sample/2684709?utm_source=coleofduty.com&utm_medium=AG

This report studies the 19 Impact on Global Machine Learning Artificial intelligence market status and outlook of global and major regions, from angles of players, countries, product types and end industries, this report analyzes the top players in global 19 Impact on Global Machine Learning Artificial intelligence industry, and splits by product type and applications/end industries. This report also includes the impact of COVID-19 on the 19 Impact on Global Machine Learning Artificial intelligence industry.

Emphasizing the key factors of the 19 Impact on Global Machine Learning Artificial intelligence market report:

Thorough analysis of the geographical landscape of 19 Impact on Global Machine Learning Artificial intelligence market:

Highlighting on the competitive landscape of 19 Impact on Global Machine Learning Artificial intelligence market:

.

Ask for Discount on 19 Impact on Global Machine Learning Artificial intelligence Market Report at:https://www.marketstudyreport.com/check-for-discount/2684709?utm_source=coleofduty.com&utm_medium=AG

Additional factors of 19 Impact on Global Machine Learning Artificial intelligence market research report:

.

.

Research objectives:

For More Details On this Report: https://www.marketstudyreport.com/reports/covid-19-impact-on-global-machine-learning-artificial-intelligence-market-size-status-and-forecast-2020-2026

Related Reports:

1. COVID-19 Impact on Global Gamification of Learning Market Size, Status and Forecast 2020-2026Read More: https://www.marketstudyreport.com/reports/covid-19-impact-on-global-gamification-of-learning-market-size-status-and-forecast-2020-2026

2. COVID-19 Impact on Global Chain Hotel Market Size, Status and Forecast 2020-2026Read More: https://www.marketstudyreport.com/reports/covid-19-impact-on-global-chain-hotel-market-size-status-and-forecast-2020-2026

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

Follow this link:
19 Impact on Global Machine Learning Artificial intelligence Market to Grow at a Stayed CAGR from 2020 to 2026 - Cole of Duty

WikiLeaks founder Julian Assange misses court hearing due to respiratory problems – ComputerWeekly.com

Julian Assange, founder of WikiLeaks, was too unwell to attend a court hearing by video link today at Westminster Magistrates Court.

Assanges lawyer, Edward Fitzgerald QC, told the court that his client had had respiratory problems for some time.

The WikiLeaks founder faces 17 charges under the 1917 Espionage Act after WikiLeaks published a series of leaks from Chelsea Manning, a former US Army soldier turned whistleblower, in 2010-11.

The 48-year-old faces a further charge of conspiracy to commit computer intrusion. The charges, filed in an indictment by the Easter District of Virginia, carry a maximum sentence of 175 years.

Observers and journalists dialled in to a short court hearing at Westminster Magistrates Court, but frequently had difficulty hearing what the lawyers and judge were saying over noises on the line.

According to one journalist present at the court, district judge Vanessa Baraitser said the court had received an email from Belmarsh Prison, saying Assange was refusing to attend the hearing and refusing to sign a refusal form.

Fitzgerald told the judge that Assanges solicitor, Gareth Peirce, had sent the court an email on Friday explaining that Assange was unwell with respiratory problems, 7 News reported.

The judge said she had hoped to provide the name of the crown court that could hear Assanges extradition case today, but said she was still waiting for confirmation of the venue.

The court heard that the prosecution had been unable to complete a psychiatric report on Assange because a medical expert had been unable to gain access to Belmarsh Prison during the lockdown.

The judge gave the prosecution a deadline of 31 July to produce the psychiatric report on Assange.

James Lewis for the prosecution said the defence had served new evidence that would need to be examined to determine admissibility.

The judge ordered the prosecution to present a new skeleton argument to the court on 25 August, with the defence skeleton argument due on 1 September, 7 News reported.

The next scheduled hearing will take place on 29 June, and a full three-week hearing is due to start on 7 September.

In a separate development, 36 members of the European Parliament have called for Assange to be released from Belmarsh on press freedom and humanitarian grounds.

Detention measures across Europe have become more flexible due to the Covid-19 pandemic, and prisoners are being considered for early release or bail as the severity of the coronavirus in closed quarters, such as a prison, puts prisoners at great risk of infection and death, the MEPS said in a letter.

A second letter, signed by Yanis Varoufakis, a member of the Greek Parliament, and others, called for Assange to be released into home detention.

Read this article:
WikiLeaks founder Julian Assange misses court hearing due to respiratory problems - ComputerWeekly.com

Kayleigh McEnany just accidentally revealed the key difference between the media and the Trump White House – WICZ

Analysis by Chris Cillizza, CNN Editor-at-large

White House press secretary Kayleigh McEnany thought she had scored a direct hit on the media's credibility during Thursday's press briefing.

