Page 1,607«..1020..1,6061,6071,6081,609..1,6201,630..»

Solana-based DEX Orca bans US users from trading in its platform – CoinGeek

Orca becomes the latest decentralized exchange (DEX) to restrict U.S. residents from interacting with its web platform, according to anoticeon its official website.

The Solana-based DEX noted that the U.S. would be joining the list of banned countries by March 31, giving affected users over a week to prepare for the changes. Orcas announcement appears to be linked to a rising regulatory crackdown on the digital currency industry in the United States.

Orca will be adding the United States to the regions and countries which are restricted from trading on orca.so effective March 31, 2023. This will not impact the ability of U.S. users to directly interact with Orcas smart contracts or SDK, nor will it impact their ability to provide liquidity through orca.so, the announcement read.

Orca was launched in February 2021, and immediately became one of the most popular Solana DEXs and automated market maker (AMM) platforms. In February alone, Orca recorded transaction volumes exceeding $600 million, with nearly $50 million ontotal volume locked(TVL) on the Solana network.

It appears that U.S. users will still be allowed to interact with Orcas smart contracts if they do so directly. Only the website functionalities will be blocked for U.S. residents, with a range of options available for U.S. residents to interact directly with the DEX.

One method that U.S. users have been doing to bypass the restriction is by using tools like Truffle or Hardhat, or the Jupiter platform. Another alternative to interact directly with Orcassmart contract has been via the use of virtual private networks (VPN) to hide their IP address, allowing them to evade geographical restrictions.

Other DEXs have moved to preclude U.S. residents from using their platforms, citing regulatory concerns with Binance DEX leading the way in 2019, but offering users the option of VPNs to bypass restrictions. DEX aggregator joined the growing list with a ban on U.S. residents with a strict warning for citizens not to attempt bypassing restrictions.

You must not use any software or networking techniques, including the use of a Virtual Private Network (VPN) to modify your internet protocol address or otherwise circumvent or attempt to circumvent this prohibition, the warning read.

A case against DEXs

Generally,decentralized exchangesare typically not subject to registration by the U.S. Securities and Exchange Commission (SEC) because of the absence of custody or order books. However, some experts believe that registration for DEXs with the Commission is required as they satisfy the requirements for registration with the Commission.

The focus is not on the label you put on something or the technology youre using. The focus is on the function, and what the platform is doing. Whether its decentralized or not, whether its on a smart contract or not, what matters is its an exchange, Robert Cohen, former head of the SEC Cyber Unit, said in 2018.

Watch: Law & Order Regulatory Compliance for Blockchain & Digital Assets

New to Bitcoin? Check out CoinGeeksBitcoin for Beginnerssection, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.

Read the original post:

Solana-based DEX Orca bans US users from trading in its platform - CoinGeek

Read More..

What Is a Hybrid Blockchain, and How Does It Differ from a Regular … – MUO – MakeUseOf

Governments, businesses, and other organizations have begun adopting blockchains to manage data and provide better solutions. But there is no one-size-fits-all regarding blockchains. Different types exist.

Typically, youll find public and private blockchains. However, a more uncommon option is availablehybrid blockchains, which offer the best of both worlds.

A hybrid blockchain is a unique type of blockchain that derives its features from public and private blockchains. Its a blend of both blockchains; the public and private aspects of the hybrid blockchain work hand-in-hand.

Because it is open and accessible, the public blockchain verifies transaction data via a blockchain consensus mechanism. Then, the data is stored in the private blockchain, only accessible to those with permission.

This amalgamation balances transparency, privacy, and security with several potential applications in finance, governance, and supply chain management industries.

Those who run hybrid blockchain-based companies cannot change the transactions and data in the decentralized ledger because it is immutable. However, they can keep the identity of new entrants hidden from the other network members, revealing them only after they have completed transactions with other participants.

Hybrid blockchains have some merits and demerits:

As mentioned earlier, hybrid blockchains have several applications in different sectors and industries.

