Ripple CTO: Quantum computers will be a threat to Bitcoin and XRP – Crypto News Flash

In a chapter of the Modern CTO podcast, Ripples CTO, David Schwartz, expressed concerns about the development of quantum computers. Ripples CTO believes this technology is a threat to the security of Bitcoin, XRP, and cryptocurrencies. This is primarily because the consensus algorithms behind cryptocurrencies rely on conventional cryptography, as Schwartz stated:

From the point of view of someone who is building systems based on conventional cryptography, quantum computing is a risk. We are not solving problems that need powerful computing like payments and liquidity the work that the computers do is not that incredibly complicated, but because it relies on conventional cryptography, very fast computers present a risk to the security model that we use inside the ledger.

Algorithms like SHA-2 and ECDSA (elliptic curve cryptography) are sort of esoteric things deep in the plumbing but if they were to fail, the whole system would collapse. The systems ability to say who owns Bitcoin or who owns XRP or whether or not a particular transaction is authorized would be compromised().

Ripples CTO said that Ripple is trying to prepare for the emergence of quantum computers. Therefore, they are determining when the algorithms mentioned will no longer be reliable. Ripples CTO estimates that in the next 8-10 years, quantum computers will begin to pose a threat, as Schwartz further stated:

I think we have at least eight years. I have very high confidence that its at least a decade before quantum computing presents a threat, but you never know when there could be a breakthrough. Im a cautious and concerned observer, I would say.

The other fear would be if some bad actor, some foreign government, secretly had quantum computing way ahead of whats known to the public. Depending on your threat model, you could also say what if the NSA has quantum computing. Are you worried about the NSA breaking your payment system?

Despite the above, Ripples CTO made an optimistic conclusion and stated that even if there is a malicious actor with this technology, he will not use it against the average person. Therefore, Schwartz believes that most users have nothing to worry about:

While some people might really be concerned it depends on your threat model, if youre just an average person or an average company, youre probably not going to be a victim of this lets say hypothetically some bad actor had quantum computing that was powerful enough to break things, theyre probably not going to go after you unless you are a target of that type of actor.

As soon as its clear that theres a problem, these systems will probably be frozen until they can be fixed or improved. So, most people dont have to worry about it.

Excerpt from:
Ripple CTO: Quantum computers will be a threat to Bitcoin and XRP - Crypto News Flash

Letter: A plea to our Holland community – Opinion – Monroe Evening News

SundayJul26,2020at12:01AM

In life, so much can be out of one's control. We all know tragedies hit without warning and alter life in very personal ways. During this unusual time, our community needs unprecedented teamwork that is in our control.

I boldly want to ask every church leader in our community to require every parishioner to wear a mask for indoor services. I know there will be some who believe that this would violate First Amendment rights. However, First Amendment rights do not give any of us liberty to endanger the well-being and life of another.

When I wear a mask, I am protecting you. When you wear a mask you are protecting me. When I watch videos of my 5- and 7-year-old grandchildren playing baseball and they are the only ones wearing masks, I ache. They are protecting others, but no one cares enough to protect them.

I believe all of our religious leaders could make this requirement in the name of saving lives. It is a small gesture and the best we have at the moment.

This is a plea from one Holland resident asking all our religious leaders to stand together. At times in life, courage and teamwork have to supersede individual preferences. I believe this is one of those times.

Peg Luidens

Holland

Original post:

Letter: A plea to our Holland community - Opinion - Monroe Evening News

The Trump campaigns legal strategy includes suing a tiny TV station in northern Wisconsin – The CT Mirror

This year, President Donald Trumps reelection campaign filed defamation lawsuits against three of the countrys most prominent news outlets: The New York Times, The Washington Post and CNN. Then it filed another suit against a somewhat lower-profile news organization: northern Wisconsins WJFW-TV, which serves the 134th-largest market in the country.

The Trump campaign sued the station over what it claims is a false and defamatory ad WJFW aired that showed Trump downplaying the threat of the coronavirus as a line tracking new COVID-19 infections ticks up and up on the screen.

Dozens of stations ran the ad. But the Trump campaign chose to sue just NBC-affiliate WJFW, which is owned by a relatively small company that only has two other local TV stations, both in Bangor, Maine. The campaign did not initially sue the political organization that produced the ad. That group later joined the case as a defendant.

The curious lawsuit is part of a larger, aggressive and exceedingly expensive legal operation by the Trump campaign thats the focus of our latest Trump, Inc. podcast.

The campaign has spent over $16 million on litigation and other legal costs more than any past presidential campaign and more than 10 times what presumptive Democratic nominee Joe Biden has spent on legal services, according to disclosures.

Trump has long boasted about his penchant for filing lawsuits. The president and his businesses have reportedly filed over 2,000 lawsuits. After losing a 2006 defamation lawsuit against the journalist Tim OBrien, Trump told the Post that he knew he couldnt win, but he sued anyway. I spent a couple of bucks on legal fees, and they spent a whole lot more, Trump said. I did it to make his life miserable, which Im happy about.

As with other areas, Trump has taken his approach to running his personal life and business to the presidency.

Multiple media law experts told us that the suit against tiny WJFW has little chance of succeeding. Susan Seager, a media defense lawyer and adjunct professor at The University of California, Irvine, School of Law, said, The courts are very deferential and very protective of opinions about public figures and political issues.

Scare tactics

So if Trump isnt likely to win, what might he be trying to do? Matthew Sanderson, who served as counsel for Sens. John McCain and Mitt Romney, said he thinks the Trump campaign is engaging in scare tactics.

The reason in my opinion that the Trump campaign is filing these types of lawsuits is not necessarily to punish the Wisconsin station theyre not going to be successful, Sanderson said. The reason theyre doing this is to send a message to the rest of the stations to be careful about running anti-Trump ads.

