Bitcoin Price in 2020: Bloomberg Analyst Predicts That $10,000 Is More Likely Than $5,000 – U.Today

The HEX token project came to existence in early December this year. It calls itself a DLT certificate of depositwith yields over the Ethereum chain.

The website of the project does not provide any specific description of details how the technology works. However, it promises fast and large profits and says that the more people participate the better it will be for all investors.

Image viahex.win

Fast and large yields promised and calls to preach the Gospel to new participants have always been immediate signs of a scam.

Now, the founder of IOTA, David Sonstebo, the Weiss Ratings agency and other crypto community members say the same. Roger Ver is going against the flow, though.

In an exclusive interview with U.Today, which is to be published next week, Mr Sostenbo touched upon the topic of scams in the crypto industry, saying that he would like more attention to be drawn to them in the media. What he said was:

The ones that deserve attention are actually the bad ones. I would like to see more attention shed on the obvious scams in this space, like the HEX project by Richard Heart or this crazy token that just appeared the other day called MINDOL with something like 15,000 percent increase, which is an obvious scam.

One of the biggest and influential financial agencies, Weiss Ratings, has also drawn attention to HEX in its recent tweet, saying that it has one big issue half of it which is distributed to token holders goes to a single account, called the Origin Address.

It adds that the main purpose of creating HEX is to enrich those who created it, not its investors.

The other day, the price of HEX token dropped 99 percent (from 3,000 Satoshis to just 3).

A HEX promoter Trevon James has recorded a video to clam down the investors, saying 'you did not lose your money but technically it looks like you've lost your money'.

Members of the crypto community started heated discussions all over Twitter, pointing out that $5.2 mln in Ethereum has been sent to HEX already.

The former Bitcoin JesusRoger Verhas recently listed the token on its Bitcoin.com exchange and gave it a personal endorsement, as U.Today reported earlier.

His major argument for the support of the project that a lot of people call a scam is:

Don't like something? Don't buy it. Have something you don't like? Sell it.

Continued here:

Bitcoin Price in 2020: Bloomberg Analyst Predicts That $10,000 Is More Likely Than $5,000 - U.Today

Stone Bitcoins and Echoes From the Past – Coindesk

The best Sundays are for long reads and deep conversations. This time we're reflecting on the past and taking a deeper look at one of the most interesting blockchain allegories that doesn't involve technology at all

Don't have time to listen? Partial transcript below (Stone Bitcoins segment only)

More ways to Listen or Subscribe.

In the midst of the biggest bubble to date, deep in the "then they laugh at you" phase, and with the China narrative rising for the first time as trade volumes overtook the rest of the world, Adam B. Levine was joined by Stephanie Murphy and Andreas M. Antonopoulos in early 2014 for a conversation that is very different, yet somehow the same as they react in real time to all-time high prices of $220...

But first, In the nearly seven years since they started talking Bitcoin, Adam's favorite segment from his favorite writer is without question, "the Island of Stone Bitcoins" by then-LTB managing editor George Ettinger. Bitingly funny and still one of the easiest ways to accurately explain how blockchains and tokens work without the need for technology at all, this segment is not to be missed.

Let's Talk Bitcoin! #421 is sponsored by Brave.com and eToro.com, and is distributed in partnership with CoinDesk.com

SO YOU'VE DECIDED TO TELL SOMEBODY ABOUT BITCOIN.

I, for one, am glad to hear it. You have my congratulations and respect; explaining Bitcoin is a noble endeavor. Other noble endeavors include bathing a leper, manually clearing blockage from a constipated mule, and applying for anything involving the words "phase one human clinical trials."

My point is you're doing something that is highly necessary and will ideally make the world a better place in the grand scheme. In the immediate future, however, you will be miserable. You will be miserable, tired, and will really wonder how anything good could come of this. Bitcoin does not lend itself to casual explanation or to convenient metaphor.

In fact, very few comparisons even suit it! It's a currency but it works like a commodity. It's mined in limited quantities, so... it's almost like gold! ...except it's created at an exact, fixed rate and will end at an exact, fixed point. So, not like gold. The work of 'mining' doesn't really 'accomplish' anything, either.

Bitcoin is a trainwreck of anachronisms to have to dump on any unsuspecting novice, and horrible pseudo-words like 'blockchain' and 'hashcash' just make it sound more like a scam.

Take all this insufferable jargon and add the fact that any given person you're explaining it to has used fiat currency notes their whole life and you have a recipe for... for nothing. Probably, nothing. There is a slightest sliver of possibility they will understand and take interest, and the much greater likelihood they will become exasperated and simply hate the stuff out of frustration and I'm getting angry just thinking about it actually.

You're more likely to create a frothing madman who calls Bitcoin a pyramid scheme (showing equally poor understanding of Bitcoin AND pyramid schemes) than an excited new adopter. What we need is a story- a story with a point, with a message, with an illustration of what we're trying to get across. In ancient times, before the centuries-old culmination of written human language was abandoned in favor of "blogging," this was known as an "allegory."

In my last article I made mention of a story that helped to finally introduce me to the world of Bitcoin, and the more I've learned the more apt the story has become. There is a strong allegory for Bitcoin in a currency that has already been used before. That currency is hundreds of years old, and there isn't anything else quite like it.

THE PRIMORDIAL BITCOIN

Off in the Pacific Ocean, among the Caroline Islands, is a particular trio of small islands known together as the Island of Yap. Its native residents form several communities among the islands and number in the thousands. From its 'discovery' by Spain in the sixteenth century until the turn of the twentieth, it was a largely ignored Spanish property.

Once the island fell under German ownership in 1899, more details of their peculiar culture were finally exposed to the western world. More specifically, their peculiar economy. Yap was lush in vegetation and fairly sustainable but had no precious metals or minerals to be found.

