The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: February 8, 2021
Northland Power Could Invest EUR 13 Billion in Offshore Wind in Next Five Years – Offshore WIND
Posted: February 8, 2021 at 11:06 am
Over the next five years, Northland Power could invest between at least CAD 15 billion and CAD 20 billion (between EUR 9.8 billion and EUR 13 billion) in new offshore wind projects in which it holds ownership shares, with offshore wind being an anchor for its next phase of growth in the renewable energy sector.
On 4 February, the Canadian company issued an update on its long-term plans and said that it was at an inflection point given the accelerating global trend towards de-carbonisation and electrification, and its extensive portfolio of offshore wind development.
Northland continues to position itself for future growth and expects its strategy will continue to generate growing shareholder value over the coming years. The next growth inflection point for Northland offers the opportunity to deploy at least $15 to $20 billion of gross capital investment into new renewable projects over the next five years, anchored by identified offshore wind projects that are currently in active development, said Pauline Alimchandani, Northlands Chief Financial Officer. These projects have the potential to more than double our adjusted EBITDAfrom current levels, once commercially operational.
Northland currently has over 1.2 GW of gross offshore wind operating capacity and an additional 4 to 5 GW of gross capacity in projects under development: Hai Long in Taiwan, Chiba in Japan, Dado Ocean in South Korea, Baltic Power in Poland, and Nordsee Two/Three in Germany.
Our growth aspirations are much larger than this and we have amassed a total pipeline of approximately 12 GW of gross offshore wind capacity globally, said Mike Crawley, Northlands President and Chief Executive Officer. Pursuing offshore wind projects provide us the opportunity to deploy significant capital to generate attractive returns on assets underpinned by long-term, government backed revenue contracts.
Offshore wind is the largest segment of Northlands business and is expected to account for over 60 per cent of its 2020 adjusted EBITDA.
Along with offshore wind as a focal point of its growth strategy, the company is also targeting new opportunities in onshore renewables, utilities and transmission, as well as entering clean fuel and energy storage sectors. In these areas of business, Northland also sees potential synergies between its renewable assets and hydrogen production.
Our allocation to utilities and transmission is targeted to account for approximately 10 to 15% of our adjusted EBITDA over time. This should enable Northland to maintain solid and diversified cash flows thereby supporting a strong balance sheet and credit rating to fund expenditures related to our core focus of securing and developing offshore wind development assets, Pauline Alimchandani said.
The rest is here:
Northland Power Could Invest EUR 13 Billion in Offshore Wind in Next Five Years - Offshore WIND
Posted in Offshore
Comments Off on Northland Power Could Invest EUR 13 Billion in Offshore Wind in Next Five Years – Offshore WIND
A Swiss company claims it used quantum computers to find weakness in encryption – HT Tech
Posted: at 11:05 am
Security experts have long worried that advances in quantum computing could eventually make it easier to break encryption that protects the privacy of peoples data. Thats because these sophisticated machines can perform calculations at speeds impossible for conventional computers, potentially enabling them to crack codes previously thought indecipherable.
Now, a Swiss technology company says it has made a breakthrough by using quantum computers to uncover vulnerabilities in commonly used encryption. The company believes its found a security weakness that could jeopardize the confidentiality of the worlds internet data, banking transactions and emails.
Terra Quantum AG said its discovery upends the current understanding of what constitutes unbreakable encryption and could have major implications for the worlds leading technology companies, such as Alphabet Inc.s Google, Microsoft Corp., and International Business Machines Corp.
Don't miss: ProtonMail, Threema, Tresorit and Tutanota warn EU of risks of weakening encryption
But some other security experts said they arent nearly ready to declare a major breakthrough, at least not until the company publishes the full details of its research. If true, this would be a huge result, said Brent Waters, a computer science professor who specialises in cryptography at the University of Texas at Austin. It seems somewhat unlikely on the face of it. However, it is pretty hard for experts to weigh in on something without it being published.
IBM spokesman Christopher Sciacca said his company has known the risks for 20 years and is working on its own solutions to address the issue of post-quantum security. This is why the National Institute of Science & Technology (NIST) has been hosting a challenge to develop a new quantum safe crypto standard, he said in an email. IBM has several proposals for this new standard in the final round, which is expected in a few years.
