Making the most of XG Firewall v18 Part 2 – Naked Security

Network traffic encryption levels continue to steadily increase. In the last year, the percentage of pages loaded over HTTPS as reported by Google has increased from 82% to 87% on the Windows platform. Its even higher on Macs at 93%. At this rate, we are not far away from a 100% TLS-encrypted Internet.

In this second in a series of articles on making the most of the great new features in XG Firewall v18, were going to specifically focus on resources available to you in order to make the most of the new Xstream TLS 1.3 inspection solution in XG Firewall v18.

In our last article, we covered the Xstream architecture and the new Xstream DPI engine in XG Firewall v18. The new TLS inspection solution is a key component of the new architecture and provides decryption for TLS/SSL-encrypted traffic with native support for the latest TLS 1.3 standard.

With most traffic flows transiting the firewall now encrypted, TLS inspection is absolutely critical to opening up this enormous blind spot to enable the firewall to do its job and inspect content coming into the network. As we will discuss in our next article in the series, the DPI engine can be extremely effective at identifying new zero-day variants of ransomware and other threats, but only if its able to inspect the traffic unencrypted.

Encrypted traffic flows destined to be examined by the new DPI engine are passed to the TLS inspection engine for decrypt before being inspected. After inspection, the flow is re-encrypted and sent on to its destination. If youre interested in learning more about how TLS encryption and inspection works, and why its important, I suggest reviewing these two great assets on the topic:

The new Xstream TLS inspection engine in XG Firewall v18 offers a number of compelling benefits that make it the ideal solution for todays modern encrypted internet:

As we mentioned in the last article, taking advantage of the new TLS inspection engine in XG Firewall v18 is super easy. It essentially requires checking one box in your firewall to activate it and then creating a rule on the new SSL/TLS Inspection Rules tab as shown below.

For a quick five-minute overview of how to create your own SSL/TLS inspection rules, watch this short how-to video:

For a detailed explanation and step by step guide for creating SSL/TLS inspection rules and decryption profiles, check out the online documentation:

It is recommended that you start gradually with TLS encryption, with a limited sub-estate of your network or a few test systems. This will allow you to build your expertise with the new TLS inspection solution and explore the new rules, logging, reporting, and error-handling options.

Not all applications and servers fully and properly support TLS inspection, so watch the Control Center for errors and take advantage of the convenient built-in tools to exclude problematic sites or services. Your XG Firewall comes with two pre-packaged TLS inspection rules out of the box that make exclusions easy. By default, they exclude trusted domains known to be incompatible with TLS decryption such as iCloud, some Microsoft domains, and others. You can easily customize these rules directly through the widget on the Control Center as issues arise, or through updating those exclusion rules directly.

Once youre comfortable with the DPI engine and TLS inspection, we recommend applying it more broadly across your network. When youre ready for broader TLS inspection and wish to push the CA certificate out to more systems, we recommend using the wizard built into the Microsoft Active Directory Group Policy Management tools to make this task quick and easy.

As you roll out TLS inspection more broadly, carefully monitor your firewall system performance metrics to ensure your hardware is not a bottleneck. While the Xstream architecture in XG Firewall v18 offers tremendous performance gains for TLS inspection, going from inspecting 0% of encrypted traffic to 80-90% of your TLS traffic may have an impact on performance depending on your firewalls normal load.

If your firewall could benefit from some extra headroom, consider a hardware refresh to a current higher-capacity model. You definitely dont want to risk NOT inspecting TLS traffic given the rate at which hackers and attackers are utilizing this enormous blind spot to their advantage.

Heres a summary of the resources available to help you make the most of the new features in XG Firewall v18, including Xstream TLS inspection:

Go here to read the rest:
Making the most of XG Firewall v18 Part 2 - Naked Security

ProLock ransomware gives you the first 8 kilobytes of decryption for free – Naked Security

As organizations were scrambling to deal with the lockdowns associated with the global COVID-19 pandemic, a new wave of ransomware attacks began. The ransomware, called ProLock, is a successor to PwndLocker, a ransomware strain that emerged late in 2019.

PwndLockers distribution was short-lived, primarily because it was discovered that the keys needed to decrypt files could be recovered from the malware itself without paying a ransom. The retooled ProLock ransomware, which emerged in March, resulted in the opposite problem: in May, the Federal Bureau of Investigation issued an alert warning that victims who had paid the ransom demanded by ProLocks operators had received a faulty decryptor that corrupted files it decrypted.

The faulty debugging may be connected to the unusual way in which ProLock encrypts files: it skips files smaller than 8,192 bytes, and starts encrypting larger files after the first 8,192 bytes. The result is files that are partially readable, and partially encrypted.

Sophos initially encountered ProLock when it was caught by Intercept Xs CryptoGuard component on a customer network in mid-March. The malware uses a Powershell-based dropper that extracts Windows executable code from an accompanying graphics fileor at least, a file with a graphics format extension. And all of its malicious activities are concealed within legitimate Windows processes.

According to the FBI flash, victims of ProLock have included healthcare organizations, government agencies, financial institutions, and retailers. Victims are directed to contact the ProLock operators through a Tor-based ( .onion) web portal or a ProtonMail email address. Following the current trend in ransomware set by Maze, ReVil, and other established extortion operations, the ProLock actors instruct victims to pay the ransom in several days, threatening to release the victims data on social media and public websites, the FBI reports.

ProLock has gained access to victims networks in several ways, with some leveraging third-party exploitation. In May, Oleg Skulkin, Senior Digital Forensics Analyst at Group-IB, told BleepingComputer that evidence he had uncovered showed some ProLock victims were infected through scripts executed by the QakBot banking trojan.

The FBI also cited Qakbot as one of ProLocks means of initial access, as well as phishing emails and improperly configured Remote Desktop Protocol (RDP) servers, and remote access connections over RDP with stolen user credentials. The earliest detection of ProLock by Sophos was on a customers compromised server, most likely through an exploit of a Remote Desktop Protocol connection.