So, for function of currency they made stone coins. The people of Yap, keen on not half-assing this 'coin' thing, decided to go big AND to go home. They sailed up to four hundred miles to other islands with vast limestone quarries so that they could carve out enormous stone discs three to twelve feet in diameter, wheel them over to rafts, and sail them back to Yap. The men who carved the stone rolled it into a convenient place (even if it took a dozen extra hands to do so) and it was ready for trade.

After they 'mined' and moved the coin, its journey really was done. When time came for a large trade, something on par with livestock or a dowry, the coin changed hands. By 'changed hands' I mean the two involved parties loudly and publicly declared that this particular coin here was now property of so-and-so, and proceeded to leave it right where it was. Nobody could be arsed to move the bloody things. They were massive, and the community was tight-knit; so why bother?

So generations passed and the stones never moved. Tallies were never marked or recorded on the stones- it wasn't necessary. Business was conducted and announced publicly, and the rightful owner of any given stone was common knowledge to anyone living near it.

So these stone coins weren't traditional "coins." You could not fit them in the pockets of anything but the most clownly of pants. You did not even put them in a vault for safekeeping. They simply existed, and the community kept the knowledge of who owned which at any given time.

Anyone who has arrived at letstalkbitcoin.com through conscious effort and not via any elaborate cat-on-keyboard incidents should be able to see some of the parallels at work here. To those of you who see it, I say shut up, it gets even better.

For at least three generations, there was a particular family in a particular home whose wealth was well-known across the islands. The family had long been owners of what might have been one of the biggest stone coins in circulation. ... and not one person on those islands had ever seen it.

Those aforementioned generations earlier, this enormous coin was carved out and loaded up for transport by an expedition of incredibly ambitious Yap residents. Their prodigious haul slipped from import manifests and into mytho-history when a harsh storm battered their rafts just a little ways from home shores.

The raft carrying King Coin (or Coin Kong? I didn't really think this one through, sorry) was cut loose, and their newfound wealth plummeted to the seafloor. In a boring, physicality-obsessed, fiat economy, this would be the tragic end of an otherwise uplifting tale of heroic (and Homeric) avarice. The story would be embellished, talk of sirens and wizards would be peppered throughout the narrative, and, at the end of the day, these men would still be broke.

The people of Yap, however, didn't see what the fuss was about. The men of the expedition all vouched for the proportions of the coin and its general location. Adding to this the fact that it was 'lost' only in the tangible sense and not in the fiscal one, there was no reason not to go on using it.

After all, they lost their millions to a storm, not to the craps table. Just like "that coin between those two trees," or "that coin next to Jim's house," and "that coin of Bob's that looks conspicuously like a phallus but he gets angry when you point it out," this coin entered circulation based on reputation. It was "that coin at the bottom of the ocean," and this family had clutched it for years before spending it on God-knows-what.

The stone coins already existed in a decentralized, community-enforced 'ledger.' By this precedent, they no longer needed even to be tactile objects. Stone coins were simply a unit on the Stonecoin Blockchain, tracked by group-verified transactions. With only so many coins in circulation, the community kept fairly consistent tabs on who owned what.

Whether or not Yap investors lived in fear of a 51% attack is beyond the scope of this allegory; the point itself should be abundantly clear by now.

SO THE STONE COINS ARE AN ALLEGORY FOR BITCOIN

...the point is that the stone coins are an allegory for Bitcoin. I hope I didn't make that too subtle. In this interpretation of the Stone Money of Yap as an allegory for Bitcoins (see previous sentences,) the story becomes a functional teaching tool. The story of Yap and its coins is a place to start when introducing newcomers to the blockchain.

I cannot emphasize "teaching the blockchain" nearly enough; you don't teach a person what a "Bit-Coin" is, just as much as you don't explain the texture, shape, and flavor of Yap's limestone coins. You tell them how they are recorded and how they're used. Just as each of us keeps record of the blockchain, the people of Yap all had to keep aware of who owned what. Ownership was a matter of public declaration. By spreading the word to others, it became verification. You didn't own currency unless you got the majority of the community to agree you did. You did this by conducting your business transparently, and announcing all transactions to the world at large. A deal made in secret or made dishonestly was impossible; transparency was part of the protocol. Bitcoin and stone coin changed hands almost identically.

Whether limestone or crypto, these aren't the typical 'coins' one rustles from sofa cushions or the pockets of your playground extortion victims. We don't lay eyes on these coins- we just all agree on where they are and who they belong to. All our Bitcoins are on the metaphorical ocean floor, safely away from prying eyes and sticky fingers, and every member of the community is sitting on a hard copy of the ledger. We don't simply 'trust,' however- our ledger is produced, updated, and thoroughly encrypted by the same software protocol that makes it possible.

Prying eyes aren't left totally in the dark, either; the same blockchain that tracks this ledger is protected from being altered, but is visible to any who want to see what coins have moved where. What Yap enforced by culture we enforce by encryption. What they cut from stone we carve from graphics cards. It's these traits that made their stones and our bitcoins commodities instead of reserve notes; false value could not be simply printed off a press. Bitcoins and stone coins weren't empty promises generated on a whim. They are the product of investment, whether its time spent sailing or time spent mining a processor.

The story of Yap, the stone coins, and the system they used is a great teaching tool, certainly- but it's not just for the outsiders. See, the story of stone money doesn't simply end there; all of us within the community can learn from what happened to Yap's stone coins when the Tax Man came calling.

STONECOIN GOES TO WASHINGTON

After Germany got over the novelty of having their own tiny preindustrial island, it decided to move in and get unpacking. They mercifully weren't insistent on displacing or bothering the native culture too much, but they wanted room for military stations around the islands and needed the infrastructure to connect them. The simple gravel walking trails connecting all of Yap's villages were awesome for bare feet and batcave-sized novelty coins, but were less than ideal for German road vehicles. The German government sent word out to all the village leaders that wider, modern stone roads needed to be implemented across the islands.

It isn't in doubt whether or not the elders got the message- it just seems unlikely that any of them gave a damn what their absentee foreign overlords wanted. There was very little incentive to appease these strangers, and months upon months went by without any sign of the tropical expressway the military was looking for. German officials, recognizing that no progress was being made, resorted to other means of motivating the locals. The callous Germans slaughtered the island inhabitants swiftly and brutally is what you expected me to say, because you, sir, are a racist, and shame on you.

