Intel drops work on one of its AI-chip lines in favor of an other – Network World

Well, that was short.

Intel is ending work on its Nervana neural network processors (NNP) in favor of an artificial intelligence line it gained in the recent $2 billion acquisition of Habana Labs.

Intel acquired Nervana in 2016 and issued its first NNP chip one year later. After the $408 million acquisition by Intel, Nervana co-founder Naveen Rao was placed in charge of the AI platforms group, which is part of Intel's data platforms group. The Nervana chips were meant to compete with Nvidia GPUs in the AI inference training space, and Facebook worked with Intel in close collaboration, sharing its technical insights, according to former Intel CEO Brian Krzanich.

For now, Intel has ended development of its Nervana NNP-T training chips and will deliver on current customer commitments for its Nervana NNP-I inference chips; Intel will move forward with Habana Labs' Gaudi and Goya processors in their place.

There are two parts to neural networks: training, where the computer learns a process, such as image recognition; and inference, where the system puts what it was trained to do to work. Training is far more compute-intensive than inference, and its where Nvidia has excelled.

Intel said the decision was made after input from customers, and that this decision is part of strategic updates to its data-center AI acceleration roadmap. "We will leverage our combined AI talent and technology to build leadership AI products," the company said in a statement to me.

The Habana product line offers the strong, strategic advantage of a unified, highly-programmable architecture for both inference and training. By moving to a single hardware architecture and software stack for data-center AI acceleration, our engineering teams can join forces and focus on delivering more innovation, faster to our customers, Intel said.

This outcome from the Habana acquisition wasn't entirely unexpected. "We had thought that they might keep one for training and one for inference. However, Habana's execution has been much better and the architecture scales better. And, Intel still gained the IP and expertise of both companies, said Jim McGregor, president of Tirias Research.

The good news is that whatever developers created for Nervana wont have to be thrown out. The frameworks work on either architecture, McGregor said. "While there will be some loss going from one architecture to another, there is still value in the learning, and I'm sure Intel will work with customers to help them with the migration.

This is the second AI/machine learning effort Intel has shut down, the first being Xeon Phi. Xeon Phi itself was a bit of a problem child, dating back to Intels failed Larrabee experiment to build a GPU based on x86 instructions. Larrabee never made it out of the gate, while Xeon Phi lasted a few generations as a co-processor but was ultimately axed in August 2018.

Intel still has a lot of products targeting various AI: Mobileye, Movidius, Agilex FPGA, and its upcoming Xe architecture. Habana Labs has been shipping its Goya Inference Processor since late 2018, and samples of its Gaudi AI Training Processor were sent to select customers in the second half of 2019.

See the rest here:
Intel drops work on one of its AI-chip lines in favor of an other - Network World

Love in the time of Artificial Intelligence – Philippine Star

Everybody loves a good love triangle, but heres one that veers away from the usual. The formidable third wheel in the romance between a man and a woman is a hologram!

Netflixs newest and now-streaming K-drama My Holo Love takes on love in the time of Artificial Intelligence (AI).

So-yeon is a woman who distances herself from people because of her face blindness disorder, which is described as the inability to recognize even familiar faces. Then she meets someone whom she can turn to for support, understanding and attention ideal qualities one hopes to find in The One, except hes someone she cant hold and touch. His name is Holo and hes an AI-powered hologram.

Now here comes Nan-do, So-yeons reclusive next-door-neighbor and Holos genius inventor. While Holo is made in Nan-dos exact likeness, the latter is the polar opposite hes lonely and disconnected from the world, too, and certainly not as sweet and kind.

But Nan-do gets drawn into the interactions between So-yeon and Holo, and becomes his own creations rival for So-yeons affection.

Yoon Hyun-min (Tunnel, Witch at Court, Tale of Fairy) plays the dual role of Holo and Nan-do, opposite the new-gen rom-com queen Ko Sung-hee (Suits, While Youre Sleeping, Diary of a Night Watchman) as So-yeon.

Can someone really find emotional attachment with Artificial Intelligence? Is AI capable of changing human capacity for friendship and ultimately, love? These are some questions that the series explores.

True to My Holo Loves tech-inspired theme, the Philippine press interviewed Hyun-min, 34, and Sung-hee, 29, via a video-conference call last Tuesday. Here are excerpts from the almost 40-minute chat:

On the possibility of a human being growing feelings for a robot or an AI-assisted hologram:

Sung-hee: First of all, in our (series), there is a point in time where So-yeon starts to develop feelings for Holo and is very confused. And I think it was when I had to act that particular part (that) I really had to think a lot about that issue, that thing that you just asked. Obviously, its not very easy. However, you can see that the character Holo in our work is very lovable and extremely charming.

Hyun-min: I dont think that its something that is completely impossible. Just the fact that we are holding this press conference, with us being here and you all the way in your respective countries this is something that I couldnt even imagine when I was a child but here we are. This is our reality today. The world is changing at such a rapid pace. I feel that in the near future, maybe a human being can have a relationship with an AI, who knows? I am open to all possibilities.

