Bit Digital Bitcoin Mining Company Releases the First Half 2020 Financial Results Announcing Over $10 Million Worth of Bitcoins Earned – PRNewswire

NEW YORK, Oct. 28, 2020 /PRNewswire/ --Bit Digital, Inc. (Nasdaq: BTBT), the Nasdaq listed Bitcoin mining company headquartered in New York, released the first half 2020 financial results report at 9:00 EST on October 19, 2020. The report showed the Company has earned 949.51 bitcoins since its principal business shifted to bitcoin mining in February 2020.

Highlights from the first half 2020 financial results include as follows:

1) Bit Digital (NASDAQ: BTBT) has reached 1250 PH/s of bitcoin hash rate capacity and ranked one of the largest Nasdaq listed bitcoin mining company in terms of the computer power.

2) Bit Digital launched its bitcoin mining operation in February 2020. As of the date of the report, 22,869 miners have generated an aggregate of 949.51 bitcoins, approximately $10.08 million.

3) Bit Digital's bitcoin mining business rapidly expanded. As of June 30, 2020, the bitcoin mining business has generated over $690,000 in revenue.

4) Bit Digital disposed of its peer-to-peer lending business and car rental operations in PRC.

The full first half 2020 financial results report is available on https://bit-digital.com/financial-informationand showed that after the shift of the main business of Bit Digital's (NASDAQ: BTBT) to bitcoin mining, the Company swiftly accumulated computing power while rapidly expanded operations and miners. Erke Huang, the Chief Financial Officer of the Company, said, "The bitcoin mining industry is becoming a sought for alternative asset allocation, and we're looking forward to making bitcoin mining business more accessible to the public and investors."

Safe Harbor Statement

This press release may contain certain "forward-looking statements" relating to the business of Bit Digital, Inc., and its subsidiary companies. All statements, other than statements of historical fact included herein are "forward-looking statements." These forward-looking statements are often identified by the use of forward-looking terminology such as "believes," "expects" or similar expressions, involve known and unknown risks and uncertainties. Although the Company believes that the expectations reflected in these forward-looking statements are reasonable, they do involve assumptions, risks and uncertainties, and these expectations may prove to be incorrect. Investors should not place undue reliance on these forward-looking statements, which speak only as of the date of this press release. The Company's actual results could differ materially from those anticipated in these forward-looking statements as a result of a variety of factors, including those discussed in the Company's periodic reports that are filed with the Securities and Exchange Commission and available on its website at http://www.sec.gov. All forward-looking statements attributable to the Company or persons acting on its behalf are expressly qualified in their entirety by these factors. Other than as required under the securities laws, the Company does not assume a duty to update these forward-looking statements.

For more information, please contact:

Erke Huang, CFOEmail: [emailprotected]Phone: +1 347-328-3680

SOURCE Bit Digital, Inc.

Homepage

More here:
Bit Digital Bitcoin Mining Company Releases the First Half 2020 Financial Results Announcing Over $10 Million Worth of Bitcoins Earned - PRNewswire