These were turn-of-the-century bureaucrats, not Nazis, first off. Second, social disagreements didn't actually escalate into graphic violence at the rate modern flame-wars would have you believe. The Germans' solution was so simple and nonviolent it made Ghandi look like Manson. A few officials went around the Island, spray-painting sizable black X's on the biggest stone coins they could find. They then proclaimed, for all to hear, that these stones were now confiscated funds of the German government.

The people of Yap had been fined. Durable, modern-sized roads appeared in very, very short order. Upon completion, friendly German officials were dispatched once again- this time with solvents to clean the marks off the stones. The levied fines had been refunded. The people of Yap were manipulated, of course- but was their money manipulated, or was their belief? The Germans never took a thing away from the residents of the Island; they simply preyed on the peoples' willingness to play by their rules.

In their graciousness to be part of the larger world their European 'masters' presented, the people of Yap mistakenly believed that those paint-wielding officials' rules held real power over them. Forgetting that they themselves -the community- held power over their money, they let the ILLUSION of authority give a few bureaucrats REAL authority.

There's an altogether-different, and much-less-funny allegory at work there. In the world of Bitcoin we're beset on seemingly all sides by the spectre of government intervention. We have men and women of our own community crying out for recognition, permission, and regulation from various political masters- all out of fear. Bitcoin isn't being threatened by the government. We are.

Bitcoin is a protocol. It is not a place or a thing, and to call it international is still understating its virility. Bitcoin is apolitical. It transcends boundaries as if no boundaries existed. Law can claim about as much jurisdiction over Bitcoin as it can over wind and rain. It simply isn't all that vulnerable to governance. But WE are- and we're projecting our weakness onto Bitcoin by begging for political legitimacy. In threatening businesses and individuals over Bitcoin, bureaucrats are again painting marks on values that they don't respect. They CAN harm us as individuals, it's true; but we can't give them more power than they are due.

So long as we go back and forth between cryptocurrency and fiat currency, we are pinned under their thumbs. The more we trade in Bitcoin as a currency, and not a speculative medium for Dollar gains, the more freedom we secure.

Business and value are human creations, not political entities, and by seeking their approval and placating their whims we give them political authority over us. If we keep volunteering to play the Bitcoin game by their rules, we may eventually start to believe them. ...and then, Bitcoin won't be Bitcoin anymore. It'll be theirs.

The story of Yap and the eponymous "Island of Stone Money" was originally told in 1910 by anthropologist William Henry Furniss III. The subsequent 1991 revisiting of the subject by the Hoover Institution was researched and written by Milton Friedman. This interpretation and commentary of their works is entirely the product of this article's author.

The leader in blockchain news, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups.

Read the original here:

Stone Bitcoins and Echoes From the Past - Coindesk

This Bitcoin Metric Could Trigger the Next BTC Bull Run – Bitcoinist

There are a number of varying metrics that Bitcoin analysts use to predict future price movements of the asset. One rarely used oscillator takes BTC energy value into account and it is flashing bullish at the moment.

Okay, so this metric may not be as popular as other recently used ones such as NVT ratios or unadjusted transaction values, but it is still worth a glance.

The oscillator takes into account the bitcoin price as a percentage of its energy value. It works on the premise that raw Joules alone can be used to estimate a fair value for BTC.

Digital asset manager Charles Edwards has delved deeper into this little known metric and noted some major similarities with previous bitcoin market patterns.

2019 looks VERY similar to the starting characteristics of prior bull runs.

The chart shows a clear pattern when the values have oscillated between 50% and -50% just before the previous two major bitcoin bull runs.

An in-depth analysis of the energy value model by Edwards summarizes;

The Energy Value model states that if all miners were to stop mining Bitcoin tomorrow, the power input would be zero and Bitcoin would be worthless

Using the energy value formula it adds that the current fair value for bitcoin last week was $11,500 which was way higher than its trading price.

There are other factors that come into play such as the BTC production cost which is a function of the asset price and mining expenses. Variations in such were found to be driven by the level of electrical energy input and energy efficiency of mining hardware.

Plotting the chart over the past decade revealed a strong correlation between the bitcoin energy value to its historic price in addition to stock to flow.

Chart courtesy of capriole.io

The research concludes with several principles that include increases in energy input will increase the fundamental value of bitcoin, as will higher hash rates.

Hash rates have leveled out over the past two months according to bitinfocharts.org. Theyre currently ranging between 85 and 100 EH/s which displays a level of network stability, and quells the notion that miners are capitulating.

If history rhymes with the energy value metric the next BTC bull run could be imminent. This would coincide with the stock to flow model and halving due in five months time.

If Bitcoin is successfully mass adopted as a store of wealth and/or global currency we may have financial market evidence that value is intrinsically linked to effort, the Joules of energy spent in work.

Does the BTC EV oscillator signal another bitcoin bull run? Add your comments below.

Images via Shutterstock, Twitter: @caprioleio, capriole.io

Read more from the original source:

This Bitcoin Metric Could Trigger the Next BTC Bull Run - Bitcoinist

Top 3 price prediction Bitcoin, Ethereum, Ripple: Cryptos find a foothold and try to point to the Moon – FXStreet

Yesterday's article highlighted the extreme overselling of the market and, therefore, the high probability that bargain hunters would appear. And they appeared.

The news jumped, with double-digit percentage increases, along with the crypto board.

The news of the day is the SEC proposal to extend the qualification requirements as a qualified investor.

Now, the requirements to be able to invest in hedge funds, private funds and alternative investments in the United States are only economic. Wealth and income point to the line. The SEC proposes that regulated and demonstrable academic training can give access to the rating.

This proposal would have a full impact on the crypto market, where many investment initiatives are beyond the reach of the small investor.

