Artificial Intelligence And Automation Top Focus For Venture Capitalists – Forbes

Artificial intelligence and automation have been two hot areas of investment, especially over the past decade. As the worldwide workforce increasingly shifts to a remote workforce, the need for automation, technology, and tools continues to grow. As such, its no surprise that automation and intelligent systems continue to be of significant interest to venture capitalists who are investing in growing firms focused in these areas. The AI Today podcast had the chance to talk to Oliver Mitchell, a Founding Partner of Autonomy Ventures. (disclosure: Im a co-host of the AI Today podcast).

Oliver Mitchell

For over 20 years Oliver has been working on technology startups and in the past decade he has been working on investing in automation. He spoke with us about seeing the big changes that are coming to the world with automation and the exciting possibilities that it still has to offer. He is a partner at venture firm Autonomy Ventures, an early stage venture capital firm that looks to invest in automation and robotics.

The best AI solutions are the ones that solve industry-specific problems

Despite the fact that Artificial Intelligence has been around for decades, there is still no commonly accepted definition. Because of this, artificial intelligence means something different to every industry, and this is reflected in the sort of investments that Oliver and other VCs are seeing. While some technology firms may be focused on how artificial intelligence can better help them manage funds, other companies might be more interested in how AI can supplement their human workforce. The various different tasks that artificial intelligence can help with is something that investors need to look at when making their investments.

Out of all of the investments that Oliver has made over the years, the best ones have been with companies that really focus on solving specific problems in an industry. In particular, applications of robotics to manufacturing, and specifically the concept of collaborative robots is appealing. Collaborative robots can be used to work alongside employees. To make the arm easier to use it has AI onboard and a suite of tools to enable anyone to operate the arm without technological training. With this arm, companies dont need to spend hundreds of thousands of dollars to hire specialists to train their robotic arms. Rather, the arm can be taught through movement how to carry out tasks through an iPad or similar device. This arm falls under the category of collaborative robots, or cobots for short, that are able to work side by side with humans.

About half of the Autonomy Ventures portfolio companies are based out of Israel. One portfolio company is Aurora Labs, which focuses on providing a software platform for autonomous and connected cars to monitor their onboard software. Aurora Labs calls their software a self-healing software for connected cars. Your average car needs to go to a dealership in order to receive any kind of firmware or software update if an issue is detected. This is because the technician needs to plug a device into the OBDII port of the car. Due to limited power in the chips in most current cars, they arent able to access the cloud. Even those cars that have OnStar onboard have very limited connectivity. Self-healing software for connected cars from Aurora Labs allows cars to connect to the cloud so that they can receive updates over the air. While much of this solution isnt AI per se, the use of machine learning for more adaptive updates is part of the indication that AI is finding its application in a wide range of niches.

Keeping AI in check

Something important that Oliver addressed is the view and aims of AI. A lot of people have a science fiction perspective on artificial intelligence. He believes that we need to manage our expectations on AI because there are many tasks that AI still cant do that even a child can. One example Oliver uses is the ability to tie a shoe. While a 7-year-old has been able to tie shoes for years, robots still cannot tie a shoe. We need to be able to address everyday problems before we can start to move on to what we see in movies.

Oliver also is concerned about issues of bias in AI and machine learning, especially as systems become more autonomous. Software around the world is used to help humans but so many of us are quick to turn to technology without a chance to evaluate its proper use. Oliver sites many examples including the AI-based criminal justice system that was biased in its assessment of an offenders likelihood of reoffending. Once the software was deployed in multiple states it was found that it rated people of color more likely to reoffend.

Oliver also points out bias in a type of technology that is used in emergency departments around the world to analyze patients. The software looks at a patients chief complaint, symptoms, and medical history along with demographics and gives the medical staff a recommendation about what to do. However, this software has been found to not take into account the human aspect of medical care. It will make a decision based on a perceived likelihood of effective treatment, not on saving every life possible.

Regardless of the challenges and limitations of AI, investors and entrepreneurs see significant potential for both simple automation and more complicated intelligent and autonomous systems. Companies are continuing to push the boundary of whats possible, especially in our increasingly remote and virtual world. It should be no surprise then that VCs will continue to look to invest in these types of companies as AI becomes part of our every day lives.

Visit link:
Artificial Intelligence And Automation Top Focus For Venture Capitalists - Forbes

First meeting of the new CEPEJ Working Group on cyberjustice and artificial intelligence – Council of Europe

The new CEPEJ Working group on Cyberjustice and artificial intelligence (CEPEJ-GT-CYBERJUST) will hold a first meeting by videoconference on 27 April 2020.

