Heres How Homomorphic Encryption Will Bring A Revolution In Computer Security – Technology Zimbabwe

Encryption has many states. Theres encryption for data in transit which is typically encrypted using protocols such as HTTPS, SSL, TLS, FTPS. Data at rest which is data that is temporarily held in computer memory.

Traditional encryption methods can secure data in transit and data at rest but data in use -data being processed, held in memory or analyzed by software apps- has proven harder to encrypt without reduced functionality.

This is where Homomorphic encryption comes into play. According to CBS Insights the encryption method is creating new opportunities for secure internet processes:

Startups and corporates alike are leveraging it for private database comparison, search, cloud computing, and to prevent future cyberattacks

The encryption method has been touted as the answer for organizations that need to process information whilst simultaneously protecting privacy and security.

Homomorphic encryption makes it possible to analyze encrypted data without revealing the data to anyone. This is important because most other encryption methods required that data be decrypted before use which made the data vulnerable to whatever you were trying to avoid by decrypting in the first place.

For instance, when you search for a shop on the internet a lot of your data is shared with third parties:

With homomorphic encryption in place none of the above will be shared with third parties and they also wont be able to access what results we obtain from such searches.

Homomorphic encryption has huge potential in areas with sensitive personal data such as in financial services or healthcare when the privacy of a person is paramount. In these cases, homomorphic encryption can protect the sensitive details of the actual data, but still, be analyzed and processed.

The encryption method is suited to many use cases including:

The reason why homomorphic encryption isnt in widespread use yet is that the encryption method is still slow. According to HashedOut, this is because the method requires a larger computational overhead compared to other encryption methods.

When IBM released its HElib C++ library in 2016, the library reportedly ran 100 TRILLION times slower than plaintext operations (i.e other encryption methods). Theyve since made the library 75 times faster than it was but it is still painfully slow compared to less secure alternatives in the field of encryption.

If anything goes wrong, click here to enter your query.

See the original post here:
Heres How Homomorphic Encryption Will Bring A Revolution In Computer Security - Technology Zimbabwe

Ako Ransomware: Another Day, Another Infection Attacking Businesses – BleepingComputer

Like moths to a flame, new ransomware targeting businesses keep appearing every day as theyare enticed by the prospects of million-dollar ransom payments. An example of this is a new ransomware called Ako that is targeting the entire network rather than just individual workstations.

Ako was discovered yesterday when a victim postedin the BleepingComputer support forums about a new ransomware that had encrypted both their Windows 10 desktop and theirWindows SBS 2011 server.

After looking at the ransom note and the Tor payment site, it quickly became apparent that this was not a ransomwareinfection we had seen before.

Looking on VirusTotal, I was able to find an oldersample of the ransomwareand shared it with SentinelLab's Vitali Kremez who offered to help analyze it. Soon after, newer samples [1, 2] were found that allowed us to see a broader picture of how this ransomware works.

According to Kremez, who performed the analysis of the ransomware, Ako shares some similarities to MedusaLocker that has led people to call it MedusaReborn.

"This is the new ransomware-as-a-service offering under development with the version 0.5 that seems to be inspired by the Medusa Locker behavior including its anti-Windows behavior and registry mapped drive disable targeting and isolating specific machines for encryption," Kremez told BleepingComputer.

The ransomware operators confirmed this by telling BleepingComputer via email that the Ako ransomware is their own program.

"We see news about us. But that is wrong. About MedusaReborn. We have nothing to do with Medusa or anything else. This is our own product - Ako Ransomware, well, this is if you are of course interested."

To make matters worse, when we asked the ransomware operators if they are stealing data before encrypting, they told us "Yes, it's our job."

When started, Ako will first execute the following commands to delete shadow volume copies, clear recent backups, and disable the Windows recovery environment.

It will alsocreate the Registry valueEnableLinkedConnectionsunder theHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystemregistry key and set it to1. This is done to make sure mapped drives are accessible even in a UAC launched process.

The ransomware will now begin to encrypt files on the device.