The ETH/BTC pair is currently trading at the 0.01785price level and is suffering from a lack of momentum in the Ethereum that leaves it at the mercy of massive Bitcoin rebounds.

The long-term bearish trend line (A) is fast approaching, and for the moment, the feeling is more of a threat than of hope.

Above the current price, the first resistance level is at 0.01867, then the second at 0.020 and the third one at 0.0217.

Below the current price, the first support level is at 0.018, then the second support level is at 0.0161 and the third one at 0.015.

The MACD on the daily chart points down, although with a profile that for now allows for a rebound to the upside.

The DMI on the daily chart clearly shows an extreme situation. Bears are shooting higher and remain above the ADX line. The bulls, on the other hand, go to minimum levels and mark the worst record in history, only surpassed during the lows of 2017.

BTC/USD is currently trading at the $7156price level after crashing yesterday at the close of the long-term bearish channel (A). Bitcoin needs to escape this bearish figure, and I'm sure that when it does, it will fly off in the direction of the moon.

Above the current price, the first resistance level is at $7400, then the second is at $7525 and the third one at $7600.

Below the current price, the first level of support is at $7100, then the second is at $6850 and the third one at $6750.

The MACD meets expectations and turns and crosses in a bullish direction. The bullish profile is very smooth and there is hardly any opening between the lines, but the change from yesterday's situation is complete.

The DMI on the daily chart is in line with yesterday's pattern. The bears couldn't get past the ADX line and bounce heavily downwards, with the same intensity as the bulls bounce upwards. The development of the technical pattern suggests that the bullish turn will occur in the next.

The ETH/USD pair is currently trading at the $128.10price level and forms a temporary floor at the base of the long-term bullish channel. Ethereum has no room underneath to evolve without risking its existence.

Due to the position and profile of the moving averages, the price could be in this zone for a couple of months, ranging between $150 and $200.

Above the current price, the first resistance level is at $130, then the second at $145 and the third one at $150.

The MACD on the daily chart persists in the bearish cross but does not increase either the slope or the openness between the lines.

The DMI on the daily chart provides invaluable information. Bears are following the same bullish pattern as seen on the Bitcoin. Unable to get past the ADX line, they bounce down hard. Strangely, the bulls do not react to the rise, which makes me suppose that the bears still tried to surpass the ADX line a second time.

The XRP/USD pair is currently trading at the $0.1892price level and is close to the base of the bearish structure that has governed the XRP price since the beginning of 2018. If the price continues in this scenario, it will reach 2017 levels of $0.13 in March 2020.

Above the current price, the first resistance level is at $0.19, then the second at $0.217 and the third one at $0.25.

Below the current price, the first support level is at $0.175, then the second at $0.15 and the third one at $0.133.

The MACD on the daily chart maintains the bearish cross, although the slope and opening continue to be very small. A bullish turn is possible at any time according to this indicator.

The DMI on the daily chart shows bears bouncing upwards and then bouncing downwards without touching the ADX line. The bulls do not take advantage of the bear's bearish rebound and remain at minimum levels.

Get 24/7 Crypto updates in our social media channels: Give us a follow at @FXSCrypto and our FXStreet Crypto Trading Telegram channel

Originally posted here:

Top 3 price prediction Bitcoin, Ethereum, Ripple: Cryptos find a foothold and try to point to the Moon - FXStreet

NYPD radio encryption most likely wont happen in 2020 but will soon – amNY

After amNewYork reported this week of the NYPDs plans to encrypt police radios in 2020, police officials said Thursday that it would likely not move forward with encryption for at least a year.

Moreover, police brass indicated that they are open to discussion as to who, outside of the Police Department, would have access to encrypted communications.

Encryption could potentially cut off media groups who currently monitor police radio feeds for breaking news. Outlets would then have to rely upon releases from the NYPD and statements from its officials.

Elected officials, none of whom seemed to know about the multi-million dollar encryption plan, have expressed fears of encryption, as it might significantly reduce transparency of the department. Mayor Bill de Blasios administration has emphasized greater transparency at the NYPD for most of his tenure.

Members of volunteer fire and ambulance squads around the city also use police radios to monitor for trouble, and many of them expressed doubts about the plan, fearing that they too would be cut off.

But on Dec. 19, NYPD Deputy Commissioner for Counter-Terrorism John Miller said encryption would happen in a three- to five-year transition.

So nothings happening today, nothings happening tomorrow, and probably nothings happening next year, Miller said. This is a lot of radios.

Commissioner Dermot Shea said there must be a balance between police officer safety and transparency to the public.

It is an interesting time after just what just happened in Jersey City, Shea said, referring to the Dec. 11 terrorist attack that killed six. With traditional crime and now traditional criminals using encryption, we cant have situation where criminals have better technology than police officers and detectives whether they are drug dealers or breaking into banks. Criminals are using encryption. We should certainly consider transparency, but the priority for keeping New Yorkers safe.

Miller acknowledged some investigative channels are already encrypted to safeguard investigations, as are Federal investigative channels including Drug Enforcement administration, secret service and FBI.

Any further encryption is open to more discussion at this point with a 3-5 year transition, he said. Part of the thinking and planning is where would it be advantageous to say officer safety, the integrity of investigations the commissioner gives the example of a kidnapping, how do you conduct one of those over the radio when the world is listening for entertainment? Its something we are looking at nothing that is happening right away.

Miller, a former journalist himself, noted that There have been other cities gone encrypted, and theyve made arrangements with news media that have made sense. If we ever get to the point where we are going to that level, Im sure that discussion will take place.

Miller testified Wednesday at the City Council Public Safety Committee over proposed legislation, Intro. 487, that would create comprehensive reporting and oversight of NYPD surveillance technologies. The NYPD took a stand against the bill, saying providing detailed information on technology would tip off criminals and terrorists and allow them to thwart investigations.

Sample of a police radio scanner system in action.