Farnell inks deal with Industrial Shields to distribute o… – evertiq.com

andreypopov dreamstime.comBusiness | October 30, 2020

The benefits of utilising open source hardware has been argues for quite some time, but one of the main benefits is the opportunity to bring industrial products to market at a lower cost and in less time than designing with proprietary processor boards.The new partnership strengthens Farnells industrial automation and control portfolio by providing more options to customers developing monitoring, control or automation solutions based on single board computers (SBCs). The addition of this new range of PLCs, Panel PCs and the Open Mote B ultra-low-power communications board for the Internet of Things (IoT) will further boost Farnell's catalog. Automation continues to grow in all domestic and industrial sectors including home and factory automation, large buildings and smart cities. The use of open source hardware removes any lock-in associated with proprietary PLCs, giving customers much more control and ownership of the design. Many designers are already familiar with the programming environment of Raspberry Pi and Arduino, which offers easy access to powerful tools and information about the design and operation of the products. Developers of industrial automation solutions also have the option to integrate a greater range of electronic components into their designs, reducing the cost of end products.Farnell will now stocks Industrial Shields full product range, including automation devices such as the Touchberry Pi 10.1 Panel PC, based on the Raspberry Pi 4B; the ARDBOX PLC product family, based on the Arduino Leonardo board; the Ethernet-enabled M-DUINO PLC family of PLCs. This new global franchise with Industrial Shields increases our range of PLCs and Panel PCs giving our customers greater choice of low cost and flexible devices to support their automation needs. The innovative use of open source hardware will create designs that speed time to market, reduce costs, and put the customer in control. This is a key addition to our automation range, bringing the benefits of industrial automation closer to our customers than ever before, says Lee Turner, Global Head of Semiconductors and SBC at Farnell in a press release.The collaboration with Farnell gives us the opportunity to continue growing. Thanks to this agreement, we are consolidating our position as the leading manufacturer of open source-based systems for industrial automation, and strengthening our company's international presence. In addition, the fact that a prestigious group such as Farnell is committed to Industrial Shields products gives our customers the peace of mind of using safe, quality systems, adds Albert Prieto, CEO of Industrial Shields.

Read more:
Farnell inks deal with Industrial Shields to distribute o... - evertiq.com

Harness these three types of developer collaboration tools – TechTarget

No software project gets very far without the means to plan, communicate and track work. Developer collaboration tools must provide ways to track and assign tasks, work together on software, report progress and share code among team members. Otherwise, you have a bunch of developers, not a development team.

Key categories of developer collaboration tools include project management, communication and code collaboration tooling. Let's explore each tool category to understand how developers collaborate.

Notable examples of project management software tools include:

Developers on a project team must track and manage work. Work can include tasks as well as issues to resolve. Project management tools should give developers a system to organize work itself: what work is completed, what tasks are behind and where task dependencies exist. This type of developer collaboration tool can also visualize information about the work a development team needs to do, via diagrams like Gantt, PERT and burn down charts.

The following project management tools address these needs and offer basic functionalities, such as privacy settings and team member tagging.

Jira. This Atlassian tool is designed for Agile adopters. The tool facilitates sprint planning, user story management and more. With Jira, a development team can view a project on a roadmap, Kanban board and to-do list.

Jira includes a healthy list of product integrations via the Atlassian Marketplace, which can provide options not available natively, such as a tool for a calendar view. Jira includes prebuilt workflows for Trello and also connects with other Atlassian tools like Confluence and Bitbucket.

Trello. Trello, another Atlassian product, breaks down projects into Kanban boards; each board into lists; and each list into a set of cards. In a typical example, a board has lists that represent a different step in a development team's workflow, and each list's cards are descriptions of specific tasks. Developers can move a card from one list to another to indicate it's ready for the next stage. They can add details, files, due dates and comments to each card.

Asana. Asana can display work in various formats including checklists, a timeline and Kanban boards. Asana offers an out-of-the-box calendar view. Asana's checklist/to-do list functionality lets users create subtasks, attach files to tasks and add category tags.

Airtable. Airtable enables developers to look at a project's work in progress in a spreadsheet interface, calendar format, visual-centric gallery and Kanban board format. Additionally, the vendor has a low-code/no-code tool, Airtable Apps, available at the pro pricing tier to augment a team's dashboard. Prebuilt app templates are available.

Smartsheet. The Smartsheet platform emphasizes its grid -- i.e., spreadsheet -- to provide a 30,000-foot view into projects and ongoing work. The product also provides Kanban card, calendar and Gantt chart view options. Smartsheet dashboards offer a look at crucial metrics.

Monday.com. This product uses the term pulses, in place of tasks, to describe work. Monday.com is otherwise similar to other project management tools -- users can assign a status, deadline and dependencies to a team member for each pulse. Monday.com has far fewer integrations than other project management tools. Managers could find this tool to be a good choice to see what team members' respective workloads look like.

The list of communication tools a development team could use includes:

Constant emailing back-and-forth is a disorganized and inefficient way for team members to communicate. With the proliferation of remote and globally distributed work, it's not often feasible to walk over to a co-worker's desk or schedule an in-person meeting. Developers need capable and user-friendly communication tools.

