AT&T Passive Optical Network Trial to Test Open Source Software – SDxCentral

AT&T is set trial 10-gigabit symmetric passive optical network technology (XGS-PON), tapping its growing virtualization and software expertise to drive down the cost of next-generation PON deployments.

The carrier said it plans to later this year conduct the XGS-PON trial as part of its plan to virtualize access functions within the last mile network. Testing is expected to show support for multi-gigabit per second Internet speeds and allow for merging of services onto a single network. Services to be supported include broadband and backhaul of wired and 5G wireless services.

Eddy Barker, assistant vice president for access architecture and design at AT&T, said the carriers goal was to develop a more cost-efficient network platform to support growing demand.

In working on next-generation PON, we have focused on trying to get the economics to where we are with GPON, Barker said. A big aspect is just the equipment costs and more significantly the silicon and optics costs.

Barker explained the XGS-PON technology is a fixed wavelength symmetrical 10 Gb/s platform. Compared with traditional gigabit PON (GPON), Barker said XGS-PON provides up to four-times greater downlink bandwidth and up to eight-times greater uplink bandwidth capacity.

The trial is to take place in at least two locations, with Barker stating a likely different focus for each location.

Some will have greenfield and some will have brownfield elements, Barker said. This will allow for strict XGS trials and then some interoperability trials with current GPON.

The carrier is looking to expand the XGS-PON deployment into the cloud with software.

AT&T said it has worked with ON.Lab to develop and test Open Network Operating System (ONOS) and Virtual Optical Line Terminator Hardware Abstraction (VOLTHA) software to hide the lower level details of the silicon.

AT&T said it was waiting approval on submissions of open white box XGS optical line terminal (OLT) designs to the Open Compute Project (OCP).

Barker said his team has had a big focus on using software-defined networking (SDN) and network functions virtualization (NFV). However, a bigger challenge was in building a community of suppliers and service providers that are part of ON.Lab and building open source code mirroring what has traditionally been proprietary access micro services that have run on supplier access equipment.

We are now in the latter part of the development with ON.Lab, Barker said, noting some of that work has included the organizations Central Office Re-Architected as a Data Center (CORD) initiative.We have been trying to bundle up the access components of CORD, he said. Its not that we plan to do it in a turnkey manner as in ON.Lab, but so we can disaggregate it and use parts with what we have already done within AT&T independently of CORD.

As an example of those plans, Barker said AT&T would use the Linux Foundations Open Network Automation Platform (ONAP) instead of the CORD XOS operating system. This was done because CORD was missing the emphasis on SDN control and virtualization in the access piece, Barker said.

ONAP sprung from the merger of AT&Ts ECOMP and the Linux Foundations Open-O project.

Barker said the OCP submissions are part of the carriers open access strategy, and led to the creation and sharing of the OpenOMCI specification. That spec is designed to provide an interoperable interface between the OLT and home devices, and has been distributed to the open source community.

We are shooting for a common control system that is reusable across multiple access technologies, Barker said. A few things are specific, but we want to reuse as much as possible.

AT&Ts XGS-PON plans are in contrast to competitor Verizon, which last month commissioned Calix to demonstrate channel bonding using next-generation passive-optical network two (NG-PON2) technology.

The trial used a software platform sitting in a SDN environment to combine transport channels over a single fiber strand to support speeds up to 80 Gb/s.

We believe channel bonding holds the potential to more than double the bandwidth to individual subscribers or network locations and anticipate it could be a means of moving from 10 Gb/s to 20 Gb/s and beyond without deploying new technologies, said Vincent OByrne, director of access technology at Verizon, connected with the Calix trial.

Verizon earlier this year said it completed an interoperability trial of NG-PON technology at its lab in Massachusetts. Vendors involved in the trial includedAdtran,Broadcom, Cortina Access, andEricssonin partnership with Calix. Verizon used its open optical network terminal management and control interface specifications for the trial, which the carrier said it plans to share with the industry.

AT&Ts Barker said the carrier has looked at NG-PON2, but felt the financial model around XGS-PON was more compelling. Barker added that AT&T may ultimately decide it needs more capacity and go with NG-PON2, though the ongoing evolution of PON could override that need.

