CoinSwitch: Buy Bitcoin and Cryptocurrency at India’s Leading Crypto …

1. What is crypto?

Cryptos are decentralised digital assets operating on blockchain technology. There are more than 5000 crypto out there, Bitcoin being the first-ever crypto launched.

2. Is crypto legal in India?

No law in India makes buying or selling cryptos illegal.

3. What is the future of crypto trading in India?

Since 2020, Crores of Indians have dipped their toes into cryptos, and with the number going up every day, India looks exciting for the crypto revolution. The government is also actively trying to set up a regulatory framework for its smooth functioning, the recent MCA amendment being the first step.

4. How to buy crypto in India?

CoinSwitch has simplified cryptos for Indians, you can download our Android and iOS app to begin trading in crypto with just 100

5. Why CoinSwitch is the best crypto trading platform in India?

Unlike other crypto exchanges, CoinSwitch pools liquidity from leading crypto exchanges in India and globally to enable users to trade in cryptos at the best rate.

Read more here:
CoinSwitch: Buy Bitcoin and Cryptocurrency at India's Leading Crypto ...

IBM Quantum roadmap to build quantum-centric supercomputers | IBM …

Two years ago, we issued our first draft of that map to take our first steps: our ambitious three-year plan to develop quantum computing technology, called our development roadmap. Since then, our exploration has revealed new discoveries, gaining us insights that have allowed us to refine that map and travel even further than wed planned. Today, were excited to present to you an update to that map: our plan to weave quantum processors, CPUs, and GPUs into a compute fabric capable of solving problems beyond the scope of classical resources alone.

Our goal is to build quantum-centric supercomputers. The quantum-centric supercomputer will incorporate quantum processors, classical processors, quantum communication networks, and classical networks, all working together to completely transform how we compute. In order to do so, we need to solve the challenge of scaling quantum processors, develop a runtime environment for providing quantum calculations with increased speed and quality, and introduce a serverless programming model to allow quantum and classical processors to work together frictionlessly.

But first: where did this journey begin? We put the first quantum computer on the cloud in 2016, and in 2017, we introduced an open source software development kit for programming these quantum computers, called Qiskit. We debuted the first integrated quantum computer system, called the IBM Quantum System One, in 2019, then in 2020 we released our development roadmap showing how we planned to mature quantum computers into a commercial technology.

As part of that roadmap, in 2021 we released our IBM Quantum broke the 100qubit processor barrier in 2021. Read more about Eagle.127-qubit IBM Quantum Eagle processor and launched Qiskit Runtime, a runtime environment of co-located classical systems and quantum systems built to support containerized execution of quantum circuits at speed and scale. The first version gave a In 2021, we demonstrated a 120x speedup in simulating molecules thanks to a host of improvements, including the ability to run quantum programs entirely on the cloud with Qiskit Runtime.120x speedup on a research-grade quantum workload. Earlier this year, we launched the Qiskit Runtime Services with primitives: pre-built programs that allow algorithm developers easy access to the outputs of quantum computations without requiring intricate understanding of the hardware.

Now, our updated map will show us the way forward.

In order to benefit from our world-leading hardware, we need to develop the software and infrastructure so that our users can take advantage of it. Different users have different needs and experiences, and we need to build tools for each persona: kernel developers, algorithm developers, and model developers.

For our kernel developers those who focus on making faster and better quantum circuits on real hardware well be delivering and maturing Qiskit Runtime. First, we will add dynamic circuits, which allow for feedback and feedforward of quantum measurements to change or steer the course of future operations. Dynamic circuits extend what the hardware can do by reducing circuit depth, by allowing for alternative models of constructing circuits, and by enabling parity checks of the fundamental operations at the heart of quantum error correction.

To continue to increase the speed of quantum programs in 2023, we plan to bring threads to the Qiskit Runtime, allowing us to operate parallelized quantum processors, including automatically distributing work that is trivially parallelizable. In 2024 and 2025, well introduce error mitigation and suppression techniques into Qiskit Runtime so that users can focus on improving the quality of the results obtained from quantum hardware. These techniques will help lay the groundwork for quantum error correction in the future.

However, we have work to do if we want quantum will find broader use, such as among our algorithm developers those who use quantum circuits within classical routines in order to make applications that demonstrate quantum advantage.

For our algorithm developers, well be maturing the Qiskit Runtime Services primitives. The unique power of quantum computers is their ability to generate non-classical probability distributions at their outputs. Consequently, much of quantum algorithm development is related to sampling from, or estimating properties of these distributions. The primitives are a collection of core functions to easily and efficiently work with these distributions.