Slack. Slack is a messaging platform that supports conversations across multiple channels and via direct message. Users can log onto their organization's Slack workspace via a browser, desktop application or mobile app.

Organizations often create channels for different teams, initiatives or projects -- only for the team members involved in that particular group. Channels can be public or private. Slack also offers audio and video calling, as well as screen sharing functionality.

Developers can program Slack bots to perform a number of functions. For example, Slack bots can share links or files when team members type a specific command.

Slack directly integrates with a variety of applications -- Google Drive, OneDrive, Google Calendar, Outlook, Gmail, GitHub, Trello, Asana, Jira and Zoom are just a few.

Teams. Microsoft Teams is a channel-based messaging platform that allows group chats and direct message conversations. Teams works in a desktop browser, in a downloaded app or on a mobile device.

Each Teams chat tracks the files uploaded in a channel, and users can simultaneously edit Word docs, Excel spreadsheets and other files directly in Teams. Additionally, Teams has video chat functionality with features like screen sharing and hand raising.

The list of Microsoft Teams integrations includes Box, Asana, Smartsheet, Jenkins, Trello, Jira, GitHub and Zoom.

Google Meet. Google Meet is a business video conferencing tool. Google Meet is free until March 31, 2021. After that grace period, non-enterprise accounts will have a 60-minute time limit. However, Google Meet lacks features like breakout rooms and hand raising. Also, the service requires each user to have a Google account.

Zoom. Zoom has standard features for a video conferencing app, including webinar capabilities, live chat, recording capabilities, screen-sharing and breakout rooms. Plus, attendees don't need an account to join a Zoom meeting. Zoom has paid and free options. Any meeting on the free version of Zoom with three or more people has a 40-minute time limit.

Developers can choose from code collaboration or version control tools, such as:

To do programming on a group project, developers need a place to store code and juggle contributions to a single codebase coming from multiple people. A version control system enables developers to perform various actions, including check out code, fork a repository, create a branch, merge code changes and pull others' changes. Additionally, a version control tool keeps a history of the changes made to a codebase.

GitHub. This code-hosting service allows multiple developers to work on the same application at once. Respondents to Stack Overflow's 2020 Developer Survey said they used GitHub more than any other collaboration tool, including Slack, Jira and Google Suite.

GitHub integrates with several app-dev platforms and numerous programming languages. Add-ons are available for most project management or communication tools. GitHub offers free unlimited public and private repositories for an unlimited number of collaborators, as well as paid versions for additional storage, security and automation support. GitHub also has features for dev and project management.

GitLab. GitLab is another prominent service that hosts repositories. The open source tool provides Git-based code hosting, CI/CD functionalities, wiki features and issue tracking. GitLab provides access to an unlimited number of collaborators, and both public and private repositories. However, the tool's free tier lacks some dashboard features, business support, multi-region accessibility and compliance automation, which are provided in paid tiers.

Bitbucket. One of the draws of the Bitbucket repository hosting service is the built-in integration with other Atlassian tools like Jira. Bitbucket allows developers to organize repos into projects, which can help dev team members stay on task. Bitbucket's free plan offers an unlimited number of private repositories, but Atlassian caps it at five developers. Bitbucket's standard pricing tier of $3 per user each month is Atlassian's cheapest paid option and allows for an unlimited number of developers.

Read the original post:
Harness these three types of developer collaboration tools - TechTarget

Niklas Gray’s Blog – The Machinery Goes Open Beta – Gamasutra

I've written a lot of blog posts here on Gamasutra about the design decisions and implementation choices we have made in our game engine: The Machinery. So I'm happy to announce that The Machinery is now in Open Beta, available for anyone to download and try out.

The download includes all the engine APIs, headers, and docs, so you can see how a lot of the stuff I've written about here works in practice. For example, check out foundation/carray.inl and foundation/hash.inl to see our type-safe C implementations of arrays and hash tables, that I talked about in the MinimalistcontainerlibraryinC blog post. Or foundation/slab.inl for a similar implementation of the bulk data storage model that I talked about in the DataStructuresPart1:BulkData post.