On working and being paired with each other in the series:

Sung-hee: It was great. I think it was one of those times when I felt the closest and most open in terms of having a conversation with a co-actor. And, I think, the kind of chemistry we formed behind the screens is really evident in our portrayal of the characters.

Hyun-min: It was really great for me as well. Sung-hees positive energy really exuded on set. It didnt only affect me but also members of the staff, the team, everyone. I think we all had a great time, thanks to her wonderful energy. I would love to get the chance to work with her again. And she was a really great partner (fist-bumping Sung-hee).

On finding similarities or differences with their characters:

Hyun-min: Holo is always sweet and kind because he is an AI. Nan-do the developer due to his child trauma has built walls around himself and disconnected himself from the outside world. He kind of has a hard time being kind at all times and expressing himself. I think, personally, I feel for Nan-do more out of the two, because I can always be kind and gentle when Im working or when outside of my home like Holo. However, upon returning home... theres that sense of emptiness and depression sometimes. So, I think, the imperfect human being that is Nan-do really draws me to this character and thats why I feel more for him.

Sung-hee: I share similarities, in that both of us are a little bit different when in terms of how we act when were working or when Im outside among other people and also when I am alone, and in that sense, I really related to my character. And also I myself, I often hear, I think, I appear to be cold. However, So-yeon has a completely different character once you get to know her so that was another factor that really appealed to me. I do feel that the character So-yeon is a lot nicer, much more lovely and a lot more warmhearted that I actually am (laughs). Shes very considerate of other people so much to the point that sometimes I felt frustrated with the character. So, So-yeon is definitely a character that I related a lot to, but also someone that I learned a lot from.

On preparing for their roles and learning new lessons as actors:

Sung-hee: Im mostly focused on how to really bring to light So-yeon having a relationship with an AI that is, of course, Holo, and in particular how to develop feelings for him, to love him. And also another thing was in terms of appearance, and how to maximize this sort of cold character that So-yeon had and also how she was a little bit more laidback when she was alone.

Rather than something that I learned about myself, because there were so many factors in this series where it was a completely new challenge for me. Of course, there were difficulties... but I think I grew a lot as an actress. Also because it was a sci-fi genre and I had to work against the green screen. This was something that I was completely new to. However, I did learn a lot in that aspect. So, I feel like I can be a little bit more confident in the future if I were to start in a similar type of series.

Hyun-min: Weve worked about a little over a year on this series and because it was a dual role that I had to play, it was very difficult. It was also my first-ever dual role. So, there were a lot of difficulties that came with that. But throughout the year, I think I focused mostly on my level of concentration and how not to break it. I would say that I focused mostly on the effectivity and capability in my acting.

Last year, as I was working on this series, during that time... I was also very exhausted and I was a little bit sensitive due to all of the homework. However, now looking back last year, I think it was truly a valuable experience. The fact that I was able to take on my very first dual role as an actor has become an invaluable asset to me. And it has led me to achieve a lot of personal growth. And also what I felt was that the first part of the story about the lonely couple of man and a woman and a hologram in between, its rather a unique love triangle that we see. And I think at the end of the day, we all carry a sense of loneliness. We are all a little bit lonely. But ultimately, only people or only humans can can fill that void.

On advice they would give the characters (and which viewers can learn from) on how to avoid loneliness:

Hyun-min: If I were to give advice solely on the character played by Sung-hee here, I would like to say that if you feel alone or if you have a sense of loneliness, dont take it all on yourself. Reach out, stretch out your hand because there is going to be someone that can help you, and of course, to all the journalists out there, if youre ever lonely (laughs)...

Sung-hee: I think I would give similar advice to both Holo and Nan-do. I would say you are enough. Holo himself, though hes AI, is enough. And hes a character that is sometimes and in some parts better than a human being and Nan-do despite all the hurt inside him and the way he sort of isolates himself to be more lonely, I still want to say to Nan-do, you are enough. So, know that you are enough and that you are already such a wonderful and amazing human being.

Continue reading here:
Love in the time of Artificial Intelligence - Philippine Star

‘He’ll serve for 50 years’: Rand Paul worried Ukraine whistleblower unaccountable to bosses – Washington Examiner

Sen. Rand Paul is hesitant to believe that his colleagues will call the alleged Ukraine whistleblower to testify even as the Senate Intelligence Committee may be gearing up to investigate the origins of the impeachment case against President Trump.

The Kentucky Republican, who read aloud the name of the alleged whistleblower on the Senate Floor Tuesday after Supreme Court Chief Justice John Roberts refused to do so last week during the question phase of the impeachment trial, suspects the person will remain in his current post as an intelligence analyst without oversight concerning his past actions.