Unlike many other states, Wisconsin doesnt have a law that makes complainants pay for defendants legal costs if a defamation suit ends up being dismissed as frivolous.

Seager estimates that fighting a defamation lawsuit brought by a high-profile group like the Trump campaign could cost anywhere from $100,000 to $250,000, just to go through the process of getting it dismissed.

We asked the Trump campaign and its lawyers about the suit and why they chose WJFW. They did not respond.

The TV station commented, through a lawyer, that WJFW has no choice but to fight the Trump campaigns attempt to bully a small-market broadcaster into surrendering its First Amendment rights. The public counts on local broadcasters, especially in an election year, to remain free to air criticisms of public officials.

Of course, one critical difference between lawsuits Trump used to file in his business dealings and the ones his campaign is filing is that Trump no longer has to use his own money. His donors are picking up the tab.

Trumps disclosures show his campaign has paid about $200,000 to the firm handling the Wisconsin case.

The campaign has also paid $3.3 million to the firm of attorney Charles Harder, who specializes in high-profile reputation defense lawsuits. Harder is representing the Trump campaign in the three other defamation suits against media organizations. Harder is perhaps best known as the lawyer who successfully sued Gawker into bankruptcy on Hulk Hogans behalf while being surreptitiously funded by venture capitalist Peter Thiel.

Another set of expenses in the disclosures is also interesting. It shows the Trump campaign spent $95,161 on legal & IT consulting paid to The Trump Corporation. Neither the campaign nor Trumps company responded to questions about those charges.

This story first appeared July 23, 2020 in ProPublica.

Continue reading here:

The Trump campaigns legal strategy includes suing a tiny TV station in northern Wisconsin - The CT Mirror

Seed to Table owner, legal team announce lawsuits against Collier County for mask mandate – Naples Daily News

Alfie Oakes and his legal team announced plans to file multiple lawsuits against Collier County and the individual commissioners who voted for the mask mandate passed on Tuesday during a gathering at Oakes Farms Seed to Table Market on Saturday, July 25, 2020. Naples Daily News

At least 200 people gathered outside Seed to Table market in North Naples on Saturday clothed in Americana and holding signs addressing their opposition to Collier County's mask mandate.

Seed to Table owner Alfie Oakes and his legal team, attorney Jim Boatman and state Rep. Anthony Sabatini, R-Howey-in-the-Hills,announced to the crowd they will be filing multiple lawsuits within the next few weeks against Collier County and the commissioners who voted for the mask mandate.

On Tuesday, theCollier County Commissionvoted 3-2 to pass an emergency orderthat requires owners, managers, employees, customers or patrons of a business in unincorporated Collier to wear a face covering while in that business.

Commissioners Burt Saunders, Penny Taylor and Andy Solis voted in favor of implementing a mask mandate.

Oakes and his legal team say the mandate is unlawful and a governmental overreach, attorney Jim Boatman said.

"We will not back down," Oakes said.

By the way: City of Naples to hold special meeting to discuss opting in to Collier County mask mandate

Alfie Oakes speaks during a gathering in opposition to the mask mandate passed by the Collier County Commissioners on Tuesday, at Oakes Farms Seed to Table Market on Saturday, July 25, 2020. Oakes announced that he and his legal team will be filing multiple lawsuits against Collier County and against the three individual commissioners that voted for the mandate.(Photo: Alex Driehaus/Naples Daily News/USA TODAY - FLORIDA NETWORK)

Boatman continued to speak to the crowd of supporters stating that itis their individual right to make decisions for their health care and the commissioners need to stay true to their oath to uphold the Constitution.

Sabatini has filed lawsuits against mask mandates in several other counties around the state.

Throughout the announcement the crowed cheered and clapped in support, sometimes breaking out in a chant yelling, "Alfie!"

Commissioner Taylor said Oakes has the right to sue and that in today's world anybody can sue anyone for anything.

"I guess we will see what the courts have to say," Taylor said.

Autoplay

Show Thumbnails

Show Captions

Commissioner Solis declined to comment and said he would defer to the county attorney.

Commissioner Saunders could not be reached for comment.

Oakes started voicing his opinions and moving forward with the lawsuits because he doesn't want to see people lose their opportunity.

"As we let our liberties go by the wayside we lose opportunity," Oakes said.

Oakes said he grew up poor and builthis own company that now employs 23,000 people.

"I've been able to live the American dream," he said.

A sign detailing Seed to Table's mask exception guidelines hangs outside the entrance to the store during a gathering in opposition to the mask mandate passed by the Collier County Commissioners on Tuesday, at Oakes Farms Seed to Table Market on Saturday, July 25, 2020. Collier County Commissioners who voted against the mandate are shown with Uncle Sam hats, while those that voted for the mandate are depicted above the word socialist.(Photo: Alex Driehaus/Naples Daily News/USA TODAY - FLORIDA NETWORK)

Many people in attendance at Saturday's rally stated they believe the media is creating unnecessary fear and creating division in the country.

Sarah Daniel, 72, of Marco Island, was dressed head to toe in American flag print, a "Make American Great Again" belt and a "Trump 2020" purse.

Daniel said she loves her country and came out to support Oakes because she said they have a country to save.

She mentioned how almost every boy in her high school class fought communism in Vietnam and she is scared for America's children now.

More: Finding Covid-19 exam sites in Naples takes some sleuthing

And: Relief in sight for delays in COVID-19 test results in Southwest Florida

In Lee County: Need a COVID-19 test? Here are some locations

Before Oakes made his announcement the crowed rallied together listening to live music by Jason Beal, who sangBuffalo Springfield's "For What it's Worth," a song commonly sung at civil rights protests.

As the group congregated in front of the store and spilled into the street, a car drove by almost hitting some of the attendees and yelling slurs against President Donald Trump, Seed to Table General Manager Dan St. Martin said.