If you run into any problems with the download or have requests for specific features, post them to our issue tracker. For more general discussions and help getting started, we have a forum. You can also chat with us on our Discord server. You will find us there every now and then, but well pay special attention on Thursdays.

If you haven't heard about it before, The Machinery is a new lightweight and flexible game engine, designed to give you all the power of a modern engine in a minimalistic package that is easy to understand, extend, explore, rewrite, and hack. Beyond games, the API can also be used for simulations and visualizations as well as building custom tools, editors, and applications.

Some of the things that make The Machinery more hackable than other game engines are:

Some of the features currently available in The Machinery are:

Finally, here is some user-created content from The Machinery. Happy hacking!

Follow this link:
Niklas Gray's Blog - The Machinery Goes Open Beta - Gamasutra

The Good Old Days in the Cryptography Wars – CircleID

Colossus, the world's first electronic computer used to help decipher the Lorenz-encrypted (Tunny) messages between Hitler and his generals during World War II. (Photo: John Levine)

The 20th century was the golden age of surveillance.

High-speed communication went either by telegraph and telephone, which needed a license from the government, or by radio, which anyone can listen to. Codes were manual or electromechanical and were breakable, e.g., the Zimmermann telegram and Bletchley Park. (The UK government spent far more effort inventing a cover story for the source of the telegram than on the break itself, to avoid telling the world how thoroughly they were spying on everyone.) The few secure one-time pads were either so expensive they could only be used for a handful of the most important messages (SIGSALY) or so cumbersome they weren't used correctly and broken anyway (Venona.)

Historically, that was a very strange time for cryptography and espionage, but it's what politicians and law enforcement remember as the good old days, and think that it was normal to be able to spy on anyone, anywhere.

That was then. Now we have computers and better algorithms, so any $10 burner phone can do crypto that nobody can break. The algorithms and software are available all over the world. The genie isn't going back into the bottle, no matter how hard some parties demand that we push.

More and more professionals are choosing to publish critical posts on CircleID from all corners of the Internet industry. If you find it hard to keep up daily, consider subscribing to our weekly digest. We will provide you a convenient summary report once a week sent directly to your inbox. It's a quick and easy read.

I make a point of reading CircleID. There is no getting around the utility of knowing what thoughtful people are thinking and saying about our industry.

Read the original post:
The Good Old Days in the Cryptography Wars - CircleID

Google Mending Another Crack in Widevine Krebs on Security – Krebs on Security

For the second time in as many years, Google is working to fix a weakness in its Widevine digital rights management (DRM) technology used by online streaming sites like Disney, Hulu and Netflix to prevent their content from being pirated.

The latest cracks in Widevine concern the encryption technologys protection for L3 streams, which is used for low-quality video and audio streams only. Google says the weakness does not affect L1 and L2 streams, which encompass more high-definition video and audio content.

As code protection is always evolving to address new threats, we are currently working to update our Widevine software DRM with the latest advancements in code protection to address this issue, Google said in a written statement provided to KrebsOnSecurity.

In January 2019, researcher David Buchanan tweeted about the L3 weakness he found, but didnt release any proof-of-concept code that others could use to exploit it before Google fixed the problem.

This latest Widevine hack, however, has been made into an extension for Microsoft Windows users of the Google Chrome web browser and posted for download on the software development platform Github.

Tomer Hadad, the researcher who developed the browser extension, said his proof-of-concept code was done to further show that code obfuscation, anti-debugging tricks, whitebox cryptography algorithms and other methods of security-by-obscurity will eventually by defeated anyway, and are, in a way, pointless.

Google called the weakness a circumvention that would be fixed. But Hadad took issue with that characterization.

Its not a bug but an inevitable flaw because of the use of software, which is also why L3 does not offer the best quality, Hadad wrote in an email. L3 is usually used on desktops because of the lack of hardware trusted zones.

Media companies that stream video online using Widevine can select different levels of protection for delivering their content, depending on the capabilities of the device requesting access. Most modern smartphones and mobile devices support much more robust L1 and L2 Widevine protections that do not rely on L3.

