Know Top Machine Learning Funding and Investment in Q3 & Q4 2021 – Analytics Insight

Artificial intelligence and machine learning have set the record of receiving funding and investment worth millions of dollars in 2021. Investors are eyeing multiple start-ups for providing machine learning funding as well as machine learning investment for lucrative ML models for the betterment of society. It has been observed that these ML funding and ML investments have started transforming the tech-driven market across the world. Lets explore some of the top machine learning funding and investment in Q3 and Q4 in 2021.

Landing AI rose US$57 million from Series A funding in November 2021 as one of the top machine learning start-ups in 2021. The investor is the first investment firm focused on the industrial IoT known as McRock Capital. It has continued to build tools to allow manufacturers to more easily deploy artificial intelligence systems. It is still in the early stage of the data-centric AI and machine learning movements through ML models. Landing AI is known for being fast and easy to use the enterprise MLOps platform. It applies machine learning to solve visual inspection problems efficiently and effectively.

H2O.ai is focused on the AI democratization journey with machine learning, automated machine learning, AI middleware, AI applications, and AI app stores. H20.ai has received US$100 million from Series E round with investors such as the Commonwealth Bank of Australia, Goldman Sachs, and many more. It has successfully raised US$246.5 million for this machine learning funding.

OctoML has received one of the top machine learning funding and investment with US$85 million from Series C for contributing to its machine learning acceleration platform. It helps enterprises in optimizing and deploying multiple ML models efficiently. The investors are Tiger Global Management, Madrona Venture Group, and more. This machine learning funding and investment have led OctoML to raise US$132 million in a year.

MindsDB is known as a machine learning-in-the-database open-source startup and has successfully received machine learning funding worth US$7.6 million. Walden Catalyst Ventures is the new investor interested in this machine learning investment with YCombinator, OpenOcean, and many more. It works with ML models by automating and abstracting machine learning through virtual AI tables in databases.

Being a popular machine learning provider, Manchester AI has received machine learning funding worth 1.5 million pounds. This machine-learning investment is provided by the GMCA (Greater Manchester Combined Authority Fund).

DataRobot has raised US$300 million from Series G as one of the top machine learning funding and investment in 2021. This round was led by Altimeter Capital and Tiger Global with many other investors. This new machine learning funding was set to increase platform innovation while bringing augmented intelligence. It has validated the vision of machine learning and human employees to provide predictive insights and business value to the consumer-centric market.

Share This ArticleDo the sharing thingy

About AuthorMore info about author

Link:
Know Top Machine Learning Funding and Investment in Q3 & Q4 2021 - Analytics Insight

IoTeXs MachineFi will Democratize IoT by Combining Machine Learning and DeFi – TechBullion

Share

Share

Share

Email

IoTeX recently announced the highly anticipated launch of MachineFi, in line with the goal of the founder,Dr. Raullen Chai, to help blockchain enthusiasts monetize machine-driven data, events, and tasks. MachineFi is an innovative combination of machine and DeFi, ultimately unlocking a trillion-dollar opportunity in the Metaverse and Web3.

Today, numerous machines have already started collaborating, producing, and distributing, and they consume information and resources collectively, forming a heterogeneous network of machines, explains IoTeX CEO and Founder Dr. Raullen Chai.

Machine networks are communicating with other machine networks accomplishing even more advanced tasks, Dr. Chai added. This is essentially a new form of economy, a machine economy or machine finance, which is MachineFi. MachineFi is here to reshape the future of the machine economy that is upon us.

A recent McKinsey report revealed that the Internet of Things (IoT) could unlock a global economic value of up to $12.6 trillion by 2030. Techjury also estimates that over 125 billion devices will be connected to the internet by the start of the next decade, powering that machine economy. Despite the amazing figures coming from both markets, there are not enough solutions to help blockchain enthusiasts leverage the fantastic features of the concepts. However, Dr. Chai and his team at IoTex seek to change this narrative. According to the IoT expert, the convergence of artificial intelligence, blockchain, cloud computing, edge computing, the Internet of things, 5G, computer vision, and augmented/virtual reality pushes human society through the next digital revolution wave.

The main objective of MachineFi is to transition traditional IoT and machine verticals into MachineFi decentralized applications (Dapps), enabling millions of users to participate in the machine economy with billions of smart devices.

MachineFi is the result of three years of the IoTeX teams continuous and tireless research and development and the establishment of a solid foundation, withDr. Xinxin Fan, IoTeX Blockchain and Cryptography Lead, championing the cause.

MachineFi ties the machines together, lets them trade information and resources in real-time, and at a global scale, which is unprecedented, explains Dr. Xinxin Fan.

By continuously improving the interactions between the physical and virtual worlds, the Metaverse is expected to transform every aspect of our lives and disrupt and reshape the next generation systems in all the sectors in a way that we are only beginning to imagine today, said Dr. Fan.

IoTeX is a revolutionary blockchain with the capability of shifting the balance of global wealth, which currently lies in the hands of the 1%. The goal of IoTex is to end the unethical and unscrupulous control of Big Tech firms, with MachineFi practically challenging the status quo through composability, bringing together the creativity and productivity of pioneering developers.

MachineFi consists of a suite of blockchain-based protocols such as DeFi, SSI, DAO, NFT, and decentralized device management to enable developers to build innovative machine-driven applications. MachineFi offers a comprehensive set of building blocks for developers creating machine-driven Dapps in the virtual world.