Asked by CNN's Jim Acosta about Twitter's decision to append a fact-check to President Donald Trump's false claim that mail-in balloting is a Democratic attempt to rig the 2020 election, McEnany said this: "If you're going to get into the fact-checking business -- there's no one that should be fact-checked more than the mainstream media that has been continually wrong about a number of things."

She then went on to detail several instances -- including a 2017 CNN story in which we wrongly reported that Donald Trump and his son Donald Trump Jr. had received an email providing them access to hacked WikiLeaks emails before the public had access -- where mainstream media got reporting about Trump wrong.

"In 2017, your network, CNN, botched their WikiLeaks email exclusive and were forced to make on-air corrections," McEnany scolded Acosta.

Pay very close attention to those last few words from McEnany "make on-air corrections."

Yes! CNN did do that! And wrote an entire article about the initial article being wrong -- and detailed past errors we have made.

Because CNN is a big news organization that is ultimately just a lot of people trying to get it right. And because we are people, we don't always get it right. And when we get it wrong, we do our best to explain why and how -- and try to not make that same mistake again.

That's how journalists maintain credibility with audiences. Not by never making a mistake, because that is impossible. Rather, by doing everything we can to get the story right and, when we don't, admitting we didn't. The very fact that we issue public corrections -- in the most transparent way possible -- is a testament to our commitment to getting it right.

Now, contrast that approach to how President Trump and the White House operate.

Trump, according to The Washington Post's Fact-Checker blog has said more than 18,000 false or misleading things in his first 1,170 days in office -- an average of 15 incorrect claims every single day he has been president.

Many politicians, faced with being fact-checked and deemed to have gotten something wrong, have one of two reactions: 1) They apologize for the misstatement or 2) (and this one is more common) they simply stop repeating the falsehood. Trump doubles, triples and quadruples down on known falsehoods.

When pressed about Trump's incorrect claims on Thursday, McEnany said this: "I'm around the President. His intent is always to give truthful information to the American people."

Sure! Most people do try to tell the truth most of the time! But even if you try to tell the truth all of the time, you get stuff wrong. It happens. Because we are human.

So, how many times has Trump -- or a member of his senior staff -- admitted they simply got something wrong? Uh, so, well, not many? And that's being very, very generous.

In fact, Trump's default response when he is asked to apologize for getting something wrong is an I-am-rubber-you-are-glue defense, attacking and blaming the media. "Where is their apology to me for all of the incorrect stories??" Trump tweeted in June 2017.

In other words: Trump seeks to distract from his own comments and demands that he either retract or apologize for them by accusing someone else -- almost always the media -- of needing to apologize to him. It's sort of like this defense used by Al Pacino in "And Justice For All."

What McEnany's response to Acosta, which was celebrated by conservative media, proves is the exact opposite of what she was going for. It's not that journalists aren't willing to look in the mirror and admit their own mistakes. It's that the White House doesn't understand that journalists' willingness to publicly acknowledge their mistakes is a sign of strength, not weakness.

True weakness is pretending that you never screw anything up. And that weakness leads to never learning from your mistakes because, well, you don't think you've many any.

That's what McEnany revealed on Thursday -- even if she didn't mean to.

Read the original post:
Kayleigh McEnany just accidentally revealed the key difference between the media and the Trump White House - WICZ

Quantum Cryptography Services Market (Covid-19 Updated) to witness great expansion over the forecast through 2026 | Quantum XC, Crypta Labs, Qubitekk,…

The Quantum Cryptography Services market has been changing all over the world and we have been seeing a great growth In the Quantum Cryptography Services market and this growth is expected to be huge by 2026. The growth of the market is driven by key factors such as manufacturing activity, risks of the market, acquisitions, new trends, assessment of the new technologies and their implementation. This report covers all of the aspects required to gain a complete understanding of the pre-market conditions, current conditions as well as a well-measured forecast.

The report has been segmented as per the examined essential aspects such as sales, revenue, market size, and other aspects involved to post good growth numbers in the market.

Top Companies are covering This Report:- QuintessenceLabs, Quantum XC, Crypta Labs, Qubitekk, Qasky, NuCrypt.

Get Sample PDF Brochure@https://www.reportsintellect.com/sample-request/849890

Get this report now @ https://www.reportsintellect.com/buynow/849890

Description:

In this report, we are providing our readers with the most updated data on the Quantum Cryptography Services market and as the international markets have been changing very rapidly over the past few years the markets have gotten tougher to get a grasp of and hence our analysts have prepared a detailed report while taking in consideration the history of the market and a very detailed forecast along with the market issues and their solution.

The given report has focused on the key aspects of the markets to ensure maximum benefit and growth potential for our readers and our extensive analysis of the market will help them achieve this much more efficiently. The report has been prepared by using primary as well as secondary analysis in accordance with porters five force analysis which has been a game-changer for many in the Quantum Cryptography Services market. The research sources and tools that we use are highly reliable and trustworthy. The report offers effective guidelines and recommendations for players to secure a position of strength in the Quantum Cryptography Services market. The newly arrived players in the market can up their growth potential by a great amount and also the current dominators of the market can keep up their dominance for a longer time by the use of our report.