We can see going forward if we need to go there or if we jump over NG-PON2 with the next iteration, Barker said. Standards bodies are working today on next-generation plans that can support up to 100 GB/s, so we will continue to see where we need to go.

Dan Meyer is a Senior Editor at SDxCentral, with a focus on containers, lifecycle service orchestration, cloud automation and DevOps. Dan has been covering the telecommunications space for more than 17 years. Prior to SDxCentral, Dan was Editor-In-Chief at RCR Wireless News.

See original here:
AT&T Passive Optical Network Trial to Test Open Source Software - SDxCentral

In an unsafe cyber world, here’s why you should study cryptology – Hindustan Times

What is cryptology? Historically, when did this start?

Cryptology is the art and science of secret writing. The word is derived from Cryptos and Logia, meaning secret and study respectively. Today, when the cyber world faces immense threat from hackers who are just lying in wait to steal valuable information you send over the internet, Dr. Somitra Kumar Sanadhya, associate professor, department of computer science and engineering, IIT Ropar, tells us why the study of cryptology assumes a lot of significance.

What is the relationship between cryptography and security?

Security is the all-encompassing term used to denote various goals to be achieved against various types of adversaries. For example, one could be worried by internal sabotage during an operation, or breach of access by an intruder to a secure facility etc. Digital security is concerned with protecting information against hackers and unintended recipients. Cryptography is the mathematical foundation on the basis of which the information can be protected. In this sense, it is the tool through which computer and digital security can be achieved.

Humans have needed some form of secret communication since the start of civilization. In the earliest days, people used invisible inks, writing with wax on paper, etc thus hiding even the information that some message is being communicated. During World War 2, spies used miniaturised photographs of sensitive documents and pasted them below the stamp on an envelope. In the Vietnam war, a captured American soldier transmitted information about his torture by his captors in a publicly televised interview by blinking his eyes (and using Morse code).

However, the above examples come under the study of steganography. In cryptology, the aim is to design and use a system of communication which prevents an adversary from understanding the intended message even when he has the ability to capture the transmitted message. Naturally, the transmission must be a modified form of the original message, using some secret. As an example, the earliest known example of a cipher is Julius Caesars armys use of shifted alphabets. Translated to English characters, they used D whenever they wanted to send A, E for B etc. This shifted sequence was rolled back by three characters by the recipient to recover the message.

Historically, army and diplomatic missions have always used cryptography. The history of the subject goes back a few thousand years. But in its modern form, the subject received significant attention from around the world wars.

What is the stand of the Indian government on cryptography?

As far as I know, bitcoins are not yet legal in India. Apart from this, I am not aware of any law which prohibits anyone in India to not use cryptography for any specific purpose.

Please tell us about scope and future of research and development in cryptology?

As people become more security conscious, internet banking and online payments increase, there is bound to be demand of both security engineers as well as cryptologists. Blockchain technology(Blocks are lists of records and blockchain refers to a distributed database used for maintaining the continuously growing lists) is another area which has the potential to transform the financial world. It is already being used for smart-contracts, anonymous payments etc.

Cryptography - Understanding the jargon

What are various disciplines in cryptography?

There has been tremendous research in the design of codes (encryption schemes). Design and implementation of efficient symmetric key encryption schemes as well as public key encryption schemes is an important area of research in the subject. Similarly, the design of schemes which could protect authenticity of the message or the sender is a related line of work.

The question of how to break the security guarantees offered by various cryptographic schemes is always relevant to the area. This is called cryptanalysis.

There are many interesting questions related to secure computations. For example, we might be interested in collating information across multiple computers and do some unified computation, even while knowing that some of the computers are compromised.

The implementation of various designs could leak information about the secrets. For example, a laptop with hidden secret key could be encrypting messages but the small sounds that the laptop is making during the encryption process could be enough for someone with a nearby listening device to recover the secret key. Study of such techniques leads to the study of side channel attacks and their mitigation strategies during implementation.

Finally, as another concluding example, I present one more nice application of modern cryptology. I may possess some secret which I do not wish to share with anyone, but nonetheless, I may be interested in convincing the recipient that I indeed have that secret. More interestingly, the recipient should not learn anything more than the fact that I have the secret. This interesting aim can be achieved by what is known as zero knowledge proof.

