Page 1,745«..1020..1,7441,7451,7461,747..1,7501,760..»

Intel hits major milestone as it moves toward mass production of quantum computer chips – SiliconANGLE News

Intel Corp.s two primary research organizations, Intel Labs and Components Research, announced today that theyre making big progress as they work toward large-scale production of quantum computing processors.

At the 2022 Silicon Quantum Electronics Workshop in Orford, Quebec, Intels researchers said that theyve been able to demonstrate the highest reported yield and uniformity rate when manufacturing silicon spin qubit devices at the companys transistor research and development facility. The research is believed to be a key milestone for Intel as it moves toward being able to fabricate quantum computing chips on its existing transistor manufacturing processes.

Intel is a key player in the race to build quantum computers, which are more advanced machines that encode data as qubits, as opposed to the conventional bits used in traditional computers. The advantage of qubits is theyre not restricted to states of 1 or 0. They can also exist as both states at the same time, a characteristic thats known as superposition.

Thats thanks to the quirks of quantum physics. Intel likens qubits to a coin that could be heads, tails or spinning nonstop. While the coin is spinning, it can be considered as head and tail at the same time.

As Intel explains further, if a spinning coin is able to represent two states at once, then two spinning coins can represent four states: HH, TT, HT, TH. From there, the possibilities expand rapidly, with three spinning coins able to represent eight states.

Whats important to understand is that qubits ability to represent multiple states makes them vastly more powerful than traditional bits. As such, the more qubits there are in a quantum computer, the more capable the machine will be.

Whats surprising is that, as magical as these qubits might seem, theyre actually manufactured in the same way as traditional computer chips. Theyre produced on silicon wafers as spin qubits, with the biggest difference being that theyre much more fragile. They can only exist at incredibly low temperatures to maintain their stability.

Until now, most research processes have focused on creating one quantum chip at a time. Thats what Intel has done differently, instead using existing extreme ultraviolet lithography techniques to create a typical 300-millimeter wafer packed with multiple quantum chips. According to Intel, its prototypes demonstrate the strongest uniformity thus far, with a yield rate of around 95%.

An image from Intels cryoprober during automation shows the quantum qubit devices at 1.6 Kelvin, where quantum dots can be formed in all 16 locations (four sensors and 12 qubit locations) and tuned to the last (single) electron without requiring engineer input. These results, enabled by Intel-fabricated device uniformity and repeatability, were collected across the entire wafer. The system is continually operated to generate the largest set of quantum dot device data reported to date.

Intel Director of Quantum Hardware James Clarke said the research shows that the idea of fabricating quantum chips on the companys existing transistor process nodes is a sound strategy that will deliver results as the technology matures.

Because Intel has achieved higher yield and uniformity versus earlier chips, it can now use statistical process control techniques to identify areas of the fabrication process that can be optimized. In this way, it can accelerate its research efforts and hopefully scale one day to mass-produce thousands or even millions of qubits for commercial quantum computers.

In the future, we will continue to improve the quality of these devices and develop larger scale systems, with these steps serving as building blocks to help us advance quickly, Clarke said.

Holger Mueller of Constellation Research Inc. said Intel is desperate to keep making waves in terms of semiconductor innovation, even if those advances come in more obscure areas such as quantum computing. Achieving quality and high yields is key for all computer chip production, and it looks as if Intel has made a key breakthrough in terms of the quality and reliability of mass produced quantum chips, he said. Intel deserves congratulations for its work, emerging as an early leader in the development of new chip platforms that will likely be crucial in the not-so-distant future.

Read the rest here:
Intel hits major milestone as it moves toward mass production of quantum computer chips - SiliconANGLE News

Read More..

ColdQuanta Expands Leadership Team with Promotion of Chris Wood to Chief Technology Officer and Addition of New Top Talent – PR Newswire

Former VP of Photonic Technologies Ascends to CTO; Quantum Ecosystem Leader Welcomes Dr. William Clark as VP of Quantum Development, Laura Hale as VP of Government Programs and Steve Matthews as VP of Business Development for Quantum Information Platforms

BOULDER, Colo., Oct. 4, 2022 /PRNewswire/ -- ColdQuanta, the global quantum ecosystem leader, today announced it has expanded its leadership team with a stable of quantum experts including: Dr. William Clarkas Vice President of Quantum Development, Laura Haleas Vice President of Government Programs, and Steve Matthews, as Vice President of Sales & Business Development for Quantum Information Platforms. VP of Photonic Technologies, Dr. Chris Wood, has been promotedto Chief Technology Officer (CTO). Acting Chief Technology Officer, Dr. Dana Z. Anderson, will serve as Chief Strategy Officer (CSO), guiding the company's long-term quantum strategy.

These appointments come on the heels of several technical milestones, industry partnerships, and growth across the company's entire portfolio of quantum ecosystem solutions. Earlier this year ColdQuanta's quantum matter platform, Albert, launched in beta at the Laser World of Photonics Conference in Munich, where it was honored as the 2022 Prism Award winner for Quantum. Additionally, ColdQuanta announced the commercial beta launch of Hilbert, the world's first cold atom quantum computer. The company made its first acquisition of quantum software company, Super.tech.