MachineFi realizes the vision that devices are owned by the people and are for the people. By participating in the machine economy, people can fully monetize their devices and associated digital assets on a global scale, concluded Dr. Chai.

Dr. Raullen Chai is the CEO and co-founder of IoTeX, a decentralised network for IoT. He is a member of the Centre for Applied Cryptographic Research (CACR), International Association for Cryptologic Research (IACR), and IEEE Communications Society, and joined Uber as head of cryptography R&D in 2016. He joined Google in 2013 was the founding engineer of Google Cloud Load Balancer (GCLB), which now serves thousands of cloud services with 1+ million queries per second. Dr. Raullen Chai got his Ph.D. degree from the University of Waterloo, focusing his research on cryptography, specifically in designing and analyzing lightweight ciphers and authentication protocols for IoT.

Dr. Xinxin Fan is a researcher, practitioner, and entrepreneur, with over 15 years of research and industry experience in the general area of information security and cryptography. The inventor of 15 patents filings in information security technologies and publisher of 50+ refereed papers in top-tier journals, conferences, and workshops, has more than 5 years of experience in business development and commercialization as well as project development or information security-related technologies.

For more information about MachineFi and other projects on the IoTex ecosystem, visit https://iotex.io.

Visit link:
IoTeXs MachineFi will Democratize IoT by Combining Machine Learning and DeFi - TechBullion

Andreessen Horowitz Leads Investment In Privacy Startup Integrating With Bitcoin – Forbes

Holding a glass, center right, Nym CEO Harry Halpin with Chelsea Manning, now security auditor for Nym, and supporters from Matter.VC and the LEAP Encryption Access Project at an afterparty for a pitch at Google NYC, 2017.

Working to make the internet more private, Nym Technologies recruited former U.S. Army intelligence analyst and whistleblower Chelsea Manning, who used privacy software Tor to leak thousands of classified documents in 2011. Now, with a fresh $13 million capital injection, valuing the three-year old Neuchtel, Switzerland-based company at around $270 million, Nym is gearing up to accelerate the advent of the private web powered by blockchain.

Revealed exclusively to Forbes, the Series A financing round was led by Silicon Valley monolith Andreessen Horowitz (a16z Crypto). Other investors include Barry Silberts Digital Currency Group, Tayssir Capital, Huobi Ventures, HashKey, Fenbushi Capital, and more than two dozen operators of validator nodes, or servers responsible for verifying transactions on the startups network.

Following a $2.5 million seed investment led by Binances VC arm and incubator in 2019 and a Polychain Capital-led $6.5 million raise which closed this July, Nyms latest round signals the growing interest in privacy preserving technologies, no longer a niche avail of the paranoid and the criminal. And the world at large is paying attention.

Encryption is becoming an incredibly important component of the internet today, says Ali Yahya, general partner at Andreessen Horowitz, and Nym provides privacy at the very bottom layer as a foundation for other private solutions to be built on top.

The Nym blockchain uses a mix network, or mixnet, where nodes are rewarded with tokens to shuffle internet traffic. If needed the nodes can inject dummy packets of data to make it harder for adversaries to decode information even at the highest level. Nym CEO Harry Halpin, who had worked at the World Wide Web Consortium with Web inventor Tim Berners-Lee prior to founding the firm in 2018, says this approach, offering what he calls network level privacy, can defeat even nation-state level mass surveillance, unlike VPNs or the Tor network.

That said, Nym is not trying to directly compete with Tor. We do recommend people use the Tor Browser, Halpin notes, but for bitcoin and Layer 2 solutions I think, we would be a better fit. In fact, Nym has been rewarding its network node operators with bitcoin. In the long run, he hopes Nyms technology could be integrated with protocols like Lightning, an additional layer built on top of the bitcoin network for instant, high-volume micropayments.

Prior to founding Nym in 2018, Harry Halpin had worked with World Wide Web inventor Tim Berners Lee.

Chelsea Manning, who is now working closely with Halpin on client side security, told Forbes Nym has demonstrated it has secured its mixnode process to a degree worthy of investment."

While not every privacy startup uses crypto, those that do have found renewed success raising capital, says Halpin, who in 2017 managed to raise only a few thousand dollars for a similar idea that didnt use blockchain. By contrast, Nyms network, which is now operating in test mode with approximately 5,000 nodes and 30 validators, is expected to go live at full capacity by the end of this year.

Notably, this is at least the fifth blockchain-related privacy investment for the rounds lead investor Andreessen Horowitz. Others include cloud computing firm Oasis Labs, zero-knowledge private applications platform Aleo, blockchain and software development company Orchid Labs, and infrastructure builder for private data on Ethereum, Keep. Since 2018, when Nym was established, funding for privacy startups has picked up: more than two thirds of the total $3.1 billion raised by companies in the field has come in the past four years, according to Crunchbase.Not to mention, many privacy-focused cryptocurrencies have proven to be sound investments this year, with several quietly outperforming bitcoin during the current bull market.

Ahead of its mainnet launch, Nym has already begun deploying fresh capital for new hires, expanding the original eight-member team to 30. Among them is Nyms cofounder George Danezis, who briefly left the project to help design Facebooks controversial digital currency Libra when another company he cofounded, Chainspace, was acquired by the social media giant. Danezis rejoined Nym in October. Additionally, Halpin says Nym will be giving out grants to independent third party developers starting next year.