The objective of the Working group is to analyse and develop appropriate tools on new issues such as the use of cyberjustice or artificial intelligence in judicial systems in relation to the efficiency and quality of judicial systems.

At this meeting, an exchange of views will take place on the possible future work of the Working Group, which should be based on the themes contained in its mandate:

The CYBERJUST group will also hold a joint meeting at a later stage with the CEPEJ Working Group on Quality of Justice (CEPEJ-GT-QUAL) with a view to sharing tasks, in particular to follow up the implementation of the CEPEJ European Ethical Charter on the use of artificial intelligence in judicial systems and their environment and its toolbox and to ensure co-ordination.

Read more from the original source:
First meeting of the new CEPEJ Working Group on cyberjustice and artificial intelligence - Council of Europe

Artificial Intelligence in the Oil & Gas Industry, 2020-2025 – Upstream Operations to Witness Significant Growth – ResearchAndMarkets.com – Yahoo…

The "AI in Oil and Gas Market - Growth, Trends, and Forecast (2020-2025)" report has been added to ResearchAndMarkets.com's offering.

The AI in Oil and Gas market was valued at USD2 billion in 2019 and is expected to reach USD3.81 billion by 2025, at a CAGR of 10.96% over the forecast period 2020-2025. As the cost of IoT sensors declines, more major oil and gas organizations are bound to start integrating these sensors into their upstream, midstream, and downstream operations along with AI-enabled predictive analytics.

Oil and gas remains as one of the most highly valued commodities in the energy sector. In recent years, there has been an increased focus on improving efficiency, and reducing downtime has been a priority for the oil and gas companies as their profits slashed since 2014, due to fluctuating oil prices. However, as concerns over the environmental impact of energy production and consumption persist, oil and gas companies are actively seeking innovative approaches to achieve their business goals, while reducing environmental impact.

In addition, the Oil and Gas Authority (OGA) is making use of AI in parallel ways, owing to the United Kingdom's first oil and gas National Data Repository (NDR), launched in March 2019, using AI to interpret data, which, according to the OGA anticipations, is likely to assist to discover new oil and gas forecast and permit more production from existing infrastructures.

The offshore oil and gas business use AI in data science to make the complex data used for oil and gas exploration and production more reachable, which lets companies to discover new exploration prospects or make more use out of existing infrastructures. For instance, in January 2019, BP invested in Houston-based technology start-up, Belmont Technology, to bolster the company's AI capabilities, developing a cloud-based geoscience platform nicknamed Sandy.

However, high capital investments for the integration of AI technologies, along with the lack of skilled AI professionals, could hinder the growth of the market. A recent poll validated that 56% of senior AI professionals considered that a lack of additional and qualified AI workers was the only biggest hurdle to be overcome, in terms of obtaining the necessary level of AI implementation across business operations.

Key Market Trends

Upstream Operations to Witness a Significant Growth

North America Expected to Hold a Significant Market Share

Competitive Landscape

The AI in the oil and gas market is highly competitive and consists of several major players. In terms of market share, few of the major players currently dominate the market. The companies are continuously capitalizing on acquisitions, in order to broaden, complement, and enhance its product and service offerings, to add new customers and certified personnel, and to help expand sales channels.

Recent Industry Developments

Key Topics Covered

1 INTRODUCTION

1.1 Study Assumptions and Market Definition

1.2 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET INSIGHTS

4.1 Market Overview

4.2 Industry Attractiveness - Porter's Five Forces Analysis

4.3 Technology Snapshot - By Application

4.3.1 Quality Control

4.3.2 Production Planning

4.3.3 Predictive Maintenance

4.3.4 Other Applications

5 MARKET DYNAMICS

5.1 Market Drivers

5.1.1 Increasing Focus to Easily Process Big Data

5.1.2 Rising Trend to Reduce Production Cost

5.2 Market Restraints

5.2.1 High Cost of Installation

5.2.2 Lack of Skilled Professionals across the Oil and Gas Industry

6 MARKET SEGMENTATION

6.1 By Operation

6.1.1 Upstream

6.1.2 Midstream

6.1.3 Downstream

6.2 By Service Type

6.2.1 Professional Services

6.2.2 Managed Services

6.3 Geography

6.3.1 North America

6.3.2 Europe

6.3.3 Asia-Pacific

6.3.4 Latin America

6.3.5 Middle East & Africa

7 COMPETITIVE LANDSCAPE

7.1 Company Profiles

7.1.1 Google LLC

7.1.2 IBM Corporation

7.1.3 FuGenX Technologies Pvt. Ltd.

7.1.4 Microsoft Corporation

7.1.5 Intel Corporation

7.1.6 Royal Dutch Shell PLC

7.1.7 PJSC Gazprom Neft

7.1.8 Huawei Technologies Co. Ltd.

7.1.9 NVIDIA Corp.

7.1.10 Infosys Ltd.

7.1.11 Neudax

8 INVESTMENT ANALYSIS

9 FUTURE OF THE MARKET

For more information about this report visit https://www.researchandmarkets.com/r/14dtcc