"ColdQuanta has grown tremendously this past year, and that momentum is what attracted this talented group of respected and accomplished individuals to the company," said Scott Faris, ColdQuanta CEO. "Chris, William, Laura and Steve each bring a unique perspective and background that together with our existing leadership team will further ColdQuanta's mission to build the most robust and diversified portfolio of quantum devices and platforms."

As CTO, Wood will guide ColdQuanta's technology and new product strategy, which includes overseeing the critical transition from Research to Engineering to Product. He brings extensive familiarity with rugged, field-proven mil-spec and space-qualified solid-state lasers, Telcordia-qualified lasers, Photonic Integrated Circuits, and optical fabrication and coatings from previous jobs at Insight Lidar, Kapteyn-Murnane Laboratories, Lockheed Martin Coherent Technologies, and Precision Photonics.

Dr. Clark joins ColdQuanta from General Dynamics Mission Systems, where he was a Senior Engineering Fellow, and the Founder and Director of the Quantum Laboratory and Quantum Center of Excellence, where he explored the practical use of quantum technologies for secure and covert communications, remote sensing and signal processing. His depth of knowledge of quantum science and his passion for seeing quantum technology advance align with our shared views and values. At ColdQuanta, he'll help us transition technology into fielded systems, unlock initial commercialization success, and increase research funding.

In her role as Vice President of Government Programs, Hale brings a rich background in program, product, and systems engineering across multiple domains, including ground, space, and novel environments. Hale's career spans transformational leadership positions with NASA, the National Geospatial Intelligence Agency, the Space Development Agency, and various elements of the US Department of Defense and Intelligence Community.

Matthews joins ColdQuanta as Vice President of Sales & Business Development for Quantum Information Platforms, bringing 20 years of Enterprise Software Sales experience to his role. He previously worked at quantum computing software company, QC Ware, helping clients gain competitive advantage and prepare for disruption through a mix of professional services and software products.

About ColdQuantaColdQuanta is a global quantum technology company solving the world's most challenging problems. The company harnesses quantum mechanics to build and integrate quantum computers, sensors, and networks. From fundamental physics to leading edge commercial products, ColdQuanta enables "quantum everywhere" through our ecosystem of devices and platforms.Founded in 2007, ColdQuanta grew from decades of research in atomic physics and work at JILA, with intellectual property licensed through the University of Colorado and University of Wisconsin. ColdQuanta's scalable and versatile cold atom technology is used by world-class organizations around the globe and deployed by NASA on the International Space Station. ColdQuanta is based in Boulder, CO, with offices in Chicago, IL; Madison, WI; and Oxford, UK. Find out how ColdQuanta is building the future at http://www.coldquanta.comand on YouTube.

The name ColdQuanta and the ColdQuanta logo are both registered trademarks of ColdQuanta, Inc.

SOURCE ColdQuanta

Go here to read the rest:
ColdQuanta Expands Leadership Team with Promotion of Chris Wood to Chief Technology Officer and Addition of New Top Talent - PR Newswire

Read More..

Save big ahead of Prime Day on this mobile VPN and cybersecurity tool – Popular Science

We may earn revenue from the products available on this page and participate in affiliate programs.

Weve collectively become increasingly reliant upon our ability to connect with others virtually, and many of us store secure data in areas that also requires connectivity. But as threats to online privacy intensify it can be tough to figure out which methods are most appropriate.

For a limited time, the Deeper Connect Pico, a proven and powerful cybersecurity hardware device, is available at only $199.99 (reg. $248) when you use coupon code during our Deal Days Sale. This sale presents an alternative to Prime Day, delivering our best deals on a variety of popular products, including this one, but it will come to an end Oct. 12.

Internet security is threatened on a constant basis, making it vital to take extra precautions toward protecting the privacy and functionality of your online life. Individual hackers and collective hacking groups seek quick money and blackmail power by exploiting sensitive data, but this product presents a simple way to shut them off from access.

Carrying an Amazon rating of four stars out of five, Deeper Connect Pico provides a decentralized VPN resource and seven-layer firewall protection within a package that weights only 0.11 pounds. It is equipped with a Wi-Fi adapter, a USB-C power source, and two ethernet cables.

Deeper Connect Picos fully decentralized VPN experience features multi-routing and smart routing that allows unrestricted access to content from across the globe, regardless of regional blackouts and without sacrificing functional internet speed.

Plus, block all ads and implement parental controls with just one touch. Experience the internet the way it was meant to be explored, without restrictions, and do so easily with the simple plug-and-play setup of Deeper Connect Pico. There are no annual fees or subscriptions required.

Operate your devices with confidence and security, whether at home or on the move, with major savings on Deeper Connect Pico, available now for only $199.99no coupon neededthrough Oct. 12.

Prices subject to change.

Read the original:
Save big ahead of Prime Day on this mobile VPN and cybersecurity tool - Popular Science

Read More..

