3% of Cryptocurrency Exchanges Were Hacked Last Year, Cryptocompare Report Finds – CryptoGlobe

/latest/2020/02/3-of-cryptocurrency-exchanges-were-hacked-last-year-cryptocompare-report-finds/

A report published by leading cryptoasset data provider CryptoCompare reveals that 3% of cryptocurrency exchanges were hacked last year, and that only 4% offer some form of insurance.

In a press release shared with CryptoGlobe, CryptoCompare announced an update to its cryptocurrency Exchange Benchmark tool that reveals the top cryptocurrency exchanges based on several criteria, including the team behind them, the quality of their markets, geographical location, legal status, and data provision.

The Benchmark currently ranks over 160 active spot exchanges throughout the world, assigning them a grade to help users identify the lowest risk cryptocurrency exchanges in the industry. For the first time, the press release notes, U.S. and Japanese regulated exchange itBit ranked number one.

ItBit was followed by Gemini, Coinbase, Kraken, and Bitstamp which make up the top five. Notably, popular cryptocurrency exchange Binance didnt make it to the top 10. Charles Hayter, co-founder and CEO of CryptoCompare, commented:

The industry needs reliable metrics to evaluate the vast number of cryptocurrency exchanges globally and we have been extremely pleased with the response to our analysis since launch last year. Our cryptocurrency Exchange Benchmark aims to provide this transparency by assessing exchanges using a clear methodology to assess risk

In its Exchange Benchmark, CryptoCompare found that 3% of cryptocurrency exchanges were hacked last year, and this trend seems to be continuing. CryptoGlobe reported this week Italian crypto exchange Altsbit was shutting down after being hacked, as it decided to use its remaining funds to partially reimburse affected users.

The figure is somewhat alarming as its well known that organized hacking groups like Lazarus specifically target cryptocurrency businesses, allegedly to fund the North Korean regime. Moreover, CryptoCompare also found only 4% of exchanges offer some form of cryptocurrency insurance.

The report also found top-tier exchanges those graded AA to B accounted for 27% of the global trading volume, while lower-tier exchanges graded C-E accounted for 73% in Q4 2019. Only 30% of trading platforms possess a crypto exchange license or are registered as a money service business.

Notably, 16% of exchanges reveal they hold over 95% of cryptocurrency in cold wallets. While such a small amount securely store most of their assets offline and only 4% offer insurance, 33% offer margin trading.

Featured image via Unsplash.

Read the original:
3% of Cryptocurrency Exchanges Were Hacked Last Year, Cryptocompare Report Finds - CryptoGlobe

Cryptocurrency Fraud Cases: TN Police Issues Warning To Investors – Inc42 Media

EOW has taken this decision in the backdrop of cryptocurrency fraudulent cases

In 2018, RBI had told banks to withdraw all support services for crypto entities

Startups and internet organisations are demanding for open crypto network

In a bid to curtail cryptocurrency-based transactions in Tamil Nadu, the states Economic Offences Wing (EOW) has now issued a warning to individuals dealing with cryptocurrencies.

According to a report in The Hindu, the department has taken this decision in the backdrop of cryptocurrency fraudulent cases reported in Tamil Nadu. A few cryptocurrency investors were cheated in these cases, however, accused are now arrested, it added.

The public is hereby advised not to deal with cryptocurrencies including Bitcoins, Ethereum, Ripple and more. Those trading in virtual currencies were doing so at their own risk, given that the Reserve Bank of India (RBI) has not given a licence or authorisation to any company to deal in such cryptocurrencies, the Economic Offences Wing said.

Notably, RBI, on April 6, 2018, had told banks to withdraw all support services that were being extended to crypto entities, thereby announcing a virtual ban on cryptocurrencies. The deputy governor of RBI, BP Kanungo, had then suspected that the rise of cryptocurrencies beyond a critical limit might bring financial instability in the country.

The EOW further highlighted that cryptocurrencies are not a currency as per the definition of currency in India. It is not a derivative as well, it added. Explaining further, the department said that it is only a virtual currency that is similar to gold or precious metals which behaves more like assets rather than currency. Most cryptocurrencies including Bitcoin, Ripple, Litecoin and Ethereum are not backed by a sovereign guarantee, and therefore are not considered as legal tender, the notice added.

Unlike other investment options such as stocks, mutual funds, among others, there are no government organisations which regulate cryptocurrencies around the world. Once duped, investors are left with no option to redress their grievances. Moreover, the Indian government has not yet given the status of legal tender to any cryptocurrency.

RBI has warned investors about these risks many times in the past. Moreover, it has also highlighted that cryptocurrency can be used for unethical practices such as money laundering. To address these issues, EOW said that a draft bill has also been proposed to ban cryptocurrencies in the country and provide for official digital currency.

On the other hand, there are many startups that are urging the RBI to allow the flow of cryptocurrencies in the country. In an open letter written to finance minister Nirmala Sitharaman last month, cofounder and CEO of cryptocurrency trading platform, CoinDCX Sumit Gupta cited benefits of cryptocurrencies. Moreover, the Internet and Mobile Association of India (IAMAI) has also filed a petition in the Supreme Court in favour of open crypto regulation in the country.

Get Weekly Briefing On The Indian Startup Ecosystem!

Read more:
Cryptocurrency Fraud Cases: TN Police Issues Warning To Investors - Inc42 Media

Proof-of-Stake Algorithm: How to Stake in… – Coinspeaker

Staking is a process that came as an alternative to the Proof of Work mining algorithm. Proof of Stake means that you hold a significant amount of your coins and dont want to sell them short. Staking refers to classic stakes in the companies, where big capital is put into valuable papers for a long time.

When you hold Bitcoin, you also participate in its staking. Because you are holding a stake in the economy. Bitcoin is the decentralized economy and a centralized company mixed in one by venture capitalists.

The so-called crypto influencers understood that the public is ready to use different consensus models if they have a monetary incentive. If you cannot participate in mining, you can participate in automated mining, which is staking.

The classic Proof-of-Work algorithm is good as a consensus model. Probably, its the best consensus model in history. However, it takes time to establish, and the anonymity of parties brings in lots of confusion.

