Page 1,385«..1020..1,3841,3851,3861,387..1,3901,400..»

Putting hydrogen on solid ground: Simulations with a machine … – EurekAlert

image:Phases of solid hydrogen. The left is the well-studied hexagonal close packed phase, while the right is the new phase predicted by the authors' machine learning-informed simulations. Image by Wesley Moore. view more

Credit: The Grainger College of Engineering at the University of Illinois Urbana-Champaign

Hydrogen, the most abundant element in the universe, is found everywhere from the dust filling most of outer space to the cores of stars to many substances here on Earth. This would be reason enough to study hydrogen, but its individual atoms are also the simplest of any element with just one proton and one electron. For David Ceperley, a professor of physics at the University of Illinois Urbana-Champaign, this makes hydrogen the natural starting point for formulating and testing theories of matter.

Ceperley, also a member of the Illinois Quantum Information Science and Technology Center, uses computer simulations to study how hydrogen atoms interact and combine to form different phases of matter like solids, liquids, and gases. However, a true understanding of these phenomena requires quantum mechanics, and quantum mechanical simulations are costly. To simplify the task, Ceperley and his collaborators developed a machine learning technique that allows quantum mechanical simulations to be performed with an unprecedented number of atoms.They reported in Physical Review Lettersthat their method found a new kind of high-pressure solid hydrogen that past theory and experiments missed.

Machine learning turned out to teach us a great deal, Ceperley said. We had been seeing signs of new behavior in our previous simulations, but we didnt trust them because we could only accommodate small numbers of atoms. With our machine learning model, we could take full advantage of the most accurate methods and see whats really going on.

Hydrogen atoms form a quantum mechanical system, but capturing their full quantum behavior is very difficult even on computers. A state-of-the-art technique like quantum Monte Carlo (QMC) can feasibly simulate hundreds of atoms, while understanding large-scale phase behaviors requires simulating thousands of atoms over long periods of time.

To make QMC more versatile, two former graduate students, Hongwei Niu and Yubo Yang, developed a machine learning model trained with QMC simulations capable of accommodating many more atoms than QMC by itself. They then used the model with postdoctoral research associate Scott Jensen to study how the solid phase of hydrogen that forms at very high pressures melts.

The three of them were surveying different temperatures and pressures to form a complete picture when they noticed something unusual in the solid phase. While the molecules in solid hydrogen are normally close-to-spherical and form a configuration called hexagonal close packedCeperley compared it to stacked orangesthe researchers observed a phase where the molecules become oblong figuresCeperley described them as egg-like.

We started with the not-too-ambitious goal of refining the theory of something we know about, Jensen recalled. Unfortunately, or perhaps fortunately, it was more interesting than that. There was this new behavior showing up. In fact, it was the dominant behavior at high temperatures and pressures, something there was no hint of in older theory.

To verify their results, the researchers trained their machine learning model with data from density functional theory, a widely used technique that is less accurate than QMC but can accommodate many more atoms. They found that the simplified machine learning model perfectly reproduced the results of standard theory. The researchers concluded that their large-scale, machine learning-assisted QMC simulations can account for effects and make predictions that standard techniques cannot.

This work has started a conversation between Ceperleys collaborators and some experimentalists. High-pressure measurements of hydrogen are difficult to perform, so experimental results are limited. The new prediction has inspired some groups to revisit the problem and more carefully explore hydrogens behavior under extreme conditions.

Ceperley noted that understanding hydrogen under high temperatures and pressures will enhance our understanding of Jupiter and Saturn, gaseous planets primarily made of hydrogen. Jensen added that hydrogens simplicity makes the substance important to study. We want to understand everything, so we should start with systems that we can attack, he said. Hydrogen is simple, so its worth knowing that we can deal with it.

#

This work was done in collaboration with Markus Holzmann of Univ. Grenoble Alpes and Carlo Pierleoni of the University of LAquila. Ceperleys research group is supported by the U.S. Department of Energy, Office of Basic Energy Sciences, Computational Materials Sciences program under Award DE-SC0020177.

Physical Review Letters

Stable Solid Molecular Hydrogen above 900 K from a Machine-Learned Potential Trained with Diffusion Quantum Monte Carlo

17-Feb-2023

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

Continue reading here:

Putting hydrogen on solid ground: Simulations with a machine ... - EurekAlert

Read More..

Could quantum fluctuations in the early universe enhance the creation of massive galaxy clusters? – Phys.org

This article has been reviewed according to ScienceX's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

peer-reviewed publication

trusted source

proofread

by Ingrid Fadelli , Phys.org

Astrophysicists have been trying to understand the formation of cosmological objects and phenomena in the universe for decades. Past theoretical studies suggest that quantum fluctuations in the early universe, known as primordial quantum diffusion, could have given rise to so-called primordial black holes.