St. Martin and another employee stepped in to redirect the vehicle, who had two unidentified women inside, as one woman threw a cup at a male attendee. The two women drove off without serious incident.

Jim Gibbs is held back as he yells at the driver of a car after the driver and passenger drove through the parking lot yelling slurs against President Donald Trump and threw a cup out the window during a gathering in opposition to the mask mandate passed by the Collier County Commissioners on Tuesday, at Oakes Farms Seed to Table Market on Saturday, July 25, 2020.(Photo: Alex Driehaus/Naples Daily News/USA TODAY - FLORIDA NETWORK)

Oakes has been quite vocal, and litigious, in the last few months.

Earlier this month, he filed a federal suit against the Lee County school district, which had dumped its multi-million dollar deal with his firm after he calledGeorge Floyd a "disgraceful career criminal." Floyd,a Black man who died in police custody in Minneapolis on May 25, sparked protests against racial injustice acrossthe country, including Southwest Florida. Prosecutors have filed charges in his death

Oakes also had declared that COVID-19 and the Black Lives Matter movement are "hoaxes." After that, the school district"severed ties" with Oakes and his company, which had been providing products for students, such as fresh fruits and vegetables.

Oakes, who isseeking $50 million in damages, said it was a First Amendment right to free speech.

The district wasin a three-year contract with the Naples-based supplier and had an annual renewaloption to continue services through 2024. Services during the first year of the contract, from July 2018 to June 2019, were estimated to cost $4.9 million, according to school board documents.

Oakes also filed a separate complaint with the Florida Department of Law Enforcement, accusing school district officials of violating the Sunshine Law open meeting rules.

Autoplay

Show Thumbnails

Show Captions

Read or Share this story: https://www.naplesnews.com/story/news/2020/07/25/seed-table-owner-legal-team-announce-lawsuits-against-collier-county-mask-mandate/5506537002/

See the rest here:

Seed to Table owner, legal team announce lawsuits against Collier County for mask mandate - Naples Daily News

Global Homomorphic Encryption Market 2020 Trends Analysis and Coronavirus (COVID-19) Effect Analysis | KEY PLAYERS MARKET WITH COVID-19 Impact…

Market Data Analyticshas updated theHomomorphic Encryption marketreport owing to the changing market conditions due to COVID-19. The report includes data from 2016 to 2026. Special emphasis has been given to the years 2019 and 2020 since they are turning points for the Homomorphic Encryption market on the global platform.

Click Here To Access The Free Sample PDF Report (including COVID19 Impact Analysis, full TOC, Tables and Figures)@https://www.marketdataanalytics.biz/worldwide-homomorphic-encryption-market-report-2020-industry-analysis-size-32887.html#request-sample

Final Report will add the analysis of the impact of COVID-19 on this Industry.

Chapter 1: Market Definition

The chapter includes the definition or the scope of the Homomorphic Encryption market.

Chapter2: Target Audience

In this chapter the target audience for the Homomorphic Encryption market is examined so that helps have a clear overview about their customers.

Chapter 3: Market Research Methodologies

During the market analysis, different research methodologies and market research tools were used to obtain the Homomorphic Encryption market data. Some of them are Porters Five Force analysis, SWOT analysis, PESTLE analysis, and others.

Read Detailed Index of full Research Study at::https://www.marketdataanalytics.biz/worldwide-homomorphic-encryption-market-report-2020-industry-analysis-size-32887.html

Chapter 4: Research Strategies

This chapter deals with the primary and secondary researches that were conducted by the research analysts.

Chapter 5: Homomorphic Encryption market Drivers and Restraints

In this chapter a detailed analysis of the Homomorphic Encryption market growth factors and limitations are mentioned. The facts presented in the research study are obtained through thorough research by the research analysts.

Chapter6: Market Opportunities and Challenges

The dossier has been updated for the Homomorphic Encryption market opportunities and challenges due to the fact that owing to COVID-19, the Homomorphic Encryption market has undergone several changes on the global platform.

Chapter 7: Homomorphic Encryption market Segmentation

In this chapter, the Homomorphic Encryption market is segmented into{Partially Homomorphism, Somewhat Homomorphism, Fully Homomorphism};{Industrial, Government, Financial & Insurance, Health Care, Others}). In order to study the market in detail, some of the major segments of the Homomorphic Encryption market is also sub-segmented. The data is represented in the form of tables and figures for having clear idea about the market segments.

Chapter 8: Regional Segmentation

Regional presence of the Homomorphic Encryption market in the major regions such as North America, Europe, Latin America, Asia Pacific, and the Middle East and Africa is described in detail.

For Any Query Regarding the Homomorphic Encryption Market Report? Contact Us at:https://www.marketdataanalytics.biz/worldwide-homomorphic-encryption-market-report-2020-industry-analysis-size-32887.html#inquiry-for-buying

Chapter 9: Company Profiles

This is a detailed section about the major market players in the Homomorphic Encryption market includeMicrosoft (U.S.), IBM Corporation (U.S.), Galois Inc (U.S.), CryptoExperts (France).

Chapter 10: Homomorphic Encryption market Observations and Conclusions

The conclusions mainly include the observations and the comments from the research analysts and the market experts.

See the original post:
Global Homomorphic Encryption Market 2020 Trends Analysis and Coronavirus (COVID-19) Effect Analysis | KEY PLAYERS MARKET WITH COVID-19 Impact...

Today in History: Today is Saturday, July 25, the 207th day of 2020. – wausaupilotandreview.com

By The Associated Press

Todays Highlight in History:

On July 25, 1866, Ulysses S. Grant was named General of the Army of the United States, the first officer to hold the rank.

On this date:

In 1814, the Battle of Lundys Lane, one of the bloodiest battles of the War of 1812, took place in present-day Niagara Falls, Ontario, with no clear victor.