First, it imposes high burdens on who can make business with mining. Miners have to pledge real dollars into mining equipment, then they sell off mined coins. To be profitable, the miner needs to invest substantial amounts of cash into the mining rigs. Then, they dont have the tools of governance, and all the decision making is done by the coders. Those coders typically do not listen to the miners or users. Its their ego or the mercantile motives, but they dont like to report even to crypto journalists. Thats why theres so much attention to governance in Proof of Stake models.

The Staker is someone who can participate in the life of a cryptocurrency via putting in the money or the computational power of a node. Proof of Stake coins usually enable a broad list of features, including voting and elections. Those features help the network pick development decisions based on community consensus, not the sole will of a closed circle of developing elitists.

The staker is also a person who put a significant amount of his coin stash to the staking mode. This means that, in most PoS currencies, the reference wallet implementation has a special vault for staking part of your balance. You can compare the vault to a bank account, where you cannot withdraw cash until the deposit end date. Not all the coins demand to store the coins for some time. But youll have to deal with many pretty hard to remember rules. And most of the PoS systems make you lose stake rewards or even part of your stash in case you break the network rules.

In general, crypto staking is the automated shareholding with a build-in incentive scheme for the interested masses to explore. The staking model itself, just like the mining of PoW coins, has no intrinsic value. The cost of the coins appears solely from the massive crowds and their belief that the project is important. This is similar to ordinary stocks but in cryptocurrency.

Different staking coins offer different profits based on a hefty of parameters. For example, in the majority of staking coins, the more coins you hold in a stake mode, the more block rewards you get. Some projects may modify this rule to achieve precise consensus or new incentive schemes.

Another example in many of the projects, you will receive the return based on the time your node spends in the network. Sometimes, its the power of the validating node that acts as the key factor of staking reward volumes. Depending on the networks architecture and needs, staking plans differ in the demands.

If you dont care about the ideology of the project and simply want to put in some capital for growth, use websites giving statistics to compare the coins. Many of the staking-related services have profit calculators built-in.

For instance, on the Stakingrewards homepage, we could see thetop staking coins with their basic stats. It shows you the seven days price change, approximate reward per month or year (or per staking period), a percentage of coins currently in the stake mode and so on. The website also shows you the list of staking providers with ratings and coins they support.

You can see that some coins offer big returns like 55% profitability. And some other assets only give you 5% annually. Obviously, the more the coin gives back per the share, the more probability that its a shitcoin or a Ponzi scheme masked as a PoS currency. You must be extremely aware when investing in PoS tokens with high ROI. Check that they have low public coverage and weak code to make sure to stay away.

So, if youre in the staking game, one of the main questions is whether to perform it online or offline. Offline means that you will use your PC as the staking node, sometimes called a validator node or the delegate node. Depending on the blockchain, different projects require different nodes. Some of the PoS coins require that the node you use meets the minimum technical requirements to keep the networks operation quality at a high level.

The minimum burdens could be imposed on RAM, CPU speed or some other factors such as Internet bandwidth. However, many other PoS coins dont have any Desktop validator requirements, which means you can even use an outdated PC (like the one Tone Vays is using on his kitchen to support the Bitcoin network) for staking it.

The other option is much easier and it only requires you to have an account on some exchange. Many of the exchanges handle all the fuzz with preparations for a small fee. You simply register, put in the cash, lock it and enjoy. Online staking is better because it can offer higher ROI rates compared to Desktop validation. Your computer may be too old for the network, thus it will generate fewer profits thanks to RAM or CPU limitations. When using online service, there are best servers for you and they dont even want to know your real name in most cases.

There are three major types of online staking. The first one is a cloud validator node, where you buy cloud server space and put a validating node there, increasing profits thanks to powerful hardware. In the second one, you can drop the coins on the exchange and it will do the rest for you, but the returns may be smaller. The third one is several firms that serve as online staking providers. Its up to you to decide whether you want to use them, just compare the staking plans they offer and pick the best one.

Keep in mind that any of the validator plans in different types of PoS blockchains use a minimum stake volume to prevent cheating. To ensure that network participants act honestly, the blockchain could cut off a part of the staking stash if the validator tries breaking the consensus rules or cheating with transactions/blocks/censorship.

Putting in a substantial amount of tokens also means that youre either an early network supporter who bought lots of coins for low price, or an investor looking to earn more than local banks could offer via deposit system. In both cases, nobodys interested in a scenario where the networks consensus model fails. Presumably, this makes you a loyal follower ready to risk some of his time and energy to support and (possibly) promote a favorite staking plan.

Tezos in yet another PoS currency with the possibility of delegating the validation rights to other holders. You can transfer the rights without transferring the token itself. Also, you are not obligated to pick any Trusted Block Producers as in EOS or Lisk. The systems consensus algorithm is called Liquid Proof of Stake, or LPoS. Liquid, because the user decides on whether the rights are transferable or not.

Instead of mining or staking, Tezos is using baking as the reference word when it comes to the block producing. There is a difference between the Liquid Proof of Stake and classic Delegated Proof of Stake. Liquid version allows people an option to pick the delegates, but they can refuse. While classic DPoS is about obligatory picking of the delegates, and the delegates are known corporations, not the users.

Tezos is the second biggest staking coin by volume locked in staking stash. You can join the process both using your node or via the mainstream exchanges.Coinbase offers a 5% yield on Tezos staking, and the rate may be even higher. If you want to stake the coin via Trezor Model T read this. And if you sent some tizzies to your Ledger Nano X, read on to seehow it can be profitable for you. Other Tezos staking issues? Check outthis article.

Harmony is upcoming with its staking model called EPoS, which meansEffective Proof of Stake. It uses a sharded blockchain and around 400 validators are picking to participate in each of the networks shards. The system supports voting via bonded shares. One bonded vote share gives a validator the right to cast one vote. During the day, a validator is using all his bonded vote rights and the rights are re-attributed on the next day.

How are they re-distributed? At the end of each day, people who stake send out their bets to a special betting address. The more tokens sent as the bet, the more the chance of being elected by the protocol as the next block producer and transactions facilitator.

The core protocol features include FBFT, aconsensus typewhere at least 2 of 3 votes cast a decision. It also has BLS multi-signature consensus, sharded P2P, distributed randomness generator, and so on.

