MIT Lightning Creator Unveils First ‘Demonstration’ of Bitcoin Scaling Tech – CoinDesk – CoinDesk

The infrastructure propping up Bitcoin might become easier for anyone to spin up and run.

Lightning creator Tadge Dryja has been working on a new design for a lighter weight Bitcoin full node, about which he first wrote a paper in 2019. Last week, he and a team of coders released a first version of the Utreexo software as a part of MIT Digital Currency Initiative (DCI), putting the idea of lighter nodes into working code.

Full Bitcoin nodes act like financial security systems, validating Bitcoin blockchain transactions and protecting users from being tricked into thinking they received money that they didnt. But they take up a lot of computing space and are quickly growing in size.

Since these nodes are the most trustless way of using Bitcoin, developers have long been trying to make them easier to use. Its one of Bitcoins nerdy holy grails.

Utreexo specifically tackles the size of the state of a full node, which shows up-to-date information about who owns how much bitcoin. Utreexo slashes this state size from roughly four gigabytes to less than a kilobyte. In that regard, it could be a big breakthrough.

Utreexo is a new scalability technology for Bitcoin, which can make Bitcoin nodes smaller and faster while keeping the same security and privacy as full nodes, Dryja wrote in the blog post announcing the release.

But it hasnt been implemented fully yet, which is why it is a big deal to see Dryja releasing a first version of it. The project still has a long journey to go before users can begin using the nodes to plant a flag of financial self-sovereignty. But its a crucial first step.

A 'super-pruned node'

Bitcoin full nodes hold every transaction ever made, clocking in at about 200 GB today.

Pruned full nodes are able to reduce the size of the transaction history to as low as a half a gigabyte, about the size required to store an episode of a TV show.

But this doesnt tackle the storage of Bitcoins Unspent Transaction Outputs (UTXOs), which tallies up how much bitcoin is linked to each bitcoin address. This batch of data takes up a little less than 4 GB of data.

This UTXO state has grown rapidly over time and it is likely to continue growing, making it harder to run full nodes.

Thats where Utreexo comes in. With the help of fancy, new cryptography, its possible to replace this bulk of state with one tiny cryptographic proof that takes up much less storage.

Utreexo is a novel hash based dynamic accumulator, which allows the millions of unspent outputs to be represented in under a kilobyte small enough to be written on a sheet of paper, Dryja explains on the MIT DCI website.

Because it does what a pruned node does, plus more, one bitcoiner called it a super-pruned node, Dryja told CoinDesk.

Challenging SPV

Trying to shave down these hefty Bitcoin full nodes is far from a new pursuit. Simplified Payment Verification (SPV) is probably the most popular version of a lightweight node, used by Electrum and other wallets.

Utreexo is similar to SPV in that it doesnt require nearly as much computer storage space as a full node. But SPV nodes dont preserve user privacy as well and are more susceptible to attacks than Utreexo nodes are.

Since Utreexo offers these security benefits, Dryja hopes it might chip away at SPVs dominance in the space (as long as writing the Utreexo software goes as well as planned). I think it would be great if it replaced SPV to some extent, allowing an Electrum-like user experience but with Bitcoin Core security, he told CoinDesk.

But in the end, he doesnt think itll replace SPV completely, as SPV is still easier to run.

I think it will be a bit in between. [Utreexo nodes are] heavier than SPV but lighter than current full nodes, so some SPV users may switch to Utreexo, and some current full node users will switch as well, he said.

He also imagines that since Utreexo nodes are so much easier to run, theyll be much more common than normal full nodes.

Longer term, I can definitely see almost all full nodes using a Utreexo-like design, and nodes which store the entire state and history would be more like current blockchain explorer websites or Electrum servers there will still be some, but no normal users will run their own, Dryja said.

Careful next steps

Utreexo developers now put forward a proof of concept, showing that the idea can be turned into a real working product. But they still have a lot of work to do, including ironing out bugs to make the mini node suitable for real money.

The software also operates on testnet, the Bitcoin testing network, and is not recommended for use with real money. There are still plenty of known bugs and inefficiencies in the code, but were improving it at a rapid pace, Dryja writes.

Theyll eventually have to make the Utreexo node compatible with the nodes already running on the Bitcoin network. To do this, developers will eventually need to modify Bitcoin Core, the most popular Bitcoin node software.

But this could be dangerous. Utreexo is a significant re-thinking of how Bitcoin works, changing consensus-critical code, Dryja writes.

It is thus likely to be difficult to get Utreexo code into Bitcoin Core, and with good reason. We want to be very sure to not introduce problems into a system handling so many peoples money, Dryja said.

Thats why theyve decided to see if they can try to add Utreexos magical powers to alternative Bitcoin node software Btcd first, because its not used by nearly as many people to secure their money, and in the process learn more about how it affects full node operation, Dryja said. The next step will be eventually applying what they learned to Bitcoin Core.

The leader in blockchain news, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups.

Read more here:
MIT Lightning Creator Unveils First 'Demonstration' of Bitcoin Scaling Tech - CoinDesk - CoinDesk

The Becoming of Bitcoin: A Narrative Untainted by Illusions of Truth – Cointelegraph

Understanding Bitcoin as something static as some thing with a solidified identity is not understanding Bitcoin at all.