Internet of Things (IoT) devices, due to their wireless connectivity and data transmissibility, are prone to cyberattacks. By preventing data breaches, unauthorized access, and other possible security threats, hybrid blockchains can thwart the efforts of these malicious entities.

Moreover, hybrid blockchains can enable devices to work together seamlessly by simplifying the integration process of different IoT devices via smart contracts. And if you use any IoT devices that run on hybrid blockchains, you can be assured that your user data is private and confidential.

With hybrid blockchains, companies can display listings to the public while keeping some data private. Meanwhile, businesses can enhance transparency, dependability, and trust by automating services for consumers and employees.

In addition, supply chains like retailers can use hybrid blockchain technology to fine-tune their operations and highly regulated processes. IBM Food Trust and Walmart are great examples of enterprises that have applied hybrid technology to their supply chain.

For instance, the IBM Food Trust has farmers, distributors, and wholesalers, in its hybrid blockchain network. It grants different groups access to a private blockchain containing transactions peculiar to them, while it uses the public blockchain component to share information across the different groups.

Crypto-based platforms employ hybrid blockchain technology in trading and finance globally. The banking industry can also benefit from hybrid blockchains because of their responsibility to secure user data and privacy.

Governments can use hybrid blockchain technology to build and manage public identification databases, conduct electoral voting processes, deliver humanitarian and social aid to citizens, store complex data like medical records, and automate acquisition processes. All these processes require public access but still give the government total control. The government can easily and securely share this data with its various institutions.

Here are two specific examples of institutions that incorporate hybrid blockchains.

XinFin is an EVM-compatible hybrid blockchain that uses efficient, accessible, and versatile decentralized solutions to modernize the global financial and trading sectors. The company complements financial systems by supporting them with a permissioned and restricted blockchain that private firms, governments, and enterprises can use to provide better solutions. Its digital token is XDC.

XinFin was one of the first companies to use smart contracts and delegated proof-of-stake (DPoS) consensus (instead of proof-of-stake), with IoT strongly featured. This feature makes the network fast, as transactions are completed within two seconds, and transaction fees are low.

XinFin helps solve problems with cross-border transactions and limited blockchain technology applications in the global financial sector. The platform uses the best features of IBMs Quorum private blockchain platform and Ethereum, a public blockchain. And it finds strong expression in aviation, payroll systems, supply chain logistics, HR, international finance, and trade settlements.

In 2022, IBM blockchain services and CasperLabs announced the combination of IBMs Hyperledger Fabric private blockchain and Caspers public blockchain capabilities. This combination offers enhanced security, an open market, and public verifiability.

IPwe, powered by the IBM hybrid blockchain, has published the first blockchain-powered global registry, assembling patent records freely. And IPwe is on track to tokenize patents and patent attributes. The tokens will be easily traded, licensed, and transferred with smart contracts.

In a couple of years from now, more organizations and industries will likely be adopting the hybrid blockchain. Industries that require high levels of transparency, security, privacy, and traceability have the potential to benefit the most from this revolutionary technology.

See more here:

What Is a Hybrid Blockchain, and How Does It Differ from a Regular ... - MUO - MakeUseOf

Read More..

Blockchain-Based Debt Protocol Obligate Records First Bond Issuance on Polygon Network – Yahoo Finance

Join the most important conversation in crypto and web3! Secure your seat today

Obligate, a blockchain-based debt securities protocol, has executed the first bond issuance without any banks involved using the Polygon blockchain, the protocol announced Wednesday in a statement.

The issuer was Muff Trading AG, a Swiss physical commodities trading boutique specializing in sourcing precious metals and raw materials from South America. Muff sold tokenized corporate bonds using Obligates marketplace. The firms did not disclose the debt issuances size and terms.

The development precedes Obligate opening its platform to the broader public on March 27.

Obligate, which is regulated as a financial intermediary in Switzerland, allows companies to issue bonds and commercial papers using blockchain technology without relying on banks. It combines the efficiency of smart contracts and traditional finance regulations. Issuers must go through know-your-customer (KYC) checks before onboarding to comply with regulations. Investors receive ERC-20 tokens in their crypto wallets representing the bond, carrying the right to receive payment at maturity or collateral in the case of a default.