Modern cryptography has become so vast that it is not possible to discuss all the major themes of the area here.

Which institutes in India are offering cryptology as a subject?

The RC Bose Centre for Cryptology and Security at Indian Statistical Institute Kolkata has a large number of cryptographers, and they offer PhD, MTech and some short term courses on cryptology. Among the IITs, the ones at Kanpur, Bombay, Madras, Kharagpur, Roorkee, Gandhinagar, Tirupati and Ropar have some cryptology experts in the faculty and most of them offer courses to their bachelors, masters and PhD students. Further, there are many good researchers at IISc Bangalore, IIIT Bangalore, IIIT Hyderabad, Microsoft Research and IBM research etc.

The Cryptology Research Society of India (CRSI) organises annual workshops and conferences for complete beginners to advanced researchers in India. The events are held at different locations every year.

How does one get to learn more about cryptology?

If you are interested in the area of cryptology then mathematics and theoretical computer science are very useful. If you have an electrical engineering, communications or hardware background then you could still work in attacking and securing implementations of cryptographic schemes. I suggest that young students and researchers attend cryptology events in the country, and register for online courses on the subject.

Read more:
In an unsafe cyber world, here's why you should study cryptology - Hindustan Times

Happy 10th birthday iPhone, the nearest thing to a secure pocket computer – Yahoo News

Its common for security experts to regard themselves as necessary critics, guardians against malpractice, and raisers of worst-case scenarios. While there is a very present fear of insecurity these days, its rare that we celebrate security. But on the tenth anniversary of a revolutionary technology, wed like to do just that: happy birthday to the iPhone, first released in June 2007.

Ten years ago, a computer was something that hurt your foot if you accidentally dropped it. Mobile phones were devices that were chiefly used for making phone calls. Today, the idea that we cant use these palm-sized pocket computers to command all our digital communications, and also as a camera, games console, torch, and a hundred other things, is quite unthinkable.

There is no such thing as complete security, and the iPhone is not perfect. Like many other technologies, the iPhones security relies on a users ability to choose and protect a strong password, which is a pragmatic rather than ideal basis for security. Researchers have also uncovered weaknesses in the protection of messages stored on the iPhone. Nonetheless, in an era when the rush to market has resulted in far too many insecure technologies, the iPhone stands out as an exemplar for how its possible to do things right.

The internet, in case you hadnt noticed yet, can be a dangerous place. Apple has often been criticised for its restrictions on what programs its users can and cannot load onto an iPhone. Users are required to download apps from the well-marshalled Apple App Store, which provides a secure gated compound within which software has been scrutinised by Apple before being made available for download.

While this may be seen as nannying, in a world of ruthless ransomware and untold other malicious programs that can ruin both our computers, our bank accounts, and even our lives whats wrong with a benign governess? The Android app store by comparison allows users to install any software of their choice, not all of which has been closely inspected for vulnerabilities or malicious intent.

The iPhone makes extensive use of state-of-the-art cryptography to protect data on the device. Cryptography provides mathematical tools to ensure secret data is kept secret, ensuring data is not maliciously altered or deleted, and identifies the source of data. Cryptography is easy to get wrong when used in a computer, but the iPhone mostly gets cryptography right. Everything from photos, messages, email and app data is protected using strong cryptography. The iPhone also supports innovative applications of cryptography, such as the contactless payment system ApplePay.

Cryptography relies on cryptographic keys, which are secret components critical to providing secure services, and security. Many of the spectacular past failures of security technology, for example the infamous Diginotar hack, have resulted from careless management of keys. There is no point, after all, in using the best lock to lock your front door, only to leave the key under the doormat. The iPhone has a secure hardware vault known as the Secure Enclave within which its critical keys are safely stored. In fact the keys are so safe that they are inaccessible even to Apple or any other companies involved in manufacturing iPhones.

Read More

Which brings us to the matter of Apples skirmish with the FBI. Apple has been at the forefront of a much wider and more fundamental debate about security and privacy on the internet.