Since January 2019, there are multiple test networks working already to help the network facilitate self-checks. Harmony doesnt impose hardcore limits on the hardware of validator nodes, as well as on the network speed. If you have a weak PC and bad Internet but want to participate in block production you will have the ability to do so.

You can check other exchange offers to pick the one that fits you best. The estimated annual yield for staking ONE onBinance is 8-10%. If you want to stake using your own resources, heres the Ledger Nano S staking guide.

Cosmos is widely referred to as the blockchain for blockchains. It is using a Tendermint consensus protocol. The network consists of several scalable blockchains sending the data to each other via the primary one. This adds to the decentralization and governance-related solutions pile but adds troubles with code verification.

While the new features are untested, the finality of the project is under question. Also, the developers still working on the Inter-block Communication Protocol, which is a crucial part of the projects further developments.

The developers claim that the platform is programming language agnostic, which means it supports any type of smart contracts. According to the docs, DApps running on this blockchain receive an enormous amount of scaling possibilities.

One of the bad sides of staking Cosmos is that the top 10 validators are services or companies with the biggest stake. Over time, any stake gets bigger because the more you hold in staking the more rewards you get. Thats how the top 10 validators of the networkgot control of over 46%of the whole networks cumulative share.

Currently, the Ethereum staking roadmap consists of classic PoS rule-set where the more you have, the more you get.

Ethereum 2.0 will presumably arrive somewhere in Q1 2020 in a major network upgrade. It promises the support for staking of Ethereum, as well as for a list of other long-awaited features. From the current plans of developers, a minimum burden for a validator node will be 32 ETH.

This is a somewhat large price for the average investor. So, the majority of Ethereum staking will presumably work thanks to large companies/staking pools. In case you dont have 32 ETH or dont want to stake so many coins, staking pools will allow staking any amount of funds, but with some fees.

Also, there is no clearance regarding the possible ROI, and Buterin proposed something between 1,5% and 18%. Ethereum developer Justin Drake is proposing a 5% return rate for the validators.

Unlike other blockchains, where hybrid PoW/PoS algorithms work, in Ethereum PoS will work as a separate network layer. This means that classic Ethereum mining on video cards from AMD/Nvidia isnt going anywhere. The new network layer should work separately from the old one. While the classic layer will continue to focus on smart contract functionality, confirming transactions and PoW, the new layer will facilitate PoS-related tasks solely.

See the original post here:
Proof-of-Stake Algorithm: How to Stake in... - Coinspeaker

The Seven Deadly Sins Of Cryptocurrency Investing – CryptoTicker.io

The next bull season is almost upon us. Its just only 3 months remaining until the next Bitcoin halving and Bitcoin / Altcoins are already showing a major improvement in price. So, we thought that it might be a good idea to remind everyone of the seven deadly sins of cryptocurrency investing and how not to do it. Crypto investments are highly profitable at times, but they are extremely risky also. The market itself is volatile and relatively unstable, but practicing these tips would majorly insure you against losses, to a large extent.

The most basic investment advice is to invest only, what you can afford to lose. Only utilize money which is expendable, which wont cause you any problems, even if it all goes to zero. Its easier to commit large sums from your savings and borrowings (from either banks or people), when you believe that winning is almost certain, but doing so can bring financial problems, if the situation turns out, to be the other way around.

To protect against heavy losses, using stop loss is a must. A stop loss is a defined price or satoshi value, upon reaching which, the exchanges are asked to automatically liquidate either a part of or whole assets. Using stop loss ensures that you are able to sell your assets in due time, when the price is falling unexpectedly, without causing the value of your portfolio to go down much.

Fear of missing out (FOMO) buying occurs when the value of an asset is rising and people fear being left out. As a result, they will buy the asset at a sub-optimal price, when it has already risen much. This isnt a smart investment decision to make, since a correction can be underway or the assets would fall, because its already at peak.

Fear, Uncertainty, Doubt (FUD) selling occurs when the people get impressioned by false propaganda against an asset, which isnt showing any dis-improvement in technical or fundamental analysis. Hence, they sell it in panic, without considering the fundamental value of the asset or how it might appreciate in the future.

Traders and investors are best advised to observe and respond to market trends. The price of an asset isnt exactly rational in nature, therefore if most people believe that its going to rise, that will act as a self fulfilling prophecy. On the contrary, if most people believe that the price of an asset would fall, that is likely to happen, because of the timeless principles of crowd psychology. The general trends, sentiment analysis and the technical charts should be used to gain better situational awareness.

Its better to take profits at regular times, instead of being greedy. So to secure some gains after an improvement in price value of an asset. Instead of being greedy and expecting it to improve more. Its better to secure profits instead of betting in an asset to rise further, which it will or it wont do. Its a double edged sword, for sure, but its better to err on the side of caution.

A lot of traders and investors have a thought pattern of gambling that they are more afraid of losing future profits than the capital amount, which they invested in the first place. Its again much better to exercise abundant caution and attempt to secure the capital amount first.

Instant Crypto Credit Lines from only 5.9% APR. Earn up to 8% interest per year on your Stablecoins, USD, EUR & GBP. $100 million custodial insurance.

Ad

This post may contain promotional links that help us fund the site. When you click on the links, we receive a commission - but the prices do not change for you! 🙂

Disclaimer: The authors of this website may have invested in crypto currencies themselves. They are not financial advisors and only express their opinions. Anyone considering investing in crypto currencies should be well informed about these high-risk assets.

Trading with financial products, especially with CFDs involves a high level of risk and is therefore not suitable for security-conscious investors.CFDs are complex instruments and carry a high risk of losing money quickly through leverage. Be aware that most private Investors lose money, if they decide to trade CFDs. Any type of trading and speculation in financial products that can produce an unusually high return is also associated with increased risk to lose money. Note that past gains are no guarantee of positive results in the future.

Posted By

The Dash (DASH) cryptocurrency is a highly developed and widely adopted crypto-asset. Its prominent features are instantly settled transactions, near

Cardano (ADA) is a relatively new entrant in the cryptocurrency arena being first launched in October 2017, however it has

Inflation refers to the "reduction in purchasing power of a currency or asset" or to the fact that "most currencies

Original post:
The Seven Deadly Sins Of Cryptocurrency Investing - CryptoTicker.io

Big data increasing corruption risks – Government News

Reliance on technology in the public sector and the ubiquity of personal devices and smart phones in the workplace are increasing the risk of corruption, Victorias corruption watchdog says.

