Page 1,868«..1020..1,8671,8681,8691,870..1,8801,890..»

DeepMind feuds with Russian scientists over quantum AI research – TNW

Theres nothing quite so dramatic and inspirational as a scientific breakthrough. But what happens when different groups of scientists cant seem to agree on the science?

DeepMind, an Alphabet research company based in London, published a fascinating research paper last year wherein it claimed to have solved the huge challenge of simulating matter on the quantum scale with AI. Now, nearly eight months later, a group of academic researchers from Russia and South Korea may have uncovered a problem with the original research that places the papers entire conclusion in doubt.

The implications for this cutting-edge research could be huge, if the papers conclusions are true. In essence, were talking about the potential to use artificial intelligence to discover new ways to manipulate the building blocks of matter.

Subscribe to our newsletter now for a weekly recap of our favorite AI stories in your inbox.

The big idea here involves being able to simulate quantum interactions. Our world is made up of matter which is made up of molecules that are made up of atoms. At each level of abstraction, it becomes harder and harder to simulate.

By the time you reach the quantum level, which exists inside of atoms, the problem of simulating potential interactions becomes incredibly challenging.

Per a blog post from DeepMind:

To do this on a computer requires the simulation of electrons, the subatomic particles that govern how atoms bond to form molecules and are also responsible for the flow of electricity in solids.

Despite decades of effort and several significant advances, accurately modelling the quantum mechanical behaviour of electrons remains an open challenge.

The basic problem is that its really hard to predict the probabilities of a given electron ending up in a specific position. And the complexity increases the more you add.

As DeepMind pointed out in the same blog post, a pair of physicists back in the 1960s came up with a breakthrough:

Pierre Hohenberg and Walter Kohn realised that it is not necessary to track each electron individually. Instead, knowing the probability for any electron to be at each position (i.e., the electron density) is sufficient to exactly compute all interactions. Kohn received a Nobel Prize in Chemistry after proving this, thus founding Density Functional Theory (DFT).

Unfortunately, DFT could only simplify the process so far. The functional part of the theory relied on humans to do all the heavy lifting.

That all changed back in December when DeepMind published a paper entitled Pushing the frontiers of density functionals by solving the fractional electron problem.

In this paper, the DeepMind team claims to have radically improved current methods for modeling quantum behavior through the development of a neural network:

By expressing the functional as a neural network and incorporating these exact properties into the training data, we learn functionals free from important systematic errors resulting in a better description of a broad class of chemical reactions.

DeepMinds paper made it through the initial, formal review process and all was well. Until August 2022 rolled around and a team of eight academics from Russia and South Korea published a comment questioning its conclusion.

Per a press release from Skolkovo Institute of Science and Technology:

DeepMind AIs ability to generalize the behavior of such systems does not follow from the published results and requires revisiting.

In other words: the academics are disputing how DeepMinds AI came to its conclusions.

According to the commenting researchers, the training process that DeepMind used to build its neural network taught it how to memorize the answers to the specific problems it was going to face during benchmarking the process by which scientists determine if one approach is better than another.

In their comment, the researchers write:

Although the conclusion of Kirkpatrick et al. about the role of FC/FS systems in the training set may be correct, it is not the only possible explanation for their observations.

In our opinion, the improvements in the performance of DM21 on the BBB test dataset relative to DM21m may be caused by a much more prosaic reason: an unintended overlap between the training and test datasets.

If this is true, it would mean DeepMind didnt actually teach a neural network to predict quantum mechanics.

DeepMind was quick to respond. The company published its response on the same day as the comment and provided an immediate and firm rebuke:

We disagree with their analysis and believe that the points raised are either incorrect or not relevant to the main conclusions of the paper and to the assessment of general quality of DM21.

The team expands on this throughout its retort:

DM21 is not memorizing the data; this is simply shown by the fact that the DM21 Exc changes over the full range of distances considered in BBB and is not equal to the infinite separation limit, as shown in Fig. 1, A and B, for H2+ and H2. For example, at 6 , the DM21 Exc is ~13 kcal/mol from the infinite limit in both H2+ and H2 (although in opposite directions).

And, while its beyond the scope of this article to explain the above jargon, we can safely assume that DeepMind was likely prepared for that particular objection.