The problem is that they've played it artfully where he'll probably never be called, and nothing ever happen[s] to him. He'll serve for 50 years over there, and everybody who's his boss will be worried that he's somebody who will inform on you at the drop of a hat, Paul told the Washington Examiner. And I consider him so much different than, like, Edward Snowden. Edward Snowden revealed something. No one would reveal this guy, reveal something that 400 people already knew. And most of them didn't have a problem with a phone call," he added, referring to the former National Security Agency contractor who leaked highly classified surveillance information and fled the United States in 2013.

Paul is not a member of the Senate Intelligence Committee, but a fellow Republican who is, Sen. Marco Rubio of Florida, shares similar concerns about the whistleblower and where this person is stationed.

And if we ever find out that there was a group of people within the government that were working together to craft something like this, that elements of which may turn out to be disproven, then we've got a big problem," Rubio told the Washington Examiner.

Senate Judiciary Chairman Lindsey Graham told Maria Bartiromo on the Fox News's Sunday Morning Futures that "the Senate Intel Committee under Richard Burr has told us that we will call the whistleblower." He added, "I want to find out how all this crap started."

I'm looking at the whistleblower process, Burr, a North Carolina Republican, told reporters Monday when asked about the investigation. He added, You know, I've never done investigations in public and won't be either.

Other committee members are interested in finding out more about the genesis of the whistleblower complaint filed with the inspector general on Aug. 12 about a July 25 phone conversation between Trump and Ukrainian President Volodymyr Zelensky. Under pressure, Trump released the transcript of what he describes as the "perfect call" and claimed he was only interested in rooting out alleged corruption.

Democrats, who charged Trump with abuse of power and obstruction of Congress, accused the president of improperly pressuring Kyiv to announce investigations into his political rivals, including Democratic presidential front-runner Joe Biden, by leveraging congressionally approved military aid and a White House meeting. Trump's legal team has argued that his actions are not impeachable, and the president is expected to be acquitted in a vote scheduled for Wednesday.

According to Rubio, the whistleblower issue has been on the committees agenda since the news of the complaint went public.

The committee has been following the whistleblower issue since the [complaint was filed on Aug. 12]. The initial meeting was with the interim director of national intelligence. It is in the intelligence committee. My sense is thatll continue," the senator said.

Some Republicans believe the whistleblower is CIA analyst Eric Ciaramella and want to know if there was any coordination prior to the filing of the complaint with aides for House Intelligence Committee Chairman Adam Schiff.

One particular Schiff aide, Sean Misko, previously worked with the alleged whistleblower at the National Security Council, the Washington Examiner reported, and sat behind Schiff, the lead impeachment manager, during open hearings for the House impeachment investigation as well as on the Senate floor during the trial.

Well, I think beyond the allegations that were made, there are legitimate questions that should be answered about the genesis of the complaint. Whose idea was it? Who helped write it? How much communication was there between members of staffers on the House Intelligence Committee and the whistleblower and so forth, Rubio contended.

And you can't hide behind the argument that, Well, we can't discuss that, or you'll out the whistleblower. These people most certainly have a right to go forward and talk to the Intelligence Committee, but Chairman Schiff lied about it. He's been telling us for two weeks that if you're hiding something or you're lying about it, it's evidence of wrongdoing, so at a minimum, it's a legitimate question," he added.

Schiff has disputed accusations that he knows the identity of the whistleblower and excoriated his opponents for questioning his staff's involvement. "I will not dignify those smears," the California Democrat said last week in response to an impeachment question about why he hired Misko.

Sen. Jim Lankford, an Oklahoma Republican and Intelligence Committee member, told the Washington Examiner the whistleblower issue is not an intelligence matter.

I don't know of anything that I need to know on the whistleblower at this point. There hasn't been a question on the process they went through to be able to determine. Who he was is not the issue. It's did they go through the right legal process? It looks pretty obvious they did. Where you've got the filing of the whistleblower reports, it went through review and determined this is not an intel-related issue, he said.

This needs to go to a different lane," Lankford said. "The one big unknown there that we've got to be able to resolve is even after it was determined by the Department of Justice, 'This is not correct. This is not an actual intel-related item,' they pulled it back over anyway and said, 'No, we're declaring this urgent' and pulled it out through those channels anyway. So that's the inspector general issue to resolve.

He added, When you were told by someone above you, 'hey, you're in the wrong lane here,' you typically get in the right lane, not try to be able to find a way to force it out.

Follow this link:
'He'll serve for 50 years': Rand Paul worried Ukraine whistleblower unaccountable to bosses - Washington Examiner

Well-meaning charities urge Facebook to halt encryption plan to protect kids – 9to5Mac

Well-intentioned charities and academics have urged Facebook to halt encryption plans for its messaging apps, citing concerns about child exploitation.

The call was made in a letter to Facebook CEO Mark Zuckerberg in response to the companys intention to adopt end-to-end encryption to protect user privacy

TheFinancial Times reports.

The chief executive of the social media network last year announced a move to integrate the messaging services of Facebook, WhatsApp and Instagram into one encrypted system, cast as a pivot to privacy in the wake of the Cambridge Analytica data leak.