Bitcoin is not being. Bitcoin is becoming. The perpetuation of its identity is not terminal but rather instrumental to something else. Bitcoin maintains identity so that it can serve its meaning. And, like identity, meaning is malleable and exists only in the hivemind that projects it.

A more revealing way to think about Bitcoin then is not to understand it as a physical construct as a decentralized payment network operating on a cryptographic protocol but as narrative. And dont just think of it as narrative in the most straightforward meaning of the word, as a representation or imitation of reality or a cultural artifact, but also take into account its deeper aspects i.e. narrative as being constitutive of consciousness itself.

Narrative is not just as our minds way of describing being, but also as its way of expressing and creating the possibilities of becoming. In other words, narratives arent merely representations or imitations of reality they are reality. Creator and author of Epsilon Theory Ben Hunt, whose ideas we shall visit again later, defines the concept of narrative as a thoroughly postmodern idea. What I mean by this is that Narrative is a social construction, a malleable public representation of malleable public statements that lacks any inherent Truth with a capital T[]

While the epistemology of Truth with a capital T is beyond the scope of this piece, and while indeed the brilliant thinkers at Epsilon Theory are never too far from the truth (whatever it may mean) when they opine about narratives, theres an implied false dichotomy between narrative and reality in the above definition that mustnt remain unaddressed. If we choose to understand narratives as mere cultural artifacts as nothing but products of our idle minds then yes, narratives can definitely be deemed untrue or disconnected from observable facts.

But if we take the other, more unorthodox approach, and consider narratives as being constitutive of consciousness itself, then the true power of narratives as creators and destroyers of worlds becomes evident.

And, to be perfectly clear, this isnt just semantic hair-splitting. The point is to convince you that, for all that matters, the narrative is all there is. It is narratives that make the world go round. There isnt some occult deeper layer beyond the narrative where Truth with a capital T resides. Even if there is, we have no access to it. To borrow a quote from cognitive scientist Joscha Bach: Our experience of the world that were embedded on is not a secret direct wire to the physical reality. Physical reality is a weird quantum graph that we can never experience and get access to.

All we get to experience as Paul Ricur, the philosopher whos given us the most comprehensive characterization of narrative to date argues are phenomena emploted with narrative. If we cant, by definition, experience the noumenon, and we never get to escape our brains simulacrum of reality, then all were really left with is narrative.

All mainstream discourse around Bitcoin narratives is laden with the false underlying assumption that the Bitcoin protocol is somehow categorically different from the Bitcoin narrative.

Narratives change, Bitcoin doesnt, people think.

But in reality, this isnt the case. Its the same blunder in thinking that presupposes the false dichotomy between narrative and reality we mentioned earlier. Its not the code or the protocol that constitutes what we conceive to be Bitcoin, its the narrative thats attached to it. Bitcoins code can be, and has been, changed many times before, all without triggering any shifts in narrative. In fact, out of the few radical shifts in Bitcoins identity that have occurred over the past eleven years none were caused by changes to the code or the rules of the protocol.

Indeed, it was always the other way around: when the narratives change the entire nature and identity of the asset changes. Its almost as if the asset is nothing but the underlying derivative of the narrative.

Narratives dictate how we perceive Bitcoin, and when they shift, our behavior changes, which then, in turn, changes the whole game: the way the entire industry operates, the businesses, the consumers, the legislation, the enforcement everything.

Perfect evidence of this phenomenon can be found when we take a closer look at Bitcoins switch from digital cash to digital gold. From 2013 to early 2017 the vast majority of bitcoiners viewed and wanted to use Bitcoin primarily as a means of exchange and secondarily as a speculative asset. Despite the fact that Bitcoin was just as scarce then as it is now, rarely did anybody hodl it with conviction or think of it as a savings technology or a superior store of value in any meaningful way. Bitcoiners were obsessed with being able to buy cups of coffee with it, and the majority of the discourse at the time revolved around how cheap the transactions were and how to convince as many merchants to accept Bitcoin as payment.

Then, sometime around late 2017, early 2018, when the legendary bull rally came and the transaction fees skyrocketed, what could be sensed brewing under the surface finally burst onto the scene. First gradually, then suddenly, and without any changes to the protocol, Bitcoin became digital gold.

Okay, okay. It didnt really become digital gold overnight; the digital gold narrative was, as a matter of fact, gaining traction even as far back as 2015, but for all it matters, it wasnt until the digital cash proselytes migrated to Bitcoin Cash in mid-2017 that it truly became mainstream.

The point is, todays Bitcoin is in no way shape or form a currency simply because nobody looks at it in those terms any longer. Despite everything being the same on the protocol layer, nobody in their right mind would spend Bitcoin as currency today. And why is that?

Its because the narrative inalterably transmuted Bitcoin from lead to gold. Bitcoin went from being one type of asset to another from a digital currency or a medium of exchange to commodity money and a store of value. And this process, which can hardly be interpreted as anything other than narrative alchemy, resulted in actual transmutation of the asset, and not just in some superficial shift in community sentiment.