Nym team at their first in-person meeting during the Covid-19 pandemic in Crete, Greece, Oct. 2021.

Last week, the team rolled out a wallet for node miners, through which they can pledge tokens to join the Nym network, earn reputation and, consequently, more tokens, based on the amount and quality of mixing the internet traffic. This helps ensure that the quality of service is sufficient for the network to remain usable and incentivizes miners to do the work correctly, Halpin explains. Though much of Nyms tokenomics is still in the works, he believes these economic incentives combined with mixnets potential will help Nym to make privacy real on the scale of the entire internet.

Continued here:
Andreessen Horowitz Leads Investment In Privacy Startup Integrating With Bitcoin - Forbes

‘Trans Awareness Week’ Sounds Nice, but We Need Action – The Daily Beast

I recently learned this is Transgender Awareness Week. In San Francisco, Massachusetts, and other places, its actually Trans Awareness Month. What?

I was unaware Lambda Legal has been marking the event since 2013, the year I came out. Its even been a thing at Yale University since 2004!

But why do we need trans awareness anything? If you were to rely purely on my own reporting, Dave Chappelle, Texas Republicans, and their far-right Christian conservative compatriots in nine other states certainly seem to be well aware of trans people. If thats what awareness brings, Id rather be ignored than be in their crosshairs.

And it turns out, I am not alone in becoming newly aware of this awareness week.

I didn't know there was a Trans Awareness Week until this month, Terra Field told The Daily Beast. Field, a software engineer at Netflix, is on voluntary medical leave and pursuing unfair labor practice charges with the National Labor Relations Board along with another trans woman who was fired following last months Chappelle shitshow.

Even though Field said shell join fellow members of the streaming services trans employee resource group for Saturdays commemoration of the annual International Trans Day of Remembrance, she has no plans for trans awareness week. So, apparently I had missed the memo. You know, I do think I maybe have to update the address for all of my official trans cabal emails.

As do I, apparently.

Field is the out trans woman who Netflix suspended after she publicly critiqued the companys decision to stream Chappelles transphobic special. Netflix claimed her tweeting the names of all the trans people murdered in 2021 had nothing to do with her suspension. Her bold action garnered more than 51,000 likes.

Field said shes been tempted to retweet that thread, not for awareness week, but given last weeks controversial comments by executives at the BBC. They echoed Netflix co-CEO Ted Sarandos infamous message to employees: There will be things on Netflix that you dislike. That you even find to be harmful.

The BBCs outgoing head of news Fran Unsworth made eerily similar remarks, reportedly warning LGBTQ employees to be prepared to hear content you dont personally like and see things you dont likethat's what the BBC is, and you have to get used to that.

Uh, no, they dont. As The Daily Beast reported, at least five BBC employees quit in protest. Not an ideal solution, Ill admit.

But lets be aware of one thing above all, the overarching problem for the trans community right now is not that our feelings are hurt. We are exhausted from having to fight inequity and inequality at every turn, in every part of life that cisgender people take for granted: the workplace, across social media, in mass entertainment media and even in everyday commerce, where simply insisting upon our pronouns being respected makes us a target for ridicule.

Were not offended. Were trans people that exist on the internet. We are well beyond offended. Nothing is going to offend us, Field explained. When I saw the BBC use that, I dont know how to better articulate that offended is not what were talking about here.

What were talking about is, enough is enough. Its time for trans people across America to take action that will demonstrate that were past awareness, to show that were not going to put up with our civil rights being endangered and outlawed. Were not waiting to be rounded up when Trump-loving Republicans are once again in charge of our government. Author and activist Brynn Tannehill foresees an epoch of rage and despair is coming. The dam will break eventually, she tweeted.

Out trans civil rights attorney Chase Strangio expressed his own exasperation on Twitter.

I am a little over awareness, the American Civil Liberties Union lawyer tweeted Saturday. When is our week of solidarity and mobilization?

Not everyones ready to march, of course. Chelsea Manning, the out trans former U.S. Army intel analyst who leaked classified documents to WikiLeaks, responded to Strangio: We need time to heal and reconnect some time.

Pioneering trans journalist Gwendolyn Ann Smith, who created the forerunner of TDOR 22 years ago, said these times demand action, with at least 46 trans and gender nonconforming individuals murdered so far in 2021, according to the Human Rights Campaign.

I feel like awareness week is milquetoast. Its soft-edged, and made palatable for the masses, she told The Daily Beast. It just feels like it doesnt do much more than a ribbon magnet. Smith said she is 100 percent with Chase on this.

So what does Smith suggest as an alternative? She advocates for self-defense classes for trans women, and more: I wish that, rather that awareness, there were real things. Address the issues that lead someone to be honored for TDOR, she said. Provide concrete resources, strike back against the hatred and prejudices. Provide assistance to our trans siblings in need.

"People understand our story better, not just us, focusing inward on how bad things are, Field added. Were making other people aware of what we've lost because our community is not valued by people outside of our community."

Thats the mission of trans activist Alex Petrovnia, president of the Step Up 4 Trans Kids Trans Formations Project to enlist opponents to anti-trans legislation across the U.S. He told The Daily Beast awareness cannot be the end goal.