In one corner stand national security agencies and law enforcement. They have been demanding the means to access data secured on mobile phones, including encrypted messaging services like WhatsApp and emails, in order to defend the realm. In the other corner stand proponents of digital freedom. They argue that building backdoors into strong encryption even for legitimate use by investigators would become a potential weakness for cybercriminals to exploit.

Apple has not shied away from taking a strong stance in favour of privacy. Apple does not know the keys on your iPhone, or the PIN needed to unlock it, by design. That protects you from Apple, just as much as it prevents Apple handing them over to law enforcement. The iPhone was designed to be secure, so why make it insecure just because bad guys sometimes use them?

Apples security design decisions havent always made them popular, especially among its community of developers or with government agencies. But, unlike many of its competitors, the iPhone is a personal device which is just as secure for children and grandparents to use as it is for the few these days who really understand how the technology works. Thats something to celebrate, not bemoan. So, many happy returns to the iPhone, perhaps the closest weve come to having a secure computer in our pocket.

This article was originally published on The Conversation. Read the original article.

Keith Martin receives funding from the EPSRC and the European Commission.

Kenny Paterson receives funding from EPSRC and the European Commission. He is co-chair of the Crypto Forum Research Group of the Internet Research Task Force. He serves as an advisor to Huawei Technologies, SkyHigh Networks and CYBERCRYPT ApS.

Excerpt from:
Happy 10th birthday iPhone, the nearest thing to a secure pocket computer - Yahoo News

Kenny Paterson The Conversation – The Conversation UK

I obtained a B.Sc. in 1990 from the University of Glasgow and a Ph.D. from the University of London in 1993, both in Mathematics. I was then a Royal Society Fellow at Institute for Signal and Information Processing at the Swiss Federal Institute of Technology, Zurich, from 1993 to 1994. After that, I was a Lloyd's of London Tercentenary Foundation Research Fellow at Royal Holloway, University of London from 1994 to 1996.

In 1996, I joined Hewlett-Packard Laboratories Bristol, becoming a project manager in 1999.

I then joined the Information Security Group at Royal Holloway in 2001, becoming a Reader in 2002 and Professor in 2004. From March 2010 to May 2015, I was an EPSRC Leadership Fellow working on a project entitled Cryptography: Bridging Theory and Practice. In May 2015, I reverted to being a Professor of Information Security.

My research over the last decade has mostly been in the area of Cryptography, with a strong emphasis being on the analysis of deployed cryptographic systems and the development of provably secure solutions to real-world cryptographic problems. I co-founded the Real World Cryptography series of workshops to support the development of this broad area and to strengthen the links between academia and industry. I am co-chair of the IRTF's research group on Cryptography, CFRG. This group is working to provide expert advice to the IETF in an effort to strengthen the Internet's core security protocols.

My research on the security of TLS (the Lucky 13 attack on CBC-mode encryption in TLS and attacks on RC4) received significant media attention, helped to drive the widespread adoption of TLS 1.2 with its support for modern encryption schemes, and was an important factor in the TLS Working Group's decision to abandon legacy encryption mechanisms in TLS 1.3.

I am lucky to have been the recipient of several prizes and awards for my research. These include a Google Distinguished Paper Award for my joint work with Nadhem AlFardan presenting plaintext recovery attacks against DTLS published at NDSS 2012; an Applied Networking Research Prize from the IRTF for my work with Nadhem AlFardan on the Lucky 13 attack; and an Award for Outstanding Research in Privacy Enhancing Technologies for my work with Mihir Bellare and Phil Rogaway on the Security of symmetric encryption against mass surveillance published at CRYPTO 2014. Most recently, my work with Martin Albrecht, Jean Paul Degabriele and Torben Hansen on symmetric encryption in SSH won a best paper award at ACM CCS 2016.

Other career highlights include being selected as Programme Chair for EUROCRYPT 2011, being an invited speaker at ASIACRYPT 2014, and becoming editor-in-chief of the Journal of Cryptology in 2017. I was made a fellow of the IACR in 2017.