Brian LaMacchia, distinguished engineer at Microsoft, said company cryptographers are collaborating with the global cryptographic community to prepare customers and data centers for a quantum future. Preparing for security in a post-quantum world is important not only to protect and secure data in the future but also to ensure that future quantum computers are not a threat to the long-term security of todays information.
Google didnt reply to a message seeking comment.
Terra Quantum AG has a team of about 80 quantum physicists, cryptographers and mathematicians, who are based in Switzerland, Russia, Finland and the US What currently is viewed as being post-quantum secure is not post-quantum secure, said Markus Pflitsch, chief executive officer and founder of Terra Quantum, in an interview. We can show and have proven that it isnt secure and is hackable.
Also read: Heres how an encrypted, locked Android and Apple phone gets bypassed
Pflitsch founded the company in 2019. Hes a former finance executive who began his career as a research scientist at CERN, the European Organization for Nuclear Research. Terra Quantums research is led by two chief technology officers Gordey Lesovik, head of the Laboratory of Quantum Information Technology at the Moscow Institute of Physics and Technology, and Valerii Vinokur, a Chicago-based physicist who in 2020 won the Fritz London Memorial Prize for his work in condensed matter and theoretical physics.
The company said that its research found vulnerabilities that affect symmetric encryption ciphers, including the Advanced Encryption Standard, or AES, which is widely used to secure data transmitted over the internet and to encrypt files. Using a method known as quantum annealing, the company said its research found that even the strongest versions of AES encryption may be decipherable by quantum computers that could be available in a few years from now.
Vinokur said in an interview that Terra Quantums team made the discovery after figuring out how to invert whats called a hash function, a mathematical algorithm that converts a message or portion of data into a numerical value. The research will show that what was once believed unbreakable doesnt exist anymore, Vinokur said, adding that the finding means a thousand other ways can be found soon.
Read more: Chinese scientists make world's first light-based quantum computer: Report
The company, which is backed by the Zurich-based venture capital firm Lakestar LP, has developed a new encryption protocol that it says cant be broken by quantum computers. Vinokur said the new protocol utilizes a method known as quantum key distribution.
Terra Quantum is currently pursuing a patent for the new protocol. But the company will make it available for free, according to Pflitsch. We will open up access to our protocol to make sure we have a safe and secure environment, said Pflitsch. We feel obliged to share it with the world and the quantum community.
The US government, like China, has made research in quantum computing research an economic and national security priority, saying that the world is on the cusp of what it calls a new quantum revolution. In addition, technology companies including Google, Microsoft, and IBM have made large investments in quantum computing in recent years.
Go here to see the original:
A Swiss company claims it used quantum computers to find weakness in encryption - HT Tech
Posted in Quantum Computing
Comments Off on A Swiss company claims it used quantum computers to find weakness in encryption – HT Tech
Keeping a major bank going during the pandemic: Interview with Kate Platonova, Chief Data and Architecture Officer, HSBC – www.computing.co.uk
Posted: at 11:05 am
Kate Platonova, Chief Data and Architecture Officer, HSBC
Those organisations who were more invested in cloud tended to fare better at the start of the Coronavirus pandemic in early 2020. One example is HSBC, which uses a range of cloud technology to provide "scalability, resilience and innovation," in the words ofKate Platonova, Chief Data and Architecture Officer at the bank.
She told Computing that the organisation uses as hybrid cloud model.
"We use a hybrid cloud model, so we have strategic partnerships with all three of the major public cloud providers; Google, AWS and Azure. We also consume a range of Software as a Service (SaaS) solutions from a mix of providers. Whichever cloud provider we use, we maintain the same high level of standards for security and resilience."
The choice around which platform to use for each need is made on a case by case basis.
"We select the cloud providers and services based on the best strategic fit for the particular workload. Our priorities are to always ensure we provide a secure environment, protect customer data, maintain service continuity and comply with all relevant policies and regulations globally," said Platonova.
Whilst, like everyone else HSBC was unable to predict the pandemic, it did manage to roll out the tools to enable remote collaboration at a rapid pace.
"At the beginning of 2020, 64 per cent of HSBC's global workforce were able to work remotely - and in a matter weeks our IT teams increased this to 85 per cent. To better support virtual meetings, Zoom was rolled out in 12 weeks - and in January 13 million people attended 4.3 million HSBC meetings on Zoom. 63,000 users in the UK, US and Hong Kong are finding it easier to collaborate using Microsoft Teams and last year over 20,000 laptops were delivered to colleagues at home."