Quantum Cryptography Services Market Type Coverage:

Consulting and AdvisoryDeployment and IntegrationSupport and Maintenance

Quantum Cryptography Services Market Application Coverage:

G&PDefenseBFSITelecom

Market Segment by Regions, regional analysis covers

North America (United States, Canada, Mexico)

Asia-Pacific (China, Japan, Korea, India, Southeast Asia)

South America (Brazil, Argentina, Colombia, etc.)

Europe, Middle East and Africa (Germany, France, UK, Russia and Italy, Saudi Arabia, UAE, Egypt, Nigeria, South Africa)

Discount PDF Brochure @https://www.reportsintellect.com/discount-request/849890

Competition analysis

As the markets have been advancing the competition has increased by manifold and this has completely changed the way the competition is perceived and dealt with and in our report, we have discussed the complete analysis of the competition and how the big players in the Quantum Cryptography Services market have been adapting to new techniques and what are the problems that they are facing.

Our report which includes the detailed description of mergers and acquisitions will help you to get a complete idea of the market competition and also give you extensive knowledge on how to excel ahead and grow in the market.

Why us:

Reasons to buy:

About Us:

Reports Intellect is your one-stop solution for everything related to market research and market intelligence. We understand the importance of market intelligence and its need in todays competitive world.

Our professional team works hard to fetch the most authentic research reports backed with impeccable data figures which guarantee outstanding results every time for you.So whether it is the latest report from the researchers or a custom requirement, our team is here to help you in the best possible way.

Contact Us:sales@reportsintellect.comPhone No: + 1-706-996-2486US Address:225 Peachtree Street NE,Suite 400,Atlanta, GA 30303

More:
Quantum Cryptography Services Market (Covid-19 Updated) to witness great expansion over the forecast through 2026 | Quantum XC, Crypta Labs, Qubitekk,...

Cryptocurrency And Blockchain Technology Market size Reap Excessive Revenues size COVID-19 2022 – Cole of Duty

Overview:

Cryptocurrency is a digital currency that utilizes cryptography techniques to make the transactions secure and to limit the creation of additional units of currency. Cryptocurrency is decentralized and there is no third-party/central body/governing body involved in producing new currency, verifying transactions, and protecting the currency supply. The blockchain acts as a ledger that shows the transaction activities between the peers. Cryptocurrency opts as a future revenue stream in the digital finance world. Furthermore, cryptocurrency is not bound by any rules or regulations of any specific government or exchange rates, interest rates, and country to country transaction fee, which makes international transactions faster. The prime drivers of the cryptocurrency market include proper security, authentication and ease of transactions. The Cryptocurrency and Blockchain technology allows the users to send exactly what they want without involvement of third party.Globally, more than 70% of the mobile phone users prefer transactions over their phones, which is one of the major drivers for the cryptocurrency market growth.

Request for Report Sample:https://www.trendsmarketresearch.com/report/sample/9796

Market Analysis:

The Worldwide Crypto-currency and Blockchain Technology Market is estimated to witness a CAGR of 35.2% during the forecast period 20162022. The crypto-currency market is analyzed based on two segments verticals and regions. The increasing online transaction, less transaction fees, easy and faster transaction, changing consumer and business landscape have led the demand for the market growth.

Regional Analysis:

The regions covered in the report are Americas, Europe, Asia Pacific and Middle East & Africa; along with the analysis of major countries in each region. The Americas is set to be the leading region for the cryptocurrency market growth followed by Europe. The Asia Pacific and MEA are set to be the emerging regions. India is set to be the most attractive destination and in Africa, the popularity and the usage of various cryptocurrencies are expected to increase in the coming years. The MEA market revenue is expected to reach $3.02 billion by 2022. The major countries covered in this report are the US, Canada, Argentina, the UK, Germany, Italy, France, Poland, China, Japan, Singapore, Vietnam, GCC Countries, Africa and Others.

Vertical Analysis:

Day-to-day, the consumers demands are changing and they are looking for the best and less time-consuming services to make their life easier. With these changes, the industry players have started moving towards the online business services and are adopting mobile based technology in their business units to reach their customer demands. In the current market scenario, the rise of online transactions has led the demand for the cryptocurrency and blockchain technology market. The major verticals covered are BFSI, retail, media & entertainment, gaming industry, healthcare, travel & tourism, transportation & logistics and education. Globally, the industry players are showing interest towards the blockchain and crypto-currency acceptance and making a partnership and discussing with value chain players in order to understand the benefits of blockchain technology. Additionally, few of the verticals have already started the acceptance of crypto-currencies (e.g. Bitcoin) as a payment option. Especially, the retail industry is set to be the leading vertical after BFSI for the crypto-currencies acceptance and the retail market revenue is expected to reach $10,447.2 million by 2022.