When encrypting files, Ako will encrypt all files that do not match the ".exe,. dll, .sys, .ini, .lnk, .key, .rdp" extensions and whose paths do not contain the following strings:

When a file is encrypted, it will be renamed to and a randomly generated extension will be appended to the file name. For example, 1.doc would be encrypted and renamed to1.doc.Ci3Qn3 as shown below.

Appended to the contents of each file will also be aCECAEFBEfile marker that can be used to identify that this file was encrypted by Ako. This file marker can be seen in the hex editor of an encrypted file below.

During the encryption process, Ako will usethe GetAdaptersInfo function to get a list of network adapters and their associated IP addresses.

The ransom will then perform a ping scan of any local networks using the IcmpSendEcho function to create a list of responding machines.

Any machines that respond, will be checked for network shares to encrypt as well.

When the ransomware is finished, the encryption key used to encrypt the victim's files will itself be encrypted and stored in a file namedid.key on the victim's Windows desktop.

Also on the desktop will be a ransom note named ako-readme.txt. This note contains a URL to access the Ako Tor payment site in order to get payment instructions. This site is located athttp://kwvhrdibgmmpkhkidrby4mccwqpds5za6uo2thcw5gz75qncv7rbhyad.onion.

Note how the ransom note states that "Your network have been locked" to indicate they are targeting networks and not individual devices. When we asked the ransomware developers whether they target both both networks and individual workstations, they told BleepingComputer that they are "Only working on network."

Included in the ransom note is a 'Personal ID' that when decoded becomes a JSON formatted object containing the extension, encrypted key, network configuration setting, a subid most likely used for affiliates, and the ransomware's version. The version is currently at .5.

When a victim accesses the Tor site they will need to enter their personal ID to see the ransom demand and instructions.

This Tor payment site also includes a chat service and the ability to decrypt 1 file, which is a bit low as most ransomwareinfections allow the decryption of at least threefiles.

Unfortunately, in a brief analysis byID-Ransomware owner Michael Gillespie, the encryption method used by Ako appears to be secure.

If a weakness is discovered, we will be sure to post more information. For now, if you wish to discuss this ransomware or need help, you can use our Ako Ransomware Support & Help topic.

Furthermore, it is not known how this ransomware is distributedbut is most likely through hacked Remote Desktop services. If you are affected by this ransomware, we would be interested in learning how your network became infected.

Go here to read the rest:
Ako Ransomware: Another Day, Another Infection Attacking Businesses - BleepingComputer

Drive High Cagr By Global IoT Security Solution for Encryption Market Along With Top Key Players, and Types (Software Platforms, Service) -…

The recent rport on Global IoT Security Solution for Encryption market begins with a description of the product, definition, scope of product and classification, specifications and industry outlook. The report provides IoT Security Solution for Encryption market forecast period from 2020 to 2024. It includes a thorough analysis of IoT Security Solution for Encryption market growth factors, static data, the top manufacturers/major players, and geographical region-wise analysis. It analyses historical IoT Security Solution for Encryption market values to work on latest market needs and estimate future market propensity. It composes of development plans and policies of each and every IoT Security Solution for Encryption key players along with their manufacturing processes and distinct approaches used during the process.

The report consistently focuses on the competitive analysis of worldwide IoT Security Solution for Encryption market which disclose top competitors involved in selling and marketing of IoT Security Solution for Encryption market products. This report will give an elaborated and complete information to the readers of IoT Security Solution for Encryption market. It also serves an actual analysis of parent market of IoT Security Solution for Encryption industry with the help of past, present and future IoT Security Solution for Encryption market information. Which will be beneficial to take the decisive judgment of business on IoT Security Solution for Encryption market and increase the profit margin.

Get a sample of the report from https://www.orbisreports.com/global-iot-security-solution-for-encryption-market/?tab=reqform

Vital Regions that operate IoT Security Solution for Encryption market covers Latin America (Colombia, Argentina and Brazil), North America (Mexico, Canada and The United States), IoT Security Solution for Encryption market in Asia-Pacific (China, Japan, Korea, India and South-East Asia), Europe (UK, Russia, Germany and Italy), The Middle East and Africa (South Africa, UAE, Egypt and Saudi Arabia). Besides, production value and volume, IoT Security Solution for Encryption market share, IoT Security Solution for Encryption market value, import/export detailing, price/cost, IoT Security Solution for Encryption market growth analysis and SWOT analysis.