Further reading: Breaking Content Protection on Streaming Websites

Tags: David Buchanan, digital rights management, DRM, Google Widevine, L3, Tomer Hadad

This entry was posted on Monday, October 26th, 2020 at 7:54 pmand is filed under A Little Sunshine.You can follow any comments to this entry through the RSS 2.0 feed.You can skip to the end and leave a comment. Pinging is currently not allowed.

See the rest here:
Google Mending Another Crack in Widevine Krebs on Security - Krebs on Security

Surfshark Brings Open-Source WireGuard Protocol to Its VPN Apps – Toolbox

Surfshark makes a key infrastructure upgrade, rolls out a new open-source VPN protocol, WireGuard that promises to improve VPN speeds for its users.

Surfshark has introduced support for WireGuard, an open-source virtual private network (VPN) protocol that promises to improve VPN speeds for users. The solution packs a double network address translation (NAT) system to ensure end-users privacy.

Gabrielle Racai, Communications Manager at Surfshark says the new VPN technology WireGuard demonstrates better results with both faster throughput speeds and lower ping times. As per popular request, weve rolled out WireGuard for all our users. The protocol is also easier to audit code-wise, which amounts to its security. WireGuard is furtherly improving the overall performance of Surfshark VPN, Racai said.

WireGuard is the most recent addition to Surfsharks selection of OpenVPN UDP / TCP, IKEv2/IPsec, and Shadowsocks protocols. The protocol is utilized in the Linux kernel as it is designed primarily for adoption on Linux systems.

Let us explore how WireGuard stacks up against rival VPN providers.

Security

WireGuard uses newer encryption technology than the widespread OpenVPN and IKEv2/IPSec protocols. The new VPN technology encrypts users data using thoroughly tested, modern ChaCha20, Curve25519, BLAKE2s, SipHash24, HKDF cryptography, thereby lending greater security compared to the commonly used OpenVPN and IKEv2/IPSec protocols.

User Privacy

Surfshark VPN features a double network address translation (NAT). NAT is designed for IP address conservation, which can change the IP address every time a user connects to the internet via a WireGuard VPN, ensuring more privacy for users.

According to Cisco, It enables private IP networks that use unregistered IP addresses to connect to the internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.

See Also: Comcast & Arubas Partnership Proves VPN Is Not Dead Yet

Performance

WireGuards strengths lie in lightweight code and strong cryptographic primitives. Where other popular VPN protocols utilize about 400,000 lines of code, the WireGuard has approximately 1% of either OpenVPN or IPsecs codebase. This, combined with the use of state-of-the-art cryptography, generates better overall performance results. Racai told Toolbox, Its evident that the WireGuard stands out in the overly engineered landscape of VPN protocols. The WireGuard has about 1% of either OpenVPN or IPsecs codebase, making security audits significantly more efficient and less susceptible to security vulnerabilities.

Speed

A smaller, lightweight codebase roughly translates into faster execution. Besides, encryption technologies like ChaCha20, Curve25519, BLAKE2s, SipHash24, HKDF speed up cryptography, which is where other VPNs lag. Assuming that real-world functioning of Surfshark doesnt take a hit, its speed can be expected to improve even further.

Longtime tech veteran Jeff Hussey says VPNs, a two decade old technology, are brittle and not built to scale for the connected world of 2020 and beyond. He believes VPNs for remote access isnt the best approach to network security in todays multi-perimeter era, yet organizations worldwide continue to use VPNs to mask location data. Meanwhile, Lance Johnson, VP of Marketing, Trustgrid says newer technology like SASE, which is gathering steam stitches together elements of security and wide-area networking (WAN) into a cloud-native solution is well-positioned to edge out VPNs.

So, where does that leave VPNs? Its true new technologies are permeating the market faster than ever before. However, it takes quite a lot of time for any innovation to become commercially successful. It depends on the demand for such a model, the complexity of implementations, cost, and other factors.

Meanwhile, consumer VPN services usually aim to make privacy protection accessible for the masses by offering an affordable solution that is also easy to set up and use. Essentially, the ultimate goal of a VPN is to keep users information private and secure, whereas SASE has an entirely different target audience. In any case, VPN technology will not disappear as it is a cornerstone on which enterprise security mechanisms adhere, Racai said, in closing.