The development highlights the proliferation of on-chain debt markets in decentralized finance (DeFi) and is the latest example of crypto markets offering real-world financial service for businesses and sophisticated investors. Last month, German industrial giant Siemens issued $64 million of bonds with a one-year maturity on Polygon.

See also: Hong Kong Successfully Offered Inaugural $100M Tokenized Green Bond

The bond market is the largest financial market, but it only works well for large companies, Benedikt Schuppli, Obligates CEO, told CoinDesk.

The most prominent advantage of issuing debt via blockchain-based protocols is that it connects bond issuers with investors without intermediaries, slashing costs and administrative fees, Shuppli explained. This allows smaller firms to access financing through bond markets.

Story continues

Luca Muff, founder and CEO of Muff Trading, told CoinDesk that this was the first time his company issued bonds and chose Obligate to access markets. As a mid-size commodity trader, its a very tough environment these days with traditional banks, he said.

Obligate deducts a 0.5% issuance fee based on the size of the debt paid by the issuer.

Unlike Siemens on-chain bonds, Muffs issuance sidestepped banks traditional fiat money payment rails and was funded using Circles USDC stablecoin. The debt was secured with receivables held at Apex Group, a financial services firm with some $200 billion of assets under depositary and a partner of Obligate.

With traditional sources of lending restricted by current market conditions, this issuance enables investors to access on-chain bonds and commercial paper at a fraction of the cost and time, within the same secure and regulated framework they are familiar with from the traditional financial markets, Bruce Jackson, Apexs chief of digital asset funds and business, said.

Obligates choice to use Polygon, an Ethereum sidechain, showcases the blockchains growing lure for institutional capital. Investment-management firm Hamilton Lane opened tokenized funds on Polygon earlier this year, while Clearpool, a DeFi debt protocol, is set to open its institutional platform Prime exclusively on Polygon in the coming months.

Obligate raised $4 million from Circle Ventures earlier this year, after securing a $4.5 million investment from Blockchange Ventures, Earlybird Venture Capital and SIX Fintech Ventures.

Read more: Has Tokenizations Moment Finally Come?

See the original post here:

Blockchain-Based Debt Protocol Obligate Records First Bond Issuance on Polygon Network - Yahoo Finance

Read More..

Stacks 2.1 deployed: Is BTC the catalyst STX needed all along – AMBCrypto News

Stacks [STX], known as the Bitcoin [BTC] layer for smart contracts, announced its activation of the 2.1 version on 19 March. In December 2022, the project had upgraded to 2.05, whose goal was to shorten the runtime of a full block creation on the network.

Read Stacks [STX] Price Prediction 2023-2024

The now-implemented 2.1 upgrades, also called the Stacks Improvement Proposal (SIP) would strengthen Bitcoin bridging and decentralized mining.

Stacks prides itself on a project for enabling smart contracts and decentralized applications for transaction settlement on the Bitcoin blockchain. And this has been possible because of the Proof of Transfer consensus, which helps Stacks layer hashing, secured by the Bitcoin hash power.

With the new upgrade, Stacks mentioned that the miners would be able to reduce Bitcoin transaction fees by 25%. Also, it would reduce the barrier to entry for decentralized mining pools. The announcement read:

The 2.1 upgrade adds the ability for miners to mine using a native segwit or taproot UTXO. Not only does this reduce the Bitcoin transaction fee by around 25%, but also this is a major building block for decentralized mining pools.

Interestingly, Stacks link to Bitcoin did not end with mining or smart contracts interaction. Rather, STX has also been on BTCs heels per price performance.

According to CoinMarketCap, STX shot up by 6.21% following the announcement. This brings the cryptos performance in the last 30 days to 270% cumulatively.

It is also to be noted that three weeks ago, the token recorded a 165% value hike, and BTC may have played a part in the same. But it would be necessary to evaluate if the king coin can still influence STX for another upside.