My group is really about raising the understanding of what's going on and trying to get people to contact their representatives, not because that is the only thing that needs doing, because I think thats the place to start, he said. Awareness is the first step. You cant stop there.

With Monica Roberts gone a year and a month, I fear we have no general to stand up and lead this movement in the direction of action. According to Strangio, the ACLUs trans legal eagle, awareness is the last thing we need:

The right-wing legislatures that introduced over 100 anti-trans bills in 2021 are aware of usand they want to eradicate us. The right-wing media is aware of us and are using a campaign of weaponized misinformation to compromise our survival. So many people are aware and organized to hurt us while so many of our supposed allies are aware and doing nothing remaining complicit in this moment of complete violence.

Please turn your awareness into action, into love, into being a co-conspirator, concluded Strangio in an Instagram post. We are about to witness new levels of assault on trans survival. Fight with us.

A new year will bring even more anti-trans legislation, which the Biden administration and ACLU are already challenging. But it wont be enough without cisgender people taking a stand, with us and for us.

So, now youre aware. The question is: What are you going to do about it?

Read more here:
'Trans Awareness Week' Sounds Nice, but We Need Action - The Daily Beast

M.I.A. Shares Previously Unreleased Song and Video Babylon, Which Is Being Auctioned as NFT – Complex

M.I.A.is still riding the NFT train.

The British artists previously unreleased song and video Babylon,teased earlier this week, is now part of a non-fungible tokenauction via Foundation, along with 10 othertracks from her 2010 mixtapeVicki Leekx. The winning bidders will receivethe mastered audio of the songs as well asexclusive high-resolution visuals directed by M.I.A.

Vicki Leekx will reportedly hit streaming platforms at a later date.

Profits from the 24-hour auction, which kicked off at 3 p.m. ETFriday,will support the Courage Foundation, an international organization that supports whistleblowers rights andfreedom of the press, as well as the release ofJulian Assange, the embattled WikiLeaks founder who inspired theVicki Leekx tape. Assange is accused of conspiring with ex-U.S. Army intelligence analyst Chelsea Manning to obtain and publish secret government documents. He was ultimately hit with over a dozen criminal counts, including violations of the Espionage Act.

In a 2019 interview with Al Jazeera, M.I.A. spoke about her opposition to Assanges extradition to the United States, and described him as an icon on a scale weve never had.

I dont think [the U.S. has] got it right, this big conspiracy with Assange, or for thinking Assange is the big cause of all the shitin the world, she told the outlet. Assange is not the problem. He demonstrated an alternative solution, turning up at a time when we needed it most. Persecuting him wont solve any of the problems we have as humanity going forwards.

You can watch the full Babylon video on M.I.A.s OHMNI website.

See the original post:
M.I.A. Shares Previously Unreleased Song and Video Babylon, Which Is Being Auctioned as NFT - Complex

How to encrypt files in Windows – PCWorld

Most of us have some rather sensitive files on our PCs. Whether its our tax returns, financial records, password lists (seriously, just use a password manager already), or just files you dont want anyone to see under any circumstances, we all have our reasons for wanting a bit more security. This means that its time to get into encryption, which is where a drive, file, or folder is encoded (encrypted) so as to make it unreadable to anyone except the person with the right key to decrypt it. The upside is that anyone attempting to access it without the password will fail, and the downside is that if you lose the encryption key (usually a password), whatever you had encrypted will be gone forever, unless theres a way to recover it.

Luckily, in Windows you have options on how to do this for absolutely no cost whatsoever. Windows 10/11 Pro users have encryption tools built into the OS; while users of the Home variant must use a free third-party utility. Whether you want full-drive encryption, or just a secure space to keep your important records, one of these tools will fit the bill.

Windows 10 or 11 Pro offers two built-in encryption tools: There is this simple tool, which can be used to encrypt any filehowever, in our testing we had issues with it, so we recommend using the other option, Bitlocker. Bitlocker offers full-drive encryption only, however, but thankfully you can choose between encrypting the entire drive, or just the space thats being used. Encrypting an entire drive does incur a performance penalty, but if its your work laptop and everything you are working on is on your C:/ drive, its a good option to consider. Its also a good option for external drives, as most of us have lost a few of those over the course of our lives, and lord knows what we had on them when we did so. Setting up Bitlocker is relatively painless, so follow along.

If you just type the word Bitlocker in Windows search itll appear, or you can find it in the Control Panel listed as Bitlocker Management. When you open it, youll be presented with a list of your attached storage devices, both internal and external. Were going to install it on our external drive, F.

Josh Norem/IDG

After youve enabled Bitlocker on the drive of your choice, Microsoft will ask you how you want to unlock the drive, either via a password or with a Smart Card; we chose a password. If you choose a Smart Card youll need a USB drive, which will be paired with a PIN code to unlock the drive.

Josh Norem/IDG

Next, Microsoft will ask you how you want to restore the recovery key, which could save your behind if you ever forget your password, or lose your Smart Card. We chose to have the recovery key accessible via our Microsoft Account, as that seems to be the most secure method of storing it, and definitely smarter than printing it out!

Josh Norem/IDG

One of the last steps is deciding how much of the drive to encrypt: all of it, or just the used space. We chose just the used space simply because it should result in faster drive performance.

Josh Norem/IDG

Youll also have to choose which encryption mode you want: one that works with newer PCs, or one thats compatible with older versions of Windows. Since we only have Windows 10/11 PCs in our house, we chose the newer version.