In 2018, an independent Bitcoin researcher going by the pseudonym Hasu wrote a brilliant piece on a similar topic titled Unpacking Bitcoins Social Contract which cuts right to the core of this matter:

Bitcoins rules are made on the social layer, and the software only automates it. Where the social contract and the protocol layer diverge, the protocol layer is wrong always. A failure of the protocol layer to temporarily enforce the rules of the contract has no permanent bearing on the validity of the contract itself.

(Emphasis added.)

Bingo. Bitcoins identity is forged on the social layer and then is but transcribed onto the protocol layer. The social realm is where Bitcoin lives and where Truth with capital T is decided. But, this now begs the question: who makes the rules? Who controls the narrative?

Narratives, after all, have to come from somewhere they do not arise spontaneously, from the void. They either develop organically, by the unnoted dissemination of the underlying composite memes, or theyre created by fiat. So, where did Bitcoins store of value narrative come from? Did we arrive at it by virtue of inertia, or was it perhaps a product of manufactured consent?

If we turn to the Bitcoin community, today the majority of it seems to believe that the currently prevailing store of value narrative emerged organically, as a direct result of Bitcoins protocol design. Even Satoshi himself used analogies of gold and gold mining to explain Bitcoin, and what is gold really if not a store of value?

And while many pundits consider this vision of Bitcoin self-evident, it bears reminding that, in terms of narrative, it wasnt always this way. Bitcoin was for long envisaged as a monetary weapon a weapon poised to undermine Caesar, take what is his, and render it back to the people.

Bitcoin was a revolutionary, disruptive, and seriously dangerous idea. It is only recently that the overarching mythos changed from overcoming the monster to rags to riches, or in crypto terms when Lambo?

In a 2019 podcast interview, Ben Hunt, mentioned earlier, made some very compelling contrarian points about Bitcoins changing narrative that perhaps the Bitcoin community should consider more seriously. To be more specific, Ben thinks that Bitcoins newfound digital gold story is a purposefully construed narrative trap.

Bitcoiners are taking on the role that gold owners had for the last 50 years. Its a role where you find yourself now essentially hoping for economic collapse [] Youre being balkanized; it is the true original meaning of the ghetto where youre having this neighborhood constructed for you, and youre like Ow look how nice this is! and then you move in and realize Ow ow ow, now Im here Im the grumpy old man that yells at clouds now.

Its a miserable way to live, says Ben. And in many ways, hes right. Were like frogs in boiling water; we were lured into the pot by the promise of riches and now were trapped in a reductionist narrative that fails to tell the world the whole story of Bitcoin. Its a huge step down in ambition. From a positive change movement, the community transformed into a bunch of cynics waiting for bad things to happen only to be proven right.

Perhaps Ben is correct. Maybe the powers that be have a bigger say in Bitcoins story than wed like to think. Perhaps the community believes what it believes today because its consent has been manufactured. After all, the digital gold narrative is preserving the status quo not challenging it. The governments of the world are unfazed by it. What couldve been the biggest threat to their monetary sovereignty has been neutralized by a mere change in narrative. Coincidence? Who knows. But its certainly something to think about.

Regardless of what anyone thinks of Bens narrative inquiry into Bitcoin and the origins of the store of value narrative, the most important point to consider here is that Bitcoins still an uncrystallized idea. Bitcoin is still becoming still searching for its final narrative form.

The presently dominant narrative is but one of many narratives competing for the soul of Bitcoin. Bitcoin was born out of the 2008 financial crisis, and its present identity is heavily influenced if not entirely molded by it. But this may not necessarily be the final form Bitcoin appropriates in the future. Sound money, global currency, global base settlement layer, anonymous and fungible digital cash these are all visions of Bitcoin that may one day resurface if the right conditions emerge.

Now that were facing the worst economic crisis in the last one hundred years, Bitcoins store of value narrative is increasingly being called into question, which means that its day may come sooner rather than later. Central banks are printing an order of magnitude more fiat currency now than they ever did, and Bitcoin, by all accounts and measures, is supposed to thrive and prosper in such macroeconomic conditions.

This is the narrative make-or-break point.

If Bitcoin doesnt perform well as an uncorrelated financial asset and it doesnt ascend (or at least maintain) its value in fiat-denominated terms, then the store of value narrative will shatter and Bitcoin will have to either reappropriate some of the other, already existing competing narratives, or reinvent itself into something else entirely. If, on the other hand, Bitcoin succeeds as a store of value, then this narrative will cement and assume a relatively stable form.

Whatever narrative Bitcoin assumes after it crosses the event horizon, it will be one that defines it for years (if not decades) to come.

Read the original here:
The Becoming of Bitcoin: A Narrative Untainted by Illusions of Truth - Cointelegraph

With Bitcoin ATMs, CoinFlip Is Banking The Unbanked – Bitcoin Magazine

This is a promoted article provided by CoinFlip.

There are now many ways to obtain bitcoin and join the growing revolution in sovereign digital wealth. Among them, you can mine bitcoin, you can earn bitcoin in exchange for goods or services and you can buy bitcoin for fiat currency through a credit card or bank account on an online exchange.

But perhaps no other vehicle for gaining bitcoin is as frictionless for the underbanked and unbanked around the world than Bitcoin ATMs.