In a paper published in Physical Review Letters, researchers at Niels Bohr Institute, Universidad Autnoma de Madrid and CNRS Universit de Paris recently explored the possibility that these fluctuations could also affect the creation of even larger cosmological structures, such as heavy galaxy clusters like "El Gordo." El Gordo is the largest distant galaxy cluster ever observed using existing telescopes, which was first captured more than 10 years ago.

"The question of how structure formed in the universe might be one of the most ancient ones, but since the early 1980s it has gained a new dimension," Jose Mara Ezquiaga, one of the researchers who carried out the study, told Phys.org. "At the time, scientists realized the incredible connection between the smallest and the largest scales, in which quantum fluctuations in the very early universe are stretched by a cosmic inflation to seed the formation of galaxies and large-scale structures in the universe."

After physicists first started learning more about the connections between the early and late universe, the idea that black holes could be formed in the early universe started emerging. In 2015, the first observations of black hole mergers via gravitational waves renewed interest in this area, sparking new theoretical studies focusing on the primordial origin of black holes.

"Juan, Vincent and I had been investigating the formation of primordial black holes in the early universe," Ezquiaga said. "Our key contribution was realizing that when quantum fluctuations are dominating the dynamics of cosmic inflation, this leads to a spectrum of density fluctuations that is non-Gaussian, with heavy exponential tails. In other words, quantum diffusion makes it easier to generate large fluctuations that would collapse into a primordial black hole."

After studying primordial black holes in the early universe, Ezquiaga and his colleagues Vincent Vennin and Juan Garcia-Bellido started wondering whether the same mechanism underpinning their formation, namely an enhanced non-Gaussian tail in the distribution of primordial perturbations, could also lead to the formation of other very large cosmological structures. In their recent work, they specifically explored the possibility that this mechanism affects the collapse of larger objects such as dark matter halos, which will later host galaxies and groups of galaxies.

"The formation of larger objects early on in the history of the universe could help alleviate some tensions between observations and our standard cosmological model," Ezquiaga explained. "For example, under standard assumptions, massive clusters like El Gordo may look like outlier, while quantum diffusion make them natural."

As part of their recent study, Ezquiaga and his colleagues computed the halo mass function and cluster abundance as a function of redshift in the presence of heavy exponential tails. This allowed them to determine whether quantum diffusion could increase the number of large galaxy clusters, depleting dark matter halos.

"Because gravity is always attractive, inhomogeneities will only grow as overdensities will attract mass for their surroundings and under densities will become emptier," Ezquiaga said. "The question is whether inhomogeneities in the early universe are large and frequent enough to lead to the gravitational collapse necessary to explain the observed structures in the cosmos. Given an initial distribution of perturbations one only needs to press 'play' and let the system evolve gravitationally, In our case, we had a previous understanding of the distribution of initial perturbations when including quantum diffusion, so our job in this work was to parametrize in a suitable way this spectrum and analyze the results for the number of massive clusters as a function of redshift."

The researchers' paper suggests that quantum fluctuations in the early universe might not only underly the formation of average-sized galaxies and primordial black holes, but also that of massive galaxy clusters, like the fascinating "El Gordo" and Pandora clusters. This would mean that current observations of galaxy clusters could be explained using existing theories, without the need to incorporate new physics in the standard model.

"The other very exciting outcome of our work is that it predicts unique signatures that could be tested in the near future," Ezquiaga said. "In particular, we demonstrate that quantum diffusion not only makes heavy clusters easier to form early on, but also that the amount of substructure should be lower than expected."

The simultaneous enhancement of massive cosmological structures and the depletion of substructures (i.e., halos) is not predicted by other theoretical models. Nonetheless, this potential theoretical explanation for the formation of large galaxy clusters appears to be aligned with recent cosmological observations and could also potentially solve other shortcomings of the standard model.

In their next studies, Ezquiaga and his colleagues would like to paint a more complete picture of the structures in the universe and their formation. This could ultimately also help to fully probe the predictions of quantum diffusion.

"Next for us is fully testing the predictions of this model against observations," Ezquiaga added. "Luckily, there are many new observations that we can use. In particular, the very recent observations of James Webb Space Telescope seem to indicate that there are many more massive galaxies at high redshift, somethings naturally aligning with our predictions, but we are waiting for astronomers to fully understand their systematics and confirm this 'unexpected' population. The other observations that might be interesting for us are number counts of dwarf galaxies with galaxy surveys like the Dark Energy Survey and constraints on subhalos from strong lensing."

More information: Jose Mara Ezquiaga et al, Massive Galaxy Clusters Like El Gordo Hint at Primordial Quantum Diffusion, Physical Review Letters (2023). DOI: 10.1103/PhysRevLett.130.121003

Journal information: Physical Review Letters

2023 Science X Network

Read more from the original source:

Could quantum fluctuations in the early universe enhance the creation of massive galaxy clusters? - Phys.org

Read More..