Josh Norem/IDG

Were all set now, so go ahead and click Start Encrypting. On our 256GB test drive, the encryption process took just a few seconds. Once its complete, your data is now encrypted.

Josh Norem/IDG

Going forward, inserting the now-encrypted drive results in the error seen below, instead of just automatically opening like it does for external storage.

Josh Norem/IDG

Youll also get a pop-up from Windows asking you to type the encryption password, or the recovery key. Thankfully, Windows gives you the option of automatically unlocking on a certain PC, which is handy if youre using it a lot on a home PC as opposed to a laptop.

Josh Norem/IDG

If you have the Home version of Windows, you can still get in on the encryption game with Veracrypt, which is a free utility that can encrypt a folder, drive, or partition. This handy tool lets you mount an encrypted virtual disk in Windows, MacOS, and Linux. When you enter your password the disk is mounted and your files appear, but when you close the program, the disk unmounts and the files are no longer accessible. We didnt test the disk or partition encryption, so these instructions only apply to creating an encrypted folder. Lets jump in, shall we?

To get started, download the free utility and fire it up. To begin, youll need to create the encrypted volume, so click on Create Volume.

Josh Norem/IDG

On the next screen we chose Create an encrypted file container, as were just looking for a repository for our sensitive documents and media.

Josh Norem/IDG

Next we chose Standard Veracrypt volume as its fine for the vast majority of home users.

Josh Norem/IDG

Next you have to choose the location for this file, so consider the size of the folder you will create, and make sure your storage device has enough room to hold it. We made a folder on one of our hard drives labeled Veracrypt since were good at hiding things, and then typed the name of the file into the dialogue box that appeared, resulting in what you see in the screenshot. Also note you can create this volume on a removable drive too.

Josh Norem/IDG

Next you have a lot of encryption options, but just select AES and click through. AES-256 encryption is considered the strongest form of encryption and cannot be cracked with brute strength, so it should work for your purposes.

Josh Norem/IDG

Now decide how big you want your container to be. You cant go back and make it bigger later, so shoot for the moon, assuming you have enough room. We decided to make ours 1GB.

Josh Norem/IDG

With that information inputted, the program is ready to create the volume on your drive. Dont be afraid by all the hacker looking stuff on the screen, just click Format and youre off to the races.

Josh Norem/IDG

Once the process is completed, it will show you that the volume is ready.

Josh Norem/IDG

You can now navigate to where the container is just to verify its existence and see its file size, if that is important to you. Youll note that clicking on it does nothing, as you have to use the Veracrypt program to actually open it, so lets do that now.

Josh Norem/IDG

Now its time to access our encrypted volume. Open Veracrypt and choose Select File from the main menu, then navigate to the folder where its located. Youll also need to choose a volume letter from the list provided, so choose one that is not in use like X or M, something like that. Once youve chosen the volume letter, and navigated to the file, click Mount.

Josh Norem/IDG

After that completes youll see the same window with the path to your file in blue. Double-click that and the volume will open. You will also see the same volume appear in This PC as well, if you prefer that method.

Josh Norem/IDG

Et voilahere are our encrypted files! These are quite sensitive cat photos, obviously, but feel free to throw anything you want in there, knowing its about as secure as it can possibly be for now.

Josh Norem/IDG

One final note: As long as the volume is mounted, it is accessible. So that means if you open it up, put some files in it, then just walk away from your PC, anyone with physical access to it can also look at the files. To complete the process, you have to click Dismount on the main screen of Veracrypt to shut the door on your encrypted folder. Once youve dismounted the volume, it will no longer be accessible without the encryption password.

Josh Norem/IDG

If you want to encrypt your drive to prevent unauthorized access, its built right into Windows Pro versions, so it is worth it on something that might get smashed and grabbed from a car, such as a laptop. For your desktop PC that never moves, the benefits are debatable. We do like having an encrypted folder via Veracrypt, however, for all of our tax returns and similar documents. Just be absolutely sure you keep the password somewhere safe, since you will never get back into that secure disk if you lose it.

Continued here:
How to encrypt files in Windows - PCWorld

How To Talk to Strangers Where No One Can See You – The Phoenix – Swarthmore College The Phoenix Online

Today, Im writing about something that was first used by the Ancient Mesopotamians. It used to be illegal to export under weapons trafficking treaties, and it is frequently bemoaned by law enforcement. Its also a critical component of almost every electronic device, and without it, the global economy would come to a screeching halt. Im talking, of course, about encryption algorithms.

Encryption is technically a subset of cryptography, which is the study of how to communicate securely in the presence of an adversary (who might try to eavesdrop, edit, or disrupt said communication). To encrypt something is to take some information, like my password is 1234, and combine it with a key (a chunk of hopefully random data) via some encryption algorithm such that it becomes unreadable gibberish. Said gibberish is only decipherable by providing an identical key, or a key thats mathematically related to the original key in a complicated way.

The kind of encryption youre most likely familiar with is symmetric encryption: encrypt a message with one key, and decrypt it with the same key. Symmetric encryption dates back to ancient times; Julius Caesar invented (or popularized) a cipher where the letters of the alphabet were simply shifted some number of places down (e.g. A becomes C, B becomes D, and so on). But cryptography didnt really take off until the early 20th century, with the advent of technologies like radio, which enabled longer-range communication at the cost of being trivially easy to eavesdrop on. World War II saw use of the Enigma Machine, a fascinatingly complicated electromechanical device that was only decoded by the Allies after a Herculean effort. These days, though, encryption generally refers to modern computerized algorithms like AES.