In 1898, the United States invaded Puerto Rico during the Spanish-American War.

In 1943, Benito Mussolini was dismissed as premier of Italy by King Victor Emmanuel III, and placed under arrest. (However, Mussolini was later rescued by the Nazis, and re-asserted his authority.)

In 1946, the United States detonated an atomic bomb near Bikini Atoll in the Pacific in the first underwater test of the device.

In 1952, Puerto Rico became a self-governing commonwealth of the United States.

In 1956, the Italian liner SS Andrea Doria collided with the Swedish passenger ship Stockholm off the New England coast late at night and began sinking; 51 people 46 from the Andrea Doria, five from the Stockholm were killed. (The Andrea Doria capsized and sank the following morning.)

In 1960, a Woolworths store in Greensboro, North Carolina, that had been the scene of a sit-in protest against its whites-only lunch counter dropped its segregation policy.

In 1972, the notorious Tuskegee syphilis experiment came to light as The Associated Press reported that for the previous four decades, the U.S. Public Health Service, in conjunction with the Tuskegee Institute in Alabama, had been allowing poor, rural Black male patients with syphilis to go without treatment, even allowing them to die, as a way of studying the disease.

In 1985, a spokeswoman for Rock Hudson confirmed that the actor, hospitalized in Paris, was suffering from AIDS. (Hudson died in October 1985.)

In 1994, Israeli Prime Minister Yitzhak Rabin (YIT-sahk rah-BEEN) and Jordans King Hussein (hoo-SAYN) signed a declaration at the White House ending their countries 46-year-old formal state of war.

In 2000, a New York-bound Air France Concorde crashed outside Paris shortly after takeoff, killing all 109 people on board and four people on the ground; it was the first-ever crash of the supersonic jet.

In 2002, Zacarias Moussaoui (zak-uh-REE-uhs moo-SOW-ee) declared he was guilty of conspiracy in the September 11 attacks, then dramatically withdrew his plea at his arraignment in Alexandria, Va.

Ten years ago: The online whistleblower Wikileaks posted some 90,000 leaked U.S. military records that amounted to a blow-by-blow account of the Afghanistan war, including unreported incidents of Afghan civilian killings as well as covert operations against Taliban figures. Alberto Contador won the Tour de France for the third time in four years. Erich Steidtmann, a former Nazi SS officer suspected of involvement in World War II massacres but never convicted, died in Hannover, Germany, at age 95.

Five years ago: President Barack Obama, visiting Kenya, mixed blunt messages on gay rights, corruption and counterterrorism with warm reflections on his family ties during a news conference with Kenyan President Uhuru Kenyatta in Nairobi. First lady Michelle Obama opened the Special Olympics at a star-studded ceremony in Los Angeles. Cole Hamels became the first pitcher to throw a no-hitter against the Chicago Cubs in 50 years while leading the Philadelphia Phillies to a 5-0 win.

One year ago: President Donald Trump had a second phone call with the new Ukrainian president, Volodymyr Zelenskiy, during which he solicited Zelenskiys help in gathering potentially damaging information about former Vice President Joe Biden; that night, a staff member at the White House Office of Management and Budget signed a document that officially put military aid for Ukraine on hold. The Justice Department announced that it would resume executing death row prisoners for the first time in nearly two decades. Four major automakers and the state of California announced a deal to toughen standards for gas mileage and greenhouse gas emissions; the agreement bypassed the Trump administrations push to relax mileage standards. A Swedish prosecutor charged rapper A$AP Rocky with assault over a fight in Stockholm; President Donald Trump responded by demanding that Sweden Treat Americans fairly! (The rapper and his bodyguards were convicted but received conditional sentences sparing them prison time unless they committed similar offenses in the future.)

Todays Birthdays: Folk-pop singer-musician Bruce Woodley (The Seekers) is 78. Rock musician Jim McCarty (The Yardbirds) is 77. Rock musician Verdine White (Earth, Wind & Fire) is 69. Singer-musician Jem Finer (The Pogues) is 65. Model-actress Iman is 65. Cartoonist Ray Billingsley (Curtis) is 63.

Rock musician Thurston Moore (Sonic Youth) is 62. Celebrity chef/TV personality Geoffrey Zakarian is 61. Actress-singer Bobbie Eakes is 59. Actress Katherine Kelly Lang is 59. Actress Illeana Douglas is 55. Country singer Marty Brown is 55. Actor Matt LeBlanc is 53. Actress Wendy Raquel Robinson is 53. Rock musician Paavo Lotjonen (PAH-woh LAHT-joh-nehn) (Apocalyptica) is 52. Actor D.B. Woodside is 51. Actress Miriam Shor is 49. Actor David Denman is 47. Actor Jay R. Ferguson is 46. Actor James Lafferty is 35. Actress Shantel VanSanten is 35. Actor Michael Welch is 33. Actress Linsey (cq) Godfrey is 32. Classical singer Faryl Smith is 25. Actor Mason Cook is 20. Actress Meg Donnelly (TV: American Housewife) is 19. Actor Pierce Gagnon is 15.

Read more from the original source:
Today in History: Today is Saturday, July 25, the 207th day of 2020. - wausaupilotandreview.com

What is quantum computing?

Quantum computing is an area of study focused on the development of computer based technologies centered around the principles ofquantum theory. Quantum theory explains the nature and behavior of energy and matter on thequantum(atomic and subatomic) level. Quantum computing uses a combination ofbitsto perform specific computational tasks. All at a much higher efficiency than their classical counterparts. Development ofquantum computersmark a leap forward in computing capability, with massive performance gains for specific use cases. For example quantum computing excels at like simulations.