Leading Manufacturers of IoT Security Solution for Encryption market are:

Cisco SystemsIntel CorporationIBM CorporationSymantec CorporationTrend MicroDigicertInfineon TechnologiesARM HoldingsGemalto NVKaspersky LabCheckPoint Software TechnologiesSophos PlcAdvantechVerizon Enterprise SolutionsTrustwaveINSIDE Secure SAPTC Inc.AT&T Inc.

Different product types include:

Software PlatformsService

worldwide IoT Security Solution for Encryption industry end-user applications including:

HealthcareInformation Technology (IT)TelecomBankingFinancial Services, And Insurance (BFSI)AutomotiveOthers

For more Information or Ask for discount @ https://www.orbisreports.com/global-iot-security-solution-for-encryption-market/?tab=discount

Detailed information about IoT Security Solution for Encryption market opportunities, growth, prohibiting and risk study. Furthermore a complete analysis of existing and emerging markets IoT Security Solution for Encryption market segments. Leading market IoT Security Solution for Encryption players are present in the report. The advance IoT Security Solution for Encryption market tendencies, strategies, and technologies have accelerated number of enterprise models and corporations across the globe. The correct arrangement of IoT Security Solution for Encryption market is done on the basis of segments, market size, and share. The data serves in this research IoT Security Solution for Encryption report is not only descriptive in terms of quantity but also quality. Each and every IoT Security Solution for Encryption information collected from secondary sources are cross-examined several times during paid primary interviews and industry professional expertize.

The research methodology of IoT Security Solution for Encryption market includes not only primary but also secondary research information sources. It carries out distinct factors affecting IoT Security Solution for Encryption industry such as market environment, various government policies, historical data, and latest trends, technological advancement, future innovations, market risk factors, market restraints, challenges, opportunities and any technical evolution in IoT Security Solution for Encryption industry. Research analysts initially collect the data from distinct trivial IoT Security Solution for Encryption information sources such as financial reports of the company, internet, magazines and IoT Security Solution for Encryption research reports.

Click here to see full TOC https://www.orbisreports.com/global-iot-security-solution-for-encryption-market/?tab=toc

Later, the fetched IoT Security Solution for Encryption market data is verified and justified to assure its quality. various quality testing techniques are used to ensure its quality of IoT Security Solution for Encryption market. They are approved by attending, conducting and direct interviews and questionnaires with IoT Security Solution for Encryption companys CEO, market main opinion leaders, market experts and industry executives. At the end, the data is represented in a pictorial way in the form of tables, bar graphs, pie-charts and figures format. Different paths are used to collect data about IoT Security Solution for Encryption market size covers top-down and bottom-up approach. Resulting part of the IoT Security Solution for Encryption report gives a list of manufacturers/distributors, information sources, research findings, and addendum.

About Us:

Orbis Reports is a frontline provider of illustrative market developments and workable insights to a wide spectrum of B2B entities seeking diversified competitive intelligence to create disruptive ripples across industries. Incessant vigor for fact-checking and perseverance to achieve flawless analysis have guided our eventful history and crisp client success tales.

Orbis Reports is constantly motivated to offer superlative run-down on ongoing market developments. To fulfill this, our voluminous data archive is laden with genuine and legitimately sourced data, subject to intense validation by our in-house subject experts. A grueling validation process is implemented to double-check details of extensive publisher data pools, prior to including their diverse research reports catering to multiple industries on our coherent platform. With an astute inclination for impeccable data sourcing, rigorous quality control measures are a part and parcel in Orbis Reports.

Follow this link:
Drive High Cagr By Global IoT Security Solution for Encryption Market Along With Top Key Players, and Types (Software Platforms, Service) -...