View source version on businesswire.com: https://www.businesswire.com/news/home/20200424005472/en/

Contacts

ResearchAndMarkets.comLaura Wood, Senior Press Managerpress@researchandmarkets.com

For E.S.T Office Hours Call 1-917-300-0470For U.S./CAN Toll Free Call 1-800-526-8630For GMT Office Hours Call +353-1-416-8900

More here:
Artificial Intelligence in the Oil & Gas Industry, 2020-2025 - Upstream Operations to Witness Significant Growth - ResearchAndMarkets.com - Yahoo...

Pre & Post COVID-19 Market Estimates-Artificial Intelligence (AI) Market in Retail Sector 2019-2023| Increased Efficiency of Operations to Boost…

LONDON--(BUSINESS WIRE)--The artificial intelligence (AI) market in retail sector is expected to grow by USD 14.05 billion during 2019-2023. The report also provides the market impact and new opportunities created due to the COVID-19 pandemic. The impact can be expected to be significant in the first quarter but gradually lessen in subsequent quarters with a limited impact on the full-year economic growth, according to the latest market research report by Technavio. Request a free sample report

Companies operating in the retail sector are increasingly adopting AI solutions to improve efficiency and productivity of operations through real-time problem-solving. For instance, the integration of AI with inventory management helps retailers to effectively plan their inventories with respect to demand. AI also helps retailers to identify gaps in their online product offerings and deliver a personalized experience to their customers. Many such benefits offered by the integration of AI are crucial in driving the growth of the market.

To learn more about the global trends impacting the future of market research, download a free sample: https://www.technavio.com/talk-to-us?report=IRTNTR31763

As per Technavio, the increased applications in e-commerce will have a positive impact on the market and contribute to its growth significantly over the forecast period. This research report also analyzes other significant trends and market drivers that will influence market growth over 2019-2023.

Artificial Intelligence (AI) Market in Retail Sector: Increased Applications in E-commerce

E-commerce companies are increasingly integrating AI in various applications to gain a competitive advantage in the market. The adoption of AI-powered tools helps them to analyze the catalog in real-time to serve customers with similar and relevant products. This improves both sales and customer satisfaction. E-commerce companies are also integrating AI with other areas such as planning and procurement, production, supply chain management, in-store operations, and marketing to improve overall efficiency. Therefore, the increasing application areas of AI in e-commerce is expected to boost the growth of the market during the forecast period.

Bridging offline and online experiences and the increased availability of cloud-based applications will further boost market growth during the forecast period, says a senior analyst at Technavio.

Register for a free trial today and gain instant access to 17,000+ market research reports

Technavio's SUBSCRIPTION platform

Artificial Intelligence (AI) Market in Retail Sector: Segmentation Analysis

This market research report segments the artificial intelligence (AI) market in retail sector by application (sales and marketing, in-store, planning, procurement, and production, and logistics management) and geographic landscape (North America, APAC, Europe, MEA, and South America).

The North America region led the artificial intelligence (AI) market in retail sector in 2018, followed by APAC, Europe, MEA, and South America respectively. During the forecast period, the North America region is expected to register the highest incremental growth due to factors such as early adoption of AI, rising investments in R&D and start-ups, and increasing investments in technologies.

Technavios sample reports are free of charge and contain multiple sections of the report, such as the market size and forecast, drivers, challenges, trends, and more. Request a free sample report

Some of the key topics covered in the report include:

Market Drivers

Market Challenges

Market Trends

Vendor Landscape

About Technavio

Technavio is a leading global technology research and advisory company. Their research and analysis focus on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions.

With over 500 specialized analysts, Technavios report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavios comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

View original post here:
Pre & Post COVID-19 Market Estimates-Artificial Intelligence (AI) Market in Retail Sector 2019-2023| Increased Efficiency of Operations to Boost...