The states Independent broad-based anti-corruption commission (IBAC) released a report on the unauthorised access and disclosure of information this week.

The report says its increasingly easy for public sector employees to become regular sources of official information for friends, family members and organised crime groups.

Yet public sector agencies often underplay the risk or are unable deal with it appropriately, and in some cases senior levels of management are involved.

The public sector holds vast amounts of personal information, much of it sensitive, including citizens financial data, health records and contact details along with political and economic information. It is vital that this information is properly secured and managed, Commissioner Robert Redlich said.

The report tells us that unauthorised access and disclosure of information are key enablers of other corrupt behaviour, yet they are often rated as low risk by agencies.

Organised crime

IBAC says that around the world, there has been an increase in organised crime groups targeting health records and using health sector employees to leak official information, with the data used to access online banking or lock down files for extortion.

Sometimes public sector employees disclose unauthorised information because of a perceived cause or ideology, with a Defence employee in 2012 downloading a secret document and posting it online saying Julian Assange is my hero.

The employee was later jailed.

A 2016 audit showed a VicRoads employee whose father had organised crime links, and who was accused of changing registration and licensing details on the database, accessed department records 18,000 times over two years.

In 2017, A Corrections Victoria employee admitted to accessing information about prisoners who were known to him, and in 2013 information was received about employees of government agencies in Shepparton who were allegedly passing on information to organised crime gangs.

A subsequent media report based on leaked information likely compromised the investigation, IBAC said.

Big data risks and concerns

Government agencies are at higher risk of information misuse because of the huge volume of information they hold and their increased reliance on technology, Commissioner Redlich writes.

This increased reliance upon technology for work and personal use has resulted in increased efficiency but has also raised the risk of public sector employees easily copying or replicating data for circulation.

While technology has benefited the work of the public sector overall, it has also made it very easy to disclose information in terms of time, quantity and sensitivity and difficult, if not impossible, to retrieve it once disclosed.

IBAC said ananalysis of its investigations across Victorias public sector showed some 60 per cent of all investigations involved information misuse issues.

Data analytics and big data is growing around the world and in Australia, IBAC says, bringing a raft of new corruption risks.

There are known corruption risks with big data as it brings together previously separate datasets into a new database for matching, the report says.

This allows employees to access information which they previously may not have had access to, and also makes the material more valuable and sensitive as it is matched with newrelated information.

For example, big data systems may hold multiple pieces of personal identifying information, such as details of driver licences, addresses and bank accounts, which potentially increases the consequences when this information is misused.

However, this also provides opportunities for agencies to work together to address security risks, IBAC says.

Comment below to have your say on this story.

If you have a news story or tip-off, get in touch ateditorial@governmentnews.com.au.

Sign up tothe Government News newsletter

Read more from the original source:
Big data increasing corruption risks - Government News

Growing class conflict in the US and the resurgence of socialism – World Socialist Web Site

Growing class conflict in the US and the resurgence of socialism 13 February 2020

According to a report released Tuesday by the federal Bureau of Labor Statistics (BLS), working class struggles in the US are at their highest levels in decades.

There were 25 work stoppages involving 1,000 or more workers in 2019. This is the largest number in nearly two decades. Ten of these strikes involved 20,000 or more workers, the largest number since at least 1993, when data on the size of walkouts began to be systematically tracked by the BLS.

The number of workers involved in strikes is increasing as well. There were 425,500 workers who took part in major work stoppages last year, down slightly from 2018 (485,000). The 2018 figure was a near 20-fold increase over the previous year. Combined, 2018 and 2019 saw the largest number of workers involved in a major work stoppage, over a two-year period, in 35 years.

Over the past two years, teachers have engaged in major strikes in West Virginia, North Carolina, Kentucky, Oregon and other states, and in major cities like Los Angeles, Oakland and Chicago. The unrest among manufacturing workers was expressed in the 40-day strike by 46,000 workers at General Motors last year, the first national strike by autoworkers in decades. More than 30,000 Stop and Shop grocery workers in the US Northeast also walked out last year.

In many cases, these strikes have developed outside of the official trade unions, and in all cases have come into conflict with these nationalist and pro-capitalist organizations. The United Auto Workers succeeded in shutting down the GM strike, even as its executives were under criminal investigation and indictment for stealing workers dues money and accepting bribes from the auto companies.

The intensification of the class struggle is the essential factor underlying the shift to the left among workers. Numerous polls express the broad-based support for socialism, and hostility to capitalism and inequality, particularly among young people. In the 2020 elections, this political radicalization has found its initial and, as yet, politically limited expression, in support for the campaign of Vermont Senator Bernie Sanders, who has won the popular vote in the first two contests in the Democratic primary campaignIowa and New Hampshire.

The impulse toward socialism is derived not only from social discontent and the outbreak of strikes, but from a complex interaction of the domestic and international crisis of American capitalism.

The principal objective factor that allowed the ruling class in the United States to suppress the growth of socialism was the strength of American capitalism. So long as the United States was an ascending economic power, with a sufficient share of the national income going to rising living standards, American workers were not convinced of the necessity for socialism.

The objective conditions for this American exceptionalism, however, have thoroughly eroded. Over the past 40 years, the American ruling class, responding to the decline in the dominant global position of American capitalism, has been working systematically to destroy everything that had been won by workers through bitter struggle. The land of unlimited opportunity, which always had a semi-mythical character, has given way to the land of low wages, debt and economic insecurity. The American Dream has turned into the American nightmare.

Particularly since the crash of 2008, the concentration of wealth has enormously intensified class and social divisions. The 400 richest individuals in the US now possess more wealth than the bottom 64 percent of the population, and social inequality is greater than at any time since the years preceding the Great Depression of the 1930s.

Anticipating this development, in the aftermath of the 2008 crash, the Socialist Equality Party predicted: The reality of capitalism will provide workers with many reasons to fight for a fundamental and revolutionary change in the economic organization of society. This is now taking place.

The growth of social unrest and interest in socialism has frightened and shocked the ruling class and its political and media mouthpieces. The Trump administration has responded with frenzied anti-communism. Trump frantically denounces socialism and the radical left. His effort to build up a movement of the fascistic right is directed, above all, at the growth of social opposition in the working class to the policies of the financial oligarchy.