Encryption would mean that only people sending and receiving messages would be able to view them; third parties such as Facebook itself or law enforcement could not access the content.

But in a letter signed by 129 non-profit organisations, think tanks and academics across 102 countries, child safety experts warned that Facebook had not yet satisfied...deeply held concerns that the move could enable more child sexual abuse on the platform.

The letter said the shift would mean sex offenders who typically groom children on Facebook before moving their conversations on to other less scrupulous apps would be emboldened to initiate and rapidly escalate directly on Facebooks services.

Its not the first time this argument has been made. Indeed, protecting children seems to be the new fighting terrorism when it comes to arguing against strong encryption.

But children of course already use other end-to-end encrypted chat apps, like iMessage and WhatsApp. Even the letter itself acknowledges that the only impact would be that chat initiated on Facebook might remain there rather than simply switching to other platforms.

Facebook said that moving to end-to-end encryption was critically important and repeated that there are ways to detect inappropriate contact without being able to read the content.

David Miles, Facebooks head of safety for Europe, Middle East and Africa, on Wednesday said: Strong encryption is critically important to keep everyone safe from hackers and criminals. The rollout of end-to-end encryption is a long-term project. Protecting children online is critically important to this effort and we are committed to building strong safety measures into our plans. He added that the company was working closely with experts.

The company has previously explained some of the signals that can be used.

Facebook could look at user profiles and flag someone making a series of requests to minors they do not know, or people who are part of suspicious groups []

Other alerts could include large age gaps between people communicating privately on Messenger or Instagram Direct Messages, frequency of messaging, and people that lots of users are blocking or deleting.

Another possibility would be for Facebook to switch to end-to-end encryption for its main apps, while retaining standard encryption for Messenger Kids. The social network this week announced additional parental monitoring tools for this.

Facebook is not the only company coming under fire for the use of strong encryption. The FBI is still pressing Apple on the Pensacola iPhones despite the fact that there are commercially-available tools to crack both of the models in that case. Calls to halt encryption are unlikely to go away anytime soon.

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Excerpt from:
Well-meaning charities urge Facebook to halt encryption plan to protect kids - 9to5Mac

How the B-Team watches over Australia’s encryption laws and cybersecurity – ZDNet

The cybersecurity of the Attorney-General's Department (AGD) has not been independently assessed by the Australian Signals Directorate (ASD) despite it being made an action item nearly four years ago.

The nation's Cyber Security Strategy of April 2016 said that government agencies "at higher risk of malicious cyber activity" would receive "independent cybersecurity assessments".

Adiscussion paper[PDF] for the 2020 strategy,releasedin September 2019, reported that "ASD has conducted active vulnerability assessments of a number of key government agencies".

But in written evidence given to the Senate Standing Committee on Legal and Constitutional Affairs this week, AGD revealed it wasn't one of them.

"ASD has not conducted an independent security assessment against Attorney-General's Department networks," it wrote.

"No additional funding has been provided to AGD for cybersecurity remediation activity."

AGD has vastly increased its spend on cybersecurity across the last four years, however.

From a base of AU$47,197 in 2015-2016, when they began tracking the annual operational spending of the IT Security Section, it rose to AU$225,826 in 2016-2017, then to AU$641,985 in 2017-2018. In 2018-2019, it declined slightly to AU$562,222.

"Other sections, projects, and activities make a substantial contribution to improving the overall cybersecurity posture, but are associated to other cost centres," AGD wrote.

But the department declined to answer specific questions about its compliance with theASD Essential Eightcybersecurity controls, citing security concerns.

"Publicly identifying details of any briefings provided to the Attorney-General on cybersecurity vulnerabilities on departmental networks would provide an individualised snapshot in time and may provide a heat map of vulnerabilities for departmental networks, which malicious actors may exploit and thus increase the agency's risk of cyber incidents," it wrote.

It's bad enough that most telecommunications interception warrants arenot approved by judgesbut by members of the Administrative Appeals Tribunal (AAT).

What's worse is that these less-qualified officials can spend mere minutes making their decision with no legal support from AAT staff.

After so little thought, and without further independent oversight, law enforcement agencies are free to use theircontroversial new powersunder the controversialTelecommunications and Other Legislation Amendment (Assistance and Access) Act 2018.

They can issue a "voluntary" Technical Assistance Request (TAR) to get a communications provider to help access the contents of an encrypted communication. Or they can issue a compulsory Technical Assistance Notice (TAN) to the same end.

Someseven TARs or TANs were issuedby law enforcement in the first seven months of the Act's operations. The number issued by the spooky agencies, meanwhile, is unknown.

The concern, first raised byThe Saturday Papera year ago, is that AAT members mightmore readily approve warrantsthan judges, although there's no data on this one way or the other.