Based on the technical outlook, STX had been relying on increasing support since 17 March. Although there have been times when the resistance pushed the price downwards, most ended in recovery.

But indications from the Bollinger Bands (BB) revealed that the STX had left the contracting area toward extreme volatility. Furthermore, the STX price was touching the upper band at press time, implying that the cryptocurrency was likely overbought.

Realistic or not, heres STXs market cap in BTCs terms

Additionally, the Directional Movement Index (DMI) reinforced the STX buyers supremacy over the sellers. This was ascertained from the -DMI (red) sliding below the +DMI (green).

However, the Average Directional Index (ADX) was 19.78. As such, a continuous movement in the upward direction might experience some scuffles unless the ADX (yellow) certifies it at a value of 25.

Read the original post:

Stacks 2.1 deployed: Is BTC the catalyst STX needed all along - AMBCrypto News

Read More..

The Emergence of Web3 and Its Impact on TradFi – LCX

Web3 is gaining traction in traditional finance as the underlying technology of Web3 can transform the face of TradFi. Owing to the advancements in Web3, the world of finance is going through a massive shift, and the way we conduct our financial business is evolving. The emergence of Web3 has sparked a wave of innovation within traditional finance. It is also known as the decentralized web, is a growing movement that is challenging traditional finance by offering a more transparent, secure, and decentralized alternative.

With the wave of mass adoption of digital modes of finance, it is time for TradFi to adopt some of the features of the Web3 universe to stay relevant and competent. The sudden popularity of Web3 is rooted in its characteristics. Web3 offers stability, scalability, interoperability, security, performance, extensibility, manageability, and openness, all attributes that traditional finance should aim to adopt.

One significant feature that traditional finance must adopt from Web3 is the use of a decentralized mode of finance, which allows for the creation of a system that is more transparent and resilient than a conventional system of finance. The proliferation of decentralized finance (DeFi) in the traditional financial system will be the most significant outcome for the financial world out of the invention of Web 3.0. DeFi offers the possibility of expanding TradFis total addressable market to the world. It will also enable TradFi organizations to cut down on the cost of infrastructure and data center development as they can then leverage Web3 infrastructure.

Web3 technologies have the potential to provide the necessary infrastructure to support the adoption of a decentralized system of payment and transactions within the TradFi space as well. A decentralized system based on blockchain technology enables faster, cheaper, and more secure transactions than the technology currently utilized by TradFi. For instance, the use of smart contracts can automate complex transactions and reduce the need for intermediaries, while simultaneously increasing security and transparency. Traditional finance presently relies on a complex web of intermediaries and intermediation processes, which can be slow and opaque. This technologies, on the other hand, offer a more streamlined and transparent approach, allowing for faster and more transparent financial transactions.

Continue reading here:

The Emergence of Web3 and Its Impact on TradFi - LCX

Read More..

Inery Blockchain to Implement AI, Mainnet Rescheduled for Q2 2023 – EIN News

Inery proud to announce an upgrade to its blockchain before the mainnet release

The mainnet release was originally scheduled for Q1 2023. However, the companys blockchain is undergoing a revamp to implement the AI module effectively. As such, the launch has been delayed to provide enough time to integrate and test the solution.

About Inerys AI Consensus Inerys AI-based consensus mechanism will optimize the compliance and order of blocks produced on the Inery blockchain, thus maintaining the networks integrity. The protocol will track uptime, computational power, stake, and other performance metrics of the blockchains nodes. Based on that information, it will organize block validation in the most efficient order.

Making sure that our blockchain mainnet works flawlessly, utilizing the best solutions, providing a powerful infrastructure for Web3 - thats our number one priority. I fully expect this newest upgrade to have a significant and positive impact on Inerys blockchain use, while at the same time, showcasing an elegant use for AI in blockchain. said Ivan Vujic, CTO of Inery.

This AI solution will also monitor broader network specs, such as the number of on-chain transactions per second and energy consumption. All the data it collects is stored on smart contracts. These contracts comprise a database of records which the AI will analyze for improved decision-making.