The Democratic Party and media are working relentlessly to undermine support for socialism. The hostility of dominant factions of the Democratic Party to the Sanders campaign expresses their determination to prevent an election that raises, even in a limited way, the mass hostility to social inequality and corporate dictatorship.

While posturing as a popular party, the entire program of the Democrats is based on the suppression of class consciousness. Through the mechanism of racial and gender politics, the Democrats and their affiliated organizations seek to divide the working class. With the growth of the class struggle, these efforts are intensifying.

Sanders, while the immediate beneficiary of the movement to the left among workers and youth, seeks to direct anger and opposition back into the Democratic Party itself, to prevent it from breaking out of the bounds of capitalist politics.

The development of the class struggle, and the radicalization of workers and youth, will inevitably come into conflict with Sanders and those, like the Democratic Socialists of America, that are promoting him. In terms of his program, Sanders seeks to combine proposals for minor social reforms, impossible under capitalism, with economic nationalism; a shameful silence on the persecution of Julian Assange and Chelsea Manning, and support for the imperialist foreign policy of the Democratic Party.

The growth of the class struggle, and the political radicalization of workers and youth, is in its initial stages. Millions of people, in the United States and internationally, are looking for a way to oppose inequality, exploitation, dictatorship and war. They will go through political experiences and must draw the necessary conclusions.

We must patiently explain, Lenin once wrote, under similar conditions. The workers must be imbued with a consciousness of the logic of the struggles they are waging. They must understand the role of different political tendencies, to distrust those who make empty and false promises. They must be encouraged to have confidence in their own strength and the possibility of independent action. They must be trained to analyze politics in class terms, and to reject all efforts to promote racial, gender and national divisions.

As the Socialist Equality Party candidates in the 2020 presidential elections, Norissa Santa Cruz and I will fight to build a socialist leadership in the working class. The SEP campaign will explain what socialism is and how it can be achieved. It will bring into the growing struggles of workers throughout the world the immense historical experiences of the working class, embodied in the history of the Fourth International.

The intersection of the objective movement of the working class and the intervention of the socialist movement will create the conditions for abolishing world capitalism and putting an end to inequality, exploitation and war.

To get involved in the SEP election campaign, visit socialism2020.org.

Joseph KishoreSEP national secretary and candidate for US president

2019 has been a year of mass social upheaval. We need you to help the WSWS and ICFI make 2020 the year of international socialist revival. We must expand our work and our influence in the international working class. If you agree, donate today. Thank you.

See more here:
Growing class conflict in the US and the resurgence of socialism - World Socialist Web Site

Quantum Computing: How To Invest In It, And Which Companies Are Leading the Way? – Nasdaq

Insight must precede application. ~ Max Planck, Father of Quantum Physics

Quantum computing is no ordinary technology. It has attracted huge interest at the national level with funding from governments. Today, some of the biggest technology giants are working on the technology, investing substantial sums into research and development and collaborating with state agencies and corporates for various projects across industries.

Heres an overview of quantum computing as well as the players exploring this revolutionary technology, and ways to invest in it.

Understanding Quantum Computing

Lets begin with understanding quantum computing. While standard computers are built on classical bits, every quantum computer has a qubit or quantum bit as its building block. Thus, unlike a classical computer where information is stored as binary 0 or 1 using bits, a quantum computer harnesses the unique ability of subatomic participles in the form of a qubit which can exist in superposition of 0 and 1 at the same time.As a result, quantum computers can achieve higher information density and handle very complex operations at speeds exponentially higher than conventional computers while consuming much lessenergy.

It is believed that quantum computing will have a huge impact on areas such as logistics, military affairs, pharmaceuticals (drug design and discovery), aerospace (designing), utilities (nuclear fusion), financial modeling, chemicals (polymer design), Artificial Intelligence (AI), cybersecurity, fault detection, Big Data, and capital goods, especially digital manufacturing. The productivity gains by end users of quantum computing, in the form of both cost savings and revenue opportunities, are expected to surpass $450 billion annually.

It will be a slow build for the next few years: we anticipate value for end users in these sectors to reach a relatively modest $2 billion to $5 billion by 2024. But value will then increase rapidly as the technology and its commercial viability mature,reportsBCG.

The market for quantum computing isprojectedto reach $64.98 billion by 2030 from just $507.1 million in 2019, growing at aCAGR of 56.0%during the forecast period (20202030).According to aCIRestimate, revenue from quantum computing is pegged at $8 billion by 2027.

Which Nations Are Investing In Quantum Computing?

To gain the quantum advantage, China has been at the forefront of the technology. The first quantum satellite was launched by China in 2016. Apaperby The Center for a New American Security (CNAS) highlights how, China is positioning itself as a powerhouse in quantum science.

Understanding the strategic potential that quantum science holds, U.S., Germany, Russia, India and European Union have intensified efforts towards quantum computing. In the U.S., President Trumpestablishedthe National Quantum Initiative Advisory Committee in 2019 in accordance with the National Quantum Initiative Act, signed into law in late 2018, which authorizes $1.2 billion to be spent on the quantum science over the next five years.

The Indian government in its 2020 budget has announced a National Mission on Quantum Technologies & Applications with a total budgetoutlayof 8000 crore ($1.12 billion) for a period of five years while Europe has a 1 billioninitiativeproviding funding for the entire quantum value chain over the next ten years. In October 2019, the first prototype of a quantum computer waslaunchedin Russia while in Germany, the Fraunhofer-Gesellschaft, Europes leading organization for applied research,partneredwith IBM for advance research in the field of quantum computing.

The Companies Leading the Way

IBM has been one of the pioneers in the field of quantum computing. In January 2019, IBM (IBM)unveiledthe IBM Q System One, the world's first integrated universal approximatequantum computing system designed for scientific and commercial use. In September itopenedthe IBM quantum computation center in New York to expand its quantum computing systems for commercial and research activity. It has also recentlyinvestedin Cambridge Quantum Computing, which was one of the first startups to become a part of IBMs Q Network in 2018.