The quantum computer gains much of its processing power through the ability for bits to be in multiple states at one time. They can perform tasks using a combination of 1s, 0s and both a 1 and 0 simultaneously. Current research centers in quantum computing include MIT, IBM, Oxford University, and the Los Alamos National Laboratory. In addition, developers have begun gaining access toquantum computers through cloud services.

Quantum computing began with finding its essential elements. In 1981, Paul Benioff at Argonne National Labs came up with the idea of a computer that operated with quantum mechanical principles. It is generally accepted that David Deutsch of Oxford University provided the critical idea behind quantum computing research. In 1984, he began to wonder about the possibility of designing a computer that was based exclusively on quantum rules, publishing a breakthrough paper a few months later.

Quantum Theory

Quantum theory's development began in 1900 with a presentation by Max Planck. The presentation was to the German Physical Society, in which Planck introduced the idea that energy and matter exists in individual units. Further developments by a number of scientists over the following thirty years led to the modern understanding of quantum theory.

Quantum Theory

Quantum theory's development began in 1900 with a presentation by Max Planck. The presentation was to the German Physical Society, in which Planck introduced the idea that energy and matter exists in individual units. Further developments by a number of scientists over the following thirty years led to the modern understanding of quantum theory.

The Essential Elements of Quantum Theory:

Further Developments of Quantum Theory

Niels Bohr proposed the Copenhagen interpretation of quantum theory. This theory asserts that a particle is whatever it is measured to be, but that it cannot be assumed to have specific properties, or even to exist, until it is measured. This relates to a principle called superposition. Superposition claims when we do not know what the state of a given object is, it is actually in all possible states simultaneously -- as long as we don't look to check.

To illustrate this theory, we can use the famous analogy of Schrodinger's Cat. First, we have a living cat and place it in a lead box. At this stage, there is no question that the cat is alive. Then throw in a vial of cyanide and seal the box. We do not know if the cat is alive or if it has broken the cyanide capsule and died. Since we do not know, the cat is both alive and dead, according to quantum law -- in a superposition of states. It is only when we break open the box and see what condition the cat is in that the superposition is lost, and the cat must be either alive or dead.

The principle that, in some way, one particle can exist in numerous states opens up profound implications for computing.

A Comparison of Classical and Quantum Computing

Classical computing relies on principles expressed by Boolean algebra; usually Operating with a 3 or 7-modelogic gateprinciple. Data must be processed in an exclusive binary state at any point in time; either 0 (off / false) or 1 (on / true). These values are binary digits, or bits. The millions of transistors and capacitors at the heart of computers can only be in one state at any point. In addition, there is still a limit as to how quickly these devices can be made to switch states. As we progress to smaller and faster circuits, we begin to reach the physical limits of materials and the threshold for classical laws of physics to apply.

The quantum computer operates with a two-mode logic gate:XORand a mode called QO1 (the ability to change 0 into a superposition of 0 and 1). In a quantum computer, a number of elemental particles such as electrons or photons can be used. Each particle is given a charge, or polarization, acting as a representation of 0 and/or 1. Each particle is called a quantum bit, or qubit. The nature and behavior of these particles form the basis of quantum computing and quantum supremacy. The two most relevant aspects of quantum physics are the principles of superposition andentanglement.

Superposition

Think of a qubit as an electron in a magnetic field. The electron's spin may be either in alignment with the field, which is known as aspin-upstate, or opposite to the field, which is known as aspin-downstate. Changing the electron's spin from one state to another is achieved by using a pulse of energy, such as from alaser. If only half a unit of laser energy is used, and the particle is isolated the particle from all external influences, the particle then enters a superposition of states. Behaving as if it were in both states simultaneously.

Each qubit utilized could take a superposition of both 0 and 1. Meaning, the number of computations a quantum computer could take is 2^n, where n is the number of qubits used. A quantum computer comprised of 500 qubits would have a potential to do 2^500 calculations in a single step. For reference, 2^500 is infinitely more atoms than there are in the known universe. These particles all interact with each other via quantum entanglement.

In comparison to classical, quantum computing counts as trueparallel processing. Classical computers today still only truly do one thing at a time. In classical computing, there are just two or more processors to constitute parallel processing.EntanglementParticles (like qubits) that have interacted at some point retain a type can be entangled with each other in pairs, in a process known ascorrelation. Knowing the spin state of one entangled particle - up or down -- gives away the spin of the other in the opposite direction. In addition, due to the superposition, the measured particle has no single spin direction before being measured. The spin state of the particle being measured is determined at the time of measurement and communicated to the correlated particle, which simultaneously assumes the opposite spin direction. The reason behind why is not yet explained.

Quantum entanglement allows qubits that are separated by large distances to interact with each other instantaneously (not limited to the speed of light). No matter how great the distance between the correlated particles, they will remain entangled as long as they are isolated.

Taken together, quantum superposition and entanglement create an enormously enhanced computing power. Where a 2-bit register in an ordinary computer can store only one of four binary configurations (00, 01, 10, or 11) at any given time, a 2-qubit register in a quantum computer can store all four numbers simultaneously. This is because each qubit represents two values. If more qubits are added, the increased capacity is expanded exponentially.

Quantum Programming

Quantum computing offers an ability to write programs in a completely new way. For example, a quantum computer could incorporate a programming sequence that would be along the lines of "take all the superpositions of all the prior computations." This would permit extremely fast ways of solving certain mathematical problems, such as factorization of large numbers.

The first quantum computing program appeared in 1994 by Peter Shor, who developed a quantum algorithm that could efficiently factorize large numbers.

The Problems - And Some Solutions

The benefits of quantum computing are promising, but there are huge obstacles to overcome still. Some problems with quantum computing are:

There are many problems to overcome, such as how to handle security and quantum cryptography. Long time quantum information storage has been a problem in the past too. However, breakthroughs in the last 15 years and in the recent past have made some form of quantum computing practical. There is still much debate as to whether this is less than a decade away or a hundred years into the future. However, the potential that this technology offers is attracting tremendous interest from both the government and the private sector. Military applications include the ability to break encryptions keys via brute force searches, while civilian applications range from DNA modeling to complex material science analysis.