As their name implies, Bitcoin ATMs are automatic teller machines that are quite similar to traditional ATMs, except that they allow users to buy and sell bitcoin, rather than withdraw fiat currency from their bank accounts. They serve those around the world who want to onboard to Bitcoin a system designed to remove the financial gatekeepers that create inequality in the traditional economic system by providing all of the interfacing needed to convert cash in hand into the worlds preeminent digital currency.

CoinFlip, which operates 750 Bitcoin ATMs across the United States as the highest-volume provider in the space, maintains some of the lowest barriers to buying bitcoin for those who could use it most.

In addition to a bitcoin wallet and any fiat cash they are hoping to convert, users can begin buying bitcoin at a CoinFlip ATM with as little as a mobile phone number and a name.

Bitcoin ATMs are general tools for banking the unbanked because unlike other cryptocurrency onramps, people are able to get access to bitcoin with cash and do not require a bank account, Dustin Wei, CoinFlips head of business development, said. While many other cryptocurrency onramps claim they want to foster the idea of banking the unbanked, an unbanked customer would not actually be able to use their services.

CoinFlip has found that a significant portion of its Bitcoin ATM user base is comprised of underbanked and low-income individuals who want to transact primarily in cash. By accessing bitcoin, they have a brand new avenue for paying bills, transferring money seamlessly around the world, investing in a new asset, and more.

There is no other way to buy cryptocurrency thats nearly as inclusive and straightforward as a Bitcoin ATM, Wei explained. CoinFlip provides financial access to those who have been failed by traditional banks and also features 24/7 customer service to make the process less daunting. Satoshi would be proud.

Ultimately, its this type of grassroots effort making bitcoin accessible where its needed the most with as little barrier to entry as possible that will help CoinFlip push bitcoin adoption far and wide. More so than with any other portal to bitcoin, this propulsion is the real narrative of Bitcoin ATMs.

CoinFlip recognizes bitcoin as a tool thats increasingly helping people around the world send funds to their relatives overseas, which can be accomplished in minutes through its machines. To build on this, CoinFlip operates a trading desk (called CoinFlip Preferred) that can process wire transfers for cryptocurrency and handle credit card transfers on its website.

CoinFlip hopes to create a global ecosystem of kiosks in order to push adoption, said Wei. CoinFlip also hopes to continue its mission to get crypto into as many peoples hands as possible. We are fast becoming a crypto conglomerate.

Continued here:
With Bitcoin ATMs, CoinFlip Is Banking The Unbanked - Bitcoin Magazine

Coinfloor Is Onboarding Baby Boomers To Bitcoin – Bitcoin Magazine

Coinfloor, the U.K.s longest-running bitcoin exchange, is working to convert a decidedly non-digital audience into the latest batch of hardcore HODLers: Boomers.

The exchange is capitalizing on what it sees as a growing trend among this generation, which may be just as disheartened by the rampant stimulus action from the worlds ingrained economies as younger people.

Baby Boomers now make up more than a fifth of all people who hold bitcoin, the exchange noted in a release shared with Bitcoin Magazine. Many have turned to bitcoin in frustration over record low interest rates, stock market volatility and the fear of inflation that must follow the massive quantitative easing programs of recent times all of which threaten to erode their hard-earned savings.

In addition to this growing bullish trend in Boomers, Coinfloor noted that those over 65 years old hold more than a third of household wealth in the U.K., making them a particularly attractive consumer base for the exchange. To draw in some of this disposable income, Coinfloor has doubled down on features that it believes will appeal to Baby Boomers, including an autobuy service, educational content and a customer support team reflecting Baby Boomers preference for human interaction over self-service/chat support.

Coinfloor also shared a customer testimonial from a 60-something retired teacher, Angela Ilievski of Bournemouth, England, who highlighted the appeals of bitcoin investing for someone of her generation.

This April, [I] began to feel that now was the time to save in crypto rather than invest in cash a reversal of perspective brought about by a combination of factors, including zero percent interest rates/negative interest rates imminent; the examples of Cyprus, Greece, India and the Lebanon bail-in seizure of bank deposits/limits on cash withdrawals and transfers; [and] the (equally scary) prospects of either staglflation or deflation on the horizon, Ilievski said, per the testimonial. The coincidence of the latest Bitcoin halving at the same time as the Fed was accelerating money printing to address liquidity issues in the market (triggered, not caused, by Covid) was a powerful metaphor for me. This was a kind of lightbulb moment: the realization that bitcoin was becoming hard money whereas fiat currency was being softened by incessant money printing.

Of course, there is a significant difference between convincing Boomers to autobuy bitcoin on an exchange and seeing them manage their own private keys, run their own nodes or engage in the otherwise technologically-intimidating best practices for Bitcoin custody and sovereignty.

But, as the old saying goes, youve got to start somewhere.

Peter Chawaga is a senior editor at Bitcoin Magazine. He HODLs BTC.

More:
Coinfloor Is Onboarding Baby Boomers To Bitcoin - Bitcoin Magazine

Chess Grandmaster Kasparov: Bitcoin Empowers the Public and Protects Dissidents | News – Bitcoin News

Russian human rights campaigner and chess supremo Gary Kasparov has said that the current economic crisis, which has led to unconventional monetary policy, will drive people towards bitcoin.

Bitcoins finite supply compares favorably to agenda-driven printing of money by governments, noted the Avast security ambassador, who also chairs the Human Rights Foundation and the Renew Democracy Initiative.