Scientists create a longer-lasting exciton that may open new possibilities in quantum information science – Phys.org

This article has been reviewed according to ScienceX's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

peer-reviewed publication

trusted source

proofread

In a new study, scientists have observed long-lived excitons in a topological material, opening intriguing new research directions for optoelectronics and quantum computing.

Excitons are charge-neutral quasiparticles created when light is absorbed by a semiconductor. Consisting of an excited electron coupled to a lower-energy electron vacancy or hole, an exciton is typically short-lived, surviving only until the electron and hole recombine, which limits its usefulness in applications.

"If we want to make progress in quantum computing and create more sustainable electronics, we need longer exciton lifetimes and new ways of transferring information that don't rely on the charge of electrons," said Alessandra Lanzara, who led the study. Lanzara is a senior faculty scientist at the Department of Energy's Lawrence Berkeley National Laboratory (Berkeley Lab) and a UC Berkeley physics professor. "Here we're leveraging topological material properties to make an exciton that is long lived and very robust to disorder."

In a topological insulator, electrons can only move on the surface. By creating an exciton in such a material, the researchers hoped to achieve a state in which an electron trapped on the surface was coupled to a hole that remained confined in the bulk. Such a state would be spatially indirectextending from the surface into the bulkand could retain the special spin properties inherent to topological surface states.

The team used a state-of-the-art technique that Lanzara helped pioneer, known as time-, spin-, and angle-resolved photoemission spectroscopy, which uses ultrafast pulses of light to probe the properties of electrons in a material. They worked with bismuth telluride, a well-studied topological insulator that offered the precise properties they needed: an electronic state combining the topological surface characteristics with those of the insulating bulk.

"We knew that bismuth telluride had the right electronic structure to support a spatially indirect exciton, but finding the right experimental conditions took hundreds of hours," said Lanzara. "It was a huge joy for everyone when we saw the excitonic state we were looking for."

The team studied the formation of the excitonic state and characterized its interaction with other charge carriers in the material. These observations already constituted a breakthrough, but the team went a step further by also measuring the state's spin character and demonstrating the persistence of the topological material's strong spin polarization in the excitonic state.

"We studied this new excitonic state and found that it does indeed inherit characteristics of both excitons and topological states," said first-author Ryo Mori, who worked on this project as a postdoctoral scholar and is now a faculty member at the University of Tokyo. "This finding opens up opportunities for future applications that combine properties of both, such as opto-spintronics and possibly new quantum information technology."

"This work is just the beginning, and many mysteries remain in the fundamental properties," Mori continued. "For example, we still cannot conclude the hole's spin in the current measurement. How does spin affect the exciton pairing mechanism? And then, how do we control the properties of this state so we can use it in an application?"

The research is published in the journal Nature.

More information: Ryo Mori et al, Spin-polarized spatially indirect excitons in a topological insulator, Nature (2023). DOI: 10.1038/s41586-022-05567-3

Journal information: Nature

More here:

Scientists create a longer-lasting exciton that may open new possibilities in quantum information science - Phys.org

Read More..

Google plans to add end-to-end encryption to Authenticator – The Verge

Google Authenticator is getting end-to-end encryption eventually. After security researchers criticized the company for not including it with Authenticators account-syncing update, Google product manager Christiaan Brand responded on Twitter by saying that the company has plans to offer E2EE in the future.

Right now, we believe that our current product strikes the right balance for most users and provides significant benefits over offline use, Brand writes. However, the option to use the app offline will remain an alternative for those who prefer to manage their backup strategy themselves.

Earlier this week, Google Authenticator finally started giving users the option to sync two-factor authentication codes with their Google accounts, making it much easier to sign into accounts on new devices.

While this is a welcome change, it also poses some security concerns, as hackers who break into someones Google account could potentially gain access to a trove of other accounts as a result. If the feature supported E2EE, hackers and other third parties, including Google, wouldnt be able to see this information.

Security researchers Mysk highlighted some of these risks in a post on Twitter, noting that if theres ever a data breach or if someone obtains access to your Google Account, all of your 2FA secrets would be compromised. They added that Google could potentially use the information linked to your accounts to serve personalized ads and also advised users not to use the syncing feature until it supports E2EE.

Brand pushed back against the criticism, stating that while Google encrypts data in transit, and at rest, across our products, including in Google Authenticator, applying E2EE comes at the cost of enabling users to get locked out of their own data without recovery. Theres still no timeline for when Google will actually bring E2EE to Authenticators new account-syncing feature, though, leaving users with the option of using the feature without E2EE or just continuing to use Google Authenticator offline.

Link:
Google plans to add end-to-end encryption to Authenticator - The Verge

Read More..