The ProLock actors use their access to conduct some network reconnaissance, as well as to potentially steal data before launching their ransomware attack. They then use the stolen or compromised credentials, built-in Windows tools and scripts to propagate the ransomware across the network.

When the time came to release the ransomware, we found in the case we analyzed that four files were dropped onto targeted systems, downloaded from a remote server (IP addresses are in the Indicators of Compromise file posted to SophosLabs GitHub).

ProLock malware depends on Windows batch scripts, the Windows Task Scheduler (through the schtasks.exe command line utility) and PowerShell to launch its attack.

The ransomware chain is set off with the execution of run.bat, which creates a scheduled Windows task to execute clean.bat using the contents of WinMgr.xml to configure the task. When it is launched by the scheduler, clean.bat executes a base64-encoded PowerShell script that extracts the ProLock executable file encoded into the image file WinMgr.bmp, loads it into memory, and executes itpassing parameters that control the encryption. (When executed without the Powershell script, the executable runsbut doesnt encrypt any files.)

One of the ProLock samples we examined hides some of its contents with a self-modifying section of code, which conceals text strings and other elements from analysis. As is common in malware development, the ProLock program is deliberately set not to allow debugging, to make it more difficult for researchers to run it in a controlled fashion.

The malware decodes the self-modifying section, imports DLLs and sets up the functions it will use. Then it launches a new thread and puts the first thread to sleepan anti-analysis trick.

The malware traverses the registry looking for security policy settings that might cause trouble. For some reason, it switches some of Internet Explorers security policy settings, turning off the mapping of Universal Naming Convention paths to IEs Intranet zone and turning on automatic intranet mapping. (The list of registry changes is included in the indicators of compromise file on SophosLabs Github here.) Then it starts hunting for applications and services that might get in the way of total data destruction.

Using a function call to Windows CreateToolhelp32snapshot.dll, the malware takes a snapshot of all running processes, and begins checking them against a list (which can be found here on SophosLabs GitHub), shutting down the ones that match the list with Windows taskkill.exe utility (through a ShellExecuteA function call). The processes include common desktop applications (including Microsoft Office applications), databases, the Firefox browser and Thunderbird mail client, and a number of security software components. These sorts of processes are stopped by ransomware in order to make sure no user files are locked openallowing the malware to encrypt them without resistance.

Then, using net.exe, the ransomware code attempts to shut down a list of more than 150 services associated with enterprise applications, security software, and backups. A full list of the processes and services targeted by the ransomware is posted on SophosLabs GitHub here(services) and here (processes). Again, the goal is to prevent anything from interfering when the encryption begins. These service shutdown commands are issued with Windows net.exe utility.

Next, to prevent local file recovery, ProLock deletes the shadow copy of local files by executing the following commands to vssadmin.exe (Windows Volume Shadow Copy Service):

With all of the guards out of the way, the ransomware begins to check what media is mounted and traverses the directory structure of any local or network-mapped drives. It skips over executable files (including .php files for websites), and leaves applications intact. All of this malicious activity is executed through the powershell.exe process.

As it reads each file, it checks the length. If the file is under 8,192 bytes (0x2000 in hexidecimal), it skips the file. Otherwise, it begins encrypting the file, starting after the 8,192nd byte. After encrypting a file, the extension .prolock is appended to its file name (for example, a_very_large_text_file.txt becomes a_very_large_text_file.txt.prolock.)

As the malware finishes the encryption of the contents of each folder, it writes a file to the folder named [HOW TO RECOVER FILES].TXT. This contains the ransom note.

When all the folders have been traversed, the ransomware sounds the system alert tone, and drops a ransom note on the desktop.

The ransom note itself is hard-coded into the ransomware as a text stringincluding the .onion website address and the victims user ID. In fact, across the ProLock samples we examined, the ransom notes were exactly the same, including the user IDdespite other differences in the code. Given that these samples came from separate sources, that would suggest that multiple ProLock victims were given the same user ID, which wouldnt matter in any case because of the targeted way ProLock is deployed.

As with other targeted ransomware attacks, ProLocks encryption of files should be considered just the final act in the attack. The attackers need to have gained administrative credentials to spread the malware, which means that theyve had largely unfettered access to victims data. While weve seen no direct evidence thus far of data theft, the tools used to gain access by ProLocks actors give them wide access to network resources and data. And its possible that other malware (such as QakBot) has also taken rootmalware that ProLock would leave untouched.

Even if victims pay, theres the chance (thanks to the broken decryptor) that data will be lost or made more expensive to recover. Bringing in the expertise of a ransomware response team may be required to recover.

There are several concrete steps that organizations can take to prevent these types of attacks. Protecting remote network access is key to stopping these types of targeted attacks, by putting RDP access behind a virtual private network and using multi-factor authentication for remote access. As with all ransomware threats, maintaining offline backups and malware protection for both desktops and servers also hardens defenses against attacks like ProLock. And up-to-date endpoint protection tools (such as Intercept X and CryptoGuard) can be effective in blunting attacks that get past other defenses, or at least minimizing the damage done by an intrusion.

Sophos now blocks variants of ProLock as Troj/Agent-BEKP and Troj/Ransom-FVU, and through heuristic analysis by Sophos ML, as well as through CryptoGuard.

SophosLabs wishes to acknowledge the contributions of Hajnalka Kp , Anand Aijan, Andrew Brandt, Rahul Dugar, and Gabor Szappanos.

More:
ProLock ransomware gives you the first 8 kilobytes of decryption for free - Naked Security

Global Encryption Software Market Expected to reach highest CAGR by 2025: Dell , Eset , Gemalto , IBM , Mcafee – Owned

Aimed at providing report readers with a discerning picture of the current market scenario dominant in the Encryption Software market, this holistic report output encapsulating historic as well as current market developments are poised to specifically grab the pulse of the Encryption Software market.

Owing to the sudden onset of dynamic macro-economic factors the Encryption Software market has been thoroughly affected by the current developments, thus manifesting in a myriad alterations and tangible deviations from the regular growth course of the Encryption Software market. Our researchexperts and industry analysts.