In October 2019, Google (GOOG,GOOGL) made anannouncementclaiming the achievement of "quantum supremacy."It published the results of this quantum supremacy experiment in theNaturearticle, Quantum Supremacy Using a Programmable Superconducting Processor.The term "quantum supremacy" wascoinedin 2012 by John Preskill. He wrote, one way to achieve quantum supremacy would be to run an algorithm on a quantum computer which solves a problem with a super-polynomial speedup relative to classical computers. The claim wascounteredby IBM.

Vancouver, Canada headquartered D-Wave is the worlds first commercial supplier of quantum computers and its systems are being used by organizations such as NEC, Volkswagen, DENSO, Lockheed Martin, USRA, USC, Los Alamos National Laboratory and Oak Ridge National Laboratory.In February 2019, D-Waveannounceda preview of its next-generation quantum computing platform incorporating hardware, software and tools to accelerate and ease the delivery of quantum computing applications. In September 2019, itnamedits next-generation quantum system as Advantage, which will be available in the Leap quantum cloud service in mid-2020.In December 2019, the companysignedan agreement with NEC to accelerate commercial quantum computing.

Amazon (AMZN)introducedits service Amazon basket in late 2019, which is designed to let its users get some hands-on experience with qubits and quantum circuits. It allows to build and test circuits in a simulated environment and then run them on an actual quantum computer.

Around the same time, Intel (INTC)unveileda first-of-its-kind cryogenic control chip code-named Horse Ridgethat will speed up development of full-stack quantum computing systems.

In addition, companies such as Microsoft (MSFT), Alibaba (BABA), Tencent (TCEHY), Nokia (NOK), Airbus, HP (HPQ), AT&T (T) Toshiba, Mitsubishi, SK Telecom, Raytheon, Lockheed Martin, Righetti, Biogen, Volkswagen and Amgen are researching and working on applications of quantum computing.

Final Word

Investors looking to invest in the technology can either look at individual stocks or consider Defiance Quantum ETF (QTUM) to take exposure to companies developing and applying quantum computing and other advanced technologies. Launched in April 2018, QTUM is a liquid, low-cost and efficient way to invest in the technology. The ETF tracks the BlueStar Quantum and Machine Learning Index, which tracks approximately 60 globally listed stocks across all market capitalizations.

While quantum computing is not mainstream yet, the quest to harness its potential is on, and the constant progress made is shrinking the gap between research labs and real-world applications.

Disclaimer: The author has no position in any stocks mentioned. Investors shouldconsider the above information not as a de facto recommendation, but as an idea for further consideration. The report has been carefully prepared, and any exclusions or errors in reporting are unintentional.

The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.

Read the rest here:
Quantum Computing: How To Invest In It, And Which Companies Are Leading the Way? - Nasdaq

For the tech world, New Hampshire is anyone’s race – Politico

With help from John Hendel, Cristiano Lima, Leah Nylen and Katy Murphy

Editors Note: This edition of Morning Tech is published weekdays at 10 a.m. POLITICO Pro Technology subscribers hold exclusive early access to the newsletter each morning at 6 a.m. Learn more about POLITICO Pros comprehensive policy intelligence coverage, policy tools and services, at politicopro.com.

Advertisement

If Sanders wins in New Hampshire: If the polls hold true, the tech world may see a ton more heat from the Vermont senator, who has long been critical of tech giants market power and labor practices.

Trumps 2021 funding requests: President Donald Trumps 2021 budget proposal would give big funding boosts to artificial intelligence and quantum computing, as well as the Commerce Departments NTIA and the Justice Departments antitrust division, but not to the FTC or FCC.

Bipartisanship at risk?: House Judiciarys Republican leaders say recent comments from the Democratic chairman about Silicon Valley giants threatens the panels tech antitrust probe, a rare point of bipartisanship in a hotly divided Congress.

ITS TUESDAY, AND ALL EYES ARE ON THE FIRST PRESIDENTIAL PRIMARY OF 2020: NEW HAMPSHIRE. WELCOME TO MORNING TECH! Im your host, Alexandra Levine.

Got a news tip? Write Alex at alevine@politico.com or @Ali_Lev. An event for our calendar? Send details to techcalendar@politicopro.com. Anything else? Full team info below. And dont forget: add @MorningTech and @PoliticoPro on Twitter.

WHAT NEW HAMPSHIRE MEANS FOR TECH A week after winning the most votes in Iowa, Sen. Bernie Sanders (I-Vt.) is polling first in New Hampshire, with Pete Buttigieg a close-second. (Further behind, and mostly neck-and-neck, are Elizabeth Warren, Joe Biden and Amy Klobuchar.) What could this mean for the tech world? Just about anything.

But if the Vermont senator prevails in tonights Democratic presidential primary, we can expect to hear more of his usual anti-Amazon commentary (Sanders has repeatedly criticized Amazons labor practices and complained that the online giant pays zero in taxes); more break up big tech talk (Sanders has said he would absolutely look to break up tech companies like Amazon, Google and Facebook); and more attacks on corporate power and influence (he has proposed taxing tech giants based on how big a gap exists between the salaries of their CEOs and their mid-level employees).

Several prime tech policy issues are also fair game: Sanders criminal justice reform plan includes a ban on law enforcements use of facial recognition technology, and he has spoken out about tech's legal liability shield, Section 230 debates that are playing out (often, with fireworks) at the federal level. (Further reading in POLITICO Magazine: Is it Bernies Party Now?)

Plus: Could New Hampshire be the next Iowa? State and local election officials running this primary without apps (voters will cast their ballots on paper, which in some cases will be counted by hand) say no. POLITICOs Eric Geller provides the birds-eye view.

Heres everything you need to know about the 2020 race in New Hampshire.

BUDGET DISPATCH: HUGE JUMP FOR DOJ ANTITRUST, NO BIG CHANGES FOR FCC AND FTC The White House on Monday rolled out its fiscal year 2021 funding requests, including a proposed 71 percent bump in congressional spending on the Justice Departments antitrust division an increase that, as Leah reports, is another indicator that the agency is serious about its pending investigations into tech giants like Google and Facebook. (It would also allow the agency to hire 87 additional staffers.)

In contrast, the FCC and FTC arent requesting any big changes in their funding or staffing. The FCC is seeking $343 million, up 1.2 percent from its 2020 funding level, while the FTC is asking for a little over $330 million, which is about $800,000 less than its current funding. The FCC noted its on track to move to its new Washington headquarters in June, while FTC Commissioner Rebecca Slaughter, a Democrat, objected to the request for her agency, saying in a statement that it does not accurately reflect the funding the FTC needs to protect consumers and promote competition.