The rise of deepfakes in job interviews: Why we should be concerned – Euronews

By Susan Armstrong

If youre fearful of a future where a potential employer cant tell the difference between a real applicant and a computer-generated forgery, aka a deepfake, and offers the job to them instead of you, you have reason to be a little alarmed.

The FBIs Internet Crime Complaint Centre (IC3) released a Public Service Announcement (PSA) warning employers and job seekers about the rising risk of deepfakes during the recruitment process.

Sure, watching startlingly accurate deepfake videos of actors like Tom Cruise can be fun, albeit a little unnerving at times.Theyre so popular theres now a TikTok account dedicated entirely to them.

Theres also the brilliantly executed Spider-man: No Way Home trailer that replaces Tom Hollands face with the original Tobey Maguire.

And Korean television channel MBN showed how easily deepfakes could become part of everyday mainstream media by presenting viewers with a deepfake of its own news anchor, Kim Joo-Ha.

But the phenomenon is growing rapidly online and has the potential to become very harmful.

Earlier this year, Meta said it removed a deepfake video that claimed to show Ukrainian president Volodymyr Zelenskyy demanding Ukrainian forces to lay down their arms amid Russia's invasion.

Just as concerning is the harm that individuals could face from being targeted by deepfakes.

The use of the technology to harass or harm private individuals who do not command public attention and cannot command resources necessary to refute falsehoods should be concerning, the US Department of Homeland Security warned in a report about deepfake technology.

Now that cybercriminals are infiltrating organisations with deepfakes, this poses very damaging threats.

According to the FBI, theyre applying for working from home positions that include information technology and computer programming, database, and software related job functions. Notably, some reported positions include access to customer PII, financial data, corporate IT databases and/or proprietary information.

When you consider that more than 34 per cent of businesses around the globe are affected by insider threats yearly, the idea that these can now include deepfakes takes the problem to a whole new level, particularly when they can be hard to detect.

A study from Carnegie Mellon University says that artificial intelligence meant to detect video that has been altered can range anywhere from 30 per cent to 97 per cent in accuracy, while a report from Sensity, a threat-intelligence company based in Amsterdam, found that 86 per cent of the time, anti-deepfake technologies accepted deep fakes videos as real.

Its clear when it comes to detection, theres still a very long way to go.

So, how can companies protect themselves from the rise of deepfakes during the recruitment process?

While there is no long-term solution at present, asking candidates to display some form of official identification, recording video interviews and requiring new employees to visit company premises at least once immediately after hiring will mitigate the risks of hiring a deepfake actor.

Companies can also combat deepfakes by accelerating their digital postures, and educating employees involved in hiring processes on best practices.

The FBI, in its announcement, also offered a tip for spotting voice deepfake technology.

"In these interviews, the actions and lip movement of the person seen interviewed on-camera do not completely coordinate with the audio of the person speaking. At times, actions such as coughing, sneezing, or other auditory actions are not aligned with what is presented visually," the agency wrote.

Any company that has identified deepfake attempts should report it here.

But if youre in the market for a job, beat out the competition (real or otherwise) and apply for your dream role.

For inspiration, here are three great roles to check out, with plenty more to discover on Euronews.jobs.

TechNET IT is looking for an experienced Sales Manager to join its team of global leaders in cyber security solutions as it continues to pioneer cyber security innovation.

In the role, youll become a product specialist in threat prevention, while presenting, defining and implementing threat prevention strategies to end users and partners.

The ideal candidate will have experience working in a security or software company, plus strong selling skills, with a background in selling endpoint security solutions a bonus. If this sounds like you, click here.

Are you an experienced Credit Analyst with a curious and analytical mindset and do you want to give your career a boost?

American Express is recognised for proven excellence in employee conditions and developing talent at all levels of the organisation.

In this role, youll be performing analysis, remediation, and refresh activities to complete customer files, acting as the first line of defence to detect unusual and suspicious behaviour for the business, and raising Internal Suspicious Activity Reports (ISAR) with evidence and report to the compliance department for further investigation.

Youll need to be fluent in Dutch, English and French and live and perform your duties in the Netherlands. Know Your Customer (KYC) and Customer Due Diligence (CDD) experience is an advantage. Interested? Click here.

At Booking.com, data drives its decisions, technology is at its core and innovation is everywhere.

It is currently looking for a Senior Site Reliability Engineer to design, develop and implement systems software that improves the stability, scalability, availability and latency of the Booking.com products.

Youll need eight-plus years experience with building, operating and maintaining complex and scalable systems, solid experience in at least one programming language (Java, Python, Go, Ruby or Perl) and a solid foundation in Linux administration and troubleshooting.

In return, youll get the opportunity to contribute to a high scale, complex, world-renowned product and see the real-time impact of your work on millions of travellers worldwide. Sounds good? Click here.

If youre interested in a new role this year, check out Euronews.jobs, set up alerts and bookmark the link for regular check-ins

Visit link:
The rise of deepfakes in job interviews: Why we should be concerned - Euronews

Read More..