There have been concerns that many AAT members are political appointees with no legal qualifications. More than 60% of members appointed since 1 July 2015 are not legally trained, according to further AGD evidence to the Legal and Constitutional Affairs Committee.

And whilesection 5DAof theTelecommunications (Interception and Access) Act 1979states that only AAT members who are "enrolled as a legal practitioner of the High Court, of another federal court, or of the Supreme Court of a State or of the Australian Capital Territory" for at least five years are approved to issue warrants -- a lawyer with five years experience is not a judge.

"Some legal experts argue that judges are more experienced and therefore more qualified to assess warrant applications than a lawyer with five years' practising experience,"The Saturday Paperwrote.

"Key to this is the fact that during these warrant proceedings, there is no party making an opposing argument."

Judges are experienced in weighing up the pros and cons of a case to ensure fairness. Lawyers are experienced at arguing for their client's position. They're not the same.

Also concerning is the amount of support given to AAT members in this role: None.

The Senate was told that "members undertake these functions in a personal capacity (as apersona designata) and not as part of their duties as a member of the AAT".

"AAT staff do not provide any legal support in respect of applications considered by an AAT member under the Act," AGD wrote.

"The AAT and AAT staff provide limited assistance to facilitate the performance of these functions, particularly scheduling appointments."

Those appointments can be very brief indeed.

"Since 1 July 2015 the average (mean) length of all appointments with AAT members for warrant-related purposes is just 18 minutes," AGD wrote.

"The shortest amount of time recorded for an appointment that proceeded is 1 minute. The data is not subject to auditing."

Maybe the members spend hours of their own time wrestling over whether to approve each warrant. On that matter, your writer has a simple response: Prove it.

Either way, it might well be argued that one minute doesn't allow for a serious challenge to a warrant application's claimed merits.

Australia's health sector continues to be the most affected by data breaches, according to the Office of the Australian Information Commissioner (OAIC).

Some58 notifiable data breaches(NDBs) were received by the OAIC between 1 January 2019 and 31 March 2019.

"The OAIC's 2019-20 corporate plan includes a continued focus on the health sector, particularly centred on uplifting the health sector's security posture," it told the Senate this week.

In September 2019, the OAIC released aGuide to Health Privacy.

"[The OAIC] is currently undertaking an associated outreach and social media campaign. This campaign includes the development of a toolkit to assist health service providers improve their information handling practices," it said.

Also during Estimates in November, the OAIC was asked if it was conducting an investigation into an alleged AU$10 million international identity theft scam that had affected several of Australia's largest super funds, including REST Super, AustralianSuper, and HESTA.

"The Information Commissioner has not opened an investigation into the named organisations in relation to the media report of an alleged identity theft scam," the OAIC said.

It did add, however, that the maximum current penalty that the Federal Court can impose for a serious or repeated interference with privacy is AU$2.1 million for a body corporate.

In recent years, the OAIC has found it difficult to process Freedom of Information (FOI) requests promptly. A substantial increase in all types of requests has since widened the gap, resulting inincreased delays and backlogs.

This week the OAIC revealed that meeting the demand for FOI regulatory work would require nine more staff at a cost A$1.65 million a year, plus A$300,000 in the first year for accommodation.

Your writer is of the view that this is back-of-the-couch money, given that it would deliver a significant increase in government transparency.

Visit link:
How the B-Team watches over Australia's encryption laws and cybersecurity - ZDNet

Kids Need End-to-End Encryption for Protection Against Corporations – The Mac Observer

In areport from theFinancial Times (paywall), a letter signed by 129 non-profits, think tanks, and academics urge Facebook to reconsider encrypting its apps. They use the think of the children argument because encryption could enable more child sexual abuse. But Justin Myles Holmes says weshould think of the children andenable end-to-end encryption for them, so their data isnt used and abused by corporations precisely like Facebook.

If we fail to take action now, we risk a world in which unsavory actors domestic and foreign have built rich, comprehensive profiles for every one of our children, following the trajectories of their education, home life, consumer habits, health, and on and on. These profiles will then be used to manipulate their behavior not only as consumers, but as voters and participants in all those corners of society which, in order for freedom and justice to prevail, require instead that these kids mature into functional, free-thinking adults.

Check It Out: Kids Need End-to-End Encryption for Protection Against Corporations

Follow this link:
Kids Need End-to-End Encryption for Protection Against Corporations - The Mac Observer

Encryption Backdoors: The Achilles Heel to Cybersecurity? – Techopedia

The war against cybercrime is ongoing and should not be halted or terminated because cybercriminals are not on the verge of giving up any time soon. Rather, they seem to be getting tech savvier on a daily basis. (Read How Cybercriminals Use GDPR as Leverage to Extort Companies.)

Taking a look at the IC3 Complaint Statistics 2014-2018, it becomes very glaring that we are really facing a cyberwar across the globe.

Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.