Follow this link:
NYPD radio encryption most likely wont happen in 2020 but will soon - amNY

Facebook’s Push for End-to-End Encryption Is Good News for User Privacy, as Well as Terrorists and Paedophiles – Nextgov

Facebook is planning end-to-end encryption on all its messaging services to increase privacy levels.

The tech giant started experimenting with this earlier this year. Soon, end-to-end encryption will be standard for every Facebook message.

But Australian, British and United States governments and law makers arent happy about it. They fear it will make it impossible to recover criminal conversations from Facebooks platforms, thus offering impunity to offenders.

For instance, this was a major concern following the 2017 London terror attacks. Attackers used WhatsApp (Facebooks end-to-end encrypted platform), and this frustrated police investigations.

But does Facebooks initiative place the company between a political rock and an ethical hard place?

What is end-to-end encryption?

End-to-end encryption is a method of communicating more securely, compared to non-encrypted communications.

It involves using encryption (via cryptographic keys) that excludes third parties from accessing content shared between communicating users.

When the sender wants to communicate with the receiver, they share a unique algorithmic key to decrypt the message. No one else can access it, not even the service provider.

The Real Incentive

Facebooks plan to enact this change is paradoxical, considering the company has a history of harvesting user data and selling it to third parties.

Now, it supposedly wants to protect the privacy of the same users.

One possible reason Facebook is pushing for this development is because it will solve many of its legal woes.

With end-to-end encryption, the company will no longer have backdoor access to users messages.

Thus, it wont be forced to comply with requests from law enforcement agencies to access data. And even if police were able to get hold of the data, they would still need the key required to read the messages.

Only users would have the ability to share the key (or messages) with law enforcement.

Points in Favour

Implementing end-to-end encryption will positively impact Facebook users privacy, as their messages will be protected from eavesdropping.

This means Facebook, law enforcement agencies and hackers will find it harder to intercept any communication done through the platform.

And although end-to-end encryption is arguably not necessary for most everyday conversations, it does have advantages, including:

1) protecting users personal and financial information, such as transactions on Facebook Marketplace

2) increasing trust and cooperation between users

3) preventing criminals eavesdropping on individuals to harvest their information, which can render them victim to stalking, scamming and romance frauds

4) allowing those with sensitive medical, political or sexual information to be able to share it with others online

5) enabling journalists and intelligence agencies to communicate privately with sources.

Not Foolproof

However, even though end-to-end encryption will increase users privacy in certain situations, it may still not be enough to make conversations completely safe.

This is because the biggest threat to eavesdropping is the very act of using a device.

End-to-end encryption doesnt guarantee the people we are talking to online are who they say they are.

Also, while cryptographic algorithms are hard to crack, third parties can still obtain the key to open the message. For example, this can be done by using apps to take screenshots of a conversation, and sending them to third parties.

A Benefit for Criminals

When Facebook messages become end-to-end encrypted, it will be harder to detect criminals, including people who use the platform to commit scams and launch malware.

Others use Facebook for human or sex trafficking, as well as child grooming and exploitation.

Facebook Messenger can also help criminals organise themselves, as well as plan and carry out crimes, including terror attacks and cyber-enabled fraud extortion hacks.

The unfortunate trade-off in increasing user privacy is reducing the capacity for surveillance and national security efforts.

End-to-end encryption on Facebook would also increase criminals feeling of security.

However, although tech companies cant deny the risk of having their technologies exploited for illegal purposes they also dont have a complete duty to keep a particular countrys cyberspace safe.

What to do?

A potential solution to the dilemma can be found in various critiques of the UKs 2016 Investigatory Powers Act.

It proposes that, on certain occasions, a communications service provider may be asked to remove encryption (where possible).

However, this power must come from an authority that can be held accountable in court for its actions, and this should be used as a last resort.

In doing so, encryption will increase user privacy without allowing total privacy, which carries harmful consequences.

So far, several governments have pushed back against Facebooks encryption plans, fearing it will place the company and its users beyond their reach, and make it more difficult to catch criminals.

End-to-end encryption is perceived as a bulwark for surveillance by third parties and governments, despite other ways of intercepting communications.

Many also agree surveillance is not only invasive, but also prone to abuse by governments and third parties.

Freedom from invasive surveillance also facilitates freedom of expression, opinion and privacy, as observed by the United Nations High Commissioner for Human Rights.

In a world where debate is polarised by social media, Facebook and similar platforms are caught amid the politics of security.

Its hard to say how a perfect balance can be achieved in such a multifactorial dilemma.

Either way, the decision is a political one, and governments - as opposed to tech companies - should ultimately be responsible for such decisions.

Roberto Musotto is a Cyber Security Cooperative Research Centre postdoctoral fellow at the Edith Cowan University and David S. Wall is a professor of criminology at the University of Leeds

This article is republished from The Conversation under a Creative Commons license. Read the original article.

See more here:
Facebook's Push for End-to-End Encryption Is Good News for User Privacy, as Well as Terrorists and Paedophiles - Nextgov

The decline of passwords, the rise of encryption and deepfakes cybersecurity predictions for 2020 – BetaNews

It's the time of year again where the great and good of the tech sector like to consult the tea leaves, gaze into the crystal ball, read the runes -- and of course draw on their industry knowledge -- to give their predictions for the year ahead.

So, what do they think is in store for cybersecurity in 2020?

The decline of the password has been on the horizon for a while, but Ben Goodman, CISSP and SVP of global and corporate development at ForgeRockbelieves 2020 will mark the beginning of the end. "Consumers already log in to dozens of protected resources everyday: from email, banking and financial accounts, social media, healthcare, government accounts, and beyond. Even when tools like TouchID are leveraged each of these resources currently still have an associated username and password that can be attacked. To save time and remember their credentials for all these sites, consumers reuse the same username and password across several sites. As a result, the user's exposure from any one security breach on one of those profiles dramatically increases the odds that additional accounts can be compromised as well, allowing attackers to access far more sensitive information."