How Water Labbu Exploits Electron-Based Applications – Trend Micro

We discovered that the Cobalt Strike instance added a persistence registry key to load an exploit file from an online code repository controlled by Water Labbu. The repository hosted multiple exploit files of CVE-2021-21220 (a Chromium vulnerability affecting versions before 89.0.4389.128) to execute a Cobalt Strike stager. It also contained files designed to target Meiqia (), a Chinese desktop-based live chat app for online customer support that is used on websites. MeiQia () was developed using ElectronJS a framework that employs Chromium core, and therefore is vulnerable to Chromiums vulnerabilities.

We observed that many cryptocurrency scam websites that were compromised in this campaign also embedded Meiqia to provide an option for easy communication with potential victims. This association suggests that Water Labbu likely sends the exploit via the live chat box. To support this claim, we found an exploit HTML file sample containing a screenshot that looks like a withdrawal confirmation for cryptocurrency funds. If scammers open the exploit page in an old vulnerable version of the Meiqia management client application, its possible that they might get infected by Water Labbu.

The infection is initiated when) the initial scammer (in essence, the victim) opens a weaponized webpage (likely sent to them via livechat). A recent research paper on Electron security demonstrated a successful exploitation of an Electron-based application using CVE-2021-21220. In this scenario, it leveraged cross-site scripting (XSS) techniques to force the exploit to be rendered in a window without sandboxing.

We found weaponized HTML pages created by Water Labbu that leverages the same Chromium vulnerability to attack the MeiQia application. The initial scammers used an old version of MeiQia, which might be vulnerable to exploits. Review of the code shows that old versions of MeiQia open external links inside their ElectronJS applications and render the web page without sandboxing. The latest version of MeiQia is not vulnerable because it runs on the newer version of Chromium core and also opens the external links, not inside the ElectronJS app, but via the default system web browser.

The weaponized HTML pages contain JavaScript that uses the User-Agent to identify whether the environment of the victim is vulnerable. The script detects strings such as electron and x64 to discover Electron-based applications and x64 architecture. It also detects the strings 0.0.8 Chrome/83, s/0.0.7, or s/0.0.6, to identify if it is running inside a vulnerable version of Chromium or MeiQia application. If the User-Agent does not match, it will either redirect victims to the official MeiQia website or create a new iframe to load screenshots from banking or cryptocurrency transactions. Its likely that these are the lures Water Labbu used to communicate with the targeted cryptocurrency scam websites.

When the weaponized HTML pages detect a vulnerable target, it will proceed with loading additional stages of the attack.

The last stage involves the creation and loading of a new script called tongji.js, which in Chinese means (to deliver a punishing attack). These files are hosted inside Water Labbus code repository. The tongji.js script is a JavaScript containing CVE-2021-21220 exploit code, with a shellcode that is a Cobalt Strike stager. The Metasploit module for this vulnerability is publicly available. Water Labbu reuses the available code, obfuscates it with one or more layers of obfuscation (sojson.v4, jsjiami.com.v5), before executing the custom shellcode.

The embedded shellcode can either be a Cobalt Strike stager or a complex batch command capable of stealing credentials, and downloading and running other scripts and files.

Regardless if the embedded shellcode is the stager or the custom batch script, we noticed that the set of malicious operations that were being performed were largely the same:

1) Download and install Cobalt Strike2) Steal cookies and other important files3) Download and patch the MeiQia app4) Download additional spying software5) Provide information about the infection progress by communicating with the report-collecting server, among others

The Cobalt Stike stager is usually encrypted (XOR, AES), encoded (Base64, hexadecimal), and embedded into a Golang shellcode runner to make payload detection more difficult. The malware operator was likely inspired by this blog post.

It attempts to steal *.txt files in desktop, Telegram Desktop, and MeiQia cookies in AppDataRoamingcom.meiqia.windowscookies. These files are included in a specially crafted .html file and submitted to the information-collecting server with the help of headless Chrome (without visible UI) or Internet Explorer (if submission with Chrome fails). The specially crafted .html file contains one form, one input text with the computer name, and one text area with stolen content. After the timeout expires, the script will automatically submit the content to a typosquatting domain.

If Cobalt Strike has not been installed yet, then it is downloaded and executed. The Golang shellcode runner is used as a form of obfuscation.

To learn more about the success or failure of the infection progress, parameters such as COMPUTERNAME and USERNAME are exfiltrated to the report-collecting server. In case of failure, the server may call the following requests:

If the MeiQia app is not found, the error report with parameter a is sent. If the app is found and is unpatched, the error report with parameter b is sent. If the discretionary access control list modifications with icacls fails, the error report with parameter z is sent.

Meanwhile, another script checks if the process 360tray belonging to the 360 Total Security solution is running:

In some cases, we also noticed DNS and HTTP monitoring platforms such as ceye.io being used to collect information about the infection progress:

If necessary, this batch script will download a vulnerable version of Chrome (89.0.4389.114) and/or an-already patched MeiQia application from a repository found on a popular version control site. These files are downloaded and extracted to the infected system.