As to whether that solves the problem remains to be seen. At this point, weve yet to see further rebuttal from the academic team to see if their concerns have been assuaged.

In the meantime, its possible that the ramifications of this discussion could go far beyond just affecting a single research paper.

As the fields of artificial intelligence and quantum science become increasingly intertwined, theyre also becoming more and more dominated by corporate research tanks with deep pockets.

What happens when theres a scientific deadlock opposing sides are unable to agree on the efficacy of a given technological approach via the scientific method and corporate interests come into play?

The core of the problem could lie in the inability to explain how AI models crunch the numbers to come to the conclusions they do.

These systems can go through millions of permutations before outputting an answer. It would be impossible to explain every step of the process, which is exactly why we need algorithmic shortcuts and AI to brute force mass-scale problems that would be too large for a human or computer to solve head on.

Eventually, as AI systems continue to scale, we could reach a point where we no longer have the tools necessary to understand how they work. When this happens, we could see a divergence between corporate technology and that which passes external peer review.

Thats not to say DeepMinds paper is an example of this. As the commenting academic team wrote in their press release:

The usage of fractional-electrons systems in the training set is not the only novelty in the work by DeepMind. Their idea of introducing the physical constraints into a neural network via the training set, as well as the approach for imposing physical sense through training on the correct chemical potential, are likely to be widely used in construction of neural network DFT functionals in the future.

But were experiencing a bold, new, AI-powered technology paradigm. Its probably time we started considering what the future looks like in a post-peer-review world.

Continued here:
DeepMind feuds with Russian scientists over quantum AI research - TNW

Read More..

Going deep inside the mind of Lincoln Riley on The Riley Files – Trojans Wire

Were almost there. Our 12-part summer podcast series on Lincoln Riley, The Riley Files, has arrived at Episode 11. We look at the thought processes, the emotional disposition, and personal inclinations of USCs head coach.

We turned to Oklahoma insider Kegan Reneau for more insights on the person, the public figure, the coach, and what makes him tick.

We discussed the media interviews Riley gave earlier this offseason, wondering why Riley gave what would widely be considered very generic and bland coach-speak. Why speak in such a coded way while making such an effort to talk to numerous media outlets? What was the strategy or purpose behind these decisions from Riley? What does this say about his relationship with the media, and how he manages a football program during the season?

Examining his Oklahoma years offers a basis for understanding more about this very complicated man. This is one of the cornerstone reasons for launching The Riley Files podcast series in the first place: to take you inside his mind and give you the assessment of a journalist who covered him up close for several years. Its a level of insight we wanted to bring to you at Trojans Wire.

Only one episode remains in our special series.

Ian Hest, as always, produced this latest show:

View post:
Going deep inside the mind of Lincoln Riley on The Riley Files - Trojans Wire

Read More..

A Head Spa Trip Cleared My Scalp and My Mind Read Review of the Japanese Scalp Treatment – Allure

Somewhere along the way, I fell asleep. Borges continued the treatment, but I was a goner. I'm not a big dreamer these days I chalk it up to stress, plus a mattress that needs replacing but something about the service set me off. I dreamed of colors, swirling purples and forest green fireworks, sort of like those old school PC screensavers. I got lost in repeated images, and succumbed to total tranquility. (Apologies to my editor, who'd been Slacking my powered-down phone the entire time.)

Just before the end, my hair marinated in a mask Borges made especially for my scalp from a mixture of mahogany wood and organic sage, which she often uses on guests with oily scalp, as the ingredients help to rebalance sebum.

I woke up with a full layer of drool around my lips. But once the treatment was over, my scalp told a different story. Once again, Borges showed me the camera-view of my follicles, and the sebum we'd noticed just an hour before vanished. My head felt clean maybe the cleanest I've ever noticed it. I could feel smoother skin on my scalp, and you could have probably seen your reflection in my hair, that's how shiny it was. We finished it up with a simple blowout, and I was out the door.

At $220, the service is a little cost-prohibitive to regularly maintain on my editor's salary (yes, I paid for it in full no writer freebies here). But if I had Upper West Side money, I'd go every month. Borges tells me that a head spa "can be found in almost any Japanese salon," so I might shop around and try other treatments. "Just like how all salons offer cute, blowout, color, or keratin, pretty much all Japanese salons have a head spa on their menu, too," Borges added. So even if your favorite TikTok head spa practitioner is miles away, you may be able to find a treatment at a nearby J-beauty spa.