Research interests:

Theoretical and Applied Cryptography Network Security Coding Theory and Mathematics of Communications

Read more:
Kenny Paterson The Conversation - The Conversation UK

Beware Cryptocurrency "Gold Rush Mentality": Aberdeen Asset Mgmt – Investopedia

On one hand, it's hard for many investors not to be excited about the meteoric rise of cryptocurrencies in the past few months. Bitcoin has roughly tripled in value since the beginning of the year, Ethereum is up by about 40 times, and Ripple, one of the newest arrivals on the scene, gained a shocking 3800%. What's more, the total market cap for the cryptocurrency industry has been steadily increasing as well, and more and more businesses are finding ways to incorporate digital currencies into their models and payment systems. However, with all of this excitement about the new industry, there are also many analysts approaching with caution. Aberdeen Asset Management is one of the latest firms to do so, suggesting that there is a virtual currency bubble which will, at some point, eventually burst.

In an interview with Bloomberg, the head of global venture capital at Aberdeen Asset Management had some words of caution for investors considering the cryptocurrency field. Peter Denious said that "prices right now aren't being driven by network usage, they're being driven by speculation that tokens are going to appreciate. It's a gold-rush mentality." Denious and others point to the rapid increase in the number of initial coin offerings, or ICOs, as well as the quick gains in the price of tokens upon listing as two signs that a bubble is in effect. ICOs are tremendously successful, with many companies operating in the blockchain space making millions of dollars in minutes, even if they have no proven or distinctive idea backing their token.

It may be important to note, however, that digital currencies are not the only assets which have seen gains to record levels in recent months. The returns on the leading cryptocurrencies so far in 2017 have been unparalleled in other areas, but other asset classes have also made impressive gains. Nasdaq and S&P 500 indices are at record levels, despite the widespread uncertainty surrounding global markets. At the same time, housing prices seem to have mostly recovered from an earlier burst.

Coin Telegraph suggests that the increase in asset prices may be due to large degrees of liquidity across global markets, thanks to quantitative easing by many central banks around the world. Considering this possible reason for the gains, it may not be just a cryptocurrency bubble that eventually bursts. If there is, in fact, a burgeoning bubble in either the real estate or equity worlds, those could have serious and long-lasting effects on the worldwide economy. As cryptocurrencies are untested, it's more difficult to say what the impact of a bubble burst would be in that area.

See original here:
Beware Cryptocurrency "Gold Rush Mentality": Aberdeen Asset Mgmt - Investopedia

AMD’s stock falls as Nvidia’s upcoming cryptocurrency GPUs pose a threat – MarketWatch

Advanced Micro Devices Inc.s stock fell Wednesday, bucking the sharp gains enjoyed by its peers and the broader stock market, amid growing concerns that cryptocurrency miners may start going elsewhere for their graphics cards.

The chip-makers stock AMD, -1.27% closed down 1.3% at $13.23, paring earlier losses of as much as 2.3% at an intraday low of $13.09. With volume of 84.8 million shares, the stock was the most actively traded on the Nasdaq exchange.

Meanwhile, the PHLX Semiconductor Index SOX, +1.77% climbed 1.8% and the S&P 500 index SPX, +0.88% rallied 0.9%.

Analyst Christopher Rolland at Susquehanna Financial said that after a recent trip to Asia, he can confirm recent media reports that key rival Nvidia Corp. NVDA, +3.53% will release two new cryptocurrency-specific graphics processing units (GPUs) during the third quarter. Nvidias stock surged 3.5% to snap a four-session losing streak.

As these new products are more price competitive, they may pose a risk to AMDs current offerings in the market, Rolland wrote in a note to clients. [The] new cards may upset AMDs alt-crypto coin dominance.

Nvidia said it had no comment. AMD did not respond to a request for comment.

AMDs stock has run up 16.7% year to date, after rocketing nearly fourfold in 2016, fueled by news that Apple Inc. AAPL, +1.46% would use AMD chips in its new iMac Pro. It also got a boost from a surge in demand from cryptocurrency miners and hard-core gamers and optimism over the release of new Epyc chips for the enterprise market.

Dont miss: AMDs stock extends rocket climb, fueled by tremendous graphics cards demand.

See also: AMDs stock takes another Epyc leap.

Nvidias stock hasnt been far behind, soaring 42.2% year to date after more than tripling in 2016, on the back of a strong showing in the server business and the potential for strength in the autonomous vehicles market.