This is echoed by Clayton Calvert, a consultant at IT security and risk assessment firm netlogx. "With passwordless authentication, IT reclaims its purpose of having complete visibility over identity and access management. Reuse and sharing are common issues in password-based authentication. Without passwords, there is nothing to phish, share, or reuse. The user is no longer a wild card in an organization's access scheme. It is this crucial element that gives passwordless solutions their security advantage. As an added benefit, GDPR prefers that companies use passwordless authentication to eliminate the storing and securing of passwords exchanged over the network. While consumers have used this technology for a number of years in Apple and Samsung products, companies are beginning to do so as well. Sixty percent of large enterprises and nearly all of midsize organizations will use passwordless authentication by 2020."

With the decline of the password though the rise of deepfakes becomes a greater concern. CEO of Jumio, Robert Prigge says, "With a reported 50 percent of consumers using the same credentials across multiple accounts, automated account takeover attacks will continue to run rampant in 2020. As the industry abandons outdated authentication methods that are easily susceptible to fraud, like SMS-based 2FA and knowledge-based authentication, and turn to more advanced, biometric-based authentication methods as a secure alternative, the rise of deepfake technology will become a larger concern. A deepfake superimposes existing video footage or photographs of a face onto a source head and body using advanced neural network powered AI -- and are relatively easy to create. In 2020, we will see an increase in deepfake technology being weaponized for fraud as biometric-based authentication solutions are widely adopted. Even more concerning is that many digital identity verification solutions are unable to detect and prevent deepfakes, bots and sophisticated spoofing attacks."

Deepfakes raise other concerns too according to Optiv Security, "There has been much publicity around the potential to impact elections using deepfakes (AI-doctored videos that enable individuals to make it appear people said things they never said). However, not enough attention has been paid to how cybercriminals can make money using deepfakes against businesses. This will change in 2020 as we expect to see the first deepfake attacks designed to impact stock prices, by having CEOs, financial analysts, Federal Reserve leaders or other powerful economic figures make phony statements that will cause stock market movements. Cybercriminals will use these videos to make quick killings in the market."

2020 is also set to be the year of encryption according to Peter Galvin, vice president strategy and marketing at nCipher Security. "In the US, lawmakers on Capitol Hill have re-energized a push for encryption backdoors, an initiative that is seeing bipartisan support. Internationally, the UK and Australian governments (in addition to the US government) are pressuring Facebook to scrap plans for end-to-end encryption of Facebook Messenger. Galvin adds, Consumers, meanwhile, want more control and privacy over their data yet are often left confused about what that really means and how to make it a reality. Also factoring into the encryption conversation is the protection of voter information leading up to the US election and advancements in facial recognition software."

We can also expect to see more attacks aimed at critical infrastructure and governments according to Alex Heid, chief research officer at SecurityScorecard. "Malicious nation-state actors will continue to focus on malware and ransomware attacks. Nation-state actors don't just want to sell cardholder data on the Dark Web, theyre targeting critical infrastructure such as electricity and water companies.

"In August of 2019, emails sent to US utilities companies contained a remote access trojan as part of a spear phishing campaign. The advanced persistent threat is another in a long line of attacks targeting critical infrastructure.

"With at least thirteen global presidential elections scheduled for 2020, we can expect to see more malware and ransomware attacks attempting to undermine voters confidence."

The ongoing skills shortage will add to problems says Bret Fund, head of cybersecurity at training specialist Flatiron School, "While the average pay for cybersecurity positions in North America is $90,000, pay levels in some areas -- such as local and federal government -- is below what's needed to attract and retain skilled talent. With healthcare, financial services and other large enterprises making it more lucrative for qualified cybersecurity professionals to work in their organizations, local government will be faced with a great cybersecurity skills shortage. Local government agencies will have to think creatively about how they can re-skill their current employee base to meet their cybersecurity needs."

Healthcare is set to come under attack too says Mike Riemer, chief security architect at Pulse Secure, "It is already well-understood that the healthcare industry struggles to secure its trove of sensitive data. But, even as widely discussed as this issue is, the healthcare industry has been slow to adopt effective security measures and quick to embrace an even greater influx of data during digital transformation efforts. As healthcare continues to evolve towards the convenient, self-service model that todays digital-first consumer demands, there will be serious security implications as companies try to control the release of data and information. For example, telemedicine is making patient care extremely convenient, but is the doctor-patient communication secured and encrypted? If not, anyone can intercept the data and communication in transit. How do you secure that information stored on the end-user's phone? The security of any network is only as strong as the weakest link. In this service model, the end-point device is most likely to be compromised and healthcare organizations need to ensure they are meeting all the security and regulatory requirements."

Are there other trends that you think will affect cybersecurity in 2020? Let us know.

Photo Credit: vinzstudio/Shutterstock

Read the original here:
The decline of passwords, the rise of encryption and deepfakes cybersecurity predictions for 2020 - BetaNews

Hardware-based Full Disk Encryption Market Executive Summary, Introduction, Sizing, Analysis and Forecast To 2025 – Market Research Sheets

The Hardware-based Full Disk Encryption Market research added by UpMarketResearch.com, offers a comprehensive analysis of growth trends prevailing in the global business domain. This report also provides definitive data concerning market, size, commercialization aspects and revenue forecast of the industry. In addition, the study explicitly highlights the competitive status of key players within the projection timeline while focusing on their portfolio and regional expansion endeavours.

This report on Hardware-based Full Disk Encryption Market delivers an in-depth analysis that also comprises an elaborate assessment of this business. Also, segments of the Hardware-based Full Disk Encryption market have been evidently elucidated in this study, in addition to a basic overview pertaining to the markets current status as well as size, with respect to the profit and volume parameters.

Request Exclusive Free Sample PDF Of This Report At https://www.upmarketresearch.com/home/requested_sample/10552

The study is ubiquitous of the major insights related to the regional spectrum of this vertical as well as the companies that have effectively gained a commendable status in the Hardware-based Full Disk Encryption market.