The study encompasses profiles of major companies operating in the Encryption Software Market. Key players profiled in the report includes:DellEsetGemaltoIBMMcafeeMicrosoftPkwareSophosSymantecThales E-SecurityTrend MicroCryptomathicStormshield

Available Sample Report in PDF Version along with Graphs and [emailprotected] https://www.orbismarketreports.com/sample-request/83040

The report specifically hovers over vital, market specific details concerning both historical as well as current scenario, such that readers can seamlessly grab ready-to-use information from a singular, compact documentation on the Encryption Software market.This section of the report further aims to enlighten report readers about various market influencers with a thorough overview of barrier analysis as well as an opportunity mapping that collectively influence and decide the upcoming growth trajectory of the Encryption Software market in all favorable terms.

By the product type, the market is primarily split into On-premisesCloud

By the end-users/application, this report covers the following segments Disk encryptionFile/folder encryptionDatabase encryptionCommunication encryptionCloud encryption

Access Complete Report @ https://www.orbismarketreports.com/global-encryption-software-market-growth-analysis-by-trends-and-forecast-2019-2025

As the report makes further progress, it unveils a real-time scenario of the market, besides also shedding substantial light on other historical developments that had influenced sustainable revenue flow in the Encryption Software market. Minute details about lucrative business strategies, trouble-shooting approach as well as customer enticing tactics have been thoroughly addressed in this section of the report such that readers can well comprehend real developments to ascertain an-evidence based business strategy, with ample competitive edge, such that market players can definitely cement their lead despite the high intensity in the Encryption Software market.

Global Encryption Software Geographical Segmentation Includes: North America (U.S., Canada, Mexico) Europe (U.K., France, Germany, Spain, Italy, Central & Eastern Europe, CIS) Asia Pacific (China, Japan, South Korea, ASEAN, India, Rest of Asia Pacific) Latin America (Brazil, Rest of L.A.) Middle East and Africa (Turkey, GCC, Rest of Middle East)

These details are indicated in the report to allow market players undertake a systematic analytical review of the Encryption Software market to arrive at logical conclusions governing the growth trajectory of the Encryption Software market and their subsequent implications on the growth of the aforementioned market.

Some Major TOC Points: Chapter 1. Report Overview Chapter 2. Global Growth Trends Chapter 3. Market Share by Key Players Chapter 4. Breakdown Data by Type and Application Chapter 5. Market by End Users/Application Chapter 6. COVID-19 Outbreak:Encryption Software Industry Impact Chapter 7. Opportunity Analysis in Covid-19 Crisis Chapter 9. Market Driving ForceAnd Many More

Global Encryption Software Market Report: Research Methodology

Moving forward, report readers are also presented with a unique portfolio presentation that houses minute details about prominent market players. The report is a unique, one stop solution to unravel complexities concerning player specific information their asset, competitive edge, influential market specific decision that eventually harness a lucrative stance despite cut-throat competition in the Encryption Software market.

Do You Have Any Query or Specific Requirement? Ask Our Industry [emailprotected] https://www.orbismarketreports.com/enquiry-before-buying/83040

The report allows its readers to gain optimum cues about the market progression such that players can well comprehend potential opportunities as well as persistent challenges and probable threats in the Encryption Software market. This dedicated research articulation on the Encryption Software market structuresinclusive outlook of various drivers and threats that eventually impact the growth course in the Encryption Software market.

About Us :

With unfailing market gauging skills, has been excelling in curating tailored business intelligence data across industry verticals. Constantly thriving to expand our skill development, our strength lies in dedicated intellectuals with dynamic problem solving intent, ever willing to mold boundaries to scale heights in market interpretation.

Contact Us :

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

Originally posted here:
Global Encryption Software Market Expected to reach highest CAGR by 2025: Dell , Eset , Gemalto , IBM , Mcafee - Owned

US attorney general may be using Assange case for political ends, court told – The Guardian

The US attorney general, William Barr, may be using Julian Assanges extradition case in the UK for political ends, the WikiLeaks founders defence team alleged during a court hearing at which he appeared by video link from prison for the first time in months.

It was a fact that Donald Trump had described the defence case as a plot by the Democrats, Edward Fitzgerald QC told the hearing at Westminster magistrates court.

Fitzgerald said a new superseding US indictment, produced months after the start of attempts in the UK to secure his extradition, had been sprung on his defence team.

The indictment, which had not yet been formally laid before the court, supersedes previous indictments brought in February and which related to 2010 and 2011.

A US grand jury had previously indicted Assange on 18 charges 17 of which fall under the Espionage Act around conspiracy to receive, obtaining and disclosing classified diplomatic and military documents.

The details in the new indictment publicised last month by the US Department of Justice focus on conferences in 2009 in the Netherlands and Malaysia at which US prosecutors say Assange tried to recruit hackers who could find classified information, including in relation to a most wanted leaks list posted on the WikiLeaks website.

The hearing on Monday was the latest in a series of administrative hearings. Chaotic arrangements meant journalists, legal observers and some lawyers had difficulty accessing it remotely to listen in. The full hearing of the extradition case has been postponed until September due to the Covid-19 pandemic.

Wearing a beige sweater and a pink shirt, Assange eventually appeared from Belmarsh prison after an earlier attempt was aborted.

Fitzgerald told the hearing it would be improper if the new indictment led to the postponement of the hearing until after the November presidential election in the US.

Judge Vanessa Baraitser told the hearing that the deadline had arrived for any further evidence before the extradition hearing, aside from psychiatric reports. She said she expected all parties to attend the hearing in September in person.

Outside the court, the WikiLeaks editor-in-chief, Kristinn Hrafnsson, said: The new superseding indictment actually contains nothing new. All the alleged events have been known to the prosecution for years.

It contains no new charges. Whats really happening here is that despite its decade-long head-start, the prosecution are still unable to build a coherent and credible case. So theyve scrapped their previous two indictments and gone for a third try.

US Department of Justice authorities have said: The new indictment does not add additional counts to the prior 18-count superseding indictment returned against Assange in May 2019. It does, however, broaden the scope of the conspiracy surrounding alleged computer intrusions with which Assange was previously charged.