Typically, algorithm developers require breaking problems into a series of smaller quantum and classical programs, with an orchestration layer to stitch the data streams together into an overall workflow. We call the infrastructure responsible for this stitching To bring value to our users, we need our programing model to fit seamlessly into their workflows, where they can focus on their code and not have to worry about the deployment and infrastructure. We need a serverless architecture.Quantum Serverless. Quantum Serverless centers around enabling flexible quantum-classical resource combinations without requiring developers to be hardware and infrastructure experts, while allocating just those computing resources a developer needs when they need them. In 2023, we plan to integrate Quantum Serverless into our core software stack in order to enable core functionality such as circuit knitting.

What is circuit knitting? Circuit knitting techniques break larger circuits into smaller pieces to run on a quantum computer, and then knit the results back together using a classical computer.

Earlier this year, we demonstrated a circuit knitting method called entanglement forging to double the size of the quantum systems we could address with the same number of qubits. However, circuit knitting requires that we can run lots of circuits split across quantum resources and orchestrated with classical resources. We think that parallelized quantum processors with classical communication will be able to bring about quantum advantage even sooner, and a recent paper suggests a path forward.

With all of these pieces in place, well soon have quantum computing ready for our model developers those who develop quantum applications to find solutions to complex problems in their specific domains. We think by next year, well begin prototyping quantum software applications for specific use cases. Well begin to define these services with our first test case machine learning working with partners to accelerate the path toward useful quantum software applications. By 2025, we think model developers will be able to explore quantum applications in machine learning, optimization, natural sciences, and beyond.

Of course, we know that central to quantum computing is the hardware that makes running quantum programs possible. We also know that a quantum computer capable of reaching its full potential could require hundreds of thousands, maybe millions of high-quality qubits, so we must figure out how to scale these processors up. With the 433-qubit Osprey processor and the 1,121-qubit Condor processors slated for release in 2022 and 2023, respectively we will test the limits of single-chip processors and controlling large-scale quantum systems integrated into the IBM Quantum System Two. But we dont plan to realize large-scale quantum computers on a giant chip. Instead, were developing ways to link processors together into a modular system capable of scaling without physics limitations.

To tackle scale, we are going to introduce three distinct approaches. First, in 2023, we are introducing Heron: a 133-qubit processor with control hardware that allows for real-time classical communication between separate processors, enabling the knitting techniques described above. The second approach is to extend the size of quantum processors by enabling multi-chip processors. Crossbill, a 408 qubit processor, will be made from three chips connected by chip-to-chip couplers that allow for a continuous realization of the heavy-hex lattices across multiple chips. The goal of this architecture is to make users feel as if theyre just using just one, larger processor.

Along with scaling through modular connection of multi-chip processors, in 2024, we also plan to introduce our third approach: quantum communication between processors to support quantum parallelization. We will introduce the 462-qubit Flamingo processor with a built-in quantum communication link, and then release a demonstration of this architecture by linking together at least three Flamingo processors into a 1,386-qubit system. We expect that this link will result in slower and lower-fidelity gates across processors. Our software needs to be aware of this architecture consideration in order for our users to best take advantage of this system.

Our learning about scale will bring all of these advances together in order to realize their full potential. So, in 2025, well introduce the Kookaburra processor. Kookaburra will be a 1,386 qubit multi-chip processor with a quantum communication link. As a demonstration, we will connect three Kookaburra chips into a 4,158-qubit system connected by quantum communication for our users.

The combination of these technologies classical parallelization, multi-chip quantum processors, and quantum parallelization gives us all the ingredients we need to scale our computers to wherever our roadmap takes. By 2025, we will have effectively removed the main boundaries in the way of scaling quantum processors up with modular quantum hardware and the accompanying control electronics and cryogenic infrastructure. Pushing modularity in both our software and our hardware will be key to achieving scales well ahead of our competitors, and were excited to deliver it to you.

Our updated roadmap takes us as far as 2025 but development wont stop there. By then, we will have removed some of the biggest roadblocks in the way of scaling quantum hardware, while developing the tools and techniques capable of integrating quantum into computing workflows. This sea change will be the equivalent of replacing paper maps with GPS satellites as we navigate into the quantum future.

This sea change will be the equivalent of replacing paper maps with GPS satellites.

We arent just thinking about quantum computers, though. Were trying to induce a paradigm shift in computing overall. For many years, CPU-centric supercomputers were societys processing workhorse, with IBM serving as a key developer of these systems. In the last few years, weve seen the emergence of AI-centric supercomputers, where CPUs and GPUs work together in giant systems to tackle AI-heavy workloads.