Platinova adds that regular communication has been key to ensuring staff wellbeing, as well as productivity.
"Throughout the pandemic, the wellbeing of our people has been our paramount concern. We have taken steps to enable our front-line colleagues to do their jobs safely and effectively. For all our colleagues, we have maintained a regular flow of communication and listened closely to their needs (including through a specific wellbeing survey to identify priority areas to address), providing the support and flexibility to help them manage their lives during the pandemic."
Another common concern during these times of mass remote working has been security, with potentially compromised personal devices connecting to corporate networks in numbers never seen before. HSBC has used a number of strategies to mitigate these risks, in part sending out secure devices to staff.
"212,000 secure HSBC laptops and desktop PCs are currently being used by colleagues working remotely. And 60,000 colleagues are working using HSBC Virtual Connect - allowing them to securely connect in a number of ways, including from personal Windows and Mac devices. Our BYOD mobile service allows colleagues to securely access their work email, calendar and join Zoom meetings from any supported mobile device."
Stepping away from the pandemic, the organisation continues to invest in the future, with its sights firmly set on exploiting quantum computing.
"We are excited about the potential benefits of quantum computing in banking for solving resource intensive problems and improving customer experience. We think applications could include risk analytics, machine learning and cybersecurity. We're part of the European NEASQC (Next Applications of Quantum Computing) project to explore potential applications for quantum computing within the banking industry."
Computing's Deskflix virtual conference on Hybrid and Multi Cloud takes place on the 10th February. Register now!
Link:
Keeping a major bank going during the pandemic: Interview with Kate Platonova, Chief Data and Architecture Officer, HSBC - http://www.computing.co.uk
Posted in Quantum Computing
Comments Off on Keeping a major bank going during the pandemic: Interview with Kate Platonova, Chief Data and Architecture Officer, HSBC – www.computing.co.uk
Microsoft Scientists Build Chip That Can Handle Thousands Of Qubits – Analytics India Magazine
Posted: at 11:05 am
Scientists and engineers at the University of Sydney and Microsoft Corporation have developed a device that can handle thousands of qubits. To put things in perspective, the current state-of-the-art quantum computer can control only 50 qubits at a time.
Scaled-up quantum computers require control interfaces to manipulate or readout a large number of qubits, which usually operate at temperatures close to absolute zero (1 Kelvin or -273 degrees celsius).
The complementary metal-oxide-semiconductor (CMOS) technology has its limitations due to high thermodynamic dissipation, leading to heating of the fragile quantum bits. Overheating of quantum bits compromises its quantumness, the property of being in two states at the same time (also called superposition).
The current architecture uses multiple connections as every qubit is controlled by external circuitry with a separate electrical connection, generating a lot of heat.
The scientists from the University of Sydney built a CMOS interface between the qubits and the external circuitry, in such a way that the CMOS chip can generate control pulses for multiple qubits, with just four low-bandwidth wires, at 0.1 Kelvin, a temperature 30 times colder than deep space, with ultralow power dissipation.
The interface consists of four low-bandwidth wires at room temperature to provide input signals to the chip, which then configures 32 analogue circuit blocks to control the qubits that use dynamic voltage signals.
Analogue circuit boards use the low leakage of the transistors to generate dynamic voltage signals for manipulating qubits, consuming significantly less power.
Quantum computers are at a similar stage that classical computers were in their 40s when machines needed control rooms to function.
However, this chip, according to the scientists, is the most advanced integrated circuit ever built to operate at deep cryogenic temperatures.
The quantum computers that we have now are still lab prototypes and are not commercially relevant yet. Hence, this is definitely a big step towards building practical and commercially relevant quantum computers, said Mr Viraj Kulkarni, But I think that we are still far away from it.
This is because of the Error Correction. Any computing device always has errors in it and no electronic device can be completely perfect. There are various techniques that computers use to correct those errors.
Now the problem with quantum computing is that qubits are very fragile. Even a slight increase in temperature, vibrations, or even cosmic rays can make qubits lose their quantumness, and this introduces errors. So the key question of whether we can really control these errors is still relevant.
Nivedita Dey, research coordinator at Quantum Research and Development Labs, said the qubit noise is still a roadblock in developing quantum computers.