More:

US attorney general may be using Assange case for political ends, court told - The Guardian

TD9 and Exchange Inflows: Reasons for Caution as Bitcoin Hits $10,440 – Cointelegraph

The price of Bitcoin hit $10,463 on BitMEX, slightly below the previous peak in June. But two indicators are signaling a BTC cool-off: TD9 and exchange inflows.

The price of Bitcoin tests a crucial resistance level. Source: Raoul Pal

The TD9 is a trend-reversal indicator that is a part of the TD sequential system. It typically indicates if a rally or a correction is over-extended.

Similarly, exchange inflows, especially among whales, often suggest that the ongoing rally could be overcrowded.

A TD9 sell signal triggers essentially when the price of Bitcoin rises for nine consecutive days without a major pullback. If nine candles all stay above the close of the four candles prior, then a TD9 lights up.

Since July 19, the price of Bitcoin has increased from $9,219 to $10,463. The four candles prior to the most recent nine daily candles closed at $9,150, making a TD9.

The TD9 in itself could be unreliable. It does not take into account the fundamentals or technicals of an asset. But when BTC rallies for nine straight days, and it coincides with other factors, it might hint at a pullback.

Apart from the TD9, analysts are exploring exchange inflows of BTC. According to CryptoQuant CEO Ki Young-Ju, exchange inflows spiked upon Bitcoins latest rally. He suggested that some whales could be getting cautious. He said:

BTC price went up too fast. Seems like other whales think so too.

Bitcoin exchange inflows spike as BTC surges. Source: CryptoQuant

The funding rates of perpetual futures contracts across major exchanges, like BitMEX and Binance Futures, are also surging.

Perpetual futures contracts do not have any expiration dates, unlike conventional futures contracts. As such, exchanges use a mechanism called funding to incentivize users that bet against the majority of the market.

For example, if the Bitcoin futures market has more than 60% of longs, the funding rate would increase and incentivize short holders.

Currently, the funding rates on BitMEX and Binance Futures are 0.072% and 0.054%, respectively. Usually, the funding rate of BTC perpetual contracts hovers at around 0.01%. It indicates that the majority of the market are longing, which might leave BTC vulnerable to a long squeeze.

Meanwhile, some other traders and technical analysts believe that Bitcoin may continue to rally without major pullbacks.

Zoran Kole, a cryptocurrency trader, said he expects Bitcoin to stabilize at the $10,000 to $10,100 support range, before moving upwards. Based on market structure, the trader explained that BTC could surge to as high as $11,500. He wrote:

Looking to long range high retest/DBS Zone. Invalidation below weekly open/9900 sweep. Targeting 11.5-11.6 weekly kumo top.

Raoul Pal, the CEO of Real Vision Group, said that the real rally of Bitcoin starts when BTC crosses $10,500. Whether it corrects before hitting the crucial resistance level is an uncertainty, Pal said. But he noted that he expects the momentum to continue. He said:

The real game in bitcoin begins over $10,500. Maybe it corrects first, maybe not but I'm hodling.

Simon Peters, a cryptoasset analyst at global investment platform eToro, shared his comments, saying:

Bitcoins network metrics are also looking pretty healthy. Glassnodes Reserve Risk metric is currently signaling an attractive risk-to-reward level, indicating that confidence is high and the price is low.

While several fundamental indicators point toward a minor short-term pullback, some traders believe the momentum of BTC is too strong for a deep correction.

Read more from the original source:
TD9 and Exchange Inflows: Reasons for Caution as Bitcoin Hits $10,440 - Cointelegraph

Silvergate’s Bitcoin-Backed Lending Product Grew 80% in the Last Quarter – CoinDesk – CoinDesk

Silvergate Bank continued to add a steady drip of crypto customers in the second quarter of 2020 but its issuance of bitcoin-collateralized loans grew by $10 million, outperforming the growth of its real estate loan book by 10x.

According to its latest earnings report, released Monday morning, the banks traditional loan portfolio a real estateheavy loan book of about $1.1 billion only increased by $1 million from the first quarter. Bitcoin-collateralized loans through the banks SEN Leverage product surged by $10 million in the first quarter.

The uptick from $12.5 million to $22.5 million represents 80% quarter-over-quarter growth for the product, which is part of the Silvergate Exchange Network (SEN).

The publicly traded La Jolla, Calif.-based bank is one of the few U.S. banks willing to openly serve crypto-related businesses and has most of its deposits from the crypto sector. The bank went public on the New York Stock Exchange under the trading symbol SI in November. With $2.34 billion in total assets, Silvergate is less than 1% the size of JPMorgan Chase, a $3.1 trillion behemoth.

Key stats from the earnings report include:

The bank continues to have a steady pipeline of more than 200 customers waiting to be onboarded, Silvergate CEO Alan Lane said in a press release.

The leader in blockchain news, CoinDesk is a media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. CoinDesk is an independent operating subsidiary of Digital Currency Group, which invests in cryptocurrencies and blockchain startups.

Read this article:
Silvergate's Bitcoin-Backed Lending Product Grew 80% in the Last Quarter - CoinDesk - CoinDesk

Global uncertainty appears to benefit gold, bitcoin and gold-backed stablecoins – Yahoo Finance

Rallies in gold and bitcoin continued into Monday's morning trading session, a development underpinned by uncertainty around the global economy and a weakening U.S. dollar.

Bullion soared to record highs above $1,900 per once while bitcoin topped $10,300, its highest level since February. Meanwhile, the benchmark S&P 500 Index has shed more than 1% over the last five days.

As reported by The Financial Times, this year's gold rally has made it one of the best-performing assets against a backdrop of economic uncertainty tied to COVID-19 and possible inflation stemming from the subsequent fiscal and monetary measures. Meanwhile, the dollar has taken a hit, falling to a nearly two-year low relative to the euro, as reported by CNBC.

In a research note to clients, Goldman Sachs noted that it sees a strong case for "structural dollar weakness."