EUREKA Clusters Artificial Intelligence (AI) Call | News item – The Netherlands and You

News item | 21-04-2020 | 04:58

Singapore has joined the EUREKA Clusters Artificial Intelligence (AI) Call. Through this new initiative, Singapore and Dutch companies can receive support in the facilitation of and funding for joint innovation projects in the AI domain with entities from 14 other EUREKA countries. The 14 partner countries are Austria, Belgium, Canada, Denmark, Finland, Germany, Hungary, Luxembourg, Malta, Portugal, Spain, Sweden, South Korea and Turkey. The call will be open from 1 April to 15 June 2020, with funding decisions to be made by January 2021.

The EUREKA Clusters CELTIC-NEXT, EUROGIA, ITEA 3, and PENTA-EURIPIDES, have perceived a common cross domain interest in developing, adapting and utilising emerging Artificial Intelligence within and across their focus areas. These Clusters, together with a number of EUREKA Public Authorities, are now launching a Call for innovative projects in the AI domain. The aim of this Call is to boost the productivity & competitiveness of European industries through the adoption and use of AI systems and services.

The call for proposals is open to projects that apply AI to a large number of application areas, including but not limited to Agriculture, Circular Economy, Climate Response, Cybersecurity, eHealth, Electronic Component and Systems, ICT and applications, Industry 4.0, Low Carbon Energy, Safety, Transport and Smart Mobility, Smart Cities, Software Innovation, and Smart Engineering.

More information: https://eureka-clusters-ai.eu/

To find partners please check the online brokerage tool:https://eureka-clusters-ai.eu/brokerage-tool/

The Netherlands Enterprise Agency (RVO) will host a webinar on Tuesday 28th of April at 10am CEST for Dutch based potential applicants or intermediaries, register here.

Enterprise Singapore will host a webinar on Monday 27 April at 4pm (SG time) for Singapore based potential applicants or intermediaries, register here.

See more here:
EUREKA Clusters Artificial Intelligence (AI) Call | News item - The Netherlands and You

This AI tool measures social distancing in real time – Big Think

As COVID-19 continues to spread across the planet, some nations have been using technology to help flatten the curve.

In South Korea, for example, officials have been using GPS to track the movements of infected individuals in order to see who else might have contracted the virus. In Taiwan, the government has been enforcing quarantines through a smartphone-tracking app. And in the U.S., data scientists are exploring how they might use machine-learning to predict who's most at risk of dying from COVID-19, and using those projections to better allocate resources.

Last week, a company called Landing AI introduced another way technology might help combat the pandemic: a tool that measures social distancing. The tool uses cameras and AI to track people's movements, and it's able to put their location on a bird's-eye-view map of whatever area the camera is observing. Using these calculations, the tool estimates the distance between people.

Landing AI says businesses could use the tool to ensure employees are practicing good social distancing.

"For example, at a factory that produces protective equipment, technicians could integrate this software into their security camera systems to monitor the working environment with easy calibration steps," the company wrote in a blog post. "As the demo shows below, the detector could highlight people whose distance is below the minimum acceptable distance in red, and draw a line between to emphasize this. The system will also be able to issue an alert to remind people to keep a safe distance if the protocol is violated."

Landing AI noted that its system won't be able to identify particular individuals.

"The rise of computer vision has opened up important questions about privacy and individual rights; our current system does not recognize individuals, and we urge anyone using such a system to do so with transparency and only with informed consent."

Still, some privacy and workers' advocates are concerned about introducing these kinds of systems to the workplace. In its 2019 report, New York University's AI Now Institute wrote that using AI tools like these "pools power and control in the hands of employers and harms mainly low-wage workers." Others have raised concerns over normalizing mass surveillance, and the potential for employers to abuse these kinds of AI systems, now or in the future.

One concerned voice is Edward Snowden, the former CIA contractor who exposed NSA surveillance programs. In a recent interview with the Danish Broadcasting Corporation, Snowden spoke about the potential problems with introducing technological surveillance measures during the pandemic.

"When we see emergency measures passed, particularly today, they tend to be sticky," Snowden said. "The emergency tends to be expanded. Then the authorities become comfortable with some new power. They start to like it."

One key takeaway from the Snowden interview is to be wary not necessarily of how surveillance tools might be used today, but of how they might be used years from now we might someday find that these tools have become too integrated in our society, too normalized, to easily remove.

From Your Site Articles

Related Articles Around the Web

Read the original post:
This AI tool measures social distancing in real time - Big Think

Contact tracing apps for coronavirus are the new trend. Heres why. – India Gone Viral

Next up on the how to get life back to normal checklist: contact tracing. But its not going to be easy.