Major Players included in this report are as follows Seagate Technology PLCWestern Digital CorpSamsung ElectronicsToshibaKingstonMicron Technology IncIntel

Hardware-based Full Disk Encryption Market can be segmented into Product Types as Hard Disk Drive (HDD) FDESolid State Drives (SSD) FDE

Hardware-based Full Disk Encryption Market can be segmented into Applications as IT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthers

Hardware-based Full Disk Encryption Market: Regional analysis includes:Asia-Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)Europe (Turkey, Germany, Russia UK, Italy, France, etc.)North America (United States, Mexico, and Canada.)South America (Brazil etc.)The Middle East and Africa (GCC Countries and Egypt.)

To Buy This Report Full or Customized, Visit https://www.upmarketresearch.com/buy/hardware-based-full-disk-encryption-market

Hardware-based Full Disk Encryption market scope A basic summary of the competitive landscape A detailed breakdown of the regional expanse A short overview of the segmentation

A generic overview of the competitive landscape The Hardware-based Full Disk Encryption market report comprises a thorough analysis of the competitive terrain of this vertical. The study offers details pertaining to each industry participants specific market share, the area served, manufacturing sites and more. Information pertaining to the producers product portfolio, product features, and their respective product applications have been talked about in the report. The report profiles the companies in conjunction with the facts regarding their gross margins and price models

For Best Discount on purchasing this report, Visit https://www.upmarketresearch.com/home/request_for_discount/10552

An all-inclusive framework of the geographical terrain The research report extensively segments the geographical spectrum of this industry. As per the report, the Hardware-based Full Disk Encryption market has established its presence across the regions of United States, China, Europe, Japan, Southeast Asia & India. The report includes insights regarding the industry share acquired by each region. In addition, data concerning growth opportunities for the Hardware-based Full Disk Encryption market across every detailed region is included within the report. The anticipated growth rate to be recorded by each region over the estimated years has been correctly specified within the research report.

A brief summary of the segmentation The Hardware-based Full Disk Encryption market report exemplifies the bifurcations of this vertical with extreme precision. Data with reference to industry share amassed by each product segment, together with their market value within the industry, have been highlighted in the report. Data pertaining to production growth has also been included in the report. With reverence to the application spectrum, the study comprises details concerning market share, amassed by each application segment. Moreover, the study emphasizes details associated with the product consumption of each application, along with the growth rate to be accounted for by each application segment over the estimation period.

Some of the Major Highlights of TOC covers: Hardware-based Full Disk Encryption Regional Market Analysis Hardware-based Full Disk Encryption Production by Regions Global Hardware-based Full Disk Encryption Production by Regions Global Hardware-based Full Disk Encryption Revenue by Regions Hardware-based Full Disk Encryption Consumption by Regions

Hardware-based Full Disk Encryption Segment Market Analysis (by Type) Global Hardware-based Full Disk Encryption Production by Type Global Hardware-based Full Disk Encryption Revenue by Type Hardware-based Full Disk Encryption Price by Type

Hardware-based Full Disk Encryption Segment Market Analysis (by Application) Global Hardware-based Full Disk Encryption Consumption by Application Global Hardware-based Full Disk Encryption Consumption Market Share by Application (2014-2019)

Hardware-based Full Disk Encryption Major Manufacturers Analysis Hardware-based Full Disk Encryption Production Sites and Area Served Product Introduction, Application and Specification Hardware-based Full Disk Encryption Production, Revenue, Ex-factory Price and Gross Margin (2014-2019) Main Business and Markets Served

For More Information on this report, Request Inquiry At https://www.upmarketresearch.com/home/enquiry_before_buying/10552

About UpMarketResearch: Up Market Research (https://www.upmarketresearch.com) is a leading distributor of market research report with more than 800+ global clients. As a market research company, we take pride in equipping our clients with insights and data that holds the power to truly make a difference to their business. Our mission is singular and well-defined we want to help our clients envisage their business environment so that they are able to make informed, strategic and therefore successful decisions for themselves.

Contact Info UpMarketResearchName Alex MathewsEmail [emailprotected]Website https://www.upmarketresearch.comAddress 500 East E Street, Ontario, CA 91764, United States.

This post was originally published on Market Research Sheets

Continued here:
Hardware-based Full Disk Encryption Market Executive Summary, Introduction, Sizing, Analysis and Forecast To 2025 - Market Research Sheets

With Elections over the Head and Facebook’s Message Encryption and Election Security Many Questions are raised – Digital Information World

The U.S. Presidential elections of 2020 are just around the corner and regulatory and government bodies are all over the tech giants. Facebook, is the special concern of everyone due to the ongoing challenges it is facing related to message encryption, political ads and more.

Facebooks only concern right now is to enhance security on the platform to avoid the claws of the officials. Its hard to say that Facebook might come out of it, but there are chances if they act right.

The officials are trying to put Facebook on the back foot to avoid any mishaps from happening. Here are the top concerns that are becoming a nightmare for Zuckerberg.

For me or you, its normal. What about drug suppliers, child abusers, child traffickers and more? It might turn into a Christmas gift for them.

In October, UK Home Secretary Priti Patel, US Attorney General Bill Barr, acting US Homeland Security Secretary Kevin McAleenan, and Australian Minister for Home Affairs Peter Dutton published a letter in which they demanded Facebook abandon their project of full encryption.

Legally speaking, they are concerned about the well-being of people. End-to-end encryption feature will turn into a hub for terrorists, child sexual exploiters, abusers and more a place to carry on their secret conversations.

The government officials are demanding this to reduce the risk of serious harms that can affect countries. If not abandon the idea, then officials asked Facebook to provide a back door or an access point to law enforcement to maintain some transparency.

Facebook has commented that they will not be abandoning the idea of encryption nor will they provide any access point. As expected, Facebook responded that giving access point to one means opening doors for others as well. It is for sure that other actors will try to take advantage of this access point that can also bring major harm.

By rejecting this idea, Facebook is well aware that it has attracted more eyes to hawk on it. The scrutiny will increase and the criticism against Facebook will only touch new heights. However, Facebooks fully encrypted chat will bring more privacy-savvy users to the platform.