Let us know if you liked this news on LinkedIn, Twitter, or Facebook. We would love to hear from you!

See the rest here:
Surfshark Brings Open-Source WireGuard Protocol to Its VPN Apps - Toolbox

Quantum Cryptography Solutions Market 2020 | Covid19 Impact Analysis | Global Industry Growth Prospects and Opportunity Assessment 2020-2027 – The…

Stratagem Market Insights released the latest research report on the Quantum Cryptography Solutions Market, which includes the market size, market share, growth, emerging trends, business opportunities, and forecast to 2027. It also examines domestic regions as an international market and emerging segments, as well as market dynamics.

It also provides insights into the competitive landscape, market driving factors, the industrial environment, and the latest and upcoming technological advancements to see the general state of affairs of business and move forward to create moneymaking business methods effortlessly.

Get a FREE Sample Copy of the report:https://www.stratagemmarketinsights.com/sample/21553

The market research report also provides information on potential investment opportunities, strategic growth market analysis, and likely threats imposed on the client in the systematic and creative planning of the business models and strategies.

The major manufacturers covered in this report:

ID Quantique, MagiQ Technologies, Quantum XC, Qubitekk, QuintessenceLabs

Our research team has implemented a robust research methodology that includes SWOT analysis, Porters 5 force analysis, and real-time analysis. In addition, they have conducted interviews with industry experts to offer a report that will help clients formulate strategies accordingly. The critical data analysis in the Quantum Cryptography Solutions Market Report is built upright. This means the information is presented in the form of infographics, statistics, and straightforward graphics to make it an effortless and time-saving task for the customer.

Market Segmentation

The Quantum Cryptography Solutions market report is fragmented into product types, applications, and regional analysis. In this report, the product flow, distribution, and possible future innovations are bestowed in a detailed manner. It also provides accurate calculations for product sales in terms of volume and value.

Regional insights of Quantum Cryptography Solutions Market

In terms of geography, this research report covers almost all major regions of the world, such as North America, Europe, South America, the Middle East, and Africa, and Asia Pacific. Europe and North America are expected to increase over the next few years. The Quantum Cryptography Solutions market in the Asia Pacific is expected to grow significantly during the forecast period. The latest technologies and innovations are the most important characteristics of North America and the main reason the United States dominates the world market. The South American Quantum Cryptography Solutions market is also expected to grow in the near future.

Market Research Report Covers Impacts of COVID-19 To The Market.

The COVID-19 pandemic has dramatically changed the dynamics of the Quantum Cryptography Solutions market. This market research report includes extensive data on the impacts of the market. The research analyst team of the firm has been monitoring the market during this coronavirus crisis and has been talking with industry experts to finally publish a detailed analysis of the future scope of the market. They have followed a robust research methodology and got involved in primary and secondary research to prepare the Quantum Cryptography Solutions market report.

The main questions answered in the report:

Global Quantum Cryptography Solutions Market Industry Analysis assists clients with customized and syndicated reports of significant importance to the experts involved in data and market analysis. The report also calls for market-driven results that drive a feasibility study for customer needs. SMI guarantees validated and verifiable aspects of market data operating in real-time scenarios. Analytical studies are conducted to confirm customer needs with a thorough understanding of market capabilities in real-time scenarios.

The conclusion of this report provides an overview of the potential for new projects to be successful in the market in the near future, and the global Quantum Cryptography Solutions market in terms of investment potential in various sectors of the market covers the entire range.

Need a discount?

Note: *The discount is offered on the Standard Price of the report.

Request discount for this report @https://www.stratagemmarketinsights.com/discount/21553

Explore by UP

More:
Quantum Cryptography Solutions Market 2020 | Covid19 Impact Analysis | Global Industry Growth Prospects and Opportunity Assessment 2020-2027 - The...

Zoom finally delivers end-to-end encryption for all users – but not all of the time – TechRadar UK

Zoom has finally rolled out end-to-end encryption (E2EE) for both free and paid users worldwide, delivering on a promise made at the start of the pandemic.