After my service, I went back to the real world, the one filled with hot concrete and steaming subways and impending deadlines. Still I felt much lighter both on my scalp and in my mind.

More:
A Head Spa Trip Cleared My Scalp and My Mind Read Review of the Japanese Scalp Treatment - Allure

Read More..

Rod Wave: Beautiful Mind Album Review – Pitchfork

On the afternoon of June 13, Rod Wave declared that his latest project Beautiful Mind would be his last sad ass album. Calling the Florida rappers music sad is an understatementhis songs plumb the depths of physical, financial, and emotional pain so intensely it can feel like hes perpetually stuck underneath a rain cloud. Since at least 2017s Mike Tyson, the triumphant boom of his voice has separated him from the legions of other rap crooners leaving their hearts in their Notes apps. Across three studio albums, Rod Wave has perfected his brand of rain cloud rap, in the mold of mentor Kevin Gates if his ears were stuck on the blues hymns of the Mississippi Delta. Much of Beautiful Mind follows this blueprint, but there are more specks of joy and optimism than before, a yearning to move beyond the hurdles and embrace new life experiences. If hes as ready to live happy travel [and] get dis money as he claims, then Beautiful Mind makes a case as his most hopeful album to date.

That hope relies on a formula hes polished before. Rod Wave songs tend to span a handful of subjectsbad memories, getting money, navigating haters, reminiscing on lost love, or any combination of the four. But it didnt matter how many times youd heard him sing about waiting at bus stops with headphones in; he sells these tried and true stories with conviction. Beautiful Mind adds a few more stories to his narrative vision board, giving Wave more chances to look forward. Stone Rolling starts with family problems but ends with a journey that stretches across the United States, from smoking sessions with Sauce Walka in Houston to a fantasy of settling down in the Carolina countryside with his children. His spirited performance on standout Yungen matches his dumbfounded lyrics about amassing a fanbase paralleled by sampled news footage of a crowded Miami concert where some ticket buyers were forced to listen from outside the venue. You cant say that he isnt at least counting his blessings more.

The variety is welcome, but its not varied enough to prevent many of the two dozen tracks from bleeding together. For every plea of hopeless romance like Married Next Year or Never Find Us, there are several bids for Wave to brood about picking up women in hotel rooms across the country like Never Get Over Me or Pieces. Sometimes, like the moment he remembers Eviction letters traumatized me even though it was sunny on Better, his writing is detailed and intimate. Other times, like on Rockstar Heart, Wave sounds more like the loudest kid in class reading a rushed What I Did This Summer essay.

See more here:
Rod Wave: Beautiful Mind Album Review - Pitchfork

Read More..

When we might meet the first intelligent machines – VentureBeat

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

How close are we to living in a world where human-level intelligence is exceeded by machines? Over the course of my career, Ive regularly engaged in a thought experiment where I try to think like the computer in order to imagine a solution to a programming challenge or opportunity. The gulf between human reasoning and software code was always pretty clear.

Then, a few weeks ago, after conversing with the LaMDA chatbot for several months, now former Google AI engineer Blake Lemoine saidhe thought LaMDA was sentient [subscription required]. Two days before Lemoines announcement, Pulitzer Prize-winning AI pioneer and cognitive scientist Douglas Hofstadterwrote an article saying [subscription required] that artificial neural networks (the software technology behind LaMDA) are not conscious. He also came to that conclusion after a series of conversations with another powerful AI chatbot named GPT-3. Hofstadter ended the article by estimating that we are still decades away from machine consciousness.

A few weeks later, Yann LeCun, the chief scientist at Metas artificial intelligence (AI) Lab and winner of the 2018 Turing Award, released a paper titled A Path Towards Autonomous Machine Intelligence. He shares in the paper an architecture that goes beyond consciousness and sentience to propose a pathway to programming an AI with the ability to reason and plan like humans. Researchers call this artificial general intelligence or AGI.

I think we will come to regard LeCuns paper with the same reverence that we reserve today for Alan Turings1936 paperthat described the architecture for the modern digital computer. Heres why.

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

LeCuns first breakthrough is in imagining a way past the limitations of todays specialized AIs with his concept of a world model. This is made possible in part by the invention of a hierarchical architecture for predictive models that learn to represent the world at multiple levels of abstraction and over multiple time scales.