On Wednesday, Mizuho Securities analyst Vijay Rakesh reiterated his bullish stance on Nvidia, while raising his stock price target to $17012.0% above current levelsfrom $145.

While the gaming business has been soft so far this year, conservative gaming estimates for the second half of the year could see upside, as near-term cryptocurrency and mining trends are driving GPU shortages and pricing, combined with new auto wins and ramps at ZF, Rakesh wrote in a research note.

Although AMD has held a dominant position in the cryptocurrency market, Susquehannas Rolland said that position could be threatened by the lack of supply of AMD GPUs and from a cost-reduced part supplied by the competing Nvidia. But perhaps not for very long, as AMD also have its own new offering coming soon, Rolland added.

We note that while contacts did not mention upcoming AMD mining-specific cards, some media reports suggest their coming arrival, perhaps favoring a modest swing in competition back to AMD, Rolland wrote.

Read the original here:
AMD's stock falls as Nvidia's upcoming cryptocurrency GPUs pose a threat - MarketWatch

Asus Announces New Graphics Cards Focused on Cryptocurrency Mining – CoinDesk

One of the world's largest technology hardware makers has announcednew graphics cards (GPUs) aimed at the cryptocurrency mining market.

Taiwan-based manufacturer Asus revaeledtheMining RX 470 and Mining P106,which were designed to handle the energy and heat intensive process of mining. Though not expressly pitched as such, the release is undoubtedly aimed at capturing some of the interest in mining ethereum. Bitcoin mining, by comparison, has evolved to a stage in which application-specific integratedcircuits, or ASICs, are required to compete.

Cryptocurrency mining is a process by which new transaction blocks are added to the distributed network. When this happens, new blockchain tokensare introduced to the system and awarded to the miner as compensation in this case, a profit is achieved when the cost of electricity and the operation itself is lower than the revenue generated by selling those tokens.

According to today's Asus announcement, the new cards are "engineered especially for coin mining, positioning the products as capable of providing "maximum mega hash rates at minimum cost".

Interest in cryptocurrency mining has led to reported shortages of GPUsin the global market. One hobbyist miner recently told CoinDesk that local tech stores have run low on the cards, adding that online marketplaces like Newegg, Amazon and eBay, among others, are also largely out of stock.

It's a situation that echoes the earlier "GPU rush" from 2014, when mining activity around alternative cryptocurrencies like dogecoin and litecoin led to similar price increases and a decline in available inventory.

Shortages aside, ethereum network data suggests that more hash rate is coming into ply as time goes on.

According to etherchain.org, the mining difficulty which rises as more hashing power is brought online nearlytripled from 27th April to 27th June.

TheRX 470 will be available worldwide, according to Asus, while the Mining P106 card will be available in China and Eastern Europe only,beginning in July.

Image via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

Read more from the original source:
Asus Announces New Graphics Cards Focused on Cryptocurrency Mining - CoinDesk

Illinois Is Venezuela and the Solution Is Cryptocurrency – Observer

The reason Im so much fun at parties is that my idea of a good time is to lecture everyone on cryptocurrency. I can pretty much talk bitcoin and blockchain with Hamiltonian fervor all night.

Ever since I began writing about cryptocurrency in general in 2013I believe this story I wrote for Esquire in fall of that year was the first ever mainstream media mention of Ripple (on whose board I now sit) I have been making one point to anyone who will endure my what is cryptocurrency lecture. People are all wrong about the difference between cryptocurrency and real money.

By real money, people invariably mean fiat currency issued by a government. To counter the argument that real money is somehow safer than crypto Ive pointed to Argentinas 40 percentinflation rate, or the Weimar Republic, and its famous wheelbarrows full of money to buy a loaf of bread (which was arguably intentional as Germany sought to repay Treaty of Versailles debt with devalued deutsche marks). And of course the world has watched in horror as Venezuela has devalued the bolivar to the point of meaninglessness.

These are not hypothetical examples. If you think this is all futurist theoretical BS, read up on the devastating effect hyperinflation is having as it transforms what was once South Americas most promising economy into a hellish nightmare in which people are eating their pets. Governments constantly, reliably, invariably and maddeningly ruin their own currencies by giving in to the temptation to overprint it. The beauty of bitcoin is that, like gold, the entire supply of it that will ever exist on earth (21 million coins), is known about, finite, and will never increase.