Speaking to Forbes on the intersection of human rights and new technologies, Kasparov said cryptocurrencies enable the public to regain control of personal finances at a time when unilateral moves by government and institutions are on the rise.

The good thing about bitcoin is that you know exactly the number the magic number of 21 million. And we understand the formula behind that. But when you look at the other side, the Fed for instance, you never know how many trillions of dollars will appear on the market tomorrow that will damage your savings, he observed.

Kasparov said cryptocurrencies potential for abuse gets overstated but it is the upside which must be harnessed to empower individuals. Crypto offers means to protect personal finances against inflation and state interference and anything that can offer us the opportunity to take back control or some control of our privacy is always welcome, the chess grandmaster said.

Thats why I think the steady rise in popularity of bitcoin and other cryptocurrencies and blockchain technology as a concept is inevitable, because its a response to the shift of power from individuals to states or other institutions that may act on our privacy without our consent, he added.

As chairperson of the Human Rights Foundation, Kasparov has promoted blockchain and cryptocurrency as a means to empower dissidents around the world.

For us, it was important for us to address every violation of human rights, and we were trying to help these people, most of them under severe attacks by their governments even if they left their countries, their financial accounts were hacked, their information was stolen so we have been providing special training courses.

He continued: Weve invited famous hackers to help them and to work with them we have been using every opportunity to offer them extra protection, and of course blockchain and bitcoin were very natural choices to incorporate into this strategy.

Kasparov also criticised the discriminatory treatment of customers from one territory to the other by tech giants and encouraged internet users to practice digital hygiene to stay safe from governments and other third parties.

What do you think about Kasparovs views toward crypto? Let us know in the comments section below.

Image Credits: Shutterstock, Pixabay, Wiki Commons

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Follow this link:
Chess Grandmaster Kasparov: Bitcoin Empowers the Public and Protects Dissidents | News - Bitcoin News

Full-disk encryption is the first line of defense – Naked Security

Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops that are lost, misplaced, or stolen every day, a crucial first line of defense for devices is full-disk encryption.

With full disk encryption rolled out, admins can ensure sensitive company data cant be accessed, even if a device falls into the wrong hands. And while disk encryption has long been a vital component of device security, it has also frequently been associated with complexity and admin overhead. Setting up and maintaining servers, dealing with encryption keys, and helping users whove forgotten their credentials all takes time and effort.

With Sophos Central Device Encryption, we focus on making device encryption intuitive and hassle-free. Theres no server to install, and encryption is enabled in a handful of clicks. Sophos Central Device Encryption uses the same core agent as Intercept X, meaning existing Sophos customers have no additional agent to deploy and can start encrypting computers in mere minutes.

Under the hood, we leverage Windows BitLocker and macOS FileVault technology to do the heavy lifting when it comes to encrypting and decrypting data on the disk. With these technologies being integrated deeply into each operating system, performance and security is first-class.

As a part of compliance requirements, companies often need to verify which computers in the organization are encrypted. The cloud-based Sophos Central Admin console provides great visibility into device status, including which disks are encrypted and the last time a device checked in. The next version of Central Device Encryption adds a new Encryption Status report, further drilling down into device encryption status, making it even easier to help demonstrate compliance across the organization.

An important consideration with disk encryption is how users will regain access to their devices if they forget their credentials. The Sophos Central Self-Service Portal lets users retrieve their own recovery keys without needing to contact the IT helpdesk. Users get back up and running faster, and IT teams have fewer tickets to deal with.

The shift towards remote working makes full disk encryption more important than ever. Sophos Central Device Encryption makes it a breeze to deploy and manage devices with full disk encryption. Head over to Sophos.comto find out more and to sign up for a free trial.

Here is the original post:
Full-disk encryption is the first line of defense - Naked Security

Why Develop Thoughtful Cyber Policies When Disjointed Activities And Remaining Vulnerable Feel Good? – Forbes

The United States is being targeted by nation-state cyberattackers and criminals alike, exploiting the current crisis and taking aim at our nations most vital critical infrastructures, including healthcare, energy and elections.

Currently, the governments ability to protect us and respond to these threats is hindered. Cyber responsibilities and capabilities are spread across various agencies that often operate in silos. This patchwork of disjointed cyber activities and approaches undermines accountability and puts citizens at risk. Within other important public functions and businesses, there is one centralized office overseeing security programs, managing risk and coordinating incident response activities; one accountable executive. The U.S. government needs a central, coordinating authority, who has visibility and oversight of cyber activities across all government agencies. This will help assure we have an accurate understanding of risk, are taking the appropriate measures to reduce risk and can coordinate a whole of government response to incidents of national consequence. This role is also critical to form coherent policies around important topics such as our international engagement on cyber issues, formulating a national encryption policy that balances the desires of law enforcement with cybersecurity and public safety, cyber workforce development and inclusion programs and many others.

The Cyberspace Solarium Commission was formed last year to develop a consensus on strategy for best defending the U.S. against significant cyberattacks. Commissioners Representative Jim Langevin, and Representative Mike Gallagher, and other congressional leaders have submitted legislation to codify many of the Commissions recommendations. They call for establishing a National Cyber Director that has policy and budgetary authority to coordinate and harmonize cyber defenses and policies across government. Thoughtful and well coordinated cybersecurity policies or lack thereof impact just about every aspect of how this nation is governed and operates. I fully support legislation establishing the National Cyber Director position. And I would urge Congress to consider some additional authorities and responsibilities to this role.