Proposed changes to intermediary guidelines will put digital India’s future at risk: ISOC – MediaNama.com

The content filtering requirements in Indias proposed intermediary guidelines to curb online misinformation and illegal content, will put the security of the Internet and its users, and the future of a digital India at greater risk, the Internet Society (ISOC) said in an open letter to Indias IT Minister Ravi Shankar Prasad. The letter, which has 27 signatories, said that making intermediaries liable for monitoring communications would limit the use of end-to-end encryption and encourage others to weaken existing security measures. ISOC has also urged the Ministry of Electronics and Information Technology (MeitY) reconsider the current proposed amendments and protect Indias Internet economy and users, by supporting the use of end-to-end encryption.

Traceability requirement will weaken everyones security: End-to-end encrypted communication platforms, such as WhatsApp and Signal, cannot provide the level of monitoring required in the proposed amendments. Under the current proposed amendments to the rules, intermediaries must enable tracing of the originator of the information on their platform.

Whether its through putting a backdoor in an encryption protocol, storing cryptographic keys in escrow, adding silent users to group messages, or some other method, there is no way to create exceptional access for some without weakening the security of the system for all. ISOC in the open letter.

Apart from protecting people and the economy on the Internet, encryption also secures web browsing, online banking, and critical public services like e-government services, electricity, hospitals and transportation, the letter said. It added that more than 400 million people in India use end-to-end encrypted messaging services for communicating, and engaging in business.

As the Intermediaries Guidelines highlights, intermediaries should take all reasonable measures to secure [their] computer resources and information contained therein. ISOC in the open letter.

Current proposals will affect Indian companies as well: The letter said that the proposed amendments might reduce the trust that consumers have on Indian products. It said that Indian companies might feel compelled to weaken strong encryption on their services or fail to implement the technology at all. This would, in turn, jeopardise the success of Indian products and services globally.

India has the potential to be a world leader in the global digital economy, but only if consumers trust the products and services provided by its companies. In a global market, trust can make or break a decision to go with an Indian product or service, rather than a well-established competitor from North America or Europe. ISOC in the open letter.

Wikimedia Foundation has also expressed concerns on the proposed changes: This open letter comes days after the Wikimedia Foundation, the non-profit group that operates Wikipedia, had written to the IT Minister expressing concerns over the impact the proposed amendments would potentially have on Wikipedias open editing model. The Foundation had urged MeitY to make the latest changes to intermediary rules public and seek comments from concerned stakeholders.

Read this article:
Proposed changes to intermediary guidelines will put digital India's future at risk: ISOC - MediaNama.com

Encryption Software Market Size, Top Companies, Business Opportunities and Growth 2020 to 2027 – Pro News Time

New Jersey, United States, The recent report added by Verified Market Research gives a detailed account of the drivers and restraints in the Encryption Software Market. The research report, titled [Encryption Software Market Research Report 2020] presents a comprehensive take on the overall market. Analysts have carefully evaluated the milestones achieved by the global Encryption Software market and the current trends that are likely to shape its future. Primary and secondary research methodologies have been used to put together an exhaustive report on the subject. Analysts have offered unbiased outlook on the global Encryption Software market to guide clients toward a well-informed business decision.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

Request a Sample Copy of this report @https://www.verifiedmarketresearch.com/download-sample/?rid=1826&utm_source=PNT&utm_medium=007

Top 10 Companies in the Global Encryption Software Market Research Report:

Global Encryption Software Market: Competitive Landscape

Competitive landscape of a market explains strategies incorporated by key players of the market. Key developments and shift in management in the recent years by players has been explained through company profiling. This helps readers to understand the trends that will accelerate the growth of market. It also includes investment strategies, marketing strategies, and product development plans adopted by major players of the market. The market forecast will help readers make better investments.

Global Encryption Software Market: Drivers and Restrains

This section of the report discusses various drivers and restrains that have shaped the global market. The detailed study of numerous drivers of the market enable readers to get a clear perspective of the market, which includes market environment, government policies, product innovations, breakthroughs, and market risks.

The research report also points out the myriad opportunities, challenges, and market barriers present in the Global Encryption Software Market. The comprehensive nature of the information will help the reader determine and plan strategies to benefit from. Restrains, challenges, and market barriers also help the reader to understand how the company can prevent itself from facing downfall.