Artificial intelligence and quantum computing would also receive big funding boosts under the budget proposal, Nancy reports. So would the Commerce Departments NTIA, to help prepare the agency for 5G and other technological changes, as John reported for Pros.

IS THE BIPARTISAN TECH ANTITRUST PROBE IN JEOPARDY? The House Judiciary Committees investigation into competition in the tech sector which garnered rare bipartisan momentum in a hotly divided Congress could now be in trouble. On Monday night, the committees Republican leaders criticized Democratic Chairman Jerry Nadlers recent remarks railing against the power of Silicon Valley giants, writing in a letter that Nadlers comments "have jeopardized" the panel's "ability to perform bipartisan work." Spokespeople for Nadler did not offer comment. A Cicilline spokesperson declined comment.

The dust-up marks the first major sign of fracturing between House Judiciary Republicans and Democrats over their bipartisan investigation into possible anti-competitive conduct in the tech industry a probe widely seen as one of Silicon Valleys biggest threats on Capitol Hill, Cristiano reports in a new dispatch. The dispute could threaten the push to advance bipartisan antitrust legislation in the House, something House Judiciary antitrust Chairman David Cicilline (D-R.I.) has said the committee plans to do early this year.

T-MOBILE-SPRINT WIN T-Mobile and Sprint can merge, a federal judge is expected to rule today, rejecting a challenge by California, New York and other state attorneys general, Leah reports. U.S. District Judge Victor Marrero is expected to release his hotly anticipated decision on the $26.2 billion telecom megadeal later this morning.

FCCS FUTURE-OF-WORK FOCUS Amazon, AT&T, Walmart, LinkedIn and Postmates are among the tech companies expected at a future-of-work event today that Democratic FCC Commissioner Geoffrey Starks is hosting at the agencys headquarters.

The public roundtable will address the same kinds of issues that several Democratic presidential candidates have raised, such as concerns about AIs effect on labor economies. Issues of #5G, #InternetInequality, automation & education are colliding in ways that will impact all Americans, Starks wrote on Twitter. Eager to host this important policy discussion!

CCPA UPDATE: GET ME REWRITE! California Attorney General Xavier Becerra on Monday published a business-friendly tweak to his proposed Privacy Act regulations, a change that his office said had been inadvertently omitted from a revised draft unveiled on Friday.

Only businesses that collect, sell or share the information of at least 10 million Californians per year thats about 1 in 4 residents would have to report annual statistics about CCPA requests and how quickly they responded to privacy-minded consumers, under the change. That threshold was originally 4 million.

The update will come as a relief to companies that no longer need to pull back the curtain on their Privacy Act responsiveness. Its also good news for procrastinators, as the new deadline for submitting comments on the AGs rules was pushed back a day to Feb. 25.

TECH QUOTE DU JOUR Senate Judiciary antitrust Chairman Mike Lee (R-Utah) offered colorful praise on Monday for Sen. Josh Hawleys (R-Mo.) proposal to have the Justice Department absorb the FTC, a plan aimed in part at addressing concerns over the FTCs enforcement of antitrust standards in the technology sector.

Having two federal agencies in charge of enforcing antitrust law makes as much sense as having two popes, Lee told MT in an emailed statement. This is an issue weve had hearings on in the Judiciary Committee and I think Sen. Hawley has identified a productive and constitutionally sound way forward. (Hawleys proposal swiftly drew pushback from one industry group, NetChoice, which said it would make political abuse more likely.")

The state of play: Some Republicans in the GOP-led Senate now want to reduce the number of regulators overseeing competition in the digital marketplace. A small contingent of House Democrats wants to create a new federal enforcer to police online privacy. But a vast majority of the discussions happening on Capitol Hill around those issues have so far focused on ways to empower the FTC, not downgrade it.

Mike Hopkins, chairman of Sony Pictures Television, is joining Amazon as a senior vice president overseeing Amazons Prime video platform and movie and television studios.

AB 5 blow: Uber and Postmates on Monday lost the first round in their challenge to Californias new worker classification law, POLITICO reports.

Uber IPO fallout: As tax season begins, some of Uber's earliest employees are realizing they had little idea how their stock grants worked and are now grappling with the fallout on their tax bills after last May's disappointing IPO, Protocol reports.

JEDI latest: Amazon wants Trump and Defense Secretary Mark Esper to testify in its lawsuit against the Pentagon over the award of the multibillion-dollar JEDI cloud computing contract to Microsoft, POLITICO reports.

ICYMI: Federal prosecutors announced charges Monday against four Chinese intelligence officers for hacking the credit-reporting giant Equifax in one of the largest data breaches in history, POLITICO reports.

Facebook ad tracker: New Hampshire saw more than $1 million in Facebook spending in the month leading up to todays presidential primary, Zach Montellaro reports for Pros.

Can privacy be a piece of cake?: A privacy app called Jumbo presents a startling contrast to the maze of privacy controls presented by companies like Facebook, Twitter and Google, Protocol reports heres how it works, and how it plans turn a buck.

Virus watch: Following Amazons lead, Sony and NTT are pulling out of this months Mobile World Congress in Barcelona as a precaution during the coronavirus outbreak, Reuters reports.

In profile: Zapata Computing, a startup that creates software for quantum computers by avoiding as much as possible actually using a quantum machine, Protocol reports.

Out today: Alexis Wichowski, New York Citys deputy chief technology director and a professor at Columbias School of International and Public Affairs, is out today with The Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World, a book published by HarperCollins.

Tips, comments, suggestions? Send them along via email to our team: Bob King (bking@politico.com, @bkingdc), Mike Farrell (mfarrell@politico.com, @mikebfarrell), Nancy Scola (nscola@politico.com, @nancyscola), Steven Overly (soverly@politico.com, @stevenoverly), John Hendel (jhendel@politico.com, @JohnHendel), Cristiano Lima (clima@politico.com, @viaCristiano), Alexandra S. Levine (alevine@politico.com, @Ali_Lev), and Leah Nylen (lnylen@politico.com, @leah_nylen).

TTYL.