Encryption Policy

The National Cyber Directors role should bring a cyber practitioners knowledge of encryption to balance industry and government objectives in security and access to information. Strong encryption improves cybersecurity, privacy, economic competitiveness, and increases public safety. An informed National Cyber Director can ensure law enforcement leverages lawful tools and methods and has robust technical training to access the information needed to conduct investigations without weakening security. The National Cyber Director should be the focal point for developing a national policy on encryption.

Cyber Workforce Diversity

There is a well-documented shortage in the cybersecurity workforce, and just as importantly, a great lack of diversity in thought and creativity. The lack of inclusion in the cybersecurity industry is a contributing factor. The workforce shortage is projected to reach 1.8 million people by 2022, according to the Global Information Security Workforce Study released in February. Minority representation within cyber is 26%, only slightly higher than the overall U.S. minority workforce (21%). Women represent only 14% of the cybersecurity workforce in North America and just 11% globally. Only through increased inclusion and diversityof race, gender, perspective and thoughtcan the cybersecurity industry effectively address our biggest challenges. We need a bold cyber workforce strategy that develops and advances people from all walks of life. We need buy-in and partnership from the government to invest in recruiting, developing and retaining talent. Ensuring that the U.S. remains competitive for the best cyber talent available will require top-level attention and should be at the forefront of priority initiatives for the National Cyber Director.

Zero Day Disclosure

Businesses have been caught off guard in the past when hacking tools leveraging zero daysor previously unknown and unpatched vulnerabilitieshave leaked out of the confines of federal law enforcement. Specifically, the publication in 2017 by Wikileaks of the Vault 7 trove of documents stolen from the CIA included zero days that have been used to compromise U.S. businesses. The National Cyber Director should oversee the Vulnerabilities Equities Process and Review Board which determines whether and when the government should weaponize a specific vulnerability for intelligence purposes or disclose it so that it can be remediated and improve the nations and the worlds cybersecurity. A strong process which properly weighs the benefits and risks of disclosure and drives towards consensus will protect our overall cyber posture, critical infrastructure and economy, while considering national security and law enforcement needs.

Regulatory Coordination

The National Cyber Director should coordinate cybersecurity policies and practices with regulatory agencies like the Securities and Exchange Commission (SEC) to promote accountability and mitigate risk. The Cyber Solarium Commission Report recommends Congress amend the Sarbanes-Oxley Act (SOX) to explicitly account for cybersecurity, which would increase transparency and drive better behavior, without dictating specifictechnologies or practices. Even shy of amending SOX, interpreting the existing rules to be more inclusive of cybersecurity risk and requiring explicit attestation might be the single most impactful way to improve private industrys cyber hygiene practices and reduce cyber-related losses.

Today government agencies, critical infrastructure and businesses across the country have greatly expanded the cyber attack surface. Internet of Things (IoT) devices are everywhere, sensitive data is in the cloud and critical infrastructure providers now connect operational technology systems to the internet. In a report from the Ponemon Institute in 2019, 90% of critical infrastructure operators said their environments had been damaged by at least one cyber attack over the past two years, with 62% experiencing two or more attacks.

With COVID-19, malware, phishing and ransomware attacks on critical healthcare and government systems are on the rise. At a time when the government is crucial to helping to maintain vital services and state and local governments lack the resources to reallocate to cyber, its more critical than ever to prioritize funding and budget investments based on risk, and to provide better coordination of cyber at the federal level. We need a National Cyber Director to lead this charge in partnership with industry.

See original here:
Why Develop Thoughtful Cyber Policies When Disjointed Activities And Remaining Vulnerable Feel Good? - Forbes

Global Cloud Encryption Software Market Expected to Witness a Sustainable Growth over 2026 – Bulletin Line

This latest report studies Cloud Encryption Software Market globally, particularly in North America, Europe(Germany, UK, France, Italy, Spain, Russia, Poland), China, Japan, Southeast Asia (Malaysia, Singapore, Philippines, Indonesia, Thailand, Vietnam) the Middle East and Africa(Saudi Arabia, United Arab Emirates, Turkey, Egypt, South Africa, Nigeria), India, South America(Brazil, Mexico, Colombia), with revenue, import, and export, production, consumption in these regions, from 2015 to 2019, and forecast 2020 to 2026. Global Cloud Encryption Software market 2020 research report is replete with precise analysis from radical studies, specifically on queries that approach market size, trends, share, forecast, outlook, production, and futuristic developments trends and present and future market status.

Then, the report focuses on world major leading industry players with information like company profiles, product picture and specifications, Sales Revenue, Price, gross margin, market share, and contact info. In addition, the Cloud Encryption Software industry development trends and marketing channels are analyzed.