Key Players:

Zebpay, Coinsecure, Coinbase, Bitstamp Ltd., Litecoin, Poloniex Inc., Bitfury Group Limited, Unocoin, Ripple, Bitfinex, Global Area Holding Inc., BTL Group Ltd., Digital Limited, IBM Corp., Microsoft Corp. and other predominate and niche players.

Competitive Analysis:

In the current market scenario, the crypto-currency and blockchain technology market is at a nascent stage. But, a lot of new players are entering the market as it holds huge business opportunities. Especially, new start-ups are coming with new products/services in the market and they are expecting to see a double-digit growth in the upcoming years. In this space, venture funding in this market is expected to grow and collaborations, merger & acquisition activities are expected to continue.

Benefits:

The report provides complete details about the usage and adoption rate of crypto-currency and blockchain technology in various industry verticals and regions. With that, key stakeholders can know about the major trends, drivers, investments, vertical players initiatives, government initiatives towards the crypto-currency market adoption in the upcoming years. In other end, the report provides details about the major challenges that are going to impact on the market growth. Furthermore, the report gives the complete details about the key business opportunities to key stakeholders to expand their business and capture the revenue in the specific verticals. In addition, each vertical provides the key reason for the crypto-currency adoption, key opportunities, and government bodies information. This will help the key stakeholders to analyze before investing or expanding the business in this market.

More Info of Impact [emailprotected]https://www.trendsmarketresearch.com/report/covid-19-analysis/9796

Original post:
Cryptocurrency And Blockchain Technology Market size Reap Excessive Revenues size COVID-19 2022 - Cole of Duty

Health Information and Sharing Center (H-ISAC) partners with SAFE Identity to help health sector members safeguard their healthcare identities and…

ORMOND BEACH, Fla. and RESTON,Va., June 01, 2020 (GLOBE NEWSWIRE) -- Health Information and Sharing Center (H-ISAC), a global non-profit organization that provides the health sector a trusted community for combating cyber and physical threats, today announced that the organization has agreed to partner with SAFE Identity, formerly known as SAFE-BioPharma, an industry consortium and certification body supporting identity and cryptography in healthcare. As part of this agreement, H-ISAC members are able to take advantage of SAFE Identity programs at a reduced rate.

Identity is the leading cause of breaches today but many health care organizations don’t understand why securing identity is so important, or where to get started,” said Denise Anderson, President and CEO of H-ISAC. Last fall, H-ISAC launched an initiative to educate the health care community on this topic and equip CISOs with tools to better approach the challenges of Identity and Access Management (IAM). H-ISAC’s partnership with SAFE is one element of this broader identity initiative.”

Defining common requirements for identity providers that align with Digital Identity Guidelines (SP 800-63-3) and certifying identity providers against these requirements is how SAFE is supporting a strong interoperable identity in healthcare. The re-envisioning of SAFE-BioPharma and the new SAFE Identity services are further explored in the recent SAFE Identity press release.

With the renewed SAFE Identity partnership, H-ISAC members can join the SAFE Policy Management Authority (PMA), the governing body of the SAFE Identity Trust Framework, to vote on identity policies, join working groups aimed at helping healthcare organizations implement strong identity solutions, and address identity challenges faced across healthcare. As part of the partnership, H-ISAC members can federate their existing compatible identity credentials with SAFE to achieve cross-organizational trust or join the PMA as relying parties, both at discounted rates.

H-ISAC offers a portfolio of products and services that have been identified and developed specifically for health sector members. Strategic in nature, these low cost or no-cost solutions help member organizations to develop and maintain an effective, long-term defense. SAFE furthers these goals by brokering identity services to healthcare organizations including the ability to rely on the SAFE Identity infrastructure and to consult the SAFE Qualified Products List (QPL), a list of certified products that have been lab-tested at SAFE for compliance against industry and member-driven requirements, both at no cost.

We are eager to start putting the re-envisioned SAFE ecosystem into practice,” said Kyle Neuman, the new managing director of SAFE Identity. Existing members can continue to utilize the ecosystem for the use cases and principles on which SAFE-BioPharma was founded while also taking advantage of the new capabilities SAFE is bringing to the table. As we examine the future, we look forward to advising H-ISAC on the principles necessary to leverage a federated infrastructure and start tackling the most pressing identity challenges in healthcare including TEFCA and health information exchange, identification of medical devices, blockchain technology, and achieving a true portable patient ID that can be used across healthcare.”

About Health Information Sharing and Analysis Center (H-ISAC) Created in 2010, Health Information Sharing and Analysis Center is recognized as the official ISAC for the health sector. H-ISAC is a member-driven organization that offers the sector a trusted community and forum for coordinating, collaborating, and sharing vital threat intelligence and best practices. Members are able to use this knowledge to strengthen their defenses and minimize the effect of threat actors around the world.