Now, IBM is ushering in the age of the quantum-centric supercomputer, where quantum resources QPUs will be woven together with CPUs and GPUs into a compute fabric. We think that the quantum-centric supercomputer will serve as an essential technology for those solving the toughest problems, those doing the most ground-breaking research, and those developing the most cutting-edge technology.

We may be on track, but exploring uncharted territory isnt easy. Were attempting to rewrite the rules of computing in just a few years. Following our roadmap will require us to solve some incredibly tough engineering and physics problems.

But were feeling pretty confident weve gotten this far, after all, with the new help of our world-leading team of researchers, the IBM Quantum Network, the Qiskit open source community, and our growing community of kernel, algorithm, and model developers. Were glad to have you all along for the ride as we continue onward.

Quantum Chemistry: Few fields will get value from quantum computing as quickly as chemistry. Even todays supercomputers struggle to model a single molecule in its full complexity. We study algorithms designed to do what those machines cant.

Here is the original post:
IBM Quantum roadmap to build quantum-centric supercomputers | IBM ...

Just the Facts: What We Know About the NSA Spying on Americans

In the wake of former NSA contractor Edward Snowdens revelations about the governments widespread capability to gather, store and analyze emails, phone calls and internet traffic, the Obama administration has repeatedly suggested the public needs to understand the facts. Read our previous story, How Good Are the Checks on NSA Surveillance? Let us know in the comments if youve seen other statements you think we should check out.

There is no spying on Americans,Obamatoldlate-night comedian Jay Leno in an interview earlier this month.

But as more details emerged about the governments extensive surveillance network last week, the National Security Agency admitted that there had, in fact, been willful violations of its own restrictions on spying on Americans, but that those instances had been very rare, according toBloomberg News.

This weekend The Wall Street Journal reported additional details: Its story suggested NSA analysts broke the rules to read their love interests e-mails and other communications often enough that the behavior was given a nickname LOVEINT. (The intelligence community tends to attach -INT to their intelligence monikers. Information gleaned from people, for example, is called HUMINT.)

The NSA says it punished these transgressions with administrative sanctions, and in some cases, termination.

In the past year, the NSA has repeatedly denied that it is collecting data on U.S. citizens. In March 2012, NSA chief Keith Alexander told Congress that his agency doesnt even have the ability to collect data on Americans.

This past March, James Clapper, the director of the Office of National Intelligence, the top intelligence official in the country, testified that the NSA does not wittingly collect data on Americans. After the Snowden leaks he sent a letter to Sen. Dianne Feinstein, apologizing for his clearly erroneous testimony, because he simply didnt think of a major provision of the Patriot Act.

Officials had even told the Foreign Intelligence Surveillance Court, the legal entity set up to oversee it, that the NSA gathered no communications between people in the U.S.

In a declassified FIS Court filing last week, the court said it had since learned that was not the case. There is no question that the government is knowingly acquiring Internet transactions that contain wholly domestic communications through its upstream collection, the ruling found.

The NSA gathers intelligence under Section 702 of the FISA Amendment Act, which allows the NSA to gather data on non-U.S. citizens outside the U.S. It also gathers tens of thousands of domestic communications by and from Americans in its normal gathering of foreign surveillance, according to Wednesdays declassified court finding.

According to documents leaked by former NSA contractor Edward Snowden, the government has also been collectingAmericans phone records in bulk, andscooping up their emails, browsing history and social-media activity.

Since 2011, the NSA has determined on its own that it has the legal authority to search within the data it collects using U.S. citizen names and other identifying information,accordingto an Aug. 9 report by theGuardian, citing a document from Snowden. The document said analysts wouldnt be able to start those searches until the NSA developed an oversight process, but its unclear when or whether it did so.

In the wake of Snowdens leaks, the Obama administration has set up a review board to examine the NSAs policies that is mostly composed of former Obama administration officials. It will provide an interim report in 60 days and a final report by the end of the year.

Read the rest here:
Just the Facts: What We Know About the NSA Spying on Americans

Poll: Majority of Americans Say Big Tech Censorship of Hunter Laptop …

Over half of Americans believe media censorship of the Hunter Biden laptop story constitutes election interference, a new survey finds.

The survey from the Media Research Center found 49 percent of respondents said it was inappropriate for social media sites to suppress an October 2020 New York Post report that showed Hunter promised Ukrainian business partners access to his father. Twitter suspended the Posts account following publication and blocked users from sharing the link. Fifty-two percent of respondents said the blackout constituted election interference.