Request For Free Sample Report:

https://www.globalmarketers.biz/report/business-services/global-cloud-encryption-software-market-report-2020-by-key-players,-types,-applications,-countries,-market-size,-forecast-to-2026-(based-on-2020-covid-19-worldwide-spread)/153883#request_sample

Analysis of Cloud Encryption Software market Key manufacturers (Sales Revenue, Price, gross margin, main products, etc.):

CiphercloudBoxcryptorTrend MicroSophosPerspecsysVoltage SecuritySkycryptGoogleSafenetVaultiveHitachiPorticorViivoSymantec.HPVormetric

Analysis of Cloud Encryption Software Market By Product Types(Market Size & Forecast):

Infrastructure-as-a-ServiceSoftware-as-a-ServicePlatform-as-a-Service

Analysis of Cloud Encryption Software Market By Applications(Market Size & Forecast):

Banking, Financial Services, and Insurance (BFSI)HealthcareGovernment and Public UtilitiesTelecom and ITRetailAerospace and DefenseOthers (manufacturing, education, and media and entertainment)

In additional, the manufacturers dominant within the global Cloud Encryption Software Market are highlighted inside the competitive landscape section of the report. The competitive state of affairs and trends current within the market have additionally been encapsulated underneath this section of the study. moreover, the mergers and acquisitions that passed off within the market in the past few years and their impact on the markets development has in addition been bestowed underneath this a part of the report.

Ask For Discount: https://www.globalmarketers.biz/discount_inquiry/discount/153883

Furthermore, it describes the in-depth analysis of key Cloud Encryption Software market segments and sub-segments, particularly includes evolving Cloud Encryption Software industry trends and dynamics, challenges, and competitive insights, technological breakthroughs for Cloud Encryption Software market development mapping with different opportunities. The report also analyzes the Cloud Encryption Software industry potential for every geographical region consequently.

With the list of tables and figures, the report provides key statistics on the condition of the business and could be a valuable supply of steerage and direction for firms and people curious about the market.

Any Query Or Specific Requirement? Ask to our Research expert @

https://www.globalmarketers.biz/report/business-services/global-cloud-encryption-software-market-report-2020-by-key-players,-types,-applications,-countries,-market-size,-forecast-to-2026-(based-on-2020-covid-19-worldwide-spread)/153883#inquiry_before_buying

TOC of Cloud Encryption Software Market Contains Following Points:

Table of Content & Table Of Figures

https://www.globalmarketers.biz/report/business-services/global-cloud-encryption-software-market-report-2020-by-key-players,-types,-applications,-countries,-market-size,-forecast-to-2026-(based-on-2020-covid-19-worldwide-spread)/153883#table_of_contents

The rest is here:
Global Cloud Encryption Software Market Expected to Witness a Sustainable Growth over 2026 - Bulletin Line

(COVID 19 Impact) Mobile Encryption Market: Industry Expected to Experience a Positive Growth Before 2027 – Market Research Posts

A recent study of the Global Mobile Encryption Market was published. The Mobile Encryption Market Research Report shows the latest market insights, current situation analysis of future trends, and product and service analysis. This report provides key statistics on market conditions, size, share, and growth factors of the Mobile Encryption market. The study covers data from emerging players, including competitive terrain, sales, revenue, and market share of the worlds leading manufacturers.

The Best part of the report is, this contain Covid-19 Impact Created in this Mobile Encryption Industry. COVID-19 can affect the global economy in 3 main ways: by directly affecting production and demand, by creating supply chain and market disturbance, and by its financial impact on firms and financial markets.

Download the Sample ToC to understand the CORONA Virus/COVID19 impact and be smart in redefining business strategies-https://www.worldwidemarketreports.com/sample/249675

Mobile Encryption Market and Competitive Analysis:

Know the current market situation! Not only new products, but also existing ones are given ever-changing market dynamics. This study will allow market experts to drop their market share rapidly while maintaining the latest market trends and segment performance. Through market share analysis, correlate market position,% market share, and segmented revenue to identify who actually competes within the market. (Players Can be Added as per Request)

The historical Mobile Encryption market scenario, market entropy, and patent analysis for competitive attacks section includes variables such as gross margin, gross profit, segment revenue, employee size, net profit, total assets, along with competitor SWOT, product specifications and peer margins, etc.

Segmentation and Targeting:Essential demographic, geographic, psychological, and behavioral information about the business segments of the Mobile Encryption market will help you determine which features your company should include to fit your business needs.

Place an Inquire or Ask for TOC of the report at: https://www.worldwidemarketreports.com/quiry/249675(We value your investment and offer customization as per your requirements.)

Mobile Encryption Market Product/Service Development:You can see why the product/service fits your needs and why modifications make the product more attractive. Approach consumer-side analytics, such as focus groups that leverage user testing and empirical research, always help to correlate innovation with demand preferences.

Market Scope & Target with Key Findings / Objectives:

How Study Have Considered the Impact of COVID-19 / Economic Slowdown of 2020?

Analysts at the Worldwide Market Reports conducted special surveys and connected with opinion leaders and industry experts from various regions to gain a fine-grained understanding of growth impacts as well as regional reforms to combat the situation. A special chapter in this study shows the impact of COVID-19 on the global Mobile Encryption market, as well as impacting growth trends with tables and graphs related to various countries and sectors.