AES is short for Advanced Encryption Standard and has been the standardized encryption method for the U.S. governments classified information since 2002. Its also used for most web traffic, disk encryption on iOS and macOS, password managers, end-to-end encrypted chat applications, and a zillion other things. In fact, most modern processors have specific hardware components just to encrypt and decrypt AES data. But symmetric encryption still has a flaw: you need both parties to have the same key for them to talk to each other. How does that happen when theres no secure communication channel, like when accessing a website over the Internet? It would obviously be impractical for every computer to come pre-programmed with what would be millions or billions of different encryption keys for everything. So, we need a way for two parties, communicating solely over an insecure communication channel, to have a conversation thats impervious to eavesdropping. It sounds impossible, but as it turns out, its perfectly achievable with a bit of sorcery known broadly as asymmetric-key encryption.

Its not particularly an exaggeration to say that without asymmetric-key encryption, the Internet wouldnt exist anywhere near its current form. It would be impossible to transmit any sensitive information like credit cards, passwords, or private email, unless you obtained an encryption key offline (which kind of obviates the entire point). Its hard to speculate on exactly what an Internet in this world would look like, or whether it would exist at all, but I can safely say that it would be a lot worse than it is now.

So how does asymmetric-key encryption work? The first hint is in a more common name for it: public-key cryptography. Instead of one key that encrypts and decrypts (symmetric encryption), asymmetric encryption uses a pair of keys: a public key and a private key. If you encrypt a message with the public key, it can only be decrypted with the corresponding private key, and theres no way you can figure out the private key from just the public key. So, you can make the public key as public as you want: transmit it over a public WiFi network, give it to your friends, even post it on social media. Meanwhile, the private key is private only to you. If someone wants to send you a message, all they have to do is encrypt it with your freely available public key and transmit it to you through any channel, even an insecure one. You can think of public-key cryptography as like a safe with two separate keys one key can only lock, and the other one can only unlock. You can duplicate the locking key as much as you want, and anyone can use it to put stuff in the safe and then lock it. But to access whats inside after the safe has been locked, youd need your secret unlocking key.

But the lock analogy breaks down at a certain point, because theres no difference in principle between the public and private key. If I encrypt something with my private key, it can only be decrypted with the corresponding public key. This is useful for identity verification through something called a digital signature. If I take a message, encrypt it (or sign it) with my private key, and publish the encrypted and original messages together, then you can verify the encrypted message decrypts successfully to the original. If they match, then you know I am who I say I am. (This concept, by the way, is key to the security of blockchain-based cryptocurrency: transfers out of a specific account are only accepted by the rest of the network if they have a valid digital signature proving that whoever submitted the transfer possesses the private key for said account.)

The specific mathematical underpinning behind public-key cryptography is sort of complicated and varies based on the specific algorithm. For many algorithms, we rely on the fact that multiplying very large numbers together is relatively easy, while finding the factors of a very large number is very, very hard. (For performance reasons, some modern algorithms use things that are kind of similar to large numbers like elliptic curves, but we can safely ignore that.) Either way, though, the mathematical details of public-key cryptography are somewhat less interesting than the fact that it exists and you can do things with it.

Almost everything you do on the Internet nowadays relies on public-key cryptography. If youre reading this on a computer, the webpage was transmitted via the HTTPS protocol, which (to simplify things) means your computer transmitted an encrypted request using The Phoenix websites public key, which lets your computer talk to the server through a private channel. If youre reading this in the print edition, then public-key cryptography was still involved I send in these articles via email, which involves my computer making a secure connection to my mail server using its public key via the same method. (Technically, asymmetric encryption is generally used just to secretly transmit a key for symmetric encryption, since symmetric encryption is considerably faster.)

But why does any of this matter, aside from it being really cool and interesting? Well, Ive previously written about why HTTPS makes paying for a VPN somewhat unhelpful for a lot of people. Today, though, Im going to cover end-to-end encryption, which is a fascinating application of cryptography and an interesting thing to be aware of in your own life.

When you send an email, its (usually) encrypted in transit via the methods I talked about above: if someone is eavesdropping on your Internet traffic, they cant read your mail. But once it reaches your mail server, its decrypted and is readable by your mail provider (e.g. Gmail). Its important to note that readable doesnt mean someone at Google is regularly snooping through your mail to learn all your secrets, it just means that Googles systems can process the plain contents of messages. This can be for innocuous reasons: checking whether messages are spam, for instance, or automatically adding a booking to your calendar based on a confirmation email. But theres nothing technically stopping Google from scanning your email to target advertisements. (Google explicitly says that they dont do this. Sometimes it might seem like they do, but those are often cases where, e.g., you search for winter coats, spend an hour browsing winter-coat-related websites, and then see an ad for winter coats next to an email you sent to a friend asking about coat recommendations.)

But the fact that Google could read your email if they wanted to is more important in a different way: if Google can theoretically do it, then the government can too. If youre worried about government surveillance (from any government), then you dont care what a company says they will or wont look at, you want a cryptographic guarantee that they cant provide data to anyone even if they were made to by a court order, subpoena, or police raid. This is where end-to-end encryption comes in.