Read this article:
What is quantum computing?

As TikTok Spyware Rumor Swirls, Crypto Apps Safety in the Spotlight – Cointelegraph

Over the past few weeks, TikTok has found itself in hot water over security issues. First, it was axed in India along with 58 Chinese apps for stealing and surreptitiously transmitting users data in an unauthorized manner. Later, it became a major target for Trumps administration against the backdrop of Americas faltering relationship with China and was even banned for Wells Fargo and Amazon employees, with the latter later retracing the news, saying it did not intend to prohibit using TikTok.

While the censure of TikToks data collection habits seems to stem from mostly geopolitical reasons its harshest critics accuse the app of being spyware for the Communist Party of China some research suggests that TikTok isnt much different from Western apps in terms of privacy and security, with the FacebookCambridge Analytica data scandal being arguably the clearest example.

It seems safe to say that at this point, user data has become the main commodity for mainstream apps, but how do things stand with popular crypto apps?

Cybersecurity remains a major weak point for the cryptocurrency and blockchain space. Each year, hackers manage to extract increasingly larger sums of money from cryptocurrency exchanges and ignorant investors, while the technology itself and the emergency of privacy coins have allowed criminals to stay relatively anonymous.

Data collection, however, is a slightly different matter. Unlike hacks, it falls into a grayer regulatory area. Private data is a rather abstract umbrella term, and normally, users consent to data collection when they download an app and approve its terms and conditions. Nonetheless, they often dont realize what kind of data theyve allowed this app to access and sometimes its much more than just their email address and approximate location.

Mobile apps are generally very thorough when it comes to targeted advertising, Hartej Sawhney, the CEO and co-founder of cybersecurity agency Zokyo Labs, said in an email conversation with Cointelegraph. He went on to say: Many apps track users even when their mobile app is not in use. In addition, theres even concern about apps accessing your phones microphone.

Indeed, a somewhat similar story happened with Binance recently. Earlier this month, Twitter user Sherpa posted a screenshot of a certificate issuer in a tweet, showing that the permissions requested by the top cryptocurrency exchange in its Android app include access to the camera and the ability to record audio. At the time, the chief security officer of Binance told Cointelegraph that the camera is used during the KYC verification process, stressing that the code developed in-house within the Binance app definitely does not use the microphone.

Later, Binance CEO Changpeng Zhao said that he asked his team to review the code, clarifying to Cointelegraph that Binance chose to remove the audio recording permission and keep other permissions required to a minimum, for our users peace of mind.

CZ also shared a list of permissions from the updated version of the app, which seemed much more privacy-oriented when compared to the screenshots posted by Sherpa. Furthermore, Zhao stressed that Binance does not sell user data of any kind, such as packaging KYC data together with blockchain analytics.

As CZ previously told Cointelegraph, apps with access to users clipboard data pose the greatest threat to users safety because they can potentially steal their private keys. Most crypto applications that ask for your key material can simply steal your funds, and you trust that they dont, Harry Halpin, the CEO of privacy mixnet Nym Technologies, confirmed to Cointelegraph, adding: Any custodial service can obviously steal your cryptocurrency.

Coin theft is one of the main risks associated with cryptocurrency applications, and wallet apps in particular. Alex Heid, the chief research and development officer at information security company SecurityScorecard, added in a conversation with Cointelegraph:

Attackers have been known to use malware, compromised developer repositories and social engineering to obtain the wallet and private keys of vulnerable users. Examples of this has taken place in the past, such as with the ongoing plague of rogue applications in mobile app stores, the attack on Copay wallets via a compromised JavaScript library in 2018, and the attack on Electrum node messaging servers in 2019.

Are crypto apps any different from mainstream software in terms of data collection? Experts opinions are divided. The nature of crypto apps is very similar to other financial apps in many ways, Heid argued, elaborating: Users are often required to provide identification information for KYC/AML compliance. There have been cases in the past where KYC/AML data has been obtained by attackers from successful hacks against cryptocurrency services.

Matt Senter, a co-founder and the chief technology officer at Bitcoin rewards app Lolli, told Cointelegraph that the incentive to lie, cheat and steal is much higher in Bitcoin apps than traditional apps but warned that users should stay alert for all types of apps.

Halpin said he would be shocked if cryptocurrency applications did not have more malware and surveillance than other applications, given that cryptocurrency has to deal with money. Sending cryptocurrency to a public ledger allows anyone to spy on your transaction, he added.

Brian Kerr, the CEO of lending platform Kava Labs, told Cointelegraph hes much more concerned about data being shared from fintech apps like Robinhood and business communication apps like Zoom than data from crypto trading apps.

But how can one stay safe when using crypto apps? Senter believes that knowing the basics of cryptocurrencies is a must when it comes to using industry apps or dealing with digital assets in general. Senter referenced the recent Twitter hack as an example:

Users who dont understand how Bitcoin works are in danger of outright losing all of it. We saw an attack on Twitter recently where people were duped into handing over their funds to a random address. While not a Bitcoin app, the Twitter attack does highlight a lack of understanding.

According to Senter, crypto apps that dont have a user-friendly interface to guide their customers through transaction verification leave the uninitiated wondering if their funds are safe. There are also app lookalikes, he warned, noting that these are threats easily mitigated by education on Bitcoin and good opsec.