IC3 statistics showing a significant increase in total losses during 2018 (source: FBI IC3)

Different technological and non-technological measures such as weak and strong passwords, single, double, and multi-factor authentication are being fashioned out to arrest the menace caused by hackers but due to the fact that technology itself is advancing rapidly, it will still take some level of work to be able to have full control of the situation. (Read Is Security Research Actually Helping Hackers?)

Some of the measures that have been posited to use in tackling cybercrime include:

While the zero-trust strategy is not technologically based, both VPN and blockchain are based on technology. Despite the fact that they may have their different shortcomings especially as even renowned VPN providers can have privacy issues the good news is that both have encryption as a feature.

Its rather unfortunate that despite all the effort being put in place to ensure that organizations, governments, and individuals are secured, it is the government that may be constituted a stumbling block in checkmating the activities of cybercriminals.

Get insights into data center priorities and IT trends.

Governments and law enforcement agents around the globe, especially in the Five Eyes (FVEY) intelligence alliance, are not relaxing in their efforts to ensure that there are encryption backdoors.

They claim this is necessary for the interests of national safety and security as criminals and terrorists increasingly use encrypted messages to communicate online.

The FVEY governments believe that there is a widening gap between the ability of law enforcement to lawfully access data and their ability to acquire and use the content of that data, which they term "a pressing international concern." In their opinions, this clearly demands "urgent, sustained attention and informed discussion."

Encryption is the method by which your data is converted into a secret code that conceals the information's true meaning. (Read Trusting Encryption Just Got a Lot Harder.)

It's based on the science known as cryptography. Any data that is not encrypted in computing, unencrypted data is referred to as plaintext, while the encrypted data is called ciphertext.

You make use of encryption algorithms or ciphers to encode or decode messages. If an unauthorized party manages to intercept your encrypted data, the only way such data can be meaningful to the intruder is by haphazardly guessing which cipher was used to encrypt the message and also what keys were used as variables.

The best way to crack any encryption key is a brute-force attack. For example, AES with 256-bit keys has a key length that is 256-bit.

The possible number of combinations that can be used to crack this type of encryption can keep a hacker working throughout life without success. This makes encryption a very valuable asset and security tool.

Encryption can be said to be the basic block on which information technology (IT) assets are built and without it, cybercriminals will be having a field day as things are currently. Before going through the tunnel, your data gets encrypted with a special pre-configured algorithm.

Then going out of your device, the encrypted traffic goes via the tunnel to a blockchain or VPN server. The server contacts the requested Internet resource, traffic is decrypted and reaches the resource in an unencrypted way.

The process is the same backward: your data from the website is unencrypted, then it becomes encrypted and conveyed through the tunnel to you where it is finally decrypted.

The Federal Bureau of Investigation (FBI), are brimming hell on technology companies that offer end-to-end encryption (E2EE). Their argument is that such encryption restricts law enforcement from accessing data and communications even with a warrant.

The FBI described this issue as "going dark," and the U.S. Department of Justice (DOJ) is not taking it with a pinch of salt either. The DOJ is calling for what they termed "responsible encryption" that can be unbarred by technology companies under a court order.

Taking it to the extreme, Australia enacted a law that made it compulsory for visitors to render passwords for all digital devices when before entering the country. A five-year jail term is a punishment for failure to comply.

Even when you fail to have security behind your mind, the fact that you must meet up with the worlds best standards makes it mandatory for you to encrypt your data since you must meet compliance regulations.

Quite a number of organizations and standard bodies recommend or mandate that sensitive data must be encrypted in order to prevent unauthorized third parties or hackers from accessing the data.

A case in point is that of the Payment Card Industry Data Security Standard (PCI DSS) where it is absolutely necessary that merchants must encrypt customers' payment card data when it is both stored at rest and broadcasted over unrestricted channels.

Making use of link-level encryption, you have your data encrypted data when it leaves your network, decrypted at the next link, which may be a host or a relay point, and then its re-encrypted before it is sent to the next link. You have the advantage of using a different key or even a different algorithm for data encryption by each link.

This process keeps on repeating until your data gets to its destination.

The world is talking Cloud storage and hence the encryption of data in the cloud cannot be overemphasized. Cloud storage providers are able to encrypt data using encryption algorithms and the data is then placed in cloud storage.

The fundamental difference between cloud encryption and in-house encryption is that cloud customers must take time to learn about the provider's policies and procedures for encryption and encryption key management in order to ensure that encryption is in league with the level of sensitivity of the data being stored.

With Network-level encryption you are able to apply crypto services at the network transfer layer above the data link level but below the application level. The implementation of network encryption is facilitated through Internet Protocol Security (IPsec) as a set of protocols and authentication methods developed for data protection just at the dawn of the Internet, which is a set of open Internet Engineering Task Force (IETF) standards that, when used in conjunction, design a structure for private transmission over IP systems.

This is based on the quantum mechanical properties of particles to protect data. Going by the Heisenberg uncertainty principle which posits that the two identifying properties of a particle its location and its momentum cannot be measured without changing the values of those properties, quantum cryptography is strongly positioned to ensure the security of your data.