End-to-end encryption is when your data stays encrypted all the way from you to the person or people youre talking to. Most commonly, this is in the context of chat applications like WhatsApp or iMessage. To secure your messages, instead of the server publishing its public key, everyone on the service publishes a public key. The private keys never leave each persons device. If you want to send a message to your friend, you ask the server for your friends public key and use it to encrypt the message. The server here just passes encrypted messages back and forth, so all it can possibly know is when you send messages and who you send them to. (Through a little bit more cryptography, its actually also possible to also obscure the fact that youre sending the messages kind of like dropping a letter in a mailbox without writing a return address.) Actual end-to-end encryption as implemented also uses a bit more stuff on top of the public/private key business, via something called a double ratchet: the two parties constantly change their public and private keys via an agreed-upon method. This means that if a private key is compromised, an attacker can only view a few messages before the keys are regenerated.

Full end-to-end encryption (or at least, end-to-end encryption that didnt suck) was pioneered in 2013 by what would eventually become Signal. Signal was the first end-to-end encrypted messaging app that tried to be usable by non-computer-nerds while still being secure, and as a result has seen extensive use among whistleblowers, journalists, and any social movement you care to name. But whats had an even bigger impact is the Signal Protocol that the Signal app was built on. The protocol defines a standardized and secure method for sending text and other communication completely securely between two or more parties. In 2016, WhatsApp, the most popular messaging application in the world, switched over to the Signal Protocol for all of its messages and data. This means that every text sent on WhatsApp is unreadable to WhatsApp, its parent company Facebook, or anyone else, except the intended recipients. (Unlike Signal, however, WhatsApp does collect and use data about when and to whom messages were sent, and might use that information to target advertisements.)

So, if end-to-end encryption is so easy to use, why isnt it used for everything? Mostly because it turns out that not having a usable copy of your data stored on a companys servers is annoying from a usability standpoint for anything more complicated than simple text chat. You may have experienced this yourself if youve ever been added to a WhatsApp group chat in progress: since previous messages were only encrypted with the previous participants keys, you cant read them and miss any context that happened before you got there. End-to-end encryption also means that mirroring messages or conversations between multiple devices is difficult: since only your phone holds the keys to decrypt the messages, keeping chat records consistent between your laptop and phone requires awkward relay setups. Finally, its sort of pointless for public-facing things like social media where everyone is supposed to be able to read it anyway.Notice that in this article I havent really talked about any possibility of breaking a key. Thats because modern encryption algorithms are, for all intents and purposes, unbreakable: cracking a single 256-bit AES key with every computer on the planet would take about 14 thousand trillion trillion trillion trillion, or 14,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000, years.

Its impossible to even begin to give a perspective on how big that number is. If you try to express it in terms of multiples of the age of the universe, another mind-bogglingly big number, you get another number thats still too big to properly express. (About 900 thousand trillion trillion trillion times the age of the universe, if youre wondering.) But the fact that properly implemented AES encryption is effectively impossible to break via computational brute force doesnt mean that your secrets are necessarily safe from, say, regular brute force (as a classic xkcd comic illustrates). One of the fundamental lessons of encryption (and indeed of all computer security) is that the humans that use encryption algorithms are almost always more vulnerable to deception, persuasion, or blunt force trauma than the algorithms themselves. It doesnt matter how big your encryption key is if the password used to generate said key is just the word password.

View original post here:
How To Talk to Strangers Where No One Can See You - The Phoenix - Swarthmore College The Phoenix Online

Will you be ready when quantum breaks encryption? Steps to take now to prepare – Lexology

While the potential opportunities quantum brings are impressive, the seismic risk it poses to current encryption methods cannot be ignored. Do you know the steps your organisation should be taking now to reduce your quantum cyber risk?

Last week Rob Sumroy, head of Slaughter and Mays Tech practice, spoke at ITech laws European conference on this very subject. He was joined by Dr Ali El Kaafarani (a visiting professor at Oxford University and founder of PQShield) and Professor Yasser Omar (Professor at IST University of Lisbon and President of the Portuguese Quantum Institute).

The problem quantum will break commonly used PKC

Put simply, we know that our data and systems need to be kept secure, and encryption methods like RSA (a type of public-key cryptography or PKC) help us do this. However, a cryptographically relevant quantum computer will, in the future, be able to solve the mathematical problems on which these encryption methods are based exponentially faster than a classical computer can. This means that an encryption algorithm that would have taken thousands of years to break (making it unbreakable in practice) could be cracked in a day or so by a quantum computer, creating both a current, and future, risk:

The solution

Thankfully, a number of solutions to the encryption problem exist, and there are steps organisations can take now to prepare.

The international community has been developing quantum-proof encryption based on both classical computing (quantum-safe cryptography) and quantum mechanics (quantum key distribution).

What can organisations do?

Organisations should consider the quantum risk now, and build transitioning to quantum-safe products and services into their future plans. Preparations include:

For more information on quantum, please see our quantum computing podcasts series, which includes a podcast on Cyber security in the era of quantum with Dr Ali El Kaafarani and Robert Hannigan (Chairman of BlueVoyant International and ex Director of Government Communications Headquarters (GCHQ)).