"Gold stands out as the clearest outperformer, exceeding its already-high beta to real yields. The dollar has also slightly underperformed as many pro-risk and Euro-centric currencies have seen even stronger-than-expected returns," the bank said.

Macquarie Group's Gareth Berry said during an interview with CNBC that the U.S. dollar would continue to weaken heading into the November presidential election.

"We are quite bearish on the U.S. dollar, not massively so ... but we do see scope for broad-based U.S. dollar weakness into the U.S. presidential elections in November," Berry said.

Demand for gold in this environment appears to have spilled over to the stablecoin gold world as well.

In an email to The Block, Tether said it saw a 60x increase in 24-hour trading volumes in its Tether Gold product, increasing from $67,000 to $677,000.

"While no one could of course have anticipated the severe challenges that we've all had to adapt to in 2020, it is clear that in times of uncertainty people like having accessibility to gold," Tether CTO Paolo Ardoino said in a statement.

2020The Block Crypto, Inc. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.

Continue reading here:
Global uncertainty appears to benefit gold, bitcoin and gold-backed stablecoins - Yahoo Finance

This simple explainer tackles the complexity of quantum computing – Boing Boing

Many videos describing quantum computers try to distill and oversimplify everything. Thoughty's takes its time and gives more historical and theoretical context than most.

Because it does take a while to get into the subject, here's a shorter explainer by MIT:

Today's computers use bitsa stream of electrical or optical pulses representing1s or0s. Everything from your tweets and e-mails to your iTunes songs and YouTube videos are essentially long strings of these binary digits.

Quantum computers, on the other hand, usequbits, whichare typically subatomic particles such as electrons or photons. Generating and managing qubits is a scientific and engineering challenge. Some companies, such as IBM, Google, and Rigetti Computing, use superconducting circuits cooled to temperatures colder than deep space. Others, like IonQ, trap individual atoms in electromagnetic fields on a silicon chip in ultra-high-vacuum chambers. In both cases, the goal is to isolate the qubits in a controlled quantum state.

The processing power possible through these controlled qubits will make today's fastest computers look positively archaic.

Image: YouTube / Thoughty2

Intelligence is a surprisingly difficult thing to define. Kurzgesagt jumps into the debate with an interesting overview of where intelligence begins. Is a slime mold intelligent? Are plants intelligent?

Wildfires are a natural part of many ecosystems, though more and more are human-caused. Wendover Productions takes a look at how firefighters work to minimize the spread of wildfires in grueling and dangerous conditions.

Because of its ubiquity, the landscape is littered with proposed etymologies of the term OK. This nice explainer clarifies the murky origins of one of the most widely spoken words in the world.

You sort out your recycling. You dont use plastic bottles anymore. And youve even gone paperless, right down to using the canvas shopping bag at the grocery store. But even if youre trying to be ultra-vigilant to the environmental impact you make on our planet, there are bound to be some blind spots in that []

When you used to walk through any office you would likely spot a few bobbleheads. These wobbly figurines are great fun to have around, although most celebrate people we will never meet. For something a little more personal, tryHandmade Custom Bobbleheads. These mini caricatures are sculpted and painted by skilled artisans, based on any photo []

Most people enjoy having items on their desks that convey a taste of who they are and what theyre about to visitors. Under those circumstances, could there possibly be a greater flex to show off all of your galactic ambitions than having the entire solar system on exhibit right on your desktop? Even if you []

More here:
This simple explainer tackles the complexity of quantum computing - Boing Boing

6 Laws Of Zero Will Shape Our Future. For The Better Or Worse Is Up To Us. – Forbes

Six key drivers of humanity's progress are headed towards ZERO cost.

There are decades where nothing happens; and, there are weeks where decades happen, observed Vladimir Lenin. The recent weeks grappling with the Covid-19 pandemic certainly fall into the weeks-where-decades-happen category. Whats more, the trillions of dollars being spent on pandemic-fighting strategies might well make or break the decades to come,as I recently wrote.

Take telehealth, the adoption of which has seemingly been on the horizon for decades and suddenly, within a few weeks after Covid-19, achieved near universal embrace. McKinseyestimatesthat providers are seeing 50 to 175 times more patients via telehealth now than before Covid-19. Whats more,57% of providers view telehealth more favorably than before and 64% report that they are more comfortable using it. These punctuated changes in perception, preference and practice could vault the telehealth market from $3 billion pre-Covid to $250 billion and, in the process, force the rewiring of the entire healthcare delivery system,accordingto McKinsey.

The technological drivers enabling telehealth are reshaping every other aspect of the decades to come, too. I previously introduced these drivers as six Laws of Zerothat underpin a planning approach that Paul Carroll and I call the Future Perfect. In this article, I lay out the six laws in more detail.

The basic idea is that six key drivers of humanitys progresscomputing, communications, information, energy, water and transportationare headed toward zero cost. That meanswe can plan on being able to throw as much of these resources as we need to smartly address any problem. Success in doing so would bring us closer to the Future Perfect. Alternatively, like gluttons at an all-you-can-eat buffet, we could binge in ways that exacerbate societal issues such as health, equity,civility, privacy and human rights.

Our Future Perfect approach, which builds onan approach developed by Alan Kayfor inventing the future, projects the Laws of Zerointo the future to imagine how vast resources could address important needs in key pillars of society, suchas electricity, food, manufacturing, transportation, shelter, climate, education and healthcare.Weve chosen 2050 as a marker because 30 years is far enough in the future that one isnt immediately trapped by incremental thinking. Instead, we can explore how exponential resource improvements might radically alter the range of possible approaches. The question becomes Wouldnt it be ridiculous if we didnt have this?

The 30-year visioning is intended as a mind-stretching exercise, not precise forecasting. This is where creativity and romance lives, albeit underpinned by the deep science of the Laws of Zero rather than pure fantasy. We use a technique we call future histories to develop powerful narratives of compelling futures. We then pull backwards to today and chart possible paths for turning the 30-year visions into something more concrete. As Alan Kay says, the best way to predict the future is to invent it.