One of the biggest challenges in implementing a quantum circuit in this Noisy Intermediate Scale Quantum (NISQ) era is qubit noise, which causes hindrance in commercial availability of fault-tolerant full-scale quantum computers, said Ms Dey.
This approach can be well suited for practical quantum applications and might reduce the number of error-correcting qubits to be associated with noisy qubits, she added.
If quantum computing does prove to be commercially viable, it will open up completely new avenues.
A plane is not just faster than a car, it can also fly, said Mr Kulkarni, drawing an analogy between quantum computers and conventional computers. The idea is that quantum computers are not just faster, but at the same time will provide us with solutions that are better, especially in AI.
Hence, many applications in AI including complex mathematical equations, drug discovery by enabling chemical simulations, or building financial applications to come up with a better strategy will be solved in a faster and efficient way.
In the end its a tool, so any function a conventional computer can achieve, quantum computers will be able to do it faster and better.
See the original post:
Microsoft Scientists Build Chip That Can Handle Thousands Of Qubits - Analytics India Magazine
Posted in Quantum Computing
Comments Off on Microsoft Scientists Build Chip That Can Handle Thousands Of Qubits – Analytics India Magazine
Want a goat to stand in for you on Zoom? Itll cost you around R102 for 5 minutes – SowetanLIVE
Posted: at 11:04 am
With the global Covid-19 pandemic forcing many people to stay home and participate in endless Zoom meetings, one farm in the UK is hiring out goats to stand in for you.
Unfortunately, the animals dont know how to unmute themselves nor how to switch on the camera.
Cronkshaw Fold farm in Lancashire made headlines this week when its Goats on Zoom programmewent viral.
In a description on their website, the farm said it can help ascertain whether your colleagues, friends and family are paying attention during the call.
There are several goats to choose from, each with its own personality- so they can fit right in - and cost around 5 (about R102) for five minutes.
The goats are savvy in Zoom, Microsoft Teams, Webex, Blue Jeans, Skype, Google Hangouts, Jitsi, Go To Meeting and Ring Central. Want to use a different platform? Message us, the website advertised.
From Zoom-bombing to live kidnappings during calls, bored participants have been doing the most during the pandemic.
At least with a goat, you know the boss wont catch you working in a towel.
Read more:
Want a goat to stand in for you on Zoom? Itll cost you around R102 for 5 minutes - SowetanLIVE
Posted in Jitsi
Comments Off on Want a goat to stand in for you on Zoom? Itll cost you around R102 for 5 minutes – SowetanLIVE
Keeping mindfulness and employee health at the forefront: app reviews – Tech Wire Asia
Posted: at 11:04 am
Figures available worldwide are painting a gloomy picture of peoples mental health and wellbeing during the current Coronavirus epidemic. Apart from worry and grief over the loss of, or potential loss of loved ones, the main effects are the feelings of loneliness and isolation that lockdown brings.
As businesses and organizations begin to act proactively to counteract their employees failing mental (and physical) health, at Tech Wire Asia, we are looking at different ways that technology can help support remote workers.
The poorly-fitting appsMany pages of the technology press Tech Wire Asia included have been dedicated in recent months to examining the ways that collaboration and communication software is helping the remote worker and the businesses employing them. But in most cases, the applications that we all now use daily were conceived and written for only occasional use. Just a few short months ago, we called remote workers road warriors, individuals who worked from airport lounges, hotel rooms, and in the corridors outside conference halls.
Solutions like Webex, Zoom, Jitsi, and Teams were designed to connect working groups: a few remote workers, a body of specialists in one office with a meeting room full of others in another.
With a workforce thats been forced to go remote, these tools simply arent making up the differences between working together in person, and working together remotely.
All the comms solutions lack the human touch: even video conferencing software tends to flatten out features and compress information so that facial micro-gestures are lost. Typically, too, much of a persons body language is also missed out because of the position of the average webcam on a laptop or monitor.
The specialist applications
Both the Apple App Store and Google Play are full of apps that help users meditate, become more mindful, calm down, and concentrate. These activities are highly beneficial, but like collaborative and comms apps, they are not explicitly focused on helping people during their working day.
Embedding this type of positive, habitual reinforcement of awareness, stillness, and mindfulness into work-focused applications is not anything that we at Tech Wire Asia have seen previously (until now see below).