Read the rest here:
Will you be ready when quantum breaks encryption? Steps to take now to prepare - Lexology

How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud – BollyInside

This tutorial is about the How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud. We will try our best so that you understand this guide. I hope you like this blog How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud. If your answer is yes then please do share after reading this.

The WhatsApp messaging service adds end-to-end encryption to the backups of its users data stored in iCloud or Google Drive. WhatsApp introduced encryption to its messaging service in 2016, although there have been doubts recently about claims that it prevents surveillance. Now, the Facebook-owned service has announced that the users own backup of messages will be end-to-end encrypted if stored on Google Drive or Apples iCloud.

While the end-to-end encrypted messages you send and receive are stored on your device, many people also want a way to back up their chats in case they lose their phone, the company said in a post. blog. Starting today, we offer an optional additional layer of security to protect backups stored on Google Drive or iCloud with end-to-end encryption.

IPhone owners should note that an unencrypted version of their chat history is backed up to iCloud if they have iCloud backup enabled. To make sure this doesnt happen, you need to disable iCloud Backup and only allow WhatsApp to upload backups directly to iCloud Drive.

I hope you understand this article How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.

See more here:
How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud - BollyInside

Vaultree’s Executive Team and Advisors Drive Innovation in the Cybersecurity Industry – Yahoo Finance

Encryption Startup Assembles Expert Security Advocates to Guide Company Growth

CORK, Ireland, Nov. 18, 2021 /PRNewswire/ -- Vaultree, provider of Encryption-as-a-Service, announced today that it has assembled a highly qualified roster of executives and advisors comprising some of the cybersecurity industry's most experienced luminaries. This team brings together engineering know-how and business-savvy entrepreneurship to steer Vaultree's direction and growth.

(PRNewsfoto/Vaultree)

The executive team is made up of five co-founders who bring a wealth of varied experience:

Dr. Kevin Curran is a professor of cybersecurity, executive co-director of the Legal Innovation Centre and group leader of the Cyber Security and Web Technologies Research Group at Ulster University. He sits on the Advisory Group of the UK Cyber Security Council and the Northern Ireland Civil Service Cyber Leadership Board (FBBA).

Maxim Dressler is a project and sales leader with international experience in the software and fintech industry in leading commercial and strategic roles. His drive to make his clients' lives easier has contributed to his track record of establishing new brands, opening markets and implementing processes.

Ryan Lasmaili is a commercial and strategic leader with international experience in leading complex projects across different verticals. With 12 years of startup experience, he is an expert in technical product development, market growth strategy and business operations. In the last five years, Ryan's core focus has been on complex cybersecurity and encryption development.

Shaun McBrearty is a software security engineer with over 10 years of experience in designing, implementing, testing and deploying cryptographic solutions. His expertise is developing solutions that overcome the shortcomings of traditional cryptographic algorithms.

Tilo Weigandt is a program manager, strategic tech marketer and business developer with a "nothing is impossible" attitude and more than a decade of experience in starting things from scratch, developing highly scalable tech products, business segments and brands in global markets. Data protection lies at the heart of everything he has been implementing.

These experts comprise Vaultree's Board of Advisors:

Story continues

John N. Stewart Former Cisco chief security & trust officer and "Startup Whisperer," using his 30 years of cybersecurity experience to provide guidance to startups.

Sarah Armstrong-Smith Microsoft's chief security advisor and a keynote speaker on cybersecurity and information protection.

Stav Pischits Co-founder at Cynance and Cyber Club London, and a director of ISACA.

Rik Ferguson Vice president of security research at Trend Micro, special advisor to Europol's Cybercrime Centre, and co-founder of Respect in Security.

David Currie Nubank's chief information security officer with a history of IT leadership roles, including cryptography.

Leticia Gammil Cisco Security channels leader and the founder and president at WOMCY, a non-profit focused on the development of cybersecurity.

Andreas Bittner Managing director at Vanguard and a co-founder and COO of Solaris Bank.

Rik Ferguson, Vaultree advisor and vice president of security research at Trend Micro, said: "The world of cybercrime and the lack of accessible and affordable data encryption continues to be a threat to businesses around the globe. During my 27 years of experience in information security, I have yet to see a solution that offers a fully encrypted, searchable and scalable solution like Vaultree's, which is why I am working with this team of experts."

Shaun McBrearty, co-founder, Vaultree, said: "Cybercrime rates are climbing every year, proving a need for a new generation of data protection. This is why we made it our mission to create an encryption-as-a-service software that provides a scalable, easy-to-use solution to protect business data and make data protection attainable for enterprises of any size. We are grateful to be working with a seasoned team of experts as we chart our growth course."

About VaultreeVaultree's Encryption-as-a-Service solution enables businesses of all sizes to process fully end-to-end encrypted data. Easy to use and integrate, Vaultree delivers peak performance without compromising security, neutralizing the weak spots of traditional encryption. Follow Vaultree on Twitter @Vaultree or LinkedIn. Visit http://www.vaultree.com and join our waitlist to stay up to date on product development and company news.

Media Contact Madison DailyNadel Phelan, Inc. madison.daily@nadelphelan.com

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/vaultrees-executive-team-and-advisors-drive-innovation-in-the-cybersecurity-industry-301427750.html

SOURCE Vaultree

See the original post:
Vaultree's Executive Team and Advisors Drive Innovation in the Cybersecurity Industry - Yahoo Finance