Still, as powerful as these examples aresome from recent second-world countries and others from past first-world countriesthey do not vividly resonate with Americans. That makes perfect sense. The U.S. dollar, after all, has been so reliable that the very countries I am criticizing, like Argentina and Venezuela, turn to the greenback and use it as a shadow currency to store value as their own money fails.

Even when we see American commodities change dramatically in price, like we witnessed with gasoline in 2008 when it reached $4.11 in July and fell to $1.84 in January, people dont readily seem to connect that its not just gasoline fluctuating but American money fluctuating. If my $10 bought 4 gallons of gas on October 1 and two gallons of gas on November 1, gas doubled in price just as the buying power of the American dollar was cut in half. Its the same thing. (Not precisely the same, actually, but close enough for the point Im making.)

So what Ive been searching for in these years of evangelizing and explaining the revolutionary power of cryptocurrencyincluding bitcoin, ethereum, ripple, litecoin, this new one BAT that Im interested in and othersto transform basically everything, are examples that will resonate without sounding like Im talking about 1930s Germany or the struggles of the second world. These last few weeks, I think Ive got what I need. And it comes heartbreakingly from my home state.

Illinois faces financial distress thats unprecedented for any American state. Without a budget for two years and sitting on top of over $15 billion in unpaid bills, the state is, to use a phrase that State Comptroller Susana Mendoza borrowed from Bonfire, hemorrhaging money as the states spending obligations have exceeded receipts by an average of over $600 million per month over the past year.

While the United States Constitution prevents a state from declaring bankruptcy the way places like Detroit and Orange County have, the situation is so dire that the Tribunes prestige columnist, John Kass, is only partially kidding when he calls for the state to be divided up between its five Midwestern neighbors.

Again, this is not just wonky penciling. The people of Illinois are being crushed by the burden imposed by a state that cannot pay its bills. The Chicago Public Schools, for example, must now pay 9 percent on its adjustable bonds because they are rated as junk. S&P is warning of a negative credit spiral and threatened to lower its rating even further if the state cannot hammer out a budget by July 1, which is less than a week away.

In other words, a bridge that used to cost $100 million to build because thats what it cost to borrow the money from bondholders, now might cost $150 million. Just as we saw in the gasoline example, anytime something costs more US dollars for the exact same product, you can look at it as the cost of a bridge going up, or you can look at it as the value of a dollar falling.

Thats why I believe in cryptocurrency.

Illinois cannot print its own money. I dont know what theyre going to do to crawl out of this mess. But there is no denying that all governments, including the United States, have manipulated their money supplies for political ends. And thats why I am so bullish on the future of cryptocurrency.

This isnt about whether bitcoin will soar to $5,000 or sink to $500. I think either is possible and equally likely, and Im not looking to give investment advice. All Im saying is that I trust currencies that are cryptographically enshrined and limited by the hard realities of math, at least as much as I trust human beings who are subject to the allure of popularity and other shiny objects.

The best book about cryptocurrency is Digital Gold by Nathaniel Popper. And the parts of it that most moved me occurred when he described how this incredibly complicated and novel technology actually affected human lives. One of the early innovators of the bitcoin ecosystem was Wences Casares, who founded Xapo and a bunch of other crypto-friendly fintech startups. When Casares was growing up in Patagonia in the early 80s, the Argentinian government was messing with its currency to disastrous effect. First, they issued a new peso, exchangeable for 10,000 of the old peso. When that failed, they rolled out something called the austral, which was worth 1,000 new pesos (ie, 10 million of the currency that had been in use two years earlier). The inflation rate was more than 1,000 percent a year. Casares describes his mother carrying two grocery bags filled with moneyher wages. He and his sisters rushed with her to the store to buy what they could because the market employed people who did nothing but walk the aisles all day repricing items.

These math-based moneys from the future have a lot of user-unfriendliness and even getting money into and out of accounts can be a customer service hassle. But bagfuls of nearly worthless cash are not an unimaginable reality for millions of people on the planet. Thats the human reason Im willing to continue to bore people with cryptoevangelism.