Experts already say states need to wait until coronavirus cases actually start to decline over several weeks before they begin reopening businesses and sending people back to school and work. The US also needs to dramatically ramp up its capacity to conduct tests for Covid-19. It would help, too, if there were accurate antibody tests that would show if somebody has already been infected and is now immune.

But once people start resuming their normal routines, contact tracing will be essential to containing emerging clusters of coronavirus infections. Without those efforts, new infections could silently spread before we realize whats happening, leaving more lockdowns as the only option to guard against an out-of-control outbreak and more deaths.

If lockdowns are a sledgehammer to clamp down on new clusters, contact tracing would be the more preferable scalpel.

Traditionally, contact tracing is the work of public health staff. When somebody tests positive for an infection, field workers interview them, find out people the infected person has been in close physical contact with, and then notify those people about their exposure. Ideally, the potentially exposed people would either get tested themselves or, at the minimum, self-quarantine until symptoms show up or the incubation period has passed.

In the United States and across the world, smartphone applications are seen as a promising option to automate some of the work that health workers have traditionally been asked to do. Namely, they could silently track which people weve been in contact with, and if one of those people tests positive for Covid-19, our phone would send us a notification letting us know about our potential exposure. Apple and Google have modified their operating systems to allow our phones Bluetooth functions to do this work.

This diagram from Google helpfully explains how this would work in practice:

Google

Google

But you can probably imagine all the practical challenges and privacy concerns such a program could raise. Thats why the Center for American Progress, one of the leading left-leaning think tanks in Washington, DC, is releasing a list of recommendations for states to utilize digital contact tracing, which it shared exclusively with Vox.

Their approach seeks to maximize privacy protection while encouraging the most effective application of these tech tools. To summarize CAPs advice for states:

Digital contact tracing apps may allow all of us to better fight this virus and return to more open ways of life, CAP tech policy experts Erin Simpson and Adam Conner wrote. We come to the recommendation of distributed digital contact tracing reluctantly and only in the context of exploring the range of other recommendations. However, we find hope in the idea that new approaches make it possible to build this in a maximally privacy-protective way.

But even the best-intentioned plans are going to raise questions and be at risk of privacy violations. As Shirin Ghaffary wrote for Recode over the weekend:

The contact tracing system Google and Apple are working on is notably more privacy-centric than the methods were seeing in China or South Korea, but it still poses concerns. The two companies have now committed to shutting down the tool once the pandemic is over which was a key issue for many privacy experts but other concerns abound. There are still ways that even the randomly generated Bluetooth keys meant to anonymize users could be linked back to real identities.

Apple and Google are also leaving it up to public health authorities to develop and manage the apps that will use their contact tracing tool. Its conceivable that those authorities could introduce their own ways to circumvent privacy protections if their governments so desire.

You can see how the CAP recommendations aim to assuage these concerns (by, for example, prohibiting law enforcement access), but state governments will have to actually commit to those principles for them to be effective.

And people will have to be willing to give the government even limited access to their phones for these plans to work, and, as Shirin notes in her story, that is no small challenge in a post-Edward Snowden world. Reuters reported on Tuesday that only one in five people in Singapore, which has rolled out an app similar to what experts are envisioning in the US, have signed up for the digital tracing app. That is nowhere near the 60 percent adoption rate experts think is necessary for digital tracing to have a measurable impact on containing the coronavirus.

And all of this is why, according to the CAP experts and Shirins reporting and really anybody you could ask, digital contact tracing can only be part of a bigger solution. The ideal plan includes the traditional kind of tracing that we discussed at the top.

The problem is the US is woefully understaffed for the kind of contact tracing that is necessary for a highly infectious pathogen like the coronavirus. Public workforces have seen their federal funding cut by 28 percent over the past 15 years, and about 50,000 jobs in this now-essential field have been lost.

According to the Johns Hopkins Center for Health Security, the US needs at least 100,000 more public health staffers to conduct contact tracing, many of whom will need to be trained. Politico reported that before the coronavirus pandemic, states had fewer than 2,000 workers capable of performing these duties.

So a lot more investment may be needed. The Johns Hopkins researchers, led by Crystal Watson, put the price tag for hiring and training the necessary contact tracing workforce at $3.6 billion. The new coronavirus stimulus bill passed by Congress this week included $11 billion for states and cities to ramp up their testing capabilities, laboratory capacity, and contact tracing. Well see if that is enough.