Big tech has come under fire over the past year for censoring posts on hot-button issues. Facebook has regularly removed or suppressed content that suggests COVID-19 escaped from a Chinese lab. The platform also removed posts from a Gold Star mother critical of Biden's handling of the death of her son. Twitter this month suspended the account of Rep. Jim Banks (R., Ind.) after he referred to a transgender Biden official as a man.

The Media Research Center survey found that the ban on the Hunter Biden story also shaped voters' perceptions of Joe Biden. Almost 30 percent of respondents said they would have been less likely to vote for Biden if they had been aware of evidence Biden lied about "knowledge of his son Hunter's overseas business dealings."

When the story first broke, media outlets labeled it Russian disinformation, even though there was no evidence that Russian agents were behind the story or that the emails had been falsified. The survey found that line has stuck with many voters, with 30 percent still saying the story was Russian disinformation.

Dan Gainor, a vice president at the Media Research Center, said the survey showed "people are finally catching on to how much we're getting manipulated by big tech." He framed the survey results as a reflection of widespread concerns about self-rule, asking the Washington Free Beacon, "How can democratically elected countries survive if big tech decides it wants to pick who wins the election?"

Read more:

Poll: Majority of Americans Say Big Tech Censorship of Hunter Laptop ...

Doctors slam COVID government censorship exposed in ‘Twitter Files’: ‘On the road to totalitarianism’ – Fox News

  1. Doctors slam COVID government censorship exposed in 'Twitter Files': 'On the road to totalitarianism'  Fox News
  2. Twitter Files 9.0 reveals a web of social media surveillance, censorship by not just FBI, other agencies too  WION
  3. 'Twitter files' data reveals Biden admin pushed to censor Covid info, suspend some accounts  India Today

Read the rest here:

Doctors slam COVID government censorship exposed in 'Twitter Files': 'On the road to totalitarianism' - Fox News

System.Security.Cryptography.CryptographicException: The payload was …

When you are using your .Net Core application to decrypt a string from a different machine than it was encrypted, you may run into the following exception:

Exception:

System.Security.Cryptography.CryptographicException: The payload was invalid.

at Microsoft.AspNetCore.DataProtection.Cng.CbcAuthenticatedEncryptor.DecryptImpl(Byte* pbCiphertext, UInt32 cbCiphertext, Byte* pbAdditionalAuthenticatedData, UInt32 cbAdditionalAuthenticatedData)

at Microsoft.AspNetCore.DataProtection.Cng.Internal.CngAuthenticatedEncryptorBase.Decrypt(ArraySegment`1 ciphertext, ArraySegment`1 additionalAuthenticatedData)

at Microsoft.AspNetCore.DataProtection.KeyManagement.KeyRingBasedDataProtector.UnprotectCore(Byte[] protectedData, Boolean allowOperationsOnRevokedKeys, UnprotectStatus& status)

at Microsoft.AspNetCore.DataProtection.KeyManagement.KeyRingBasedDataProtector.DangerousUnprotect(Byte[] protectedData, Boolean ignoreRevocationErrors, Boolean& requiresMigration, Boolean& wasRevoked)

at Microsoft.AspNetCore.DataProtection.KeyManagement.KeyRingBasedDataProtector.Unprotect(Byte[] protectedData)

at Microsoft.AspNetCore.DataProtection.DataProtectionCommonExtensions.Unprotect(IDataProtector protector, String protectedData)

Two things you will need to check:

1. Is the encryption key persists to a local path? - The key needs to bepersisted to a shared location

2. SetApplicationName must be used to set an explicit application name. - If ApplicationName is not set, it will be generated a guid at runtime for different machines, and that will lead to the error above.

Code Example below:

services.AddDataProtection()

.ProtectKeysWithCertificate(x509Cert)

.UseCryptographicAlgorithms(

new AuthenticatedEncryptorConfiguration()

{

EncryptionAlgorithm = EncryptionAlgorithm.AES_256_CBC,

ValidationAlgorithm = ValidationAlgorithm.HMACSHA256

}

)

.PersistKeysToFileSystem(new System.IO.DirectoryInfo(Configuration.GetValue("KeyLocation"))) //shared network folder for key location

.SetApplicationName("MyApplicationName")

.SetDefaultKeyLifetime(TimeSpan.FromDays(600));

Visit link:
System.Security.Cryptography.CryptographicException: The payload was ...