Global Encryption Software Market: Segment Analysis

This section of the report includes segmentation such as application, product type, and end user. These segmentations aid in determining parts of market that will progress more than others. The segmentation analysis provides information about the key elements that are thriving the specific segments better than others. It helps readers to understand strategies to make sound investments. The Global Encryption Software Market is segmented on the basis of product type, applications, and its end users.

Global Encryption Software Market: Regional Analysis

This part of the report includes detailed information of the market in different regions. Each region offers different scope to the market as each region has different government policy and other factors. The regions included in the report are North America, South America, Europe, Asia Pacific, and the Middle East. Information about different region helps the reader to understand global market better.

Ask for Discount @https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=PNT&utm_medium=007

Table of Content

1 Introduction of Encryption Software Market

1.1 Overview of the Market 1.2 Scope of Report 1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining 3.2 Validation 3.3 Primary Interviews 3.4 List of Data Sources

4 Encryption Software Market Outlook

4.1 Overview 4.2 Market Dynamics 4.2.1 Drivers 4.2.2 Restraints 4.2.3 Opportunities 4.3 Porters Five Force Model 4.4 Value Chain Analysis

5 Encryption Software Market, By Deployment Model

5.1 Overview

6 Encryption Software Market, By Solution

6.1 Overview

7 Encryption Software Market, By Vertical

7.1 Overview

8 Encryption Software Market, By Geography

8.1 Overview 8.2 North America 8.2.1 U.S. 8.2.2 Canada 8.2.3 Mexico 8.3 Europe 8.3.1 Germany 8.3.2 U.K. 8.3.3 France 8.3.4 Rest of Europe 8.4 Asia Pacific 8.4.1 China 8.4.2 Japan 8.4.3 India 8.4.4 Rest of Asia Pacific 8.5 Rest of the World 8.5.1 Latin America 8.5.2 Middle East

9 Encryption Software Market Competitive Landscape

9.1 Overview 9.2 Company Market Ranking 9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview 10.1.2 Financial Performance 10.1.3 Product Outlook 10.1.4 Key Developments

11 Appendix

11.1 Related Research

Request Customization of Report @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=PNT&utm_medium=007

Highlights of Report

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne Fernandes Call: +1 (650) 781 4080 Email: [emailprotected]

More here:
Encryption Software Market Size, Top Companies, Business Opportunities and Growth 2020 to 2027 - Pro News Time

Bitcoin Goes Ballistic After Breaking Through $8,000 Level

(Bloomberg) --

Bitcoin climbed to the highest since November after breaching the $8,000 price level.

Concerns about an escalation in the conflict between the U.S. and Iran are seen as contributing to the rally in Bitcoin, which is not managed by a government.

Bitcoin and gold are well supported due to rising tensions between the U.S. and Iran, said Emmanuel Goh, who runs crypto derivatives tracker Skew. Professional investors are also back from the Christmas break and starting to deploy capital -- this is called the January effect in the stock market.

The worlds largest cryptocurrency rose as much as 7.3% to $8,128 in New York trading, the biggest one-day increase since Dec. 18.

Bloomberg Intelligence strategist Mike McGlone expects Bitcoin to draw support this year because of its fixed supply and greater adoption.

Volatility should continue to decline, as we expect $6,000 to mark this years key support and $10,000 to hold resistance, McGlone wrote in a note Tuesday.

To contact Bloomberg News staff for this story: Olga Kharif in Portland at okharif@bloomberg.net

To contact the editors responsible for this story: Jeremy Herron at jherron8@bloomberg.net, Dave Liedtka, Andrew Dunn

For more articles like this, please visit us at bloomberg.com

2020 Bloomberg L.P.

Link:
Bitcoin Goes Ballistic After Breaking Through $8,000 Level

Bitcoin: The Next Level – Forbes

Photo Illustration by Avishek Das

Recent events have rallied bitcoin, spiking the cryptocurrency more than 20%. As the Iran/U.S. situation cools, so does the bitcoin price.

Its easy to predict various scenarios on the basis of pure speculation, but that kind of guessing is hard to turn into reliably profitable positions.