Now, lets explore the drivers and understand what zero cost really does, to lay the foundation for designing those remarkably different and (hopefully) better futures.

1.Computing.

That computing has followed the Law of Zero comes as no surprise to anyone familiar withMoores Law, the observation by Intel co-founder Gordon Moore in 1965 that computing was doubling in power and halving in cost every 2 years. Ray Kurzweil has even observed that Moores Law describes not just integrated circuits but more than a century of computing, as shown below.

Computing has followed Moore's Law for more than a century. (Log Scale)

One consequence is that the smartphone in your pocket has over100,000 times more processing power and one million times more memorythan thecomputer that guided Apollo 11to the moon and backat a percentage of cost that effectively rounds to zero.While computing power obviously isnt free, as anyone buying a smartphone knows, it looks almost free from any historical distance.

Now consider computing in 2050. If Moores Law remains a guide, computing power would double about 20 times in the next 30 years. Cost would be cut in half 20 times. In other words, we can look forward to computing power more than one million times faster than today with a per unit cost of todays divided by million.

Evenif Moores Law slowsand engineers progress in cramming more circuits onto a silicon chip finally diminishes, innovations in computing architecture, algorithms and (perhaps) quantum computing are emerging to pick up the slackand perhaps even quicken the pace. Rodney Brooks, former director of MITs Computer Science and Artificial Intelligence Lab, argues that the end of Moores Law, as we traditionally knew it, will unleash a new golden era ofcomputing.

2.Communications

circa 1850: American inventor of the electric telegraph and morse code, Samuel Morse (1791 - 1872). ... [+] (Photo by Hulton Archive/Getty Images)

The first message that inventor Samuel Morse sent on his experimental telegraph line between Baltimore and Washington DC in 1844 was, What hath God wrought? Some form of that astonishment has been expressed time and again as communications have moved from the telegraph to the telephone to the ubiquitous, digital communications of today. Communications is becoming ever richer, too, as having bandwidth to burn means that video (and, in time, augmented and virtual reality) can be part of every connection.

Reach will keep expanding, too. Riding on the computing Law of Zero, communications will expand into every corner of the globe, as tens of billions of devices and trillions of sensors are incorporated into a tapestry of communication. In other words, we arent just talking about humans connecting with each other.

Now, history suggests that expectations about communication should be tempered. The telegraph, for instance, waspredicted in 1858 to bring world peace:

It is impossible that old prejudices and hostilities should longer exist, while such an instrument has been created for an exchange of thought between all the nations of the earth.

But, the telegraph turned out to be a critical instrument of war as well. The Union armies relied on some6.5 million messagesduring the Civil War, and the telegraph provided the North key tactical, operational and strategic advantages over the Confederacy.

The Internet created similar delusions. Wed all understand each other better and communicate freely, so rainbows and unicorns. Clearly, no one had imagined Twitter in those early days. No one realized how much Facebook, etc. could increase tribalism and exacerbate divides.

Still, whatever winds up flowing through the pipes in our future whether butterflies or raw sewage the pipes will be almost infinitely wide, and the cost will be a flat, low rate. Draw the graph of cost vs. performance from todays perspective, and that cost in 2050 will be so low that lets call it zero.

3.Information

In the late 1990s, during the Internets coming out party, it started to become clear just how much information could be collected on peoples online behavior. But Nicholas Negroponte, the founder of the MIT Media Lab, defiantly told us that, while his credit card company or someone else might know that he went to see a certain movie, They wont know whether I liked it!

No longer. Just a few buildings away from Negropontes old office at MIT, researchers can monitor motion, heartrate, breathing and even emotions for people simply by how they reflect ambient radio waves, such as Wi-Fi. So, sensors in a movie theater can already get a good read on how Negroponte and the rest of an audience felt about a film. Mix in a little genomics, biology, financial data, social preference data, census data, etc., and, whoa, were naked, whether we want to be or not.

Furthermore, if you think social media is revealing now, wait until you see whats coming. Already, a startup called Banjo has become a sort of network of networks and is monitoring massive amounts of private and public social feeds around the world. It divides the globe into 7 trillion sectors and monitors in real time what is happening in each of those small areas.

It doesnt take much imagination to conjure up the dystopian possibilities; but, the ability to monitor everything and everywhere has plenty of potential benefits, too.

In a simulation described by the Attorney General of Utah, Banjo was able tosolve a child abduction casein minutes. The same case eluded a multi-agency task force that applied hundreds of person-hours using traditional methods. A real-life example: by matching a social media post about the sound of gunfire with closed-circuit video camera showing gunfire, Banjo was the first to detect the 2017 shooting at the Mandalay Bay resort in Las Vegas.

How much will all that information cost? A good indicator is the sequencing cost per genome, which is falling at an exponential rate even faster than Moores Law.

Sequencing cost per genome is falling faster than Moore's Law.

Still, we are far from taking full advantage of the Laws of Zero in information. Just consider the sad state of Covid-19 testing, where wait times of up to two weeks arerendering test results uselessfor guiding public health strategies, quarantines and contact tracing. Instead, imagine building a world where every bit of such information is available when you need it to enable and manage a Future Perfect.

4.Energy

A joke in the world of energy imagines Alexander Graham Bell and Thomas Edison coming back to life today. Bell would be amazed by wireless communications, by the small size of phones, by texting and all the other apps. What would he even do with an iPhone? Facetime? Fortnite? TikTok? Where would he start? By contrast, Edison would look at the electric grid and say, Yeah, thats about where I left things.

Fortunately, big change is finally afoot.

When Bell Labs developed the first solar photovoltaic panel in 1954, the cost was $1,000 per watt produced. That means it cost $75,000 to power a single reading lamp maybe a little pricey. By 2018, solar was down to 40 cents a watt. A drop in price by a factor of 2,500 over six decades isnt Moores law, but its certainly headed toward that magic number: zero.

Wind power is also on an aggressive move toward zero prices are down nearly 50% just in the past year. Contracts were recently signed for wind power in Brazil at1.75 cents per kilowatt hour, about one-fourth of the average of 6.8 cents per kwh worldwide for coal, considered to be the cheapest of the conventional energy sources.