View post:
Illinois Is Venezuela and the Solution Is Cryptocurrency - Observer

TenX raises roughly $80 million for cryptocurrency payment system for everyday life – CryptoNinjas

Singapore-based startup TenX Technologies founded back in June 2015 with its co-founders wanting to solve the problem of cryptocurrencies not really able to be used in everydaylife. Most people trying to spend Bitcoin, Ethereum or many others realize quite fast that it is hard to connect this revolutionary but novel system with real world transactions.

Fast forward to this year two years later, the company is proud to report following a 1 million USD seed round at the beginning of 2017 with famous lead investor Fenbushi, TenX completed a successful token raise over this past weekend on June 24, 2017, 1 pm UTC.Itexchanged an equivalent of 245,832 Ether (valued at roughly 80 million USD at the time of the swap)to the companys PAY tokens at a rate of 350 PAY tokens per 1 Ether (with a 20% bonus during the first 24 hours). The PAY tokens will provide access to part of TenXs revenue of their already live payment service and also serves as a loyalty program to its own users.

Contributors only had 7 minutes to submit their contributions to TenXs receiving address before TenX stopped accepting further offers at 1:07 p.m. UTC. Roughly 4,000 people managed to participate directly while an additional several thousand people joined through pools to make it in time. Roughly 40,000 people did not manage to swap their tokens and will have to wait until July when the PAY tokens will be tradeable on cryptocurrency exchanges all over the world.

During the token swap, TenX accepted one of the most diverse ranges of tokens any company has ever provided. In addition to Ethereum, also ERC20 tokens, Bitcoin, Dash, and Litecoin were accepted. TenX made sure the transaction burden on the Ethereum network was kept to a minimum. By keeping contribution addresses unpublished until 15 minutes prior to the swap, TenX reduced unnecessary spamming of transactions leading up to the event. Transaction limits were also not suggested since such limits favor those who know how to bypass them. This technical finesse combined with authentic outreach such as their regular vlogmade the company ICO a success.

Instead of refunding this excess, TenX has agreed to honor all contributions stating: We will not withdraw the extra 45,000 ETH but rather leave them for additional liquidity in the crypto ecosystem to support a decentralized TenX as outlined in our white paper. This is actually a WIN-WIN for token holders AND the company.

This decision was made after estimations showed that in order to refund the excess Ether, close to 75% or 3,000 people would see their tokens canceled a move TenX did not want for its community. TenX offered to anyone unhappy with this arrangement to reach out prior to Tuesday, June 27, 2017, 11:59 pm EST, to receive a full refund, and has also confirmed once again that no new PAY tokens after the token swap will ever be created.

TenX will use these funds to develop their payment system even further from where it already is today: This includes apps for The Web, Android, and iPhone; debit cards and other further payment services; a decentralized system to connect any blockchain and thereby add any new cryptocurrency to the already existing multi-asset platform.

A detailed funding breakdown and the next steps for TenX are laid out clearly in its white paper.

Read the original post:
TenX raises roughly $80 million for cryptocurrency payment system for everyday life - CryptoNinjas

Crown Prince of UAE asked Americans to bomb Al Jazeera headquarters Wikileaks reveals – Middle East Monitor

The Crown Prince of the UAE Mohamed bin Zayed Al-Nahyan asked the Americans to bomb the headquarters of Al Jazeera during the US war on Afghanistan, Arabi21.com revealed yesterday.

According to the document bin Zayed spoke about a meeting between his father and the former Qatari Emir Sheikh Hamad bin Khalifa Al-Thani.

The same document also revealed that Bin Zayed had advised the Americans not to have journalists accompany them during the first attack on Afghanistan so they could not report civilian victims.

Read:$27,000 fine for Saudi hotels airing Al Jazeera

In addition, the document revealed a meeting between bin Zayed and the US diplomat Richard Haas two months before the war on Iraq. Bin Zayed offered information to the Americans about Iraq and how to contain the anger people in the Arab world felt about this war.

The document revealed that bin Zayed called on the Americans to put more pressure in Qatar to rein in Al Jazeeras coverage.

Read this article:
Crown Prince of UAE asked Americans to bomb Al Jazeera headquarters Wikileaks reveals - Middle East Monitor