Even though Facebook might be right in their decision, but the current situation with the government does not support their stance on full message encryption.

Many saw Islamophobic posts and more on the Facebook, but Facebook requested that it is as per their Community Standards Hey Facebook, I surely wanna know about this community!

With so many users on Facebook, it is certainly impossible to regulate everything as per standards. Facebook is one of its kind when it comes to having a social impact and millions of users. Believe it or not, Facebook actually has a social impact on people.

People do get influenced by Facebook and such posts only feed into their thoughts. With Presidential Elections coming, that is the least that Facebook would want!

Marc Owen Jones, a Professor has identified that the political activists are using bots to flood misinformation. Using such tactics only leads to fueled counter-movements and arguments that could cause bias pretty easily.

Targeting influential local groups is a note-worthy strategy to reach to major national ones. First, leave the bacteria in one place and the disease will travel everywhere. These posts get a lot of engagement, which can make the word travel faster among other groups.

In the end, even some high profiles engage in such false and fake content, which is beyond Facebooks control!

On such a large scale, even Facebook might be unable to control the content flowing on the internet. If Facebook stops people, they will move to another social media platform. You see, its the people, not the Facebook!

Photo: JasonDoiy via Getty Images

Read next: Frequent Facebook Use Leads to Higher Number of Ad Preferences

See the original post:
With Elections over the Head and Facebook's Message Encryption and Election Security Many Questions are raised - Digital Information World

Future of Encryption Software Market Reviewed in a New Research Study 2019-2025 – Daily News Reports 24

A leading research firm, Zion Market Research added a latest industry report on "Global Encryption Software Market" consisting of 110+ pages during the forecast period and Encryption Software Market report offers a comprehensive research updates and information related to market growth, demand, opportunities in the global Encryption Software Market.

According to the report the Future of Encryption Software Market Reviewed in a New Research Study 2019-2025

The Encryption Software Market report provides in-depth analysis and insights into developments impacting businesses and enterprises on global and regional level. The report covers the global Encryption Software Market performance in terms of revenue contribution from various segments and includes a detailed analysis of key trends, drivers, restraints, and opportunities influencing revenue growth of the global consumer electronics market.This report studies the global Encryption Software Market size, industry status and forecast, competition landscape and growth opportunity. This research report categorizes the global Encryption Software Market by companies, region, type and end-use industry.

Request a Free Sample Report on Encryption Software Market:https://www.zionmarketresearch.com/sample/encryption-software-market

The Encryption Software Market report mainly includes the major company profiles with their annual sales & revenue, business strategies, company major products, profits, industry growth parameters, industry contribution on global and regional level.This report covers the global Encryption Software Market performance in terms of value and volume contribution. This section also includes major company analysis of key trends, drivers, restraints, challenges, and opportunities, which are influencing the global Encryption Software Market. Impact analysis of key growth drivers and restraints, based on the weighted average model, is included in this report to better equip clients with crystal clear decision-making insights.

The Encryption Software Market research report mainly segmented into types, applications and regions.The market overview section highlights the Encryption Software Market definition, taxonomy, and an overview of the parent market across the globe and region wise.To provide better understanding of the global Encryption Software Market, the report includes in-depth analysis of drivers, restraints, and trends in all major regions namely, Asia Pacific, North America, Europe, Latin America and the Middle East & Africa, which influence the current market scenario and future status of the global Encryption Software Market over the forecast period.

Get Free PDF Brochure of this Report: https://www.zionmarketresearch.com/requestbrochure/encryption-software-market

The Encryption Software Market report provides company market size, share analysis in order to give a broader overview of the key players in the market. Additionally, the report also includes key strategic developments of the market including acquisitions & mergers, new product launch, agreements, partnerships, collaborations & joint ventures, research & development, product and regional expansion of major participants involved in the market on the global and regional basis.

Major Company Profiles Covered in This Report:

BM, Microsoft, Sophos ltd, Gemalto, Net App Inc, Hewlett- Packard, Vormetric, Oracle, Intel and Symantec

Some of the major objectives of this report:

1) To provide detailed analysis of the market structure along with forecast of the various segments and sub-segments of the global Encryption Software Market.

2. To provide insights about factors affecting the market growth. To analyze the Encryption Software Market based on various factors- price analysis, supply chain analysis, porter five force analysis etc.

3. To provide historical and forecast revenue of the Encryption Software Market segments and sub-segments with respect to four main geographies and their countries- North America, Europe, Asia, and Rest of the World.

4. Country level analysis of the market with respect to the current market size and future prospective.

5. To provide country level analysis of the market for segment by application, product type and sub-segments.

6. To provide strategic profiling of key players in the market, comprehensively analyzing their core competencies, and drawing a competitive landscape for the market.

7. Track and analyze competitive developments such as joint ventures, strategic alliances, mergers and acquisitions, new product developments, and research and developments in the global Encryption Software Market.

About Us:

Zion Market Research is an obligated company. We create futuristic, cutting edge, informative reports ranging from industry reports, company reports to country reports. We provide our clients not only with market statistics unveiled by avowed private publishers and public organizations but also with vogue and newest industry reports along with pre-eminent and niche company profiles. Our database of market research reports comprises a wide variety of reports from cardinal industries. Our database is been updated constantly in order to fulfill our clients with prompt and direct online access to our database. Keeping in mind the clients needs, we have included expert insights on global industries, products, and market trends in this database. Last but not the least, we make it our duty to ensure the success of clients connected to usafter allif you do well, a little of the light shines on us.

Contact Us:

Zion Market Research

244 Fifth Avenue, Suite N202

New York, 10001, United States

Tel: +49-322 210 92714

USA/Canada Toll Free No.1-855-465-4651

Email: sales@zionmarketresearch.com

Website: https://www.zionmarketresearch.com

Sorry! The Author has not filled his profile.

Original post:
Future of Encryption Software Market Reviewed in a New Research Study 2019-2025 - Daily News Reports 24