For this reason, its practically impossible to copy any quantum-encoded data since any attempt to access the encoded data will change the data. This will raise a red flag and the authorized parties to the encryption will be notified of the attempted breach.

E2EE ensures that any data being sent between two parties cannot be viewed by an attacker who may have one way or the other intercepted the communication channel. However, the use of an encrypted communication circuit, as provided by Transport Layer Security (TLS) between web client and web server software, is not always enough to ensure E2EE.

You should ensure that the actual content you are transmitting is encrypted by client software before being passed to a web client and decrypted only by the recipient. Examples of messaging apps that provide E2EE include Facebook's WhatsApp and Open Whisper Systems' Signal.

Its also possible for Facebook Messenger users to get E2EE messaging with the Secret Conversations option.

Looking at this succinctly from all angles, what the government is trying to do maybe for the intended good of the populace with encryption backdoors will clearly and overwhelmingly jeopardize the privacy and security of everyone. They should ponder on the gravity of cybercriminals exploiting these same backdoors they are clamoring for.

Without encryption backdoors, the cybercrime situation is barely containable as it stands. What will the scenario look like if we open up our last line of defense to them?

And this is exactly what we shall obtain. The risks are of mammoth proportions.

Original post:
Encryption Backdoors: The Achilles Heel to Cybersecurity? - Techopedia

Best Statistical Encryption Software Market Executive Summary, Introduction, Sizing, Analysis and Forecast to 2027 | Top Key Players: Microsoft,…

A new statistical report titled Encryption Software Market has been recently published by Research N Reports to its massive database which helps to make informed decisions in the businesses. This report provides strategists, marketers and senior executives with the critical information needed to evaluate the global market sector. This report provides targeted customers with a fresh look into the market and to fill the knowledge through processed information and opinions of specific industry experts. Comprehensive data on expanded investment in the commercial phase is there in the report.

Ask for sample copy of this Report @ https://www.researchnreports.com/request_sample.php?id=167037

Profiling Key players: Microsoft, Sophos, Checkpoint Software Technologies, Trend Micro, Symantec Corporation, IBM Corporation, Sas Institute, Intel Corporation, Emc Corporation, Winmagic and others.

Encryption Software Market by Key Product Type:

Encryption Software Market by Application Type:

The study objective is to present the developments of the Encryption Software Market operating in global regions such as North America, Latin America, Asia-Pacific, Europe, and India. To understand the existing structure of the successful industries various top key players have been profiled in this market comprises of an in-depth assessment of this particular sector. Stakeholders, operators, and field marketing executives seek to understand profitability in the marketplace and to address profitability equities such as market potential, size, market share, and market characteristics segmentation, breakdown by region, competitive landscape and growth in order to increase yields.

Ask for a discount on this report @ https://www.researchnreports.com/ask_for_discount.php?id=167037

Key questions answered through this research report:

Conclusively, it offers a far-reaching outline of the global Encryption Software Market sector in different key regions over the forecast period. Various promoting channels and methodologies are also explained in detail for a better understanding of the market. It offers facts and figures of the market to understand the market clearly. The Research Insights sheds light on the behavioral aspects of global companies.

Major Points Covered in Table of Contents:

Continue for TOC

For more information ask our experts @ https://www.researchnreports.com/enquiry_before_buying.php?id=167037

If you have any special requirements, please let us know and we will offer you the report as per your requirements.

About Research N Reports:

Research N Reports is a new age market research firm where we focus on providing information that can be effectively applied. Today being a consumer-driven market, companies require information to deal with the complex and dynamic world of choices, where relying on a soundboard firm for your decisions becomes crucial. Research N Reports specializes in industry analysis, market forecasts and as a result getting quality reports covering all verticals, whether be it gaining perspective on current market conditions or being ahead in the cutthroat global competition. Since we excel at business research to help businesses grow, we also offer to consult as an extended arm to our services which only helps us gain more insight into current trends and problems. Consequently, we keep evolving as an all-rounder provider of viable information under one roof.

Contact:Sunny Denis(Sales Manager),(Research N Reports)10916, Gold Point Dr,Houston, TX, Pin 77064,+1 510-402-1213,sales@researchnreports.comwww.researchnreports.com

Link:
Best Statistical Encryption Software Market Executive Summary, Introduction, Sizing, Analysis and Forecast to 2027 | Top Key Players: Microsoft,...

US Lawmakers Seeking to Ban Companies From Using End-to-End Encryption With a New Draft Bill – Bitcoin Exchange Guide

US lawmakers and the Department of Justice are looking to ban end-to-end encryption, making Internet users vulnerable to a host of attacks on their privacy from both malicious hackers and from the government.

Attorney General William Barr along with Sen. Senator Richard Blumenthal (D-CT) and Sen. Lindsey Graham (R-SC) seeking to ban companies from using end-to-end encryption with a new draft bill called Eliminating Abusive and Rampant Neglect of Interactive Technologies (or EARN IT) Act.