Therefore as part of a new series on mental health in the APAC region during these times of COVID, we focus on ways that employees can boost their overall wellbeing while working from home.
LIFEWORKSThe first app we are considering is LifeWorks, a platform that delivers a broad range of employee-focused wellbeing-focused training, activities, and media.
The levels of support and different content types are as varied or directed as required. That ranges from standard EAP (Employee Assistance Program) fare such as work-focused training and gamification of work success, right through to offering 24/7 access to counseling and support services, either live or as snackable clips.
Mindfulness and meditation guidance sits alongside physical wellbeing programs on the latter score, the app integrates with employees Fitbits or smartwatches to track exercise and daily activity, if desired.
The appeal of LifeWorks is that all resources are available for the employee in complete confidence: as the employer, you receive no personalized information about who is accessing what. Employers do get analysis and figures regarding uptake and engagement, allowing leaders to build their teams better. Whats trending and proving popular will help decision-makers push their employees health and wellbeing successfully, with positive outcomes for all parties in the long-term.
LifeWorks can be used as an adjunct to existing HR solutions or as a standalone, wellness, and health-oriented app. It is uniquely positioned, we feel, between traditional HR technology and personal development apps.
You can read a deeper dive into the LifeWorks offering right here on this site.
SMILING MINDThe second app we are considering is Smiling Mind, created by a non-profit organization and entirely free. (Many mindfulness apps need users to either pay upfront or subscribe somehow.)
Smiling Mind focuses on the different areas in which people can gain significantly: in their sleep, developing mindful practices, in their relationships, and especially relevant here in the workplace. The latter area of focus has around 40 dedicated sessions, designed specifically to reduce stress and conflicts.
Most of the sessions range in length from just a few minutes (perfect for coffee breaks) to nearly an hour.
And for those of us whose attention might wander during Zoom meetings, there are dedicated sessions on tap where users are taught tactics to re-steer their minds back onto other peoples speech. In fact, the focus of mediation can actually be other people talking: perfect for those long sessions where its easy to let attention wander from critical information.
As a bonus, the app also has specialized programs designed for educators, children and teenagers, so those juggling homeschooling kids and working at home can help promote positivity for themselves and their charges.
Finally, as well as iOS and Android versions, Smiling Mind is also available on the web, so those stuck to their laptops for hours each day can intersperse spreadsheet sessions with a few minutes in which to develop a smiling mind of their own!
See more here:
Keeping mindfulness and employee health at the forefront: app reviews - Tech Wire Asia
Posted in Jitsi
Comments Off on Keeping mindfulness and employee health at the forefront: app reviews – Tech Wire Asia
Inside job: Why Zoombombing isnt as random as you might think – Digital Trends
Posted: at 11:04 am
OLIVIER DOULIERY/AFP via Getty Images
Last year wasnt exactly short of threats facing humanity, but Zoombombing was an especially 2020 kind of disruption, one that sought to hijack one of the most prominent means of communication by which people stayed in touch with everyone from co-workers to friends and family during lockdown.
Zoombombing, for those unfamiliar with it, works like this: An unwanted participant or participants access a Zoom call without being invited, against the wishes of the participants, and cause problems. One Massachusetts-based high schools Zoom session was hijacked by an individual who screamed profanities and then shouted the teachers home address. On social media, some users reported that their Zoom session had been taken over and used to show pornographic content.
Zoom, whose usage exploded during the pandemic, was suddenly at the center of what appeared to be a glaring vulnerability problem: It was as if the leading manufacturer of front door locks revealed a high failure rate during a home invasion epidemic.
But researchers from Binghamton University in New York say theres more to this story than meets the eye. According to a worlds-first study they have carried out, the majority of Zoombombing incidents are actually inside jobs. To draw an analogy with creepy campfire stories about terrified babysitters: The calls are coming from inside the house. Well, kind of.
There were a lot of people that thought that maybe this was some kind of clever hacking, or else [the result of attackers] finding people that would accidentally post Zoom links on social media or sending out email blasts, Jeremy Blackburn, an assistant professor of computer science at Binghamton University, told Digital Trends. [People figured it was] these outsiders who were randomly showing up, somehow finding a link to a meeting. It was an act of attack that the Zoombombers were perpetuating, just by themselves.