Between the CAP recommendations, the work of other experts, and the examples of other countries that have already pursued these initiatives, we know what good contact tracing of both the digital and traditional variety might look like. But it will take the resources and commitment to certain ideals to make it happen.

This story appears in VoxCare, a newsletter from Vox on the latest twists and turns in Americas health care debate. Sign up to get VoxCare in your inbox along with more health care stats and news.

Support Voxs explanatory journalism

Every day at Vox, we aim to answer your most important questions and provide you, and our audience around the world, with information that has the power to save lives. Our mission has never been more vital than it is in this moment: to empower you through understanding. Voxs work is reaching more people than ever, but our distinctive brand of explanatory journalism takes resources particularly during a pandemic and an economic downturn. Your financial contribution will not constitute a donation, but it will enable our staff to continue to offer free articles, videos, and podcasts at the quality and volume that this moment requires. Please consider making a contribution to Vox today.

More here:
Contact tracing apps for coronavirus are the new trend. Heres why. - India Gone Viral

Half of the worlds VPNs would not be secure – InTallaght

The VPN they are essential tools to avoid internet censorship, as well as to browse safely encrypting our entire connection and hiding it from the eyes of authorities and operators. However, many of the VPNs would not be secure, a new report reveals.

The report states that in the data they have collected, the 46.6% of all VPNs of the world are based in countries that participate in the pact of 14 eyes, where 14 countries of the world participate sharing intelligence, among which is Spain. This group includes, in turn, the Five Eyes and Nine Eyes, formed by:

Members of these agreements may share intelligence data, and you can even skip the laws that prohibit citizen surveillance. Various VPNs warn of the possibility of this type of situation, and therefore warn that using one of a specific country can lead to security problems.

Thus, a VPN could be forced to share user information with the government, which in turn would allow any member of the 14 countries to obtain such information for being part of the intelligence pact. For example, the United States might know the browsing history of a user who has committed a crime.

The eyes pact began with five countries in the 1940s and aimed to share information of military origin in the face of the Cold War. However, little by little, it was expanding to intelligence, and now it also affects the information that is available online.

The Fourteen Eyes group is also better known as SIGINT Seniors Europe, or SSEUR, according to documents leaked by Edward Snowden. The relationship between the countries that make it up is not as close and intimate as that of the Five Eyes, but even so, they can share sensitive information belonging to users.

Thus, 46.6% of VPNs are present in one of those 14 countries, and the figure increases to 48.4% if we consider that there are countries that also collaborate at the intelligence level such as Israel, Singapore, Japan and Korea from the south. The risk is even higher by users using free VPNs, most of whom do not guarantee 100% anonymity; especially if a judge asks them to identify a user.

Among the data collected by VPNs are the websites visited, connection times, bandwidth, server location, and even the original IP address with which they can contact an operator to help them identify the real user with the name. And surnames.

Therefore, the key is to use a VPN that does not keep records, and that is located in a country that does not fall within the Fourteen Eyes alliance. For example, Express VPN is based in the British Virgin Islands, while Nord VPN It is found in Panama, so they would be the best VPNs that we can use at the privacy level.

Go here to read the rest:
Half of the worlds VPNs would not be secure - InTallaght

Zoom Upgrades Encryption Keys to What It Promised All Along – WIRED

It was another week of social distancing or quarantine for most of the world, but Google published findings that it has seen 12 government-backed hacking groups undeterred by the pandemic and, in fact, trying to take advantage of those conditions for intelligence-gathering. Another report found that China, for one, has been busy during the pandemic hacking Uighurs iPhones in a recent months-long campaign.

We broke down how Apple and Google are using aggregate smartphone location data to visualize social distancing trends. And in an exclusive interview with WIRED, Federal Bureau of Investigation director Christopher Wray warned that domestic terrorism is a growing threat in the United States.

On top of all the other digital threats, researchers emphasized this week that so-called "zero-click" hacks that don't require any interaction from users to initiate may be more prevalent and varied than most people realize. Such attacks are difficult to detect with current tools.

And there's more. Every Saturday we round up the security and privacy stories that we didnt break or report on in depth but think you should know about. Click on the headlines to read them, and stay safe out there.

On Wednesday, the video conferencing service Zoom announced a number of small but needed security improvements. As Zoom usage has increased during the pandemic, so has scrutiny on the service's security and privacy offerings. This week's announcement of incremental improvements is part of a 90-day plan the company announced to overhaul its practices. One change is that Zoom will now offer AES 256 encryption on all meetings, meaning data will be encrypted with a 256-bit key. Zoom previously used AES 128, a reasonable option, but a controversial one in Zoom's case, because the company claimed in documentation and marketing materials that it used AES 256 all along.