Bitcoin (BTC) is still in a bear trend. This might be hard to believe because the price has been so strong but Bull and Bear markets are easy to understand when you have the key. This is the key:

Price movements during a bull trend and a bear trend

Bear markets spike up and slide down, bull markets slide up and slump down. As such the recent rally is in a bear market trend.

Here is the master chart for bitcoin:

The master chart for Bitcoin

The recent high is bang on the trend top of the current bear market. You can see this trend extended by me below, in a previous analysis drawn up before Christmas 2019. (You can see the price on the day on the right axis label.) These predictions have panned out pretty well.

The Bitcoin trend before Christmas

And again in December:

The trend in December

This bear trend is still securely in place. However, I think its fair to say charts do not predict the unknown, unknowns. Trends are just ranges of price created by volatility and that volatility in this bear phase is fairly constant. This bear channel defines the range of prices that the current state of the markets can give bitcoin depending on what events come out of the soup of unresolved situations. Iran, China, Hong Kong, North Korea are all factors as are others and their possible impact and their probabilities are rolled into todays price and its historical range.

But what next? Time looks to be running out on this Bear.

The bear trend may be running out

2020 is going to have plenty of general volatility and this will push bitcoin upwards. This will come as a function of the presidential election, with all the global political trolls trying to get their leverage on in the run-up. Then there is thehalvening.

If BTC breaks out of this bear channel it will fly. It wont take much.

Meanwhile, Bitcoin Bulls should dollar cost average in. Bitcoin is a instrument where if you dont know which way it going, you should steer clear of it because one thing is certain whichever direction it goes, its going to be a wild ride and unless you are very sure of your position, you will get shaken out.

Meanwhile, my eyes are onHong Kong. Once the U.S./China trade deal (Part 1) is signed the gloves may well come off in China. Big trouble in Hong Kong will certainly spike BTC.

Clem Chambers is the CEO of private investors websiteADVFN.com, author of 101 Ways to Pick Stock Market Winners and Trading Cryptocurrencies: A Beginners Guide and the 2018 winner of Journalist of the Year in the Business Market Commentary category in the State Street U.K. Institutional Press Award.

Continued here:
Bitcoin: The Next Level - Forbes

Is Bitcoin in 2020 Really Like the Early Internet? – CoinDesk

Its a cliche at this point to compare bitcoin to the early days of the internet, since they are both examples of emerging technologies.

But does the cliche actually hold true?

If we work with a vague definition of the World Wide Web going live in 1991, then within the first decade that ecosystem grew faster and had more demand for compliant use cases than bitcoin arguably has today, one decade in.

In 1994, the New York Times reported that companies were rushing to set up shop via the World Wide Web, although the user experience was still slow and crude. Just like blockchain technologists, early internet companies ran into scaling issues. The 1994 Times report described the web as already showing signs of suffering from its own success, as crowds compete for access to popular databases. Yet people were already starting to think about subscription paywalls for content distribution.

Industry insiders were so bullish on the commercial potential that in the December 1995 issue of Wired magazine, Sun Microsystems CEO Scott McNealy predicted the rise of disposable word processors and spreadsheets priced per use and delivered via Java software.

Within the first decade it was clear the internet could be used for commerce, interpersonal communications, marketing and education. There were established companies using it to turn a modest profit.

Blockstream alumnus and founder of the Blockchain Commons, Christopher Allen, said he is concerned about the lack of bitcoin adoption at this stage, which is why he is so optimistic about scaling solutions like the lightning network.

Lightning does have the potential to be where you buy your steak and bread, Allen said. Until you buy your bread or steak with bitcoin, youre going to have to convert to some other currency, no matter how good it is as a censorship-resistant medium.

To be fair, cryptocurrency has already proven its usefulness through cross-border collaboration. For example, the Decred treasury has distributed roughly $3.5 million worth of cryptocurrency to more than 60 contributors, according to the communitys press representative. Roughly 30 percent of these contributors hail from Latin America and 15 percent are from Africa, a more global distribution than comparable Silicon Valley startups.

Even so, such experiments are a far cry from the mainstream adoption many fans predict bitcoin will undergo in becoming a global, self-sustaining currency.

Community roots

Bitcoin may be behind the internets timeline in terms of commercial use cases, but it has already achieved comparable social functions.