Return of the EARN IT Act rekindles encryption debate at critical moment for privacy-protecting apps – CyberScoop

Lawmakers will markup legislation next week that would hold tech companies accountable for child sexual abuse materials and images distributed on their platforms, part of a growing push in Washington, across the U.S. and abroad to crack down on activity online related to harming minors.

This marks the third time Sens. Lindsey Graham, R-S.C., and Richard Blumenthal, D-Conn., have put the bill the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act forward. The bill previously failed to see a floor vote, instead drawing backlash from security experts and privacy advocates over its potential to weaken the availability of end-to-end encryption.

Those concerns are even more heightened today amid growing concerns about the privacy of people seeking abortions after the Supreme Court overturned Row v. Wade and state laws eroding LGBTQ+ civil rights. Additionally, the FBI and Interpol both recently spoke out against encrypted chat apps and lawmakers in the U.K. and European Union are considering laws like the EARN IT Act that could also decrease the availability of encryption.

All these developments could open the next front in the war over encryption that has flared up over the past decade, often pitting law enforcement against civil liberties groups in the U.S. and abroad.

Whats different this time is a growing public awareness about the benefits of encryption. In the wake of the Supreme Courts abortion ruling, for instance, California, New York and D.C. attorneys generals all issued warnings to residents to avoid unencrypted messaging technology when discussing sensitive information. And the return of the EARN IT Act is already sparking public pushback. An online petition from the group Fight for The Future asking Congress to oppose the bill has more than 500,000 signatures.

The EARN IT Act is probably one of our biggest encryption-threatening bills worldwide, said Natalie Campbell, senior director of North American government and regulatory affairs for the Internet Society, a founding member of the Global Encryption Coalition.

The bill would make two significant changes to current laws. First, the legislation strips companies of liability protections outlined in Section 230 of the Communications Decency Act in cases involving child exploitation, opening the door for more state and private plaintiff cases. Second, it removes the federal knowledge standard for child sexual abuse materials, making it easier for courts to make the argument that a tech company was negligent in offering encryption because it knew it could be used to transmit child sexual abuse materials.

They are opening the courthouse door and lowering the threshold to get through that door and successfully bring a claim, said Riana Pfefferkorn, a research scholar at the Stanford Internet Observatory. And so all of that will operate to disincentivize providers or allow the punishment of providers of offering encryption.

Furthermore, privacy advocates say, the EARN IT Act would make it easier for law enforcement to claim that a company acted negligently or recklessly by offering encryption, bolstering a years-long argument law enforcement has made against encrypted services. While in previous years those complaints have centered around terrorism and drug trafficking, increasingly law enforcement has pointed to child abuse in its concerns about end-to-end encryption.

Earlier this month, the FBI joined with Interpol and the U.K. National Crime Agency to blast Metas expansion of encryption, saying it blindfolds them to abuse and is a purposeful design choice that degrades safety systems. Former AttorneyGeneral William Barr used concerns about child exploitation when sparring with Meta over its plans to roll out full end-to-end encryption across its messaging products in 2019, arguing that going dark impeded the Justice Department from investigating child predators.

The EARN IT Act, introduced the same year Meta announced its encryption plans, got its name from an original plan to allow companies to earn liability protections by following guidance from a law enforcement-led national commission, has become synonymous with concerns that weakening encryption hurts everyone, not just criminals. So much so that lawmakers tried to address encryption concerns in 2020 by clarifying in the bills text that the use of full end-to-end encryption cannot serve as an independent basis for liability. Experts criticized the fix, which does not prohibit encryption from being used as evidence of negligence, as insufficient.

Now, critics say that the Supreme Courts Dobbs decision and the rise of laws targeting LGBQT+ rights make the stakes of the bill even higher than during previous reintroductions. You cant be pro-choice and anti-encryption, said Pfefferkorn.

Moreover, experts worry that the broad definitions in the EARN IT Act could give states the ability to pressure service providers to not just weaken encryption, but to remove lawful content entirely under the pretext of concerns about child exploitation.

Emma Llans, director of the Center for Democracy and Technologys Free Expression Project, said the EARN IT Act would be a gift to those state prosecutors seeking to censor large parts of the web and criminalize information about reproductive health care and LGBTQ+ content.

Llans pointed to the purge of content related to sex and nudity after the passage of FOSTA-SESTA, a bill aimed at eliminating sex trafficking, as an example of what tech companies do when their liability protections are threatened.

Some advocates expressed surprise to CyberScoop that lawmakers reintroduced the EARN IT Act with virtually no changes, given previous opposition. In fact, one of the only notable changes to the bill is the removal of the term grooming, according to a copy of the bill. Blumenthals office told CyberScoop the term was removed to more precisely reflect the conduct in the U.S. criminal code that the bill covers.