About SAFE Identity SAFE Identity provides an ecosystem for identity assurance in the health sector to enable trust, security, and user convenience. SAFE assures identities and data in virtual clinical trials, telehealth, medical devices, and trusted data exchanges in supply chains through free and membership-driven services. These services operationalize the use of SAFE Identity-certified credentials and applications tailored to healthcare organizations, partners, and patients.

SOURCE: Health Information Security and Analysis Center and SAFE Identity

Related Links https://www.h-isac.org https://makeidentitysafe.com

Contact Dana Kringel Montner Tech PR 203-226-9290 dkringel@montner.com

Originally posted here:
Health Information and Sharing Center (H-ISAC) partners with SAFE Identity to help health sector members safeguard their healthcare identities and...

The Lizard People Invented Bitcoin: Why Crypto is a Hotbed for Conspiracy Theories – Cointelegraph

In April 2020 Vin Armani packed up his family and got on the last flight to an obscure island in the middle of the Pacific.

The cryptocurrency influencer suggested to his 14,000 Twitter followers, many times, that the pandemic is being used to impose totalitarian tyranny on America. As the CTO of CoinText, he was worried that his outspoken views and links to the crypto industry meant he could be disappeared by the Gestapo. He now lives in Saipan, population 50,000.

This isnt the end of whats happening, he says, citing the historical precedent of the Jewish people fleeing Germany before World War II. Our ability to travel is going to be greatly restricted and youre going to be trapped. And its going to be at the points of transit where the undesirables get mopped up. The people who are on the list.

Totalitarianism always starts out of an emergency.

While many in the crypto community share his fears about the erosion of civil liberties during the pandemic, Armani has gone further than most. Six thousands miles further.

He doesnt see himself as a conspiracy theorist just someone questioning societys assumptions about money and power. Armani says the Bitcoin White Paper is often the catalyst that wakes people up and sets them on a journey of discovery.

I hate conspiracy theories, he says. Because you dont need a conspiracy, all you need is a perverse incentive. The world just works in a certain way. People act in their own self-interest. Lord Acton (said): Power tends to corrupt, and absolute power corrupts absolutely. I think that what you see in the crypto community is people who have read economic texts you see people who recognize what the government is, what the state is and who the people are in pursuit of state power.

Armani appears to have embraced what some call the paranoid style in American politics. He is a big fan of notorious English conspiracy theorist David Icke and interviewed him twice on his YouTube show. He credits Icke with waking me up when I first came across his work 15 years ago David has been absolutely spot on for 30 years.

Icke believes the world is run by a bunch of shape-shifting blood-drinking reptilian aliens from Alpha Draconis, one of whom is masquerading as the Queen.

Armani says Ickes views have evolved though Icke was recently booted off Facebook and YouTube for spreading 5G coronavirus conspiracy theories.

Another Bitcoiner interested in . unorthodox hypotheses is Caleb Chen, who works in content marketing for a popular VPN provider. Although hes undecided about most conspiracy theories, he still spends part of each day trawling through conspiracy forums on Reddit looking for alternative explanations for whats really going on in the world.

He says the crypto community was where he first encountered conspiracy theorists in the wild. The first Bitcoin meetup I went to was in 2013. And yeah, its right around there when I started running into these people, he says.

Id never met someone who didnt believe that the moon landing happened, or that believed in the flat earth conspiracy, until I started going to Bitcoin conferences and Bitcoin meetups.

Kirby Ferguson, the writer/director of documentary This Is Not A Conspiracy Theory says theres a definite strand of conspiratorial thinking within the crypto community, although price speculation and gossip are the major preoccupations.

There certainly is that subculture of conspiracy theory in there, he says. I feel like its a combination of anti-establishment spirit, that spirit of dissent that is in cryptocurrency, and the dubious media sources that are mixed in there.

The subculture is big enough to be noticeable.

Almost half a million people have watched Crypto Chicos YouTube video in which he explains a complicated crypto meets COVID-19 conspiracy theory titled Global Pandemic Planned.

When Bitcoin Ben isnt pumping the BTC price on YouTube and Twitter, he likes to post about QAnon which The Washington Post described as the idea there is a worldwide cabal of Satan-worshiping pedophiles who rule the world.

And that 5G stuff that one in eight people apparently now believe? You know, how the pandemic was faked to cover up the health impacts of 5G so that Bill Gates can microchip everyone with his vaccine? That whole story was dreamed up by a crypto-loving pastor from the small town of Luton in the UK; a guy who has advised African central banks on digital currencies.

Crypto publication Trustnodes has run with the theme, devoting large amounts of space in recent months to stories with headlines like America on the Verge of a Dictatorship that suggest lockdowns are about keeping humanity down, chained and enslaved.