Blackburns major research interest, his university website profile notes, involves understanding jerks on the internet, from toxic behavior and hate speech to fringe and extremist web communities. He was intrigued by the rise of Zoombombing as a phenomenon, but also not entirely convinced by the theories.
How were they getting in? They could be brute-forcing the call IDs, but given the size of the search space, it seemed unlikely that they would be able to consistently find active calls to target. And while human error was certainly possible, in terms of people leaving Zoom links lying around, this also seemed improbable.
To quote Sherlock Holmes popular aphorism: When you have eliminated the impossible, whatever remains, must be the truth. Or, in this case, if people arent breaking into Zoom calls on their own, someone on the call must be willfully letting them in.
As it turns out, what we found is that Zoombombings were perpetuated by people that were legitimately in the call, Blackburn said. What would happen is that [a member of the call] would go ahead and share the meeting link on some fringe websites and say, Hey guys, show up and, you know, say the N-word or whatever in the call. Pretty much every time, it was a student asking people to come [and] Zoombomb lectures. They would also do things like say, Hey, use this name when you connect, because thats the name of somebody else in the class.'
To reach this conclusion, the researchers scoured tens of millions of social media posts, uncovering more than 200 calls for Zoombombing between Twitter and 4chan during the first seven months of 2020 alone. Between January and July that year, they identified 12,000 tweets and 434 4chan threads that discussed online meeting rooms, then used thematic qualitative analysis to identify the posts calling for Zoombombing. As Blackburn noted, the majority of the calls for Zoombombing in their dataset targeted online lectures, with evidence of both universities and high schools being the most heavily targeted groups.
In addition to Zoom, they also found evidence of similar bombing attacks on other popular communication platforms including Hangouts, Google Meet, Skype, Jitsi, GoToMeeting, Microsoft Teams, Cisco Webex, BlueJeans, and StarLeaf.
[For a company like Zoom], unless they perform the type of investigation we did, on their end it seems really difficult to detect this type of thing, Blackburn said. Because its not really a technical vulnerability. Its kind of a sociotechnical vulnerability If they were just looking at traffic [or whatever other] metrics they have, Im not sure it would be possible to purely detect this. You would need a study like ours that goes out and specifically tries to understand how this sociotechnical problem is unfolding.
(Digital Trends reached out to Zoom for comment, and we will update this story when we hear back.)
The results pose a challenge for communication platforms like Zoom. Their ease of use makes them appealing. Just click a link and youre suddenly talking to your friends or joining the morning huddle at work. But this also necessitates lowering security measures that could eradicate this behavior.
Anything involving security is always kind of a trade-off between ease of use and the robustness of the security, Blackburn said. I dont think people [would want to] go through a whole process of registering individual users and creating one-time links [in a more time-intensive manner]. Its much easier, and much more straightforward for non-tech-savvy people, to just have a link, click it, and it opens the program. That is certainly a big reason that Zoom gained the type of adoption it did. If it would have had a much more complicated, but secure, registration system, I would imagine something else would have [become] the dominant application.
Zoom does offer passwords as a login option. However, given the complicity of users, they would seem unlikely have to blocked Zoombombers with the right advanced knowledge. The same is true for waiting rooms, in which the host must manually approve people for entrance. While this would seem to be a more secure option, they are insufficient if the Zoombombers name themselves after people in a class in order to confuse the teacher or lecturer. (Thanks to a recent update, hosts can, however, pause their meetings to manually remove troublesome participants.)
Blackburn describes Zoombombing behavior as raiding, and says that it has always been a part of online life. Now, its using Zoom, but if you go back even to the IRC days (read: Internet Relay Chat, an early text-based chat protocol created in 1988), there were [online] wars where people would try and take over different channels, he said. Any time you have computer-mediated communication on the web [thats] instant and semi-anonymous, youre going to have people that get into conflict and attempt to disrupt things. In that sense, its not new, its the same basic sociotechnical problem with the internet. If theres an available mechanism to cause trouble, somebodys going to cause trouble.
In addition to Blackburn, other researchers on the project include Chen Ling, Utkucan Balc, and Gianluca Stringhini. A paper describing the work, titled A First Look at Zoombombing, is available to read online.
Link:
Inside job: Why Zoombombing isnt as random as you might think - Digital Trends
Posted in Jitsi
Comments Off on Inside job: Why Zoombombing isnt as random as you might think – Digital Trends