View original post here:
For the tech world, New Hampshire is anyone's race - Politico

IBM bets on blockchain to leverage cloud revenue – CIO Dive

Dive Brief:

Industry watchers say blockchain adoption in the enterprise is in its infancy.IBM's got time and resources to watch it evolve and deliver more workloads to its cloud.

Since 2018, IBM has tripled its blockchain patents each year, and has a workforce of 2,000 blockchain experts focused on development and implementation,the company told CIO Dive. Citing customers the size of Ford, Maersk and the U.S. Food and Drug Administration, IBM's strategy hinges on luring more customers to its cloud platform.

IBM has worked to make inroads in advanced technologies such as quantum computing unveiling the IBM Q System One last year and blockchain. But the enterprise cloud market, led by Amazon Web Services,has remained elusive.

In the broader cloud market, IBM is a niche player, according to Gartner stats. In 2018 it landed in last place among the top five providers, with 1.8% of market share. IBM trails its closest competitor, Google Cloud, which sits at 4%.

In 2018, artificial intelligence, cloud and blockchain projects helped IBM emerge from a 22-quarter revenue growth crater. In January, IBM announced a succession plan for CEO Ginni Rometty, who led the company through a computing evolution. The company's choice of a cloud executive as CEO highlights IBM's shift to focus on the technology. Arvind Krishna, who will become CEO on April 6, currently serves as SVP for cloud and cognitive software.

View post:
IBM bets on blockchain to leverage cloud revenue - CIO Dive

What is cryptography? | TechRadar

Whether for secure communication, or for private storage of data, there are occasions when individuals and organizations have a need to make their data unreadable to general users.

The technology that makes this possible is known as cryptography, which comes from the Ancient Greek words, kryptos, that translates to secret or hidden, and graphein which means to write. Cryptography is a process that converts the text of a message or data, into a scrambled message, that obscures the original message, and then the recipient can convert the scrambled message back to the original.

Cryptography can be traced back to the ancients, with the first documented use dating to 1900 BC in ancient Egypt with substituted hieroglyphics. A more modern approach with a substitution cipher can be found with Julius Caesar in 100 BC, where each letter was substituted with another letter to scramble the message, in what became known as a 3 cipher that moved each letter three ahead in the alphabet to keep it secure.

This Caesar Cipher was used to send secure messages to the Roman generals on the front line, but is considered less secure by modern standards as it only used an encryption method, and did not utilize an encryption key, and therefore is subject to being easily decrypted based on the frequency of the letters.

A more modern approach to cryptography is from Blaise de Vigenre, a Frenchman in the 16th century, and represents an early approach to encoding the message via an encryption key in what became known as the Vigenre cipher. In this approach, an encryption key is used, and the letters get encrypted via this key, however this simplistic approach can also be easily broken.

Seeking greater security, cryptography has benefited from technological advances, with electro-mechanical approaches being taken in the early 20th century, starting with the Hebern Rotor Machine. This used a single rotating disc, with a secret key embedded and was based off of an electrical typewriter. The cryptography is based on a substitution table, but the advance was that the next letter, the rotor advanced, thereby changing to a different substitution table used after each letter, while maintaining efficiency as no manual lookup was required to encode or decode the message.

Rotating disc technology then formed the basis of the famous German Engima machine, which was invented by Arthur Scherbius. It debuted at the end of World War I, and was relied upon heavily by the German military during World War II.

The advance over the Hebern Rotor Machine was that it used multiple discs, three for the German Army, and the Navy, that implemented their Enigma Code later, used four rotors for additional security. It took a process over years to crack the German Enigma code, with initial progress made by the Polish Cipher Bureau, which used their close ties to the German engineering industry for the initial decryption, and had a fully reconstructed an Enigma machine in the 1930s. The Germans were quite confident that their Enigma code could not be broken, and used it throughout all of their branches of the military, including all secret communications.

Facing a German invasion, the Poles shared their knowledge of Enigma with the British at their now famous Government Code and Cipher School, better known for their location at Bletchley Park, including their reconstructed Enigma machine that was a detailed replication down to the internal wiring.

The British, faced with the challenge of deciphering Enigma code messages in a timely fashion to generate actionable intelligence, devoted considerable resources including their top mathematicians, for a faster method to decrypt the German Enigma communications. This resulted in the Colossus Mark 1, which was the worlds first programmable, and electronic computer- purpose built for codebreaking. From the origins of these vacuum tube code decrypting behemoths started the computing revolution.

Computers have continued to be central to cryptography today. In the 1970s, IBM developed a cipher known as Lucifer to encrypt corporate communications, that subsequently was adopted by the US National Bureau of Standards as the Data Encryption Standard (DES) for the protection of sensitive government data.

With a 56-bit key size, as computing power increased it was broken via brute force attacks, and this was demonstrated in 1999 when it was decrypted in under 24 hours. Shortly thereafter, in 2001, the shift was made by NIST to a new more secure block cipher, which became the Advanced Encryption Standard (AES), which features a block size of 128-bits, and multiple different key lengths of 128, 192 and 256 bits, which is currently still in use.

AES uses symmetric encryption, which means that the same key is used for both encryption as well as decryption. This is also known as shared-secret key encryption, and the weakness is that any user with the key can decode the message making the security of the key quite paramount. This type of encryption is commonly used for securing data stored on a hard drive.

The alternative is asymmetric encryption, which is also known as public key encryption. In this method, the code to encrypt the message can be shared, as it cannot be used to read the message, and is known as the public code. A second code, known as the private code, is necessary for decrypting the message. Asymmetric encryption is applied to many internet protocols, including the RSA security algorithm, that forms the basis of the SSL/TSL Protocol, which secures our computer networks.

While symmetric and asymmetric encryption are thought of as separate entities, in practice they are also used in combination across the internet. For example, symmetric and asymmetric encryption is combined for digital signatures, where both public and private keys are utilized for verification of the sender of the message, and to keep the message secure, and unaltered.

Cryptography also gets applied to secure browsing, via the encrypted tunnel that gets created via VPN technology. While there are several security protocols that can be used for the creation of an encrypted tunnel of a VPN, the state of the art choice is OpenVPN, which uses asymmetric encryption with both public and private shared keys, via an open source algorithm, and 256-bit encryption via OpenSSL.

View original post here:
What is cryptography? | TechRadar