The script modifies the Run registry key for persistence, with the persistent command being chrome.exe --headless --no-sandbox --user-data-dir= . Since the script installed a vulnerable version of Chrome, the next reboot of the operating system causes the exploitation of the vulnerability and execution of the embedded shellcode (either Cobalt Strike or a custom one).

This script adds a certificate to Trusted Root by via the certutil utility:

The script installs a certificate with the filename "mitmproxy-ca-cert.pem" into Trusted Root. Although we dont have the certificate file, It's likely that it is generated by mitmproxy tool due to its file name.

It then modifies the AutoConfigURL setting in HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings. These settings allow a user to specify certain domains to have their traffic forwarded through a proxy. With the help of a malicious certificate installed in the root directory, an attacker will be able to decrypt HTTPS encrypted traffic and steal entered credentials.

The additional scripts perform the following:

a) Hiding windows with the title windows update.b) Downloading and running osmonitor, a tool for spying on victims and monitoring their behavior.c) Patching the MeiQia app, either by downloading an already-patched app0.2.asar archive and replacing it, or by running a patcher scriptd) Restarting the MeiQia app to start the patched versione) Stealing *.txt and *.xl* files from Recent Files, steals *.lnk, *.txt, *.xl* files from Desktop, and adds a list of processes and list of active network connections before packing these into a zip archive and uploading it to an OS information-collecting server

The process of patching MeiQia involves changing files in the app.asar archive. In our scenario, the .modulescreate-window.js file from the app.asar archive was modified. The modifications included:

a) Disabling auto updatesb) Setting fixed window sizesc) Replacing the default URL (https://app.meiqia.com) with a malicious oned) Embedding additional JavaScript files to be executed within the MeiQia application context

When victims open a new MeiQia window, the script injected to the internal function new-window will check the title of the web page. If the title doesnt contain the string (MeiQia), it will redirect victims to the official MeiQia website and execute additional JavaScript files within the page.

During our research, we discovered that many of the links used for loading additional scripts were no longer active. However, one of the links loading a script called apo.js ( = mother-in-law) from their code repository was still available.

If the title contains the Chinese string (dng l = login), the script will try to grab the value of DOM elements with the IDs email and password and send the grabbed data to the remote server app[.]meiqiacontents[.]com. If the title contains the Chinese word (Mei), it will collect the websites cookies and send them to the same remote server.

When victims open a new window without specifying any URL to load, the new window will load the default URL of the application (APP_URL), which has also been replaced with a malicious URL hosted on the delivery server mmmm[.]whg7[.]cc. The delivery server will only respond when the User-Agent contains the string Electron to ensure that it is sent from an Electron application.

The request to the malicious URL responds with a code that redirects to the MeiQia apps original default URL. At the same time, it creates a small new window to load another URL that will perform several redirections before finally attempting to exploit CVE-2021-21220 to launch a Cobalt Strike stager.

Water Labbu registered the typosquatting domain name meiqla.com (compared to the legitimate meiqia.com). Although the website looks visually identical to the legitimate one, there is one noteworthy malicious feature.

Figure 14 shows how the function lc() reads the user-entered email and password and exfiltrates them to an information-recording PHP script before redirecting victims to the legitimate meiqia.com website.

Water Labbu is a dangerous new threat actor with a complex routine and infrastructure that isnt afraid to leverage the schemes of other scammers for its own ends, exploiting live chat applications on preexisting scam websites that were developed using the ElectronJS framework.

A key part of the threat actors routine is the exploitation of a known Chromium vulnerability to target scammers who use an unpatched version of the MeiQia app. Given that users are dealing not only with the original scammer, but with Water Labbu as well, we advise both individuals and organizations to update their applications and systems to the latest secure versions to prevent vulnerable software from being exploited and used in malicious ways.

Read the first part of our Water Labbu series to learn more about how the threat actor compromises Dapps for their own purposes.

The indicators of compromise for this blog entry can be found here.

Read more here:
How Water Labbu Exploits Electron-Based Applications - Trend Micro

Read More..

Section 230 heads to the Supreme Court – Columbia Journalism Review

For the past several years, critics across the political spectrum have argued that Section 230 of the Communications Decency Act of 1996 gives social-media platforms such as Facebook, Twitter, and YouTube too much protection from legal liability for the content that they host. Conservative critics argue, despite a lack of evidence, that Section 230 allows social-media companies to censor likeminded thinkers and groups without recourse, and liberal critics say the platforms use Section 230 as an excuse not to remove things they should be taking down, such as misinformation and hate speech. Before the 2020 election, Joe Biden said he would abolish Section 230 if he became president; since taking office, he has made similar statements, including that the clause should be revoked immediately.

This week, the Supreme Court announced that it would hear two cases that are looking to chip away at Section 230 legal protections. At the core ofone case is the claim that Googles YouTube service violated the federal Anti-Terrorism Act by recommending videos featuring the ISIS terrorist group, and that these videos helped lead to the death of Nohemi Gonzalez, a 23-year-old US citizen who was killed in an ISIS attack in Paris in 2015. In the lawsuit, filed in 2016, Gonzalezs family claims that while Section 230 protects YouTube from liability for hosting such content, it doesnt protect the company from liability for promoting that content with its algorithms. The second case involves Twitter, which was also sued for violating the Anti-Terrorism Act; the family of Nawras Alassaf claimed ISIS-related content on Twitter contributed to his death in a terrorist attack in 2017.