By 2001, the New York Times was describing internet services like email as a platform for relationship-building with former coworkers and classmates, while startups pioneered video and music streaming services.

One such Yahoo group reportedly included 600 people exchanging hundreds of messages a month about the bankruptcy proceedings, health insurance and the fate of their retirement plans. This may be comparable to crypto communities today, which rely on forums, GitHub and social networking platforms like Twitter.

According to Allen, who focused earlier in his career on core internet protocols, the internet was also designed to offer more freedom of choice to the users even though, through big-tech consolidation, the industry eventually failed to reach that vision.

Zcash co-creator and Electric Coin Company CEO Zooko Wilcox agreed that the early software projects he worked on were supposed to offer freedom and end wars, because people would just talk things out over the internet.

Wilcox said, looking back at his time in the 90s working on bitcoins predecessor, Digicash, that he idealistically underestimated the importance of economic incentives.

What I would tell myself, if I could use a time machine, is just being compatible isnt good enough, Wilcox said. This was a fatal flaw in the overall design of the [open software] movement, that is relied on ongoing volunteers or donations. It didnt have a built-in economic feedback loop.

In this regard, bitcoin has a great track record during this first decade. Yet it remains to be seen if bitcoins ecosystem provides a self-sustaining model.

Similar risks

Some coders believe early advocacy for strong legal frameworks that protect freedom, coupled with forward-thinking precautions, could help the decentralized Web3 avoid or minimize early mistakes.

Protocols would have a lot of flexibility in terms of what types of security you need, etc., and along the way we ended up creating the central Certificate Authority (CAs) business not quite realizing that 20 years later all the CAs all got consolidated, Allen said. We were supposed to be able to choose which CA we trusted. Centralization crops up in odd ways.

Marco Peereboom, a Dell alumnus and Linux veteran who is also currently the Decred communitys New Systems Development Lead, agreed with Allen that the internet was built by idealistic young men who wanted to uplift humanity. (Not unlike crypto adherents today.)

Im extremely disappointed with where we are today, Peereboom said. The amount of snooping the government is doing, I didnt anticipate. More cryptography early on would have done the internet a lot of good, and more advocacy as well.

Along these lines, Allen is focused on work related to user-friendly-yet-secure key management and blockchain identity standards. Meanwhile, Peereboom is working to refine Decreds open source funding experiments, which is how he earns a salary today.

Much like the altcoin project Dash, Decred pays freelancers through public votes and grants collected from the network itself. Plus, Decred developers can earn money anonymously based on the merits of their contributions.

Until the internet moves away from the ad-sponsored model, it will only get worse, Peereboom said, referring to potential surveillance and corporate dominance via upcoming Web3 models.

I think anonymous payments are a must-have feature for any cryptocurrency to be around, he said. I hope Im not making the same mistake twice. But I really do believe cryptocurrencies have the potential to change the world.

Beyond bitcoin

From the perspective of veteran bitcoiners like Peereboom, many of whom are now focused on altcoin projects, bitcoins weakness is how difficult it is to update the software.

He said there must be a middle ground between constant changes and nearly impossible changes.

Writing bug-free software just doesnt happen, Peereboom said. You need a mechanism to deal with consensus changes.

Plus, bitcoiners like Peereboom and Wilcox are both prioritizing the privacy-enhancing aspects of cryptocurrency. Is it possible for governance mechanisms to resist centralization over several decades? Thats what Wilcox is trying to figure out.

It would be dishonest and overselling to tell people this is inevitable, Wilcox said.

He added Linux failed, in his opinion, because the movement redefined success to match corporate adoption rather than broader social change. As larger institutions profit from or leverage bitcoin, just like with the internet, the risks to users personal freedoms increase.

Theres going to be a lot of challenges along the way, and harm. Id like to mitigate the harm as much as possible, Allen concluded.

The leader in blockchain news, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups.

See original here:
Is Bitcoin in 2020 Really Like the Early Internet? - CoinDesk

2019 Bitcoin Transaction Volume Moved Away From US in First Since 2013 – Cointelegraph

For the first time since 2013, the U.S. is no longer the top recipient of Bitcoin (BTC) as valued in USD, as Singapore took the lead over the course of 2019.