In a system protected by E2EE, communication between meeting participants is encrypted using cryptographic keys held only on users devices. This means no third party, Zoom included, has access to the keys to decrypt private meeting data.

The company originally stated that end-to-end encryption would be reserved for paying customers only, but executed a swift U-turn after facing a backlash from users.

The feature is available immediately to all Zoom users in technical preview (meaning the firm is actively soliciting feedback) on client version 5.4.0 for Windows and Mac, Zoom for Android and Zoom Rooms. The service will also soon appear on Zoom for iOS, once the updated app has been greenlit by Apple.

In April, Zoom found itself in hot water when it emerged that claims its meeting participants were protected by full end-to-end encryption were unfounded. Instead, researchers discovered the service deployed a lesser form of encryption using the Transport Layer Security (TLS) protocol.

The company was forced to make a public apology and pledged to spend the following three months focused solely on improving the security of its platform. During this period, Zoom acquired secure messaging and file-sharing service Keybase, whose team was brought on board to develop full E2EE for the video conferencing service.

The arrival of end-to-end encryption for all users, then, finally makes good on a promise made more than six months ago.

Were very proud to bring Zooms new end-to-end encryption to Zoom users globally, said Jason Lee, Zoom CISO. This has been a highly requested feature from our customers, and were excited to make this a reality. Kudos to our encryption team who joined us from Keybase in May and developed this impressive security feature.

As per the new system, which harnesses 256-bit AES-GCM encryption, meeting hosts generate encryption keys which are distributed to fellow participants via public key cryptography. The encrypted information is indecipherable by Zoom, whose servers merely act as oblivious relays.

While many will celebrate the arrival of the new security feature, its important to note that E2EE protection does not apply to all Zoom meetings. The feature must be toggled on by the host, participants must join from the appropriate Zoom clients and the meeting must not contain more than 200 participants.

Activating E2EE will also result in diminished functionality, preventing users from accessing features including cloud recording, polling, breakout rooms and live transcription.

Follow this link:
Zoom finally delivers end-to-end encryption for all users - but not all of the time - TechRadar UK

Android 12 to feature native VPN support: Google integrates WireGuard VPN to new Linux kernel – MySmartPrice

Android 12 is seemingly set to get a natively integrated VPN (virtual private network) service integrated into its kernel. After having spotted development around this matter earlier this month, reports have noticed that Google is adding native support for cryptography-based VPN service WireGuard to both the supported Linux kernels of Android 12 Linux 4.19 and Linux 5.04. In simpler terms, Google adding WireGuard VPN support to Android 12s root kernels mean that subject to more work around its interface, users will get a native VPN service integrated into the Android ecosystem. This, in turn, can make using various internet services via home internet connections significantly safer.

WireGuard VPN is a relatively newer virtualisation service, but has so far received critically positive reactions from general users, developers and security experts alike. WireGuard uses cryptography and blockchain standards to securely mask your traffic, and also offers users full details of your internet traffic via its openly accessible activity logs. WireGuard VPN is already available as an app on the Google Play Store, and can be downloaded and used as a third party service.

Also Read: PUBG Banned: Heres How to Play PUBG Mobile Using VPN on Any Smartphone

Integrating the WireGuard VPN service into the root Linux kernels, based on which Android 12 will be forked, will likely bring about changes in the way the service functions for the end-user right now. It is important to note that XDA Developers has not spotted Google adding any interface features so far to the VPN integration in the Android Open Source Project (AOSP) forums and repositories as of now. As a result, exactly how the VPN service will be baked into the 2021 version of Android will remain a mystery for now. That said, we do expect Google to reveal more details about it at a date closer to the launch of Android 12s developer preview and stable builds some time in late 2021.

Given that Google has added support for WireGuard VPN to Linux kernel 4.19 as well, it may also be likely that a future upgrade to Android 11s framework may bring the feature to Android 11 devices as well. Android devices being launched now and in the coming months, which run on Android 11, will also likely support the new feature when they are upgraded to Android 12 next year.

Read this article:
Android 12 to feature native VPN support: Google integrates WireGuard VPN to new Linux kernel - MySmartPrice