Technology companies are already legally required to report known child sexual abuse materials to the National Center for Missing and Exploited Children, which then forwards those reports to law enforcement. Many have taken an additional voluntary step by using hash matching, a technology that allows systems to flag abusive images that has already been reported and assigned a digital signature.

Proponents of EARN IT and other online safety bills say that this kind of voluntary system leads to underreporting and that not enough firms are using hashing. When you start looking at the reports coming in from these companies, theyre often missing a lot of information or are just unhelpful, said Alexander Delgado, director of public affairs for ECPAT-USA, an anti-trafficking policy organization.

Because hashing is based on known material, it has limitations in what it can detect. Other automated tools may produce false results or incorrectly flag child abuse. For instance, The New York Times reported two instances in which parents were accused by Google of uploading child sexual abuse materials after taking sensitive images of their children to share with doctors. In both cases, the men were investigated and cleared by law enforcement, but Google permanently suspended their accounts.

Despite these limitations, some lawmakers in the U.S. and abroad have pressured companies to go a step further by scanning users messages for abusive material before they are sent, using a process called client-side scanning. Efforts to do so, like a ditched attempt by Apple in 2021, have been met with swift criticism by encryption experts.

Electronic Frontier Foundation senior analyst Joe Mullin compared the technology to having someone read your messages over your shoulder. Even if the technology doesnt technically break the encryption, it breaks the values of what end-to-end encryption promises, he said. Theres no way to look at all the messages for this one bad crime and also have end-to-end encryption, said Mullin. Its actually incompatible.

Since the EARN IT Acts initial introduction in 2020 childrens online safety has taken center stage in Congress. Other proposals include the recently introduced STOP CSAM Act, which includes measures such as enforcing new child exploitation reporting obligations for tech companies. There is also the Kids Online Safety Act, which would require platforms used by kids 16 and under to prevent the promotion of content encouraging harmful behaviors. A boom in state-level childrens safety laws also add pressure on federal lawmakers to act.

Theres definitely a lot of momentum for some of these bills, which kind of heightens our concerned that something is gonna pass through, said Campbell of the Internet Society.

The EARN IT Act isnt the only sign of a new front in the war on encryption worrying encryption experts. The European Union has introduced its own CSAM regulations and the United Kingdoms Online Safety Act, which would promote client-side scanning, is making its way through parliament much to the protest of global tech firms.

Its like this kind of global onslaught, said Mullin.

Every expert CyberScoop spoke with agreed that tech companies need to do more to protect children online. However, critics of EARN IT say that there are less controversial changes that wouldnt interfere with encryption that Congress could explore first. For instance, Congress could extend CyberTip hotline preservation times, Pfefferkorn suggested.

If we could have more of a thoughtful and sustained discussion about that and put these civil liberties violating ideas off the table that could be a really positive approach, CDTs Llans said. Im not sure EARN IT can do that.

Proponents of the legislation say, however, that time is of the essence. I think we need to at least do something instead of just trying to find the perfect answer, said Delgado, whose organization supports both EARN IT and STOP CSAM. So, if we see something that doesnt work thats when we should be making changes.

Delgado acknowledged that there are valid critiques of the bills but said that there are costs and benefits to all legislation.

Encryption experts worry those costs could hurt the very children the legislation is trying to prevent. Absolutely nobody wants to prevent efforts to fight child abuse online, said Campbell, who is a parent. But you cannot undermine encryption without introducing a significant threat to every single internet user.

Corrected April 26, 2024: An earlier version of this article misstated that the EARN IT Act had not been formally reintroduced.

Go here to read the rest:
Return of the EARN IT Act rekindles encryption debate at critical moment for privacy-protecting apps - CyberScoop

Read More..

Google Authenticator sync lacks end-to-end encryption, but Google is working on it – BGR

Google finally added a great feature to Google Authenticator, support for account syncing, which will save you a lot of trouble along the way. You wont have to worry as much about a lost or stolen smartphone, and upgrading your iPhone and Android handset will be even easier. But Google Authenticator account sync lacks a major security feature: End-to-end encryption (E2EE).

Since Google Authenticator holds your two-factor authentication (2FA) keys for various key services, data encryption sounds like a no-brainer. And the app does encrypt data while in transit, but its not end-to-end encryption. Google is fixing the issue down the line, however.

Soon after Google announced account syncing for Google Authenticator data, security researchers discovered that the feature doesnt support end-to-end encryption.

That sounds like a big security issue that could prevent you from taking advantage of the account syncing convenience. If worry about the lack of full encryption, you might very well postpone syncing until Google rolls out end-to-end encryption support.

But Google Authenticator data should be secure. The data between your devices and Googles server is encrypted in transit. The only problem is that a data breach involving a Google account would also jeopardize the security of 2FA codes.

Google product manager Christiaan Brand addressed the matter on Twitter. He revealed that support for end-to-end encryption is coming.