About Inery Inery is an innovative provider in database management seeking to provide decentralized solutions to a traditionally centralized landscape. Thanks to its layer-1 blockchain foundation, IneryDBMS offers superior security, greater control over data sharing, and high performance capabilities.

For more information, visit website.

Tijana GertnerINERY PTE. LTD.email us hereVisit us on social media:TwitterLinkedIn

Original post:

Inery Blockchain to Implement AI, Mainnet Rescheduled for Q2 2023 - EIN News

Read More..

Everything You Need to Know About the Encryption on Zoog’s Free VPN – MUO – MakeUseOf

Zoog's free VPN service can provide you with elevated privacy and security online, but what's its encryption standards like? What encryption cipher does Zoog use, and is it safe enough for you to trust?

Zoog was founded in 2013 by a group of tech enthusiasts, and is based in Greece. The service offers premium and paid plans to users, with the former having more features and server accessibility. But we'll be focusing on Zoog's free version today.

Zoog is a no-log VPN service, meaning it doesn't record or share the data it encrypts for you. This is a big plus in terms of security and privacy.

The free Zoog plan offers you six different server locations (with the other 63 available servers only being available to premium members). For a basic, free VPN, six options isn't too bad. You can connect to servers in Germany, the Netherlands, Singapore (of which there are two), London, and Washington. The two Singapore servers technically takes the location choice down to five, so keep this in mind.

The Zoog app is easy to use, and doesn't require much getting used to.

The interface itself is basic, with a simple main screen that allows you to activate or deactivate the VPN, as well as see how much of your monthly data limit you've used. The free Zoog plan gives users 10 GB of data monthly. This isn't an awful lot, but is enough for browsing and the odd video.

You can also switch VPN protocols in Zoog's app settings and enable the auto-reconnect feature, connect-on-start feature, and VPN shadowing (which lets you overcome censored firewalls).

But when it comes to VPNs, it's the security that matters above all else. So, what kind of encryption is Zoog offering its customers to keep their internet traffic safe?

Many popular VPN providers out there today use AES-256 encryption to secure user data. This is a symmetric key cipher that uses a 256-bit key to encrypt data. AES stands for Advanced Encryption Standard (or Rijndael), and is used by numerous world governments, security agencies, and, VPN providers to keep data inaccessible to unauthorized parties.

ExpressVPN, SurfShark, NordVPN, Windscribe, ProtonVPN, and Zoog's premium plan all use AES-256. However, Zoog doesn't use AES-256 encryption on its free version. Rather, it uses AES-128 encryption. As you may have guessed, the difference between these two encryption ciphers is the number of bits used in the key. While the former uses 256 bits, the latter uses 128.

But this doesn't mean Zoog is not secure. AES-128 encryption is still very tough to overcome. In fact, AES encryption has never been cracked, be it the 128-bit or 256-bit cipher. There's also a 192-bit AES cipher, which has also never been cracked. Overall, this encryption standard is very good at what it does.

As said on the Zoog website, "If the most powerful computer on the Earth was trying to crack a 128-bit key, it would still take approximately 139 trillion years." So, you've not got much to worry about there.

In fact, AES-128 encryption can outshine AES-256 in some ways. For starters, AES-128 is faster and more efficient.

If you want to use Zoog and enjoy the benefits of AES-256, you'll need to upgrade to the premium plan. You can pay for Zoog monthly, or buy a year or two years' worth of membership in bulk. The pricing for this is as follows:

Though Zoog uses two different encryption ciphers on its free and premium plans, both ciphers are still highly secure, meaning Zoog is safe to use either way.

But if AES-128 encryption isn't for you, don't worry. There are so many free VPN services that use 256-bit encryption (including TunnelBear and PrivadoVPN), you'll have no trouble finding a provider with a more secure encryption cipher.

While Zoog's free and premium plans use two different AES encryption ciphers, both are highly secure, meaning your data will be sufficiently encrypted on both versions. So, if you're looking to save money and don't mind missing out on certain features, Zoog's free VPN service could suit you well.