As of Dec. 5, 2019, global users sent BTC valued at $8.58 billion to Singapore in 2019, according to analytics site Crystal Blockchain. Users in Singapore received more dollars via Bitcoin last year than anywhere else in the globe.

The U.S. held the top spot from 2014 to 2018 but slipped to 2nd place, receiving $7.46 billion in BTC, per Crystal Blockchains data.

Singapore, however, did not send the most money via Bitcoin last year. Island country and BitMEX host site the Seychelles sent the greatest USD amount of Bitcoin in 2019, valued at $10.07 billion and holding the second spot on the list for overall transaction volume, according to Crystal Blockchains data.

The U.S. came in third overall on the list of Bitcoin transaction volume a tumble for the country considering it previously held the top spot for five consecutive years. In 2013, the United Kingdom saw the most money flowing in and out via Bitcoin.

Many top exchanges in the crypto space have found homes in countries outside the U.S. and the European Union, which host notoriously stringent regulations.

Crypto derivatives giant BitMEX operates its headquarters out of the Seychelles, the site of the most Bitcoin value outflow in 2019. Binance is also located in Malta.

Still, several large exchanges have retained their position on U.S. soil, including Coinbase, Kraken and Gemini, with Binance also setting up a regulation-sensitive branch in the country.

Earlier this month, Singapore-based crypto exchange Bibox announced plans to delist crypto asset XRP from its platform, according to Cointelegraphs reporting.

View post:
2019 Bitcoin Transaction Volume Moved Away From US in First Since 2013 - Cointelegraph

Teslas Elon Musk Teases Bitcoin Community With Tongue-In-Cheek Tweet – Forbes

Elon Musk, the busy chief executive of both electric car maker Tesla and space exploration group SpaceX, still finds time to troll on Twitterwith the bitcoin and cryptocurrency community a regular target.

Musk, who often generates headlines with his Twitter account by posting both memes and serious news about his businesses, has previously praised joke bitcoin-rival dogecoin and discussed the second most valuable cryptocurrency, ethereum, on the site.

Now, the bitcoin and cryptocurrency community, many of whom are still pondering bitcoin's latest roller-coaster, have been left scratching their heads after Musk tweeted "bitcoin is not my safe word," early on Friday morning.

Elon Musk made his fortune from payments company PayPal before setting up Tesla and SpaceX. Musk has ... [+] previously used micro-blogging platform Twitter to praise bitcoin and other major cryptocurrencies.

Bitcoin and cryptocurrency watchers follow the likes of Elon Musk and Twitter's Jack Dorsey closely, with many hopeful the next wave of bitcoin and crypto adoption will come on the back of uptake from Silicon Valley's biggest technology companies.

In December, Dorsey, who like Musk heads up two U.S.-listed companies, revealed he plans to spend time in Africa this year and wants to help develop bitcoin and crypto businesses there.

Musk has, however, indicated he won't be getting into cryptocurrency directly. Musk has calledbitcoins structure "quite brilliant," though at the same time poured cold water on suggestions Tesla could get into the bitcoin businesses.

Last year, Musksurprised the bitcoin and cryptocurrency community by saying that the meme-based dogecoin is his "fav" cryptocurrency, even ahead of original cryptocurrency bitcoin.

When Musk tweeted the word "ethereum" last year he quickly followed it up by tweeting "jk"thought to be an attempt at preventing Twitter from suspending his account, which has previously been locked after tweeting about cryptocurrencies due to bitcoin and cryptocurrency give-away scammers using his name and likeness.

The bitcoin price has struggled since hitting highs of around $14,000 in early July last year.

Meanwhile, shares in Tesla have soared this week, with its market value now topping the combined value of U.S. rivals Ford and General Motors and landing it the title of the highest-valued automaker of all time.

The sharp rise in Tesla's valuation, which has doubled since October, comes after it revealed a surprise third-quarter profit and delivered a record 367,500 cars in 2019.

See the article here:
Teslas Elon Musk Teases Bitcoin Community With Tongue-In-Cheek Tweet - Forbes