One editorial said: No wonder people flock to the likes of Alex Jones

One possible reason the cryptocurrency space is so conducive to conspiracy theories is that there really are bad actors doing shady stuff in the space. There are whales out there manipulating the markets, which is why the SEC keeps knocking back Bitcoin ETFs.

The theory that Tether isnt actually backed 1:1 with US dollars has been shown in court to be correct. Many ICOs were elaborate fictions, constructed to fleece gullible investors of their cash. And there is so much doubt over the circumstances surrounding the death of Quadrigas CEO which left the exchange unable to access $145 million in crypto that there have been legal moves to exhume the body of Gerald Cotten. (Or Gerald Cotten, if you prefer.)

Every conspiracy theory, theres always some sort of truth behind it, some sort of fact hidden in it which makes it easier to believe, says filmmaker Torsten Hoffman, who covers the conspiracy theory swirling around Bitcoin development company Blockstream (replete with cartoon Lizard People) in his new documentary Cryptopia.

There are people in the Bitcoin Cash community who genuinely believe that Blockstream deliberately hobbled Bitcoin with a small block size limit as part of a grand plan to push people towards its scaling solutions, Lightning and Liquid. A sample post from Redditor BitAlien: Its not a conspiracy theory, its a conspiracy. Blockstream exists to cripple Bitcoin and allow the legacy banks to retain control over us. Seriously, WAKE UP SHEEPLE!

And for their part, some in the Bitcoin community believe that big block proponent Roger Ver set out to destroy Bitcoin to pump up the price of Bitcoin Cash.

Hoffman admits he disappeared down the rabbit hole on this conspiracy theory and spent far too long investigating inside information about Blockstream allegedly bribing various parties to get its own way. But in the end the truth appears to a lot more humdrum: the two communities just have genuine ideological differences about scaling the blockchain. In reality he says, it comes down to the question: Is it digital cash or is it digital gold? If you believe in one of those two then you have two different technical solutions.

Occams Razor, the idea that the simplest explanation is often the right one, helps explain away some of the theories. But it doesnt explain how some people arrive at the really out there conclusions, like Redditor ShadowOfHarbinger who suggested in r/btc this week that Blockstream is really a front for the CIA.

The CIA has been meddling in Bitcoin affairs since 2012-2013, he wrote blithely as if everyone knows that. It is all a government operation and government-sponsored opposition. He received 12 upvotes.

Its a riff on the theory the CIA invented Bitcoin. After all, the NSA created the SHA-256 hashing algorithm that Bitcoin uses and Satoshi Nakamoto means something vaguely like Central Intelligence in Japanese

Hoffman says its really not that surprising that some Bitcoiners hold unorthodox views.

Bitcoin started at the fringe and started to question the establishment, the economic rules and capitalism and everything the whole world. So these people question other things as well in our society and thats where maybe these conspiracy theories kind of slip in.

Crypto fans and conspiracy theorists share similar motivations: Both groups see themselves as warriors fighting against a corrupt elite whether its bankers or the Illuminati. Both groups are suspicious of institutions and are more open minded than most when it comes to leftfield ideas.

And given how opaque and incredibly complex the financial system is, its probably not surprising that some people go down some blind alleyways in their pursuit of the truth. David Golumbia, the author of The Politics of Bitcoin: Software as Right Wing Extremism, says that even the question what is money? defies easy answers.

Its very hard to get your head around even the experts cant really provide you with a terrific understanding, he says. I think a lot of people want a simple explanation. They want something that makes sense to them. I understand its frustrating when reality just doesnt conform to our desire to have things be simple. In this view, a conspiracy theory in this view is a neat and simple wrong answer to a complicated question.

In a similar vein, Horizen founder Rob Viglione says hes observed that some people, especially in the privacy coin sphere, are drawn to big ideas and grand narratives.

Theres this assumption of agency in the world, like big forces are being driven by some higher agent big forces, mystical forces are driving things, he said. And I think theres a lot of that for some people who come into Bitcoin. Its like were changing the world. There are really big ideas here you know and its easy to sometimes think theres agency behind just a whole bunch of random events.

A similar phenomenon has been observed in other parts of the financial world. Time Magazines Justin Fox wrote that Wall Street traders also love conspiracy theories, in a piece on alternative financial news source Zero Hedge (which was also recently banned from Twitter for spreading coronavirus misinformation).

Wall Street traders are among the most conspiracy-minded groups of people on the planet, he wrote. Thats because (a) some financial market conspiracies are real and (b) without theories of some sort to grasp on to, youre going to get completely lost in the chaos of the markets day-to-day movements.

The US Federal Reserve has long been an object of suspicion for Bitcoiners. It gives five unelected officials the power to change policies on the worlds reserve currency with impunity. And as Hoffman points out, the whole concept is weird: I mean, the Fed isnt a government body, its owned by private banks, he says (which is sort of true). And if you tell that to someone who doesnt know, it sounds like a conspiracy theory.