Were always focused on the safety and security of @Google users, and the newest updates to Google Authenticator was no exception. Our goal is to offer features that protect users, BUT are useful and convenient, Brand said.

We encrypt data in transit, and at rest, across our products, including in Google Authenticator. E2EE is a powerful feature that provides extra protections, but at the cost of enabling users to get locked out of their own data without recovery.

The exec also said that Google started rolling out optional end-to-end encryption in some products, and Google Authenticator will follow.

Right now, we believe that our current product strikes the right balance for most users and provides significant benefits over offline use, Brand added. However, the option to use the app offline will remain an alternative for those who prefer to manage their backup strategy themselves.

Using the app offline means not signing into your Google account from Authenticator until E2EE rolls out.

As for the actual end-to-end encryptions arrival, youll have to prepare to create strong recovery keys and store them somewhere safe. But well cross that bridge when we get there. Brand hasnt offered an actual timeline for Google Authenticator getting end-to-end encryption.

Read more here:
Google Authenticator sync lacks end-to-end encryption, but Google is working on it - BGR

Read More..

Beyond Encryption: How QRL’s Quantum-Safe Blockchain Technology Offers A Long-Term Solution To Quantum Ri – Benzinga

Although cryptocurrencies have experienced a significant decline from their market cap of over $2 trillion in 2021, they are gaining momentum once again, with Bitcoin up over 75% YTD as of this writing. The crypto industry is rapidly integrating its way into mainstream monetary systems, offering unique solutions to numerous sectors, including finance and gaming.

Born from the ashes of the 2008 financial crisis, the cryptocurrency industry, led by Bitcoin, emerged in response to what was perceived by many as a corrupt, inefficient and centralized financial landscape. It sought to establish decentralized financial alternatives to overcome these challenges, striving to achieve an intricate equilibrium between security, scalability and decentralization.

However, despite the robust nature of the blockchain, the security of cryptocurrencies is threatened by the advent of quantum computers, as they will compromise existing cryptographic algorithms without a viable replacement.

Enter your email and you'll also get Benzinga's ultimate morning update AND a free $30 gift card and more!

The Quantum Resistant Ledger, or the QRL blockchain, offers an innovative and future-proof solution that addresses the significant quantum risk of existing blockchain technology with its own quantum-safe blockchain technology and digital asset. The following discussion will explore the quantum risk landscape for cryptocurrency and evaluate QRL's potential to seize this market opportunity as a post-quantum secure hedge for investors.

Options 101: The Beginner's Guide

Want to become an options master? In his free report, options expert Nic Chahine will give you access to thefour bulletproof tips for beginners, the secret to scoring 511% gainswith options, and his time-tested"plan" for success. Grab your free copy of Options 101: The Beginner's Guide ASAP.

To understand the quantum risk landscape, it's first important to take a step back and understand how cryptocurrencies operate. The primary objective of crypto is to facilitate value exchange without intermediaries, achieved via cryptographic algorithms that enable consensus, process transactions, and ensure data integrity in a permissionless, automated way.

Cryptocurrency security currently relies on mathematical processes, called hashing algorithms, and digital keys, specifically public-key cryptography. Together, these systems discourage tampering by making it extremely expensive and challenging for malicious users to exploit the system.

This implies that, unlike traditional banks, cryptographic algorithms and blockchain technology confirm ownership through probabilistic trustlessness rather than absolute certainty. While todays major blockchains like Bitcoin and Ethereum are considered extremely secure, quantum computing promises new capabilities in processing power, which is likely to have grave impacts on the security of these cryptocurrencies.

According to a recent report by Deloitte, about 65% of all Ether are vulnerable to a quantum attack, and this number has been continuously increasing. This is a significantly larger percentage than the 25% Deloitte found for the Bitcoin blockchain in a previous analysis.

The Quantum Resistant Ledger (QRL) stands as the pioneering post-quantum value store and secure communication layer, designed to shield against the looming quantum computer threat.

QRL employs a cryptographic method called the eXtended Merkle Signature Scheme (XMSS), to ensure that the blockchain remains secure even in the face of powerful quantum computers, providing a long-term solution for safeguarding digital assets.

In addition to protecting transactions, QRLs unique blockchain technology also secures communications. QRL brings together two advanced techniques, on-chain lattice key storage and layer-to-internode communication, to create a highly secured messaging system that is protected from the threats of super-powerful quantum computers.

Lastly, QRL is extremely adaptable and tightly integrated with several world-leading hardware digital asset storage solutions and open development architecture. This, coupled with a rich API and user interface, makes QRL a seamless and robust enterprise solution.

As a prudent investor, evaluating long-term risks associated with blue-chip assets like Bitcoin and Ethereum is essential. While they may be safe at the moment, current trends in post-quantum computing pose grave risks to the security of these platforms.