If companies do not follow the practices set by a national commission, that would be comprised of 15 people and led by Barr himself, the act would make them liable in state criminal cases and civil lawsuits over child abuse and exploitation.

The ban, however, is potentially unconstitutional under the First, Fourth, and Fifth Amendments, said Riana Pfefferkorn, a member of the Stanford Law Schools Center for Internet and Society.

If passed, the law would also require companies like Telegram to allow backdoor government access to encrypted information.

Bitcoin bull and Fundstrats Tom Lee also said it would have some negative impact on crypto and digital assets which are grounded by cryptography.

Barr claimed to want to protect the children by this move. Last week, at the White House Summit on Human Trafficking, Barr said encryption was aiding human traffickers.

We live in a digital age, and like everyone else, human traffickers are relying increasingly on digital communication and the Internet and more and more, the evidence we rely on to detect and to deal with these predators is digital evidence.

However, increasingly, this evidence is being encrypted.

Barr said that while encryption is important to protect consumers from cybercriminals, military-grade encryption means they cant get access to this data. He said,

We just cant have chat rooms and websites that are involved in grooming children victims or selling trafficked women sites that are impenetrable to law enforcementand we have to do something about this.

Previously Barr said that technology companies using end-to-end advanced encryption are effectively turning devices into law-free zones.

Brett Max Kaufman, a senior staff lawyer in the Center for Democracy at the American Civil Liberties Union is in opposition to this as he said,

Encryption reliably protects consumers sensitive data.

There is no way to give the F.B.I. access to encrypted communications without giving the same access to every government on the planet. Technology providers should continue to make their products as safe as possible and resist pressure from all governments to undermine the security of the tools they offer.

A similar Act was passed in Australia. The Assistance and Access Act in late 2018 was passed that gives Australian authorities and agencies the power to compel technology companies and their employees to provide access to encrypted data.

The Act was widely criticized for undermining the security of encryption and potential abuse of the new powers. During the second half of last year, 18 technical requests were issued. Assistant minister for cybersecurity Tim Watts said last year,

It was a failure of parliamentary process, a failure of bipartisanship on national security and a failure of the Morrison government to keep its word. Since then, Australias technology sector, particularly our cyber security sector, has been paying the price of these failures. Labor is acting to right these wrongs.

Now, the amendments to the Act are being debated in the Senate.

See the article here:
US Lawmakers Seeking to Ban Companies From Using End-to-End Encryption With a New Draft Bill - Bitcoin Exchange Guide

United States: a invoice towards end-to-end encryption? – Sahiwal Tv

Representatives of the Senate and the Department of Justice from the United States seem like preventing head-to-head towards encryption messaging. Behind the noble trigger of kid safety, hides a large-scale liberticide threat, as solely the United States has the key.

According to the ZeroHedge web site, the legal professional common William Barr on the one hand, and the senator Lindsey Graham alternatively, each want prohibit full encryption from sender to recipient messages despatched through purposes comparable to WhatsApp, iCloud or Telegram.

"Although we use encryption to improve cybersecurity, we must ensure that we maintain the ability to legally access data and communications when necessary to respond to criminal activity. " William Barr

The drawback of making such again doorways, is that theyd contain a " grasp key " (or " golden key ") From decipherment. And who might guarantee us that this grasp key wont be used for dangerous actions, comparable to monitor conversations political dissidents, or leaders of huge overseas corporations? Not to say hackers who handle to get their fingers on it: it could give new that means to the expression "a treatment worse than the illness".

With the assist of senators Lindsey Graham and Richard Blumenthal, Barr needs to introduce a regulation known as EARN IT Act ".

Acronym for " An Act to get rid of extreme and common neglect of interactive applied sciences "(Just that!), It goals to make criminally accountable corporations in instances of kid abuse and exploitation, if these courier corporations dont transmit any proof associated to suspected customers.

A sneaky manner drive them to supply these well-known backdoors of their purposes (usable by all those that can have the gold key, whether or not theyre "good" or "bad"). And this might additionally, subsequently, additionally concern the case of nationwide safety pointsDo you see the wolf coming from afar?

In addition to the apparent threats to particular person freedoms, and the dangers of cybersecurity, such a regulation would even have implications eminently adverse for the cryptosphere.

Indeed, blockchain networks function on of the trade of worth and knowledge primarily based on encryption, carried out from begin to end.

Financial analyst Thomas Lee of Fundstrat, Explain in addition to :

"(If this bill) becomes reality, it would have a negative impact on cryptography and digital assets".

These needs for hypersurveillance, which all the time begin from "good intentions", additional scale back the freedoms and the safety of privateness of the overwhelming majority of harmless people. All that continues to be is to hope that this regulation which guarantees to be double-edged solely stays on the undertaking stage.

Visit link:
United States: a invoice towards end-to-end encryption? - Sahiwal Tv