Go here to read the rest:
Everything You Need to Know About the Encryption on Zoog's Free VPN - MUO - MakeUseOf

Read More..

Accenture to acquire Bengaluru-based AI firm Flutura – The Indian Express

IT services and consulting firm Accenture on Tuesday said it will acquire Bengaluru-based industrial artificial intelligence company Flutura.

You have exhausted your monthly limit of free stories.

To continue reading,simply register or sign in

Continue reading with an Indian Express Premium membership starting Rs 133 per month.

This premium article is free for now.

Register to continue reading this story.

This content is exclusive for our subscribers.

Subscribe to get unlimited access to The Indian Express exclusive and premium stories.

This content is exclusive for our subscribers.

Subscribe now to get unlimited access to The Indian Express exclusive and premium stories.

The deal size was not disclosed.

Flutura has approximately 110 professionals who specialize in industrial data science services for manufacturers and other asset-intensive companies.

Flutura will strengthen Accentures industrial AI services to increase the performance of plants, refineries, and supply chains while also enabling clients to accomplish their net-zero goals faster, Accenture said in a statement.

Ireland-based Accenture plans to bring Fluturas capabilities to clients in the energy, chemicals, metals, mining, and pharmaceutical industries.

Flutura democratizes AI for engineers. This acquisition will power industrial AI-led transformation for our clients globally and particularly in Australia, South-East Asia, Japan, Africa, India, Latin America and the Middle East, Senthil Ramani, senior managing director and Accenture Applied Intelligence lead for Growth Markets, said.

Last year, Accenture acquired data science company ALBERT in Japan.

Other recent AI acquisitions of Accenture include Analytics8 in Australia, Sentelis in France, Bridgei2i and Byte Prophecy in India, Pragsis Bidoop in Spain Mudano in the UK and Clarity Insights in the US.

First published on: 21-03-2023 at 13:25 IST

See original here:

Accenture to acquire Bengaluru-based AI firm Flutura - The Indian Express

Read More..

Data Encryption Methods and their Advantages and Disadvantages – Security Boulevard

Protecting data has become a critical part of every organizations operation. However, choosing the best method of data encryption can be difficult with all the available options. Here we discuss the various encryption methods available, the strengths and weaknesses of each, and approaches to simplify data encryption.

Encryption is the transformation of sensitive data (plaintext) into obfuscated data (ciphertext) using a mathematical algorithm and a key. The key is a random set of bits of a given length. To protect the data, the key must be kept secure.

Data encryption can be further broken down into two types, Symmetric and Asymmetric encryption.

In symmetric encryption, the same encryption key is used to both encrypt and decrypt the data. Therefore this single key must be kept confidential by all parties using it.

The most common symmetric encryption algorithm today is advanced encryption standard (AES), known for its security and being widely available.

AES can be deterministic or random. Deterministic means that for a given key and plaintext, the ciphertext is always the same, whereas random means the ciphertext is different every time. Random ciphertext values provide additional security when there are a small number of plaintext inputs, also known as low-cardinality. For example, a persons age is between 0 and 1221 so the cardinality is 123 possible inputs. At one extreme, the cardinality could be two, say the answer to, Has patient been diagnosed with Type II Diabetes, true/false. In that case, a deterministic system is not going to work well because a bad actor would only have to verify one person with or without diabetes and know everybodys situation. However, a random system will have different values for every person providing additional security.

Asymmetric encryption, also known as public key encryption, is a type of encryption that uses two different keys for encrypting and decrypting data. One key, known as the public key, is used for encryption and can be freely shared with anyone, while the other key, the private key, is kept secret and used for decryption. Alternately for digital signatures and authentication use cases, the private key is used to encrypt and the public key decrypts to validate the identity of the key holder.

Asymmetric encryption solves a major challenge with symmetric encryption in that it provides a secure way of exchanging sensitive information over insecure channels, such as the internet, without the need for a shared secret key. This is because only the person with the private key can decrypt the data, even though the public key used to encrypt the data is widely known.