In recent years, the Supreme Court has declined to hear similar casesincluding, in March, a decision by a lower court that found Facebook was not liable for helping a man traffick a woman for sex. While Justice Clarence Thomas agreed with the decision not to hear that case, he also wrote that the court should consider the issue of the proper scope of immunity under Section 230. Assuming Congress does not step in to clarify Section 230s scope, we should do so in an appropriate case, Thomas wrote. It is hard to see why the protection that Section 230 grants publishers against being held strictly liable for third parties content should protect Facebook from liability for its own acts and omissions.

Thomas has made similar comments in a number of other decisions. In 2020, the Supreme Court declined to hear a case in which Enigma Software argued that MalwareBytes, an internet security company, should be liable for calling Enigmas products malware. Although he agreed with that decision, Thomas went on at length about what he described as a movement to use Section 230 to confer sweeping immunity on some of the largest companies in the world. He also suggested he agreed with an opinion from a lower-court judge, in a case in which Facebook was sued for terrorist content. The opinion said it strains the English language to say that in targeting and recommending these writings to users Facebook is acting as the publisher of information provided by another information content provider.'

Jeff Kosseff, a cybersecurity law professor at the US Naval Academy and the author of a book on Section 230, told the Washington Post that, with the Supreme Court considering these questions, the entire scope of Section 230 could be at stake. The Post also noted that it will be the first time the court has considered whether there is a distinction between content that is hosted and content recommended by algorithms. Eric Goldman, co-director of the High Tech Law Institute at Santa Clara University, told the Post that such a division is actually a false dichotomy, and that the process of recommending content is one of the traditional editorial functions of a social-media network. In that sense, he told the Post, the question presented goes to the very heart of Section 230.

While Section 230 gets most of the attention, it isnt the only protection the platforms have. A feature on hate speech in the New York Times described Section 230 as the main reason why such speech exists online, but later added a correction clarifying that the First Amendment also protects online speech. Even if the Supreme Court decides Section 230 doesnt protect the platforms when it comes to terrorist content, Facebook and Twitter could argue with some justification that the First Amendment does. To the extent that people want to force social media companies to leave certain speech up, or to boost certain content, or ensure any individuals continuing access to a platform, their problem isnt Section 230, Mary Anne Franks, a professor of law at the University of Miami, said during a discussion of Section 230 on CJRs Galley platform last year. Its the First Amendment.

This argument is at the heart of another case the Supreme Court was recently asked to hear, involving a Florida law designed to control how the platforms moderate content. The law was struck down by the Eleventh Circuit Court of Appeals in May as unconstitutional, since the court ruled that moderation decisions are an exercise of the platforms First Amendment rights. A similar law passed in Texas, however, was upheld in a decision earlier this month, one that explicitly rejected the First Amendment defense. Now the Supreme Court has the opportunity to decide the extent to which Section 230 and the First Amendment cover the platforms moderation and content choices.

Heres more on Section 230:

Other notable stories:

TOP IMAGE: Members of the US Supreme Court. Erin Schaff/The New York Times via AP

Visit link:
Section 230 heads to the Supreme Court - Columbia Journalism Review

Read More..

Save over 60% with this exclusive Trend Micro security deal – TechRadar

When it comes picking the best antivirus and online security software, Trend Micro may not be the first name you think of - despite having passed at full marks the latest AV-Test (opens in new tab) checks on both PC and mobile. And, the good news is that you won't even have to invest the big bucks to enjoy its top-notch protection.

Usually costing $129.95 for a one-year subscription, Trend Micro Premium Security suite now comes with a 53% discount dropping to just $59.95 (opens in new tab) for a full protection of up to 10 devices at once.

If that would not be enough of a bargain, TechRadar readers have even the chance to lower the price down by a further 10%. How? Simply add the exclusive code techradar10at the checkout. This breaks down to a total saving of more than $75.

The Premium Security suite is packed with a huge array of security features and tools to secure your devices against almost all the dangers you can face online: from viruses and ransomware to online scams, malicious websites, data leaks and identity theft.

Keep reading for more details about this tempting offer and a closer look to all the features included with the Trend Micro Premium Security plan.

This security package covers up to 10 devices at the same time with a single subscription - no matter if you are using a Windows, Mac, Android, iOS or Chromebook. Here's a sample of the features you get with the Trend Micro Premium Security suite:

Laptop security: full protection for your Windows, Mac and Chromebook device against ransomware, viruses, and dangerous websites.

Mobile security: prevent malicious apps, ransomware, unprotected Wi-Fi, and dangerous websites from infecting both your Android and iOS smartphone.

Password Manager: say goodbye to vulnerable passwords and keylogging malware, measuring password strength and keeping these secure.