The key holdup for renewable energy has been batteries. There has to be some way to store solar and wind energy for when you need it, which means the need for lots and lots of battery capacity. Fortunately, batteries are progressing on three key fronts: battery life, power and cost. CATL, the worlds top producer,recently announceda car battery that can operate for 1.2 million miles, which is 8 times more than most car batteries on the market today. And, as the figure below by BloombergNEF shows, battery prices have plunged 87% in the past 10 years. Even Gordon Moore would be pleased.

Battery prices have plunged 87% in the past 10 years.

So, we have at least three cost curves that look like theyre headed toward zero: solar, wind and batteries. Thats plenty, but others are worth mentioning as well, including nuclear fission, nuclear fusion, geothermal and radical improvements in efficiency. Together, they create a Law of Zero for energy that will create unfathomable benefits. Energy drives every living thing, and unlimited energy will drive unlimited opportunities.

Edison wouldnt know what hit him.

5.Water

Water is the new oil. Aquarter of humanityfaces looming water crises. Demand is growing with population, urbanization and wealth, taxing traditional fresh water supplies while also polluting them. But theres hope: Limitless energy could allow for the almost magical availability of water.

By 2050, anyone near a body of saltwater could benefit from water technology breakthroughs. Desalination has always been possible but prohibitively expensive because of the energy costs, whether done by filtering out the salt through osmosis or by evaporating the water and leaving the salt behind. But cheap energy makes desalination more plausible, hopefully in time for the many cities around the world that are getting desperate for water.

Water wont be pulled right out of thin air in great quantities any time soon, but that technology is also under development. One group wona $1.5 million X Prizeby developing a generator that can be used in any climate and can extract at least 2,000 liters of water a day from the air at a cost of less than two cents a liter, using entirely renewable energy.

Cody Friesen, founder of Zero Mass Water, a startup backed by Bill GatesBreakthrough Energy Ventures,BlackRockand other high profile investors, says decentralized production of water will lead to benefits akin to those that come from having abundant electricity while off the grid. He says 1% to 2% of the worlds carbon footprint comes from mass-purifying todays water; that carbon dioxide goes away when water is drawn from the air and purified at your doorstep by the sorts of solar-poweredSource Hydropanelsthat his company produces.

Like many potentially world-changing future solutions, Friesens approach doesnt make economic sense today. But his early research, products and field experiments, such ashis work with the Australian Renewable Energy Agency (ARENA), helps to develop the solution for when the approach, riding on the Law of Zero for energy, becomes viable on a massive scale by 2050, if not sooner.

Where there is abundant water, along with the energy that comes from that Law of Zero, there can be food. The basics of life will be available everywhere, even to the far corners of the Earth.

6.Transportation

Although the enthusiasm for autonomous vehicles has taken a hit over the past couple of years they are a really hard problem some early successes and the multitude of startups and brilliant scientists tackling the issues make us confident that 2050 will include an unlimited number of fully autonomous vehicles.

The implications are mind-boggling. Basically, terrestrial transportation heads toward zero marginal cost. Remember, electricity is heading towards zero cost, and all these cars and trucks will be powered by batteries, so fuel is no longer an expense. In addition, the cost of driving, in terms of the time you devote to it, will disappear once we reach full autonomy. With time no longer a factor, distance wont be, either. Even if you have to travel a couple of hundred miles, or spend two or three hours in a vehicle, you take your world into the vehicle with you and can act just as you would sitting on your couch at home. So, much of the expense associated with fuel, time and distance go away.

Now, a lot of metal will need to be shaped and maintained even in an autonomous future, so transportation wont be free. But it will be so much less expensive than it is today that we can be profligate in throwing transportation resources at anything we want to design for the Future Perfect. So, think in terms of a world where fuel is free and, thus, infinite, and where many considerations of time and distance no longer matter.

Yes, lots of people and businesses will have to adapt. Most notable are the 4.5 million professional drivers in the U.S., but theyre just the startand it wont all be on the negative side of the ledger. Autonomous vehicles will also change emergency rooms (which currently treat some 2.5 million people each year after auto accidents and, based on current estimates, might treat only 10% as many once AVs become ubiquitous). We know that the vast majority of the roughly 40,000 people who die on U.S. roads every year will miss that appointment with death (Yay!) and keep living productive lives.

We also know that health, wealth, education, economic mobility and more will all improve, because access to transportation currently constrains so many people, and those limitations go away.

Not all the Laws of Zero will kick in right away. Theubiquity of water, in particular, will take time to play out, partly because getting to zero cost for energy will also take a bit. For all these Laws of Zero, supporting technologies need to continue to mature and be helped along by some as-yet-to-be-invented (but inevitable) scientific breakthroughs.

But the core question is fascinating and important: How will these Laws of Zero let us design and build as grand a world as possible for our children and their kids by 2050?

What can removing todays actual and cognitive restraints let us realistically project for them in terms of electricity, food, manufacturing, transportation, shelter, climate, education, healthcare anddare we say it?the political and social environment that will define the equity, civility, privacy and human rights in the world in which they live? How much can we increase the odds of success if we more clearly envision the Future Perfect enabled by the Laws of Zero, and begin now to focus both inspiration and perspiration towards inventing it?

The short answer is: A lot, if we step up to the challenge. By doing so, we can make next few decades ones where centuries happen.

Read this article:
6 Laws Of Zero Will Shape Our Future. For The Better Or Worse Is Up To Us. - Forbes

4 lawsuits that challenge Trump’s federal agents in Portland test issues other cities will likely face – Huron Daily Tribune

(The Conversation is an independent and nonprofit source of news, analysis and commentary from academic experts.)

Sarah J. Adams-Schoen, University of Oregon

(THE CONVERSATION) President Donald Trump has announced that the U.S. Department of Justice will send a surge of federal law enforcement into American cities run by extreme politicians who are on an anti-police crusade, including Chicago, Kansas City, Albuquerque, Cleveland, Detroit and Milwaukee.