One of the most commonly used examples of asymmetric encryption is the RSA algorithm, named after its inventors Ron Rivest, Adi Shamir, and Leonard Adleman.

Format Preserving Encryption (FPE) is a type of encryption that allows for the encryption of data while preserving its original format. Unlike traditional encryption, which typically produces ciphertext of fixed length, FPE produces ciphertext that retains the original length and format of the plaintext.

FPE is commonly used in situations where the format of the plaintext data is important, such as credit card numbers, social security numbers, and other types of sensitive data. By preserving the original format, FPE allows for encrypted data to be used in systems and applications that require the same format as the original plaintext data.

In 2016 NIST published SP 800-38G defining FPE. It uses industry standard AES, along with the advantages of performance and security that brings, but the process is modified such that the ciphertext is the same length and format as the plaintext.

FPE has proven to be highly secure and performant with any cardinality of a million or more. This translates to any numerical data (0-9) with six or more digits; so phone numbers, social security numbers, national IDs, drivers licenses, and credit cards easily meet this. Accordingly, most alpha-numeric (0-9, A-Z, a-z) data meets this need with shorter possible length, such as names and addresses. FPE output libraries can consist of numbers (0-9), letters (A-Z, a-z) or both.

Partial FPE is also possible. For example, the social security number 111-22-3333 could be partially obfuscated to 532-58-3333 so that the last four digits can be used by customer support personnel to identify a client.

FPE has recently become the favorite algorithm of choice for most organizations migrating their data to the cloud. It provides assurances that the data will be protected while outside of their network boundaries, but also that it will not break any applications that expect data to be formatted in specific ways.

The one downfall common to traditional data encryption methods is that operations doing math, searches, or sorts cant be done on the ciphertext data. If an organization must do this type of operation but cant allow the sensitive data itself to be decrypted, this is where privacy enhanced computation (PEC) comes into play. Privacy preserving analytics is another term. There are three competing versions.

Homomorphic Encryption is complex math done on the encrypted data to enable mathematical operations. The security has been called into question on this method, but the biggest issue is that it requires so much processing power that performance is slowed by orders of magnitude. As of today, it is mostly impractical.

Secure Multi-party Computation (SMPC) is a procedure where the sensitive data is broken into pieces and shared amongst several parties. The keys or secrets are also broken and distributed amongst the parties. The keys are combined using one of several methods and then the computations are done on all the data pieces in such a way that the results are calculated, but the individual inputs are meaningless. The downside to SMPC is it requires separate functions to act as the parties and do the computations resulting in some additional delay.

Private Enclave applies the concept of performing all memory and processing in a separate and highly secure portion of a computer processor. Intel processors provide this capability, and they call it SGX. The encrypted data goes in, it is decrypted and processed, then only the results are sent out. One downside to SGX is that distributed computing cant be done since everything is confined to a single enclave. Additionally, your database processors all have to be Intel with SGX capabilities. Finally, several vulnerabilities in SGX have been found. Though this is true of every computing device and application and it is why patching and updates are part of all security practices.

Baffle implements PEC in database user-defined functions (UDF). Similar to SGX, UDFs allow operations on encrypted data by processing it within the UDF. Even the DBA isnt able to access the decrypted data with this method. This has proven to be the best combination of security and performance.

Data encryption has become essential in safeguarding sensitive information for organizations of all sizes. The available encryption types include symmetric and asymmetric encryption, each with its own strengths and limitations. Symmetric encryption is faster and more efficient than asymmetric encryption, but it requires secure key management, while asymmetric encryption provides secure key distribution, making it highly scalable. Format Preserving Encryption (FPE) is a new type of encryption that preserves the original format of the plaintext, making it ideal for sensitive data like credit card numbers and social security numbers. With FPE, organizations can now protect their data in the cloud without compromising their applications data format, making it the algorithm of choice for most organizations migrating their data to the cloud.