Facebook data from more then 267 million profiles is being sold on criminal dark web forums for 500, or about $618. The information doesn't include passwords, but does include details like users' full names, phone numbers, and Facebook IDs. Though such information can't be used to break into the accounts directly, it can fuel digital scams like phishing. Most of the trove seems to be the same as data found by researcher Bob Diachenko in an exposed cloud repository last month. Even after that bucket was taken down, though, a copy of the information plus an addition 42 million records popped up in a different repository.

A growing number of Nintendo users over the past few weeks had watched fraudsters take control of their accounts, and in many cases use saved credit cards or linked PayPal accounts to buy Nintendo games or currency for the popular game Fortnite. At the beginning of April, Nintendo encouraged users to turn on two-factor authentication to protect their accounts, but it had been unclear how hackers were breaking in. On Friday, the company confirmed that hackers had gained unauthorized access to accounts and announced it was discontinuing users' ability to log into their Nintendo Accounts using Nintendo Network IDs, from older Wii U and 3DS systems. Nintendo also says it will contact affected users about resetting passwords. On its US customer support page, the company writes, "While we continue to investigate, we would like to reassure users that there is currently no evidence pointing toward a breach of Nintendos databases, servers or services."

More Great WIRED Stories

Follow this link:
Zoom Upgrades Encryption Keys to What It Promised All Along - WIRED

Review of the iStorage datAshur Pro2, an encrypted thumbdrive for home and work – Neowin

With all of the data leaks being announced on a daily basis, many people have decided that they would rather host their own data in order to maintain control. While there are many options, such as NAS devices, sometimes you may want access to your files anywhere you are, regardless of an Internet connection, so a portable storage device is something to consider. But once the device leaves the house, what happens if you accidentally lose it or your laptop bag is stolen?

Back in 2018, I took a look at the iStorage diskAshur PRO2, a secure portable hard drive that encrypted all data on the device. Today, I'll take a look at the iStorage datAshur PRO2, a device that provides similar functionality to the diskAshur PRO2, only in a small USB thumbdrive form factor that you can easily put in your pocket and carry with you.

The datAshur PRO2 comes in different capacities, from 4GB (priced at 49/$59) all the way up to 512GB (priced at 369/$468). Our review unit, provided by iStorage, was the 256GB model, priced at 279/$358.

3.7V Li-Polymer Rechargeable Battery

USB 3.2 Gen 2 SuperSpeed USB

The device's housing is made of a rugged anodized aluminum, and the case that goes over it has a rubber gasket to make the datAshur PRO2 waterproof, giving it an IP58 certification.

The USB drive contains a rechargeable battery. This lets you type in the PIN and unlock the device before connecting the datAshur PRO2 to a USB port on your computer. Since all of the encryption and decryption is done on the thumb drive itself, the datAshur PRO2 can be used on Windows, Mac, and Linux without the need to install any drivers. If the battery dies from lack of use, you can still plug it into a computer and unlock the drive while it's charging.

If you're paying for an encrypted drive, part of the cost is related to obtaining security certifications, and the datAshur PRO2 has a lot of them. Or rather, is in the process of obtaining a lot of them. Unfortunately it's hard to tell which ones have been completed and which ones are currently in process. Let's explore those certifications in the next section.

The buttons on the device are the main interface, and they have a polymer coating to prevent the keys from smudging, which would tip off an attacker as to what keys are frequently pressed to unlock it.

If you're looking for cheap and portable storage, but don't care about security, then there are far better solutions in the market for you that come in at much cheaper price points. If you require your data to be secure, then the datAshur PRO2 shines.

The website lists the following certiifcations/validations for the datAshur PRO2: FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & NATO Restricted Level. However it's hard to tell which of these the product has completed, and which are still pending review by the official agencies. For example, the device does not yet have FIPS 140-2 Level 3 validation, although the design itself is compliant. If this distinction is important to you for purchasing, you'll want to wait a little longer for NIST to complete its review. The company has other products that have been approved, so I suspect it's only a matter of time before the datAshur PRO2 is validated as well.

One of the main physical features that will allow iStorage to obtain FIPS 140-2 Level 3 validation on the datAshur PRO2 is the fact that the components within the device are covered in an epoxy resin. This makes physical attacks against the hardware nearly impossible without damaging the components, and is also used as evidence that the device has been tampered with.