The Mobile Encryption Market Key Business Segments Growth & % Share May See a Paradigm Shift

The various segments analyzed and scaled by the application/end-user in this study show potential growth and various changes from 2014 to 2027. Due to the changing dynamics that support growth, it is important for companies in this sector to understand market movements. To segment the Mobile Encryption market by type, segmentation of industrial sectors (public, commercial) and channels (direct sales, distributors) has been considered.

In addition, this study provides an in-depth overview of countries with the highest market share in country-level exit, past and present scenarios, classified as potentially high growth areas. Dismantling some regions classified in the study.

Trade dispute will continue, who is staying up in Competition: An Unsold Story

The epidemic poses a serious economic challenge to China. As the demand for decoupling and economic imbalance grows, changes in relations between China and other parts of the world will affect the competition and opportunities in the Mobile Encryption market. Negotiations between the two world economies will continue in 2020, with some uncertainties and concerns still some emerging players taking advantage of the highest growth rates and setting market share, while stable giants in the global Mobile Encryption market still challenge all competition do it. How to identify key players in the global Mobile Encryption market, and consider all scenarios while profiling players.

Certainly, this report will provide a definitive view of every single reality in the market without the need to hint at other research reports or sources of information. Our report will provide a reality of past, present and ultimate destiny in all relevant markets.

Need a discount?Request discount for this report: https://www.worldwidemarketreports.com/discount/249675

Continue reading here:
(COVID 19 Impact) Mobile Encryption Market: Industry Expected to Experience a Positive Growth Before 2027 - Market Research Posts

Using artificial intelligence to smell the roses – UC Riverside

A pair of researchers at the University of California, Riverside, has used machine learning to understand what a chemical smells like a research breakthrough with potential applications in the food flavor and fragrance industries.

We now can use artificial intelligence to predict how any chemical is going to smell to humans, said Anandasankar Ray, a professor of molecular, cell and systems biology, and the senior author of the study that appears in iScience. Chemicals that are toxic or harsh in, say, flavors, cosmetics, or household products can be replaced with natural, softer, and safer chemicals.

Humans sense odors when some of their nearly 400 odorant receptors, or ORs, are activated in the nose. Each OR is activated by a unique set of chemicals; together, the large OR family can detect a vast chemical space. A key question in olfaction is how the receptors contribute to different perceptual qualities or percepts.

We tried to model human olfactory percepts using chemical informatics and machine learning, Ray said. The power of machine learning is that it is able to evaluate a large number of chemical features and learn what makes a chemical smell like, say, a lemon or a rose or something else. The machine learning algorithm can eventually predict how a new chemical will smell even though we may initially not know if it smells like a lemon or a rose.

According to Ray, digitizing predictions of how chemicals smell creates a new way of scientifically prioritizing what chemicals can be used in the food, flavor, and fragrance industries.

It allows us to rapidly find chemicals that have a novel combination of smells, he said. The technology can help us discover new chemicals that could replace existing ones that are becoming rare, for example, or which are very expensive. It gives us a vast palette of compounds that we can mix and match for any olfactory application. For example, you can now make a mosquito repellent that works on mosquitoes but is pleasant smelling to humans.

The researchers first developed a method for a computer to learn chemical features that activate known human odorant receptors. They then screened roughly half a million compounds for new ligands molecules that bind to receptors for 34 odorant receptors. Next, they focused on whether the algorithm that could estimate odorant receptor activity could also predict diverse perceptual qualities of odorants.

Computers might help us better understand human perceptual coding, which appears, in part, to be based on combinations of differently activated ORs, said Joel Kowalewski, a student in the Neuroscience Graduate Program working with Ray and the first author of the research paper. We used hundreds of chemicals that human volunteers previously evaluated, selected ORs that best predicted percepts on a portion of chemicals, and tested that these ORs were also predictive of new chemicals.

Ray and Kowalewski showed the activity of ORs successfully predicted 146 different percepts of chemicals. To their surprise, few rather than all ORs were needed to predict some of these percepts. Since they could not record activity from sensory neurons in humans, they tested this further in the fruit fly (Drosophila melanogaster) and observed a similar result when predicting the flys attraction or aversion to different odorants.

If predictions are successful with less information, the task of decoding odor perception would then become easier for a computer, Kowalewski said.

Ray explained that many items available to consumers use volatile chemicals to make themselves appealing. About 80% of what is considered flavor in food actually stems from the odors that affect smell. Fragrances for perfuming cosmetics, cleaning products, and other household goods play an important role in consumer behavior.

Our digital approach using machine learning could open up many opportunities in the food, flavor, and fragrance industries, he said. We now have an unprecedented ability to find ligands and new flavors and fragrances. Using our computational approach, we can intelligently design volatile chemicals that smell desirable for use and also predict ligands for the 34 human ORs.

The study was partially funded by UCR and the National Science Foundation.

The technology has been disclosed to the UCR Office of Technology Partnerships, assigned UC case number 2019-131, is patent pending, titled Methods for identifying, compounds identified and compositions thereof, and licensed to the startup company Sensorygen Inc. Founded by Ray in 2015, Sensorygen utilizes computational biology and artificial intelligence to discover natural replacements for toxic and harsh chemicals in everyday products, including finding new flavors and insect repellents.

The research paper is titled Predicting human olfactory perception from activities of odorant receptors.

See more here:
Using artificial intelligence to smell the roses - UC Riverside