While they may be seen as a bunch of conspirators devaluing the currency and carrying out various schemes for nefarious reasons, Viglione says its much more likely theyre just blundering about, pulling levers in the hope that itll help the economy.

My background is in academic finance, Viglione says (he analyzed the Feds actions in detail for his PhD). I can say quite confidently: I dont think that they have any idea what theyre doing.

The further some people go down the rabbit hole of greedy bankers the more likely it is to lead them somewhere nasty.

A lot of that Anti-Fed stuff leads back to the Rothschilds and Jewish conspiracy theories and the Protocols of the Elders of Zion and all that crap, says Ferguson. Once you start questioning the Fed and where money comes from and all that stuff you can fall into a gravity well that leads you to thinking the Jews did it.

Lets not overstate it, but theres definitely some overlap. The crypto trading discussions on on 8chan were full of far right hatred and anti-Semitic memes right up until the site was taken down after its users carried out three mass shootings. It was resurrected as 8kun on the darknet thanks to Monero fork Loki. (For a taste, if you dare, visit 4chan.)

Neo Nazis, including Andrew weev Auernheimer, Stormfront and The Daily Stormer also stay afloat with Bitcoin donations. Many on the far-right were early adopters writes the Southern Poverty Law Centre on its page monitoring their known BTC addresses. And many cashed in as the currencys valuation skyrocketed.

Golumbia used to work on Wall Street and when Bitcoin began to emerge a few years ago he realized hed heard a lot of the same conspiracy theories already. They were the same conspiracy theories that I used to see floating around gold.

Gold bugs have a reputation for wacky ideas. Urban Dictionary defines them as: associated with paranoia, conspiracy theories, 9/11 truthers, survivalism, tax protesters, racism, anti-semitism, and the far right. As a gold bug, I can tell you that gold is REAL money, and worthless fiat paper money is a fraud.

Bitcoin narratives around hard money, fixed supply, inflation hedge, market manipulation and distaste for the Feds money printer, can all be traced back to gold bugs.

Everett Millman, Precious Metals Specialist at Gainesville Coins which is developing a gold backed crypto believes the idea of hard money comes hand in glove with a deep distrust of the financial world.

Such a viewpoint is steeped in the idea of conspiracy at its genesis: it characterizes the establishment of the Federal Reserve in 1913 as a coup against an honest system of money based on gold, he says.

So the whole premise is entangled with the notion of conspiracy from its start. Its fair to say that this does open a path for gold bugs to be exposed to many other kinds of conspiracy theories. When you believe youve been lied to about something as basic as how money works, it naturally leads to questioning other aspects of the world. Similar feelings animate the crypto community.

He says the strain of anti-Semitism that infects the fringes of the gold and crypto communities small though it may be contributes to them being pushed into the margins of mainstream financial discourse. He says this can become a self-fulfilling phenomenon.

When it seems the entire investment community is against you, grand conspiracies take on greater explanatory power.

Golumbia is no fan of Bitcoin and sees conspiratorial narratives in everything from the concept of middlemen (which he say recalls anti-Jewish tropes) to the hatred for the Fed. But he argues convincingly that Bitcoin was born out of the paranoia inherent in cypherpunk concerns about the impending surveillance state. As Ferguson points out:

Paranoia is at the heart of conspiratorial reasoning.

Golumbia details in his book how Bitcoin had its roots in Eric Hughes Cypherpunk mailing list. By 1994 the 700 cypherpunks included Blockstreams Adam Back, Satoshi-confidant Hal Finney, Bit Gold creator Nick Szabo and even Satoshi-claimant Craig Wright.

The cypherpunks were hyper-concerned with online privacy and the government monitoring their communications, and saw cryptography as a tool to carve out a space free from Big Brothers watchful eyes.

The problem they kept running into was money, Golumbia explains. How do we pay for stuff because theyre using our credit cards and our bank accounts to track what we do? Wouldnt it be great if we could pay each other and give each other funds without being trackable? So they started applying encryption technologies to a variety of money-like instruments.

Bitcoin is probably iteration five or six of these projects to build a currency that was outside of the states ability to regulate it, or stop it.

In this conception, the paranoid style is baked into Bitcoins technology and purpose. Horizen founder Viglione points out that one of those 700 cypherpunks was Zooko Wilcox OHearn, who went on to create the privacy coin Zcash, which was forked into Horizen.

These technologies come almost directly out of the cypherpunk movement, Viglione says. Big Brothers watching us, lets build something to stop that.

But just because youre paranoid doesnt mean theyre not after you, as Joseph Heller noted. And as Viglione remarked:

Probably the ultimate conspiracy theory is the idea of Big Brother or the NSA spying on everything we do which turns out to be true.