QRL could be poised to be a market leader in the quantum-safe space, potentially offering a low-risk and lucrative opportunity for investors to gain exposure to a growing niche. With the increasing divergence between the physical and digital worlds, it is more crucial than ever to assess and safeguard against the escalating risks in the digital era.

Featured photo by FLY:D on Unsplash

This post contains sponsored advertising content. This content is for informational purposes only and is not intended to be investing advice

2023 Benzinga.com. Benzinga does not provide investment advice. All rights reserved.

See the original post:
Beyond Encryption: How QRL's Quantum-Safe Blockchain Technology Offers A Long-Term Solution To Quantum Ri - Benzinga

Read More..

‘Encrypted web chats are a digital playground for paedos’: Javid backs Government’s Online Safety Bill… – LBC

25 April 2023, 8:47 | Updated: 25 April 2023, 9:02

Speaking with Nick Ferrari at Breakfast, the Conservative MP for Bromsgrove said the Government needs to protect children from further "abhorrent" online abuse using a key amendment to the bill.

Explaining the Government had developed software that would "pre-screen" the content of such messages, he added the move would prevent the spread of child abuse imagery.

Javid cited findings from the Internet Watch Foundation - a charity that sets out to protect children by removing and preventing abusive online content - warning of a sharp rise in child abuse images being shared online.

The organisation is responsible for tracking down sexual imagery and telling technology companies to remove or block the material.

Its annual report says the amount of the most extreme content found onlinehas doubled since 2020, with Javid highlighting that over 255,000 illegal images of sexual abuse have so far been taken down online.

He added that nearly a fifth of that content related to the most serious types of abuse, including the rape and torture of children and serious sexual abuse of toddlers - a figure that has nearly doubled in recent years.

"In the bill, the Government has introduced an amendment, that I want to say because some people are campaigning against it. And this is to do with something called end-to encryption," Javid said.

"And that's when someone uses say WhatsApp, the message today is completely totally, utterly, private between the sender and the recipient."

The Government's Online Safey Bill has faced widespread scrutiny and seen a series of amendments put forward since its introduction, including calls for social media users who encourage self-harm online to be prosecuted, proposing such behaviour to be labelled a criminal offence.

Read more: 'Holy c*** - we've got no plan, what will we do?': Shocked Boris's reaction to Brexit vote revealed

Read more: UK to start evacuating Brits from war-ravaged Sudan after start of 72-hour ceasefire

"This is a playground for paedophiles. This is something where they can share this imagery and stuff and not be frightened of getting caught in any way or being punished because this is a digital playground," said Javid.

Claiming there to be "a lot of common ground" between parties where the online bill is concerned, Javid said such amendments are about "taking advantage of the opportunities" the government has to curb the use of such chats to spread illegal material.

"Its about using new technology to prevent this kind of crimes," explained Javid, adding: "weve got to do more".

The bill has seen a number of amendments put forward since its conception, notably following the inquest into teenager Molly Russells death, which revealed that harmful online content was a contributing factor to her taking her own life.

"I think that people will be shocked to learn that that's what's happening with this kind of end-to-end encryption. What the Government, working with industry, the IWF (Internet Watch Foundation), and others have come up with is a privacy friendly way to pre-screen such content," Javid added.

"So think of it as something that some software that's on your smartphone.

"There's no third-party access, but it pre-screens it and prevents the uploading of child sexual imagery and videos so they cannot be shared."

Under the bill's original plans, the biggest platforms would have been compelled to not only remove illegal content, but also any material which had been named in the legislation as legal but potentially harmful.

Recent amendments mean there will be a greater requirement for firms to provide adults with tools to hide certain content they do not wish to see - including types of content that do not meet the criminal threshold but could be harmful to see, such as the glorification of eating disorders, misogyny and some other forms of abuse.

Read more:
'Encrypted web chats are a digital playground for paedos': Javid backs Government's Online Safety Bill... - LBC

Read More..

Enterprise Firewall Comparative Test Results Show That Encryption … – PR Newswire

Six out of the eight products are Recommended with one in Neutral and the other in Caution.Firewalls will not see attacks delivered via HTTPS unless configured to do so.

AUSTIN, Texas, April 25, 2023 /PRNewswire/ -- RSAC 2023 --CyberRatings.org, the non-profit entity dedicated to providing transparency on cybersecurity product efficacy, has completed an independent test of eight market leading security vendors in its Enterprise Firewall comparative evaluation. Six products received Recommended ratings with high security effectiveness scores ranging from 94.05% to 99.94%.

Security Effectiveness tests measured how well the enterprise firewall controlled network access/applications and prevented exploits/evasions, all while remaining resistant to false positives. Products were subjected to thorough testing to determine their support for TLS/SSL 1.2 and 1.3 cipher suites, how they defended against 1,724 exploits, whether protection could be bypassed by any of 1,482 evasions, and if the devices would remain stable under adverse conditions.