However, it is nearly impossible for a user to review the privacy and security of an application, Halpin of NYM Technologies argued, adding: Even developers often build technology that they believe is secure and private, and screw it up. He is also largely skeptical about the assumption that decentralized apps offer more security when compared to solutions developed by centralized companies, at least in their current state:

Is it more safe to trust a random group of people with your app than a single third party? For decentralization to work, we need stronger accountability and actual decentralization. Most of what I see in the blockchain space is decentralization theatre.

As a result, Halpin concluded that its better to take advice from reputable third parties like academics or industry companies that have a good track record of finding and fixing vulnerabilities before their users funds or personal data get compromised.

Go here to see the original:
As TikTok Spyware Rumor Swirls, Crypto Apps Safety in the Spotlight - Cointelegraph

First Amendment – Rights, U.S. Constitution & Freedoms …

Contents

The First Amendment to the U.S. Constitution protects the freedom of speech, religion and the press. It also protects the right to peaceful protest and to petition the government. The amendment was adopted in 1791 along with nine other amendments that make up the Bill of Rights a written document protecting civil liberties under U.S. law. The meaning of the First Amendment has been the subject of continuing interpretation and dispute over the years. Landmark Supreme Court cases have dealt with the right of citizens to protest U.S. involvement in foreign wars, flag burning and the publication of classified government documents.

During the summer of 1787, a group of politicians, including James Madison and Alexander Hamilton, gathered in Philadelphia to draft a new U.S. Constitution.

Antifederalists, led by the first governor of Virginia, Patrick Henry, opposed the ratification of the Constitution. They felt the new constitution gave the federal government too much power at the expense of the states. They further argued that the Constitution lacked protections for peoples individual rights.

The debate over whether to ratify the Constitution in several states hinged on the adoption of a Bill of Rights that would safeguard basic civil rights under the law. Fearing defeat, pro-constitution politicians, called Federalists, promised a concession to the antifederalists a Bill of Rights.

James Madison drafted most of the Bill of Rights. Madison was a Virginia representative who would later become the fourth president of the United States. He created the Bill of Rights during the 1st United States Congress, which met from 1789 to 1791 the first two years that President George Washington was in office.

The Bill of Rights, which was introduced to Congress in 1789 and adopted on December 15, 1791, includes the first ten amendments to the U.S. Constitution.

The First Amendment text reads:

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

While the First Amendment protected freedoms of speech, religion, press, assembly and petition, subsequent amendments under the Bill of Rights dealt with the protection of other American values including the Second Amendment right to bear arms and the Sixth Amendment right to a trial by jury.

The First Amendment guarantees freedom of speech. Freedom of speech gives Americans the right to express themselves without having to worry about government interference. Its the most basic component of freedom of expression.

The U.S. Supreme Court often has struggled to determine what types of speech is protected. Legally, material labeled as obscene has historically been excluded from First Amendment protection, for example, but deciding what qualifies as obscene has been problematic. Speech provoking actions that would harm otherstrue incitement and/or threatsis also not protected, but again determining what words have qualified as true incitement has been decided on a case-by-case basis.

This freedom is similar to freedom of speech, in that it allows people to express themselves through publication.

There are certain limits to freedom of the press. False or defamatory statements called libel arent protected under the First Amendment.

The First Amendment, in guaranteeing freedom of religion, prohibits the government from establishing a state religion and from favoring one religion over any other.

While not explicitly stated, this amendment establishes the long-established separation of church and state.

The First Amendment protects the freedom to peacefully assemble or gather together or associate with a group of people for social, economic, political or religious purposes. It also protects the right to protest the government.

The right to petition can mean signing a petition or even filing a lawsuit against the government.

Here are landmark Supreme Court decisions related to the First Amendment.

Free Speech:

Schenck v. United States, 1919: In this case, the Supreme Court upheld the conviction of Socialist Party activist Charles Schenck after he distributed fliers urging young men to dodge the draft during World War I.

The Schenck decision helped define limits of freedom of speech, creating the clear and present danger standard, explaining when the government is allowed to limit free speech. In this case, the Supreme Court viewed draft resistance as dangerous to national security.

New York Times Co. v. United States, 1971: This landmark Supreme Court case made it possible for The New York Times and Washington Post newspapers to publish the contents of the Pentagon Papers without risk of government censorship.

The Pentagon Papers were a top-secret Department of Defense study of U.S. political and military involvement in Vietnam from 1945 to 1967. Published portions of the Pentagon Papers revealed that the presidential administrations of Harry Truman, Dwight D. Eisenhower, John F. Kennedy and Lyndon B. Johnson had all misled the public about the degree of U.S. involvement in Vietnam.

Texas v. Johnson, 1990: Gregory Lee Johnson, a youth communist, burned a flag during the 1984 Republican National Convention in Dallas, Texas to protest the administration of President Ronald Reagan.

The Supreme Court reversed a Texas courts decision that Johnson broke the law by desecrating the flag. This Supreme Court Case invalidated statutes in Texas and 47 other states prohibiting flag-burning.

Freedom of the Press:

New York Times Co. v. United States, 1971: This landmark Supreme Court case made it possible for The New York Times and Washington Post newspapers to publish the contents of the Pentagon Papers without risk of government censorship.

The Pentagon Papers were a top-secret Department of Defense study of U.S. political and military involvement in Vietnam from 1945 to 1967. Published portions of the Pentagon Papers revealed that the presidential administrations of Harry Truman, Dwight D. Eisenhower, John F. Kennedy and Lyndon B. Johnson had all misled the public about the degree of U.S. involvement in Vietnam.

Freedom of Religion:

Reynolds v. United States (1878): This Supreme Court case upheld a federal law banning polygamy, testing the limits of religious liberty in America. The Supreme Court ruled that the First Amendment forbids government from regulating belief but not from actions such as marriage.

Braunfeld v. Brown (1961): The Supreme Court upheld a Pennsylvania law requiring stores to close on Sundays, even though Orthodox Jews argued the law was unfair to them since their religion required them to close their stores on Saturdays as well.