Ideally, organizations should look for data encryption solutions that provide simplicity in deployment and management. Baffles solution uses a unique approach that does not require any application code to be modified, and simplifies management from a centralized console. Learn more here.

The post Data Encryption Methods and their Advantages and Disadvantages appeared first on Baffle.

*** This is a Security Bloggers Network syndicated blog from Baffle authored by Billy VanCannon, Director of Product Management. Read the original post at: https://baffle.io/blog/data-encryption-methods-and-their-advantages-and-disadvantages/

Read more:
Data Encryption Methods and their Advantages and Disadvantages - Security Boulevard

Read More..

Cloud Company Vultr Announces Availability of NVIDIA H100s and … – insideHPC

The NVIDIA HGX H100 joins Vultrs other cloud-based NVIDIA GPU offerings, including theA100,A40, andA16, rounding out Vultrs extensive infrastructure-as-a-service (IaaS) support for accelerated computing workloads. From generative AI, deep learning, HPC, video rendering and graphics-intensive applications, to virtual and augmented reality (VR/AR) applications and more, Vultrs robust GPU lineup extends its full range of affordable cloud computing solutions that make Vultr the ideal cloud infrastructure provider for AI and machine learning intensive businesses.

The expansion of our NVIDIA GPU portfolio combined with our partnerships with Domino and Anaconda demonstrate our commitment to supporting innovation in AI and machine learning, said J.J. Kardwell, CEO of Vultrs parent company Constant. We have aligned with the best providers of solutions for data scientists and MLOps to enable easy and affordable access to the highest performance accelerated computing infrastructure.

The seamless integration of the products and services from Vultr, Domino, and Anaconda delivers a platform engineering approach to MLOps to accelerate data science and reduce time-to-value. Within 60 seconds data scientists can spin up a complete and secure Anaconda development environment on the Domino MLOps platform, running on Vultr infrastructure, to immediately begin developing and testing new machine learning models. This unique alliance eliminates the complexity of configuring infrastructure and IDEs, so data science and MLOps teams can focus on innovation instead of operations.

The most innovative data scientists can solve the worlds greatest challenges when they have easier access to the tools they know and love, and better collaboration resulting in faster model iterations and deployment, said Thomas Robinson, COO of Domino Data Lab. By teaming up with Anaconda and Vultr, were paving the way to breakthrough innovation with end-to-end support for AI/ML lifecycles that accelerates time-to-value for data science teams.

Together, Domino and Vultr make near-instantaneous access to our IDE available on demand from anywhere serious data science needs to happen, said Anaconda SVP Worldwide Revenue, Al Gashi . Customers can confidently access the open-source tools their team needs to drive innovation forward and scale their machine learning projects. Through this partnership, data science teams can focus on what they do best moving the world forward with AI-based innovation.

Vultrs introduction of the NVIDIA HGX H100 on its platform is unleashing the power of next-generation accelerated computing for customers, said Dave Salvator, director of accelerated computing products at NVIDIA. AI and machine learning developers can easily access the NVIDIA HGX H100 through Vultr, along with the broad NVIDIA AI platform, to supercharge their AI solutions.

Vultrs mission is to make high-performance cloud computing easy to use, affordable, and locally accessible for businesses and developers around the world. From the largest supercomputing clusters to virtual machines with fractional GPUs, Vultr makes access to the industrys best GPUs affordable by freeing users from the expensive overprovisioning embedded in the offerings of the Big Tech clouds. Customers can access Cloud GPUs by the hour or month just as needed, or on a long-term reserved capacity basis.

Vultr now offers the most powerful accelerated computing resources for unprecedented performance. NVIDIA GPUs are also integrated with Vultrs broad array of virtualized cloud compute and bare metal offerings, as well as Kubernetes, managed databases, block and object storage, and more. This seamless product and services array makes Vultr the preferred all-in-one provider for businesses of all sizes with critical AI and machine learning initiatives.

View original post here:

Cloud Company Vultr Announces Availability of NVIDIA H100s and ... - insideHPC

Read More..