Six products received Recommended ratings with high security effectiveness scores ranging from 94.05% to 99.94%.

Performance was measured using both clear text and encrypted traffic in order to provide more realistic ratings that are based on modern network traffic. Performance was measured with security enabled, and security effectiveness was measured while under moderate performance load. This was to ensure vendors did not take security shortcuts to improve performance nor enable overly aggressive security protections that would adversely impact performance. Connection rates and throughput of TLS 1.2 and TLS 1.3 encrypted traffic were significantly lower. Average connection rates of encrypted traffic were between 65% to 86.5% lower than unencrypted traffic.

Evasions were measured by taking several previously blocked attacks and then applying evasion techniques to those baseline samples. This ensured that any misses were due to the evasions, not the baseline samples. Several vendors missed evasions, with one vendor missing 72 evasions.

Key Findings:

"Firewalls are the keystone of most network security programs," said Vikram Phatak, CEO of CyberRatings.org. "It is concerning that some market share leaders are falling behind. CISOs should put pressure on those vendors to improve and look at alternatives in case they don't."

The following products were evaluated:

To read the CyberRatings reports go to CyberRatings.org.

Additional Resources

About CyberRatings.org

CyberRatings.org is a 501(c)6 non-profit organization dedicated to providing confidence in cybersecurity products and services through our research and testing programs. We provide enterprises with independent, objective ratings of security product efficacy. To become a member,visit http://www.cyberratings.org

SOURCE CyberRatings.org

Read more from the original source:
Enterprise Firewall Comparative Test Results Show That Encryption ... - PR Newswire

Read More..

Paperclip SAFE and TLA Innovation, Inc. Partner to Integrate … – StreetInsider.com

Get instant alerts when news breaks on your stocks. Claim your 1-week free trial to StreetInsider Premium here.

TLAs BoomID Mobile leverages Paperclip SAFE to keep data encryptedand readily available

HACKENSACK, N.J., April 26, 2023 (GLOBE NEWSWIRE) -- Paperclip, Inc. (OTCMKTS:PCPJ) has partnered with TLA Innovation, Inc. to integrate its breakthrough searchable encryption technology, SAFE, within its BoomID Mobile solution.

Were thrilled that TLA has chosen to integrate Paperclip SAFE within their highly innovative and disruptive authentication solutions, said Chad Walter, Chief Revenue Officer at Paperclip. TLAs solutions are among the first to integrate searchable encryption as part of their core operations. Integrating SAFE as a key component exceeds current compliance requirements and puts BoomID Mobile levels above the competition.

In data security, we like to say be better, do more, make a difference, Walter added. BoomID is doing just that.

TLA has created a mobile app with an integrated personal identity management solution, featuring SAFEs searchable encryption technology that they will bring to market later this year.

Leveraging privacy-enhancing computation (PEC) and Paperclips patented shredding protocols, SAFE combines state of the art encryption with advances in cybersecurity, data storage and retrieval, resulting in large scale data protection while enabling faster, always encrypted, searchable access.

TLAs Verified Identity products protect against bots and fraud, using advanced biometrics and AI to validate identity and facilitate cleaner, more efficient business processes, said Benjamin Massin, CEO of TLA.Paperclip SAFE is an essential element of BoomID Mobile, keeping data encrypted and readily accessible. SAFE searchable encryption technology will be integrated within our new personal identity management solution launching the second half of the year.

BoomID Mobile is a next generation password manager and digital wallet, providing the user with a single sign-on experience during application login, while providing secure storage of the users verified records.

SAFE was built with solution integration in mind, Walter said. Cybersecurity innovators like TLA can benefit from searchable encryption to elevate security and functionality for their solutions.

About Paperclip, Inc.Paperclip is a proven technology partner that continues to revolutionize content and document management, and data security for Fortune 1,000 companies worldwide. Every second of every day, our innovative solutions are securely processing, transcribing, storing, and communicating sensitive content across the internet. Maximizing efficiency to save millions annually, while maintaining absolute security and compliance. For more information, visit paperclip.com.

About TLA Innovation, Inc.TLA Innovations SaaS platforms use identity to improve business processes and mitigate risk. TLAs Verified Identity protects against identity-driven attacks and uses advanced biometrics and AI to assure identities and facilitate cleaner, more efficient business processes.

The team is comprised of industry veteran identity experts, software engineers, designers and implementers who are committed to creating products that innovative, inventive, and designed to provide what you didnt think was possible, at the convergence of the digital and human to deliver maximum security with the utmost ease and efficiency.

MEDIA CONTACT:Megan BrandowPaperclip, Inc.[emailprotected]585.727.0983

See the article here:
Paperclip SAFE and TLA Innovation, Inc. Partner to Integrate ... - StreetInsider.com

Read More..