Those cities may soon see legal battles like the ones in Portland, Oregon, where four notable lawsuits challenge the actions of federal agents who, under the auspices of the Department of Homeland Security, were purportedly sent to protect federal property on the July 4th weekend and still remain.

As a state and local government law scholar, I believe a surge of hundreds of federal officers into cities throughout the United States would represent an unprecedented expansion of the role of the federal government into local police matters.

Together, the Portland lawsuits ask the court to delineate, and enforce, constitutional limits on the federal governments ability to override state and local law enforcement and use police tactics that violate protesters constitutional rights.

Extended protests and multiple incidents

Since May 29, Portlanders have marched, sung, chanted and stood together in Portland to demand racial justice and condemn police violence against Black Americans.

Local officials and observers describe a fringe minority of protesters pointing laser pointers at officers, throwing cans, breaking windows and setting dumpsters and bags of garbage on fire, and shooting fireworks at the federal courthouse. One person was arrested for allegedly attacking a federal officer with a hammer.

In response to some of these actions, the Department of Homeland Security has sent paramilitary-style units to Portland. The president has characterized the operation as limited to protection of federal property and personnel and enforcement of federal laws but also as restoring public safety after liberal politicians have put the interests of criminals above the rights of law-abiding citizens.

State and local officials and observers say those federal agents are detaining and arresting innocent protesters. They also say federal officers have fired non-lethal rounds, pepper balls and tear-gas canisters at peaceful protesters, journalists, medics and legal-rights observers.

In a court filing, the city says the presence of heavily armed federal agents is not keeping order, but rather escalating violence, inflaming tensions in our City, and harming Portlanders. The city also says, Serious and credible allegations have been made that the federal government has effectively kidnapped people off Portland streets, among other abuses of power.

Independent monitors sue to protect themselves

The first case, Index Newspapers, Inc. v. City of Portland, began as a lawsuit by six journalists and legal observers seeking to stop Portland police from assaulting news reporters, photojournalists and legal observers documenting the polices violent response to protests. After the arrival of federal agents in Portland, the lawsuit expanded to include the U.S. Department of Homeland Security and the U.S. Marshals Service.

On July 23, U.S. District Court Judge Michael Simon rejected federal claims that the force used on Plaintiffs [was] unintended consequences of crowd control. He issued a temporary restraining order barring federal agents from arresting, threatening to arrest, or using physical force directed against any person whom they know or reasonably should know is a Journalist or Legal Observer.

The judge also barred federal agents from seizing any photographic equipment, audio- or videorecording equipment, or press passes or ordering such person to stop photographing, recording, or observing a protest.

State sues to block baseless arrests

In the second lawsuit, Oregons Attorney General Ellen Rosenblum is suing on behalf of the state of Oregon to stop federal agents from detaining or arresting people without probable cause or a warrant, and to require the federal agents to identify themselves and their reason for an arrest or detention.

The suit says citizens rightly fear being thrown into a van by anonymous agents, which infringes on their First Amendment rights to protest. It also says citizens have Fourth and Fifth Amendment rights not to be snatched off of the streets without probable cause by unidentified officers in unmarked cars.

On Friday, Judge Mosman denied Rosenblums request to immediately bar such behavior by federal agents, saying that Rosenblum had not provided enough evidence to show federal agents were engaging in a pattern of unlawful detentions and finding the state did not have standing to seek the temporary order.

As the parties prepare their next moves in this case, governors throughout the country will likely be watching to see whether Judge Mosman recognizes a states interest in local police matters and its standing to sue federal agencies to protect the constitutional rights of its citizens.

Citizens sue to protect their own rights

The third case focuses on the 10th Amendment, which says that, except specific federal powers spelled out in the Constitution, all other powers are reserved to the states and its citizens.

Those bringing the suit, which include the First Unitarian Church of Portland, say federal law enforcement agencies are infringing on Oregons sovereign powers to police Oregon streets. They say the deployment of federal law enforcement officers in Portland infringes on the power of Oregon citizens to hold state and local police accountable.

The lawsuit also argues that the federal response violates the First Amendment rights of the First Unitarian Church of Portland, whose religious practice includes activism and protest in the face of injustice.

[Youre too busy to read everything. We get it. Thats why weve got a weekly newsletter. Sign up for good Sunday reading. ]

While the lawsuit acknowledges that the federal government has a right to protect its property and personnel, it claims that defendants have far exceeded these constitutional limitations while policing in Portland.

What happens next in this case depends in part on whether the plaintiffs ask for an immediate order requiring the federal agencies to leave local policing to state and local law enforcement.

Medics sue to stop targeting and attacking

Several street medics who tended to injured protesters sued the Department of Homeland Security, U.S. Marshals Service and the city of Portland, saying that police and federal agents brutally attacked volunteer medics with rubber bullets, tear gas, pepper spray, batons and flash-bangs.

The suit claims the attacks violate the medics First and Fourth Amendment rights and seeks damages for injuries to the medics. On Friday, the medics also asked the court for an order stopping law enforcement from further targeting and attacking medics. The court will likely rule on this request in the coming week.

Federal overreach threatens police accountability

The theme of urban violence used by Trump plays on white fears of Black people and those living in extreme poverty.

Trump uses coded racist language to paint a picture of cities plagued by violent crime, heinous crimes and bloodshed. He claims that local leaders have abdicated their duty to protect citizens, requiring the federal government to step in.

The nation was founded on the principle that freedom is safeguarded by two governments, a federal government with specific, limited powers, and state governments with all other powers.

The Constitution reserves to the states an expansive power to police because that allows for law enforcement policies that reflect local circumstances and customs, and are responsive to the concerns of local citizens which is exactly what Black Lives Matter and other protesters are now demanding in Portland and throughout the country.

This article is republished from The Conversation under a Creative Commons license. Read the original article here: https://theconversation.com/4-lawsuits-that-challenge-trumps-federal-agents-in-portland-test-issues-other-cities-will-likely-face-143331.

Read more:

4 lawsuits that challenge Trump's federal agents in Portland test issues other cities will likely face - Huron Daily Tribune