The datAshur PRO2 is a great solution for enterprise environments due to the ability to whitelist the device. This allows a company to lockdown what external storage devices are allowed to connect to the corporate network and prevent someone from, for example, connecting a rogue USB thumbdrive that may have malware on it, while allowing approved devices. Unfortunately, my test lab does not have the ability to test this functionality.

The device has a concept of both an admin and a regular user account. The admin account allows you to setup features on the datAshur PRO2, such as password complexity, create a one-time recovery PIN, set the device as bootable, or make the device read-only to users. The user account only allows someone to read/write data stored on the device, and of course, only the admin can create users.

Another interesting feature of the datAshur PRO2 is the concept of a "self-destruct" PIN. If configured, you can simply type in the code to automatically delete the encryption keys and the data from the device. While this feels very spy-like, it's better to have the feature and not need it than need it and not have it.

While the datAshur PRO2 has a lot of features available, you will probably want to keep the manual nearby because memorizing all of the keypresses required to set things up or check the status is pretty much impossible. However, the PDF, which is included on the drive itself when you first get buy it, is very informative and has clear instructions on what to do and how the device will respond, as shown in the example above. In addition, unlocking the device is what you'll be doing the most, and that's a simple process to perform.

Since the datAshur PRO2 supports a USB 3.2 Gen 2 SuperSpeed connection, I expected the performance to be great and I was not disappointed.

While I normally test NAS systems using a RAM-disk in order to reduce latency, I went with a more "real-world" test here of simply copying files my Samsung 970 EVO Plus NVMe drive to the datAshur PRO2. Since the drive can read and write at over 3,300 MB/sec, we'll definitely only be limited by the USB bus and the USB drive itself.

According to the specs on the iStorage website, you can expect a maximum of 168 MB/sec when reading files from the device, and 116 MB/sec when writing files to to the device.

After doing my normal battery of tests - namely, copying a multi-gigabyte file to/from the device and copying hundreds of multi-megabyte files to/from the device, I was roughly hitting those numbers. When connected to a USB 3.0 or better port, a simple drag-and-drop copy would always consistently show 116 MB/sec when writing files to the datAshur PRO2 and 130 MB/sec when reading from the datAshur PRO2. When connected to an older USB 2.0 port, performance was consistently throttled at 40 MB/sec for all of the tests.

Running a benchmark in CrystalDiskMark provided even higher throughput values, with a consistent 140 MB/s sequential read and 128 MB/s sequential write speeds. As expected, random read/write speed was considerably slower, clocking in at only 17 MB/s read and a maximum of 12 MB/s write.

While it would've been nice to see the device take full advantage of the USB 3.2 performance, these speeds are still reasonable and iStorage delivers what it promises.

Unlike a regular flash drive, if you plug the datAshur PRO2 into a USB drive, nothing happens. In order to access the drive, you have to first unlock it. This process consists of holding the shift key down on the drive to wake it up, then pressing the unlock key, followed by your PIN code. The red light under the locked padlock lights up when the datAshur PRO2 is awake, and the unlocked padlock and letter A (administrator) start flashing after you press the unlock key. Once unlocked, you have 30 seconds to plug the device into a computer before it automatically locks itself again. Alternatively, you can plug the device in first and then unlock it.

The keys themselves are only slightly raised, but have a nice tactile response when pressed, making it easy to know you've successfully engaged it. In all of my testing, I never once accidentally pressed the wrong button.

When in the unlocked mode and connected to a computer, the datAshur PRO2 stays unlocked until it's removed from the USB port or the computer is rebooted. During this time, it acts just like a regular flash drive you'd connect to your PC.

The one minor quibble is that when you pull the flash drive from its protective sleeve, you have to make sure you don't misplace it. The datAshur PRO2 is only waterproof when in the sleeve, due to the rubber gasket, and the sleeve also protects against accidental button presses.

There's an old adage in technology: Good, Fast, Cheap, pick two. It's clear that iStorage went in with the strategy of creating a good and fast product, but as I noted earlier, that means the device is not cheap, especially at the larger capacities.

If you're just looking for a USB flash drive to store some generic data, then you probably won't be interested in the datAshur PRO2. It's a little bigger than a normal drive and a lot more expensive, especially as you look at the larger capacity drives. However if you're looking for a well designed, well performing, and very secure thumb drive to store sensitive data, you can't go wrong with the datAshur PRO2. In addition, if you're only looking to keep some sensitive documents that don't take up a lot of space, the four gigabyte version is only $59, which is a great price considering the level of security the device maintains.

More:
Review of the iStorage datAshur Pro2, an encrypted thumbdrive for home and work - Neowin