Despite the small, but noisy minority of the crypto community spreading 5G coronavirus conspiracy theories, Hoffman points out that many more crypto adherents were providing quality information and analysis about the coronavirus pandemic long before the mainstream media.

The information were getting from some of the good sources from crypto is far, far superior to what Im getting in the mainstream media, he says. Not trusting authority figures like journalists makes members of the crypto community take things into their own hands and say OK, I can report on this better, I can do a virus model and an update in my daily newsletter better than the Wall Street Journal.

Hoffman believes that unorthodox perspectives and a propensity to look further than the accepted narrative are among the crypto communitys greatest strengths.

Those investors who question commonly held beliefs, they are the ones that every decade spot things that nobody else sees, Hoffman says. Youre more likely to see a black swan event, youre more likely to add a unique solution to a problem that nobody else even knew existed like Satoshi did 11 years ago.

Read this article:
The Lizard People Invented Bitcoin: Why Crypto is a Hotbed for Conspiracy Theories - Cointelegraph

How Octopus Scanner malware attacked the open source supply chain – The Daily Swig

Malware abused the build process on GitHub

ANALYSIS GitHub has published an informative post-mortem of a real-world open source software supply chain attack.

NetBeans repositories on GitHub were used as a delivery point to serve the Octopus Scanner malware, a backdoor specifically designed to infect NetBeans projects.

As a result of the attack, the open source build process was compromised, and 26 open source projects were affected.

The attack went far deeper than the more commonplace problem of the GitHub platform being abused as part of a command and control (C2) infrastructure.

GitHub learnt of the security breach on March 9, via a tip off from an independent security researcher who warned that a set of GitHub-hosted repositories were actively serving malware.

Subsequent investigations confirmed that the Octopus Scanner malware was capable of cataloguing NetBeans project files before embedding malicious payload both in project files and build JAR files.

The affected repository owners were most likely completely unaware of the malicious activity, and sorting out the mess was a challenge because simply blocking or banning maintainers wasnt a good option.

GitHub Security Lab had to work out how to properly remove the malware from infected repositories, without having to shut down user accounts.

A detailed technical analysis by GitHubs Alvaro Muoz explains how the security team, with no small amount of difficulty, accomplished this process.

RELATED GitHub showcases new code-scanning security tools at virtual event

Many questions about the attack remain not least why the malware authors targeted NetBeans build process, a comparatively unfashionable Java IDE.

If malware developers took the time to implement this malware specifically for NetBeans, it means that it could either be a targeted attack, or they may already have implemented the malware for build systems such as Make, MsBuild, Gradle and others as well and it may be spreading unnoticed, said Muoz.

Even though the malware C2 servers didnt seem to be active at the time of analysis, the affected repositories still posed a risk to GitHub users that could potentially clone and build these projects.

Brian Fox, CTO at open source software security specialist Sonatype, commented that what makes Octopus Scanner so dangerous is that infects developer tools that subsequently infect all of the projects they are working on, impacting their team or community of open source users.

The Octopus Scanner malware validates the importance of analysing binaries within your code and not taking the word of the manifest, Fox said.

What makes Octopus so dangerous is that it has the capability to infect other JAR files in the project, so a developer ends up using and distributing the mutated code to their team or community of open source users.

Weve seen over 20 one-off attempts at malicious code injection within OSS projects, but this is a new form of attack. This attack infects developer tools that subsequently infect all of the projects they are working on.

In response to questions from The Daily Swig, Nico Waisman, head of GitHub Security Lab, explained that the goal of the Octopus Scanner was to insert backdoors into artefacts built by NetBeans, so that the attacker could then use these resources as part of a command and control server.

There was no evidence that the 26 open source projects were actually targeted by the malware, Waisman added.

The malwares primary goal was to infect a developers computer and spread through NetBeans projects. As a consequence of the developers infection, they unintentionally uploaded backdoored code to their repositories.

Software dependencies are pervasive, so its become normal for projects to use hundreds or even thousands of open source dependencies. Attackers are taking advantage of this to craft attacks, Waisman warned.

Although open source is easy for developers, it also means its easy for attackers, Waisman said. Attackers are pursuing supply chain compromises because they can have widespread reach. A single compromise vector gives them access to multiple targets.

Although supply chain compromises like this are scary, they remain rare, Waisman concluded.

The primary issue in supply chain security is unpatched software, Waisman told The Daily Swig. Its much easier for an attacker to take advantage of an unpatched, known vulnerability in a dependency, than to insert a new vulnerability into your code.

For a developer, the primary challenges are then knowing your dependencies, and knowing when they need to be patched. On GitHub, Dependency Graph helps you understand your projects dependencies, he concluded.

YOU MIGHT ALSO LIKE Open source tool searches for leaked secrets in GitHub commits

View post:
How Octopus Scanner malware attacked the open source supply chain - The Daily Swig