Sherbert v. Verner (1963): The Supreme Court ruled that states could not require a person to abandon their religious beliefs in order to receive benefits. In this case, Adell Sherbert, a Seventh-day Adventist, worked in a textile mill. When her employer switched from a five-day to six-day workweek, she was fired for refusing to work on Saturdays. When she applied for unemployment compensation, a South Carolina court denied her claim.

Lemon v. Kurtzman (1971): This Supreme Court decision struck down a Pennsylvania law allowing the state to reimburse Catholic schools for the salaries of teachers who taught in those schools. This Supreme Court case established the Lemon Test for determining when a state or federal law violates the Establishment Clausethats the part of the First Amendment that prohibits the government from declaring or financially supporting a state religion.

Ten Commandments Cases (2005): In 2005, the Supreme Court came to seemingly contradictory decisions in two cases involving the display of the Ten Commandments on public property. In the first case, Van Orden v. Perry, the Supreme Court ruled that the display of a six-foot Ten Commandments monument at the Texas State Capital was constitutional. In McCreary County v. ACLU, the U.S. Supreme Court ruled that two large, framed copies of the Ten Commandments in Kentucky courthouses violated the First Amendment.

Right to Assemble & Right to Petition:

NAACP v. Alabama (1958): When Alabama Circuit Court ordered the NAACP to stop doing business in the state and subpoenaed the NAACP for records including their membership list, the NAACP brought the matter to the Supreme Court. The Court ruled in favor of the NAACP, which Justice John Marshall Harlan II writing: This Court has recognized the vital relationship between freedom to associate and privacy in one's associations.

Edwards v. South Carolina (1962): On March 2, 1961, 187 black students marched from Zion Baptist Church to the South Carolina State House, where they were arrested and convicted of breaching the peace. The Supreme Court ruled in an 8-1 decision to reverse the convictions, arguing that the state infringed on the free speech, free assembly, and freedom to petition of the students.

The Bill of Rights; White House.History of the First Amendment; The University of Tennessee, Knoxville.Schenck v. United States; C-Span.

Here is the original post:

First Amendment - Rights, U.S. Constitution & Freedoms ...

First Amendment Watch: Another Successful Attack On Religious Liberty In America – FITSNews

This is not a pro-Christian post. If you are a worshipper of the moon and enjoy howling at it or gathering mask-less in confined spaces with your fellow lunar disciples while engaging in all manner of ritualistic observances (mooning?), more power to you.

Again, this is not a pro-Christian post it is a pro-freedom post.

In the United States of America, we have freedom of religion or at least we thought we did.

As long as your observances are not depriving others of life, liberty or property, have at it.

Lately, though, this inalienable right has fallen under attack and a court whose justices swore oaths to uphold it (along with our other essential liberties) are allowing it to happen.

The U.S. supreme court led by increasingly left-leaning chief justice John Roberts recently ruled against a San Diego, California church after it sought relief from a state law limiting attendance at religious gatherings. The church argued this edict discriminated against religious institutions at a time when abortion clinics, liquor stores and marijuana shops were allowed to operate without similar limits in place.

(Click to view)

(Via: Getty Images)

Nonetheless, according to Roberts, the churchs claim that its constitutional rights had been violated was quite improbable. And that the elected officials who imposed the edict had acted within the broad limits granted to politically accountable officials of the states during times of crisis.

Needless to say, we were livid not only at the ruling and those who supported it, but at the door it opened for further discrimination.

This is a deeply troubling ruling one which poses a clear and present danger to the most fundamental of all American liberties, we wrote at the time. As a result of Roberts latest sellout, the highest court in the nation has formally created conditions under which it is acceptable for governments to not only suppress religious freedom but actively discriminate against religion itself.

Not surprisingly, the courts ruling has emboldened liberal politicians to take further steps against religious freedom and the court is clearly not going to do anything to stop them.

This week, Roberts once again displayed his contempt for religious liberty by joining the four liberal justices on the bench in denying a request from a church located near Carson City, Nevada. This congregation had asked the justices to overturn a similar state law capping church attendance a law imposed at a time when casinos, gyms, restaurants and other entities were allowed to operate at fifty percent of their posted capacity.

(SPONSORED CONTENT)

STORY CONTINUES BELOW

Justice Samuel Alito ripped the majority opinion, saying while it was not surprising Nevada would discriminate in favor of the powerful gaming industry and its employees this courts willingness to allow such discrimination is disappointing.

Indeed it is

We have a duty to defend the Constitution, and even a public health emergency does not absolve us of that responsibility, Alito continued. For months now, states and their subdivisions have responded to the pandemic by imposing unprecedented restrictions on personal liberty, including the free exercise of religion.

The best response in the case, however, came from justice Neil Gorsuch.

In Nevada, it seems, it is better to be in entertainment than religion, he wrote. Maybe that is nothing new. But the First Amendment prohibits such obvious discrimination against the exercise of religion.

Here is his masterful, one-paragraph dissent

The world we inhabit today, with a pandemic upon us, posses unusual challenges, he concluded. But there is no world in which the Constitution permits Nevada to favor Caesars Palace over Calvary Chapel.

Amen to that

John Roberts has abandoned his oath, U.S. senator Ted Cruz of Texas tweeted. But, on the upside, maybe Nevada churches should set up craps tables? Then they could open?

Such is the sad state of religious liberty in the land of the free.

-FITSNews

Got something youd like to say in response to one of our stories? We have an open microphone policy! Submit your own letter to the editor (or guest column) via-email HERE. Got a tip for a story? CLICK HERE. Got a technical question or a glitch to report? CLICK HERE. Want to help support what were doing? SUBSCRIBE HERE.

Visit link:

First Amendment Watch: Another Successful Attack On Religious Liberty In America - FITSNews