Anti-scam tool: enhanced protection against internet or email scams, and from fraudulent websites attempting to steal your financial and personal data when shopping and banking online.

Performance optimization: helps you to identify and fix common problems with your system that may be slowing down your devices.

ID security: get notifications if personal information like email address, credit card number, passwords, or bank account details are found on the dark web.

Personal VPN: secure and encrypt your online connections and communications with its VPN Proxy One Pro, especially when you connect to a public Wi-Fi.

Premium support: enjoy the support of security experts with its 24/7 technical customer service, PC security health check, remote diagnosis and repair.

Today's best Trend Micro Premium Security Suite deals

See more here:
Save over 60% with this exclusive Trend Micro security deal - TechRadar

Read More..

Bitcoins Philosophy And Political Promise Of Borderlessness And Solving Inefficiencies – Forbes

Bitcoin BTC is not just a decentralized peer-to-peer electronic cash system. Theres more. It is a new way of thinking about economics, philosophy, politics, human rights, and society.

Hungarian sculptors and creators Reka Gergely (L) and Tamas Gilly (R) pose next to the statue of ... [+] Satoshi Nakamoto, the mysterious inventor of the virtual currency bitcoin, after its unveiling at the Graphisoft Park in Budapest, on September 16, 2021. - Hungarian bitcoin enthusiasts unveiled a statue on September 16 in Budapest that they say is the first in the world to honour Satoshi Nakamoto, the mysterious inventor of the virtual currency. The bronze life-size sculpture depicts a hooded figure with stylised facial features, alluding to Nakamoto, a pseudonym credited as bitcoin's founder, but whose identity remains unknown. (Photo by ATTILA KISBENEDEK / AFP) (Photo by ATTILA KISBENEDEK/AFP via Getty Images)

Most of the literature I have read about Bitcoin majorly focuses on Bitcoin as a store of value, a medium of exchange, an investment vehicle, a shield against government overreach, and more. However, there is less literature about the philosophy of Bitcoin and the politics it represents.

Modern political systems have made it harder for individuals to focus on what they do. Besides working hard to create value and store that value for future use, the global citizen has to work twice as hard thinking about money and how it can be tweaked to preserve value and or grow value.

This is mainly because the political systems are anchored around the control of fiat money and cannot control the temptation to increase supply while the citizens bear the burden of increased inflation and cyclical recessions.

The average global citizen does not have complete freedom to do what they do best because they must divert their attention to the subject of money. They understand that inflation erodes their purchasing power over time and that they must devote a significant portion of their income to hiring money managers to invest their money.

Alternatively, they actively invest their money in the markets, which is tedious and time-consuming. A larger proportion delegate the function by staking their money in financial institutions and financial instruments that rarely beat inflation.

What if there was an efficient store of value? Would this make the global citizen free to focus on value creation in whatever they do best?

In my opinion, Bitcoin's philosophy is based on freedom and borderlessness. If it eventually acts as a stable store of value, which it has achieved over a 4-year time horizon and failed under that time horizon, the global citizen will have more freedom to focus on what they do best without handing over control to a third party or spending significant time managing their store of value.

Bitcoin is borderless. It cruises through multiple jurisdictions and perhaps planets, well, if Elon Musk's mission succeeds. It presents a strong case for solving global inefficiencies associated with different states using different fiat currencies of varying quality.

For instance, the emigration problem, where people living in countries where there is bad money move to countries with perceived better money, can be evened out with Bitcoin adoption. For people working in the digital space, cryptocurrency payments (not just Bitcoin) have begun to solve the income inequality problem. Developers, content creators, artists, and other online workers have begun to close the pay gap regardless of where they are located.

In Bitcoins philosophy, an individuals country of birth or residence should not dictate their economic outcome. When they work hard to create value, they should be able to store and build value on a relatively fair playground. A truck driver in a country like Nigeria should have a similar level of financial outcome to a truck driver in, say, the UK. The value created should be borderless.

The inefficiencies resulting from the different quality of fiat curencies and government systems should be solved with wider Bitcoin adoption. For instance, an investor looking to invest in a coffee shop in a busy city like New York or Nairobi should find it easier to allocate capital to either without worrying about the influence of the fiat currency used in the two jurisdictions or the governance systems that apply. Bitcoin makes it possible to invest borderlessly without the headwinds associated with traditional financial institutions and systems.

In Zimbabwe, annual inflation was over 250% in July, and the central bank raised interest rates to 200% to combat the high inflation. What type of business can thrive in such an environment? I am confident that there are great businesses in Zimbabwe that solve critical societal problems, and they deserve to be able to access finance at competitive rates. As a result, they would price their products more competitively, resulting in lower inflation.

The lack of political influence on Bitcoins supply makes it the hardest asset on earth. This means that, as adoption grows, the value goes higher since supply is capped. This eliminates the possibility that political elites could print more like they do with fiat currencies leading to hyperinflation and later recessions. It also makes Bitcoin a trusted store of value and medum of exchange. Where am I going with this?

With wider institutional adoption, the political promise of Bitcoin is solving inefficiencies. For instance, according to the United Nations, the world produces sufficient food to feed all humanity. However, the wastage and inefficiencies in storage and distribution leave an estimated 800 million people hungry or malnourished.

For instance, with Bitcoins borderlessness, investments can be made in regions where there is excess food production at lower costs to improve standards, storage, and distribution channels. This would reduce food wastage and lower food costs across the world. However, the current financial systems make it harder due to taxation, currency devaluation, and poor access to financing.

This promise of borderlessness is already being experienced in energy production and distribution. Bitcoin miners are investing in regions that have excess power production at low costs and redistributing this value in other areas. In addition, some miners are acting as grid stabilizers where they consume excess energy when demand is low and switch off when demand is high thereby helping power producers earn value during both high-demand and low-demand grid cycles.

At a macro level, the capitalist Keynesian system that led to central banks printing trilions of cash during the pandemic led to the current high inflation environment that we are experiencing today. Though it helped people survive, to a degree, during the pandemic, the spillover effects have led to the poor people becoming poorer and the rich getting richer.

The Bitcoin plebs that understand the philosophy of Bitcoin have been accumulating Satoshis at lower valuations since they understand the fundamentals. They are able to store value in peace while focusing on doing what they do best. They are not worried that the FED is going to reverse course and print more dollars thereby devaluing their stored value. They have become sovereign individuals.

In my article about how Bitcoin is helping people become sovereign individuals, I explained the issue of borderlessness when it comes to spending your value, storing, and achieving a level playing ground for everyone.

Disclosure: I own bitcoin and other cryptocurrencies.

Read the original:
Bitcoins Philosophy And Political Promise Of Borderlessness And Solving Inefficiencies - Forbes

Read More..

What is Bitcoin hash rate and why does it matter? – Cointelegraph

The SHA-256 cryptographic hashing function, which converts any input data into a 256-bit string (the hash), is one of the technologies using which Bitcoin measures its hash rate. Due to the one-way nature of this function, it is simple to determine the hash from an input but not the other way around.

A hash rate, which can be expressed in billions, trillions, quadrillions and quintillions, is a measurement of how many calculations can be carried out each second. For instance, a hash rate of 1BH/s indicates that one billion estimates can be made each second. But, how is Bitcoin’s hash rate measured? Exahashes per second (EH/s) that are equivalent to one quintillion hashes are used to express the hash rate of BTC. By comparing the average time between mined blocks with the network difficulty at a particular time, the overall network hash rate may be roughly calculated.

So, what is mining difficulty? The mining challenge refers to how tough it is for miners to generate a hash lower than the desired hash, which is accomplished by lowering the hashed block header’s numerical value. On average, a new block (Bitcoin) is found every ten minutes. However, if BTC is discovered less frequently than the average time, the difficulty decreases or vice-versa.

Furthermore, it is essential to note that the Bitcoin network’s mining difficulty is automatically changed after 2,016 blocks have been mined. Therefore, depending on the number of miners and their total hashing power in the mining network, the difficulty can be adjusted either higher or downwards. So, what is Bitcoin’s current hash rate?

Although the precise hashing power of Bitcoin is unknown, it can be inferred from the number of blocks currently being mined and the level of block difficulty. So, how to monitor Bitcoin’s hash rate? Blockhain.com offers estimates about Bitcoin’s current hash rate, which is 224.383m TH/s as of September 25, 2022.

Go here to read the rest:
What is Bitcoin hash rate and why does it matter? - Cointelegraph

Read More..

Ex-Ripple Top Developer Tells Sad Truth About Bitcoin, Here’s What It Is – U.Today

Gamza Khanzadaev

Ex-Ripple top developer shares controversial opinion on Bitcoin

In explaining the difference between Bitcoin and other cryptocurrencies, Matt Hamilton, former director of development at Ripple, approached the answer from a nonstandard angle.

Thus, the developer stated that the main difference is that Bitcoin revolutionized and proved the concept of artificial digital scarcity, but now other cryptocurrencies rule the ball. All new developments, innovations and business models are now being built and shaped not based on Bitcoin, said Hamilton.

This is not to say that Bitcoin technology is not being addressed. For example, Lightning Labs, the company behind the Lightning Network infrastructure, recently released a test version of Taro, a new software that will allow BTC developers to create, send and receive assets on the Bitcoin blockchain.

Ads

Michael Saylor, being a well-known Bitcoin maximalist, is also not staying away and, as has recently become known, is looking for a software engineer for MicroStrategy to build a SaaS platform based on the Lightning Network.

Bitcoin's share of the total crypto market capitalization remains quite high. At $916 billion, Bitcoin accounts for $381.4 billion. Bitcoin's dominance has also reached a comfortable level, at 41.75%, having been here since it hit its 2018 lows in early September.

In summary, it is hard to say whether Bitcoin's time has passed, but for now it remains the main cryptocurrency on the market and even seems to have a chance to continue its technological development.

Read more:
Ex-Ripple Top Developer Tells Sad Truth About Bitcoin, Here's What It Is - U.Today

Read More..