With this world model, we can predict possible future states by simulating action sequences. In the paper, he notes,This may enable reasoning by analogy, by applying the model configured for one situation to another situation.

This brings us to the second major innovation in LeCuns paper. As he notes,One can imagine a generic world model for the environment with a small portion of the parameters being modulated by the congurator for the task at hand.He leaves open the question of how the congurator learns to decompose a complex task into a sequence of subgoals.But this is basically how the human mind uses analogies.

For example, imagine if you woke up this morning in a hotel room and had to operate the shower in the room for the first time. Chances are that you rapidly broke up the task into a series of subgoals by drawing on analogies learned by operating other showers. First, determine how to turn on the water using the handle, then confirm which direction to turn the handle to make the water warmer, etc. You could ignore the vast majority of data points in the room to focus on just a few that are relevant to those goals.

The third major advance is the most powerful. LeCuns architecture runs on a self-supervised learning paradigm. This means that the AI is able to learn by itself by watching videos, reading text, interacting with humans, processing sensor data or processing any other input source. Most AIs today must be trained on a diet of specially labeled data prepared by human trainers.

Googles DeepMindjust released a public databaseproduced by their AlphaFold AI. It contains the estimated shape of nearly all 200 million proteins known to science. Previously, it took researchers 3-5 years to predict the shape of just one protein experimentally. DeepMinds AI trainers and AlphaFold finished almost 200 million within the same five-year window.

What will it mean when an AI can plan and reason by itself without human trainers? Todays leading AI technologies machine learning, robotic process automation, chatbots are already transforming organizations in industries varying from pharma research labs to insurance companies.

When they do arrive, whether in a few decades or a few years, intelligent machines will introduce both vast new opportunities and surprising new risks.

Brian Mulconreyis SVPatSureify Labs and a futurist. He lives in Austin, Texas.

Welcome to the VentureBeat community!

DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation.

If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers.

You might even considercontributing an articleof your own!

Read More From DataDecisionMakers

View post:
When we might meet the first intelligent machines - VentureBeat

Read More..

Sean Kirst: After Rushdie stabbing, close witness seeks hope in deep roots of Chautauqua – Buffalo News

A couple of Fridays ago, Bestor Cram was up early, as usual, at the house his family rented at the Chautauqua Institution. He started off with a 3-mile run around the grounds, before returning to help his 10-year-old grandson Julian prepare for camp.

Once the child jumped on his bike and took off, Cram, 76, a documentary filmmaker and founder of the Boston-based Northern Light Productions, quickly finished his own work. He and his wife, Penny, planned to take the three-block walk to see Salman Rushdie a renowned author "who would not shut his mouth and would not drop his pen, as Cram put it, despite threats against his life speak in the amphitheater as part of a lecture series.

A pedestrian bikes through the Chautauqua Institution Friday, Aug. 19, 2022.

Cram has been at Chautauqua for parts of 65 summers. His mother was born on the grounds and his grandfather, Arthur Bestor,was an influential president there in the early 20th century. While Cram and his wife have no formal link to institution leadership, there is still a Bestor Society at Chautauqua, and Bestor Plaza is a green, beloved landmark.

People are also reading

"It is a place," Cram said, "where we feel like we're coming home."

A judge has refused to grant bail to the man accused of trying to kill Salman Rushdie as the acclaimed author prepared to give a talk in western New York. Hadi Matar appeared in a western New York courtroom after a grand jury indicted him on charges that he rushed the stage at the Chautauqua Institution and stabbed Rushdie multiple times. During the court hearing, public defender Nathaniel Barone asked the judge to do something to stop reporters from trying to contact Matar at the jail. The lawyer said the jail had received several hundred phone calls.

He sees that bond, that philosophy, as intertwined with his own life: He served as a Marine in Vietnam and was a leader afterward in a veterans movement against the war, and he has offered revelations about struggle, courage and justice in a lifetimes worth of films he directed, produced or helped create.

You come here to have your brain disturbed, he said of Chautauqua, a setting where he seeks to be challenged and unsettled by great questions of the day, but always under an assumption:

Its about as safe a place as you can go.

On that Friday, he walked alone to the amphitheater. Penny would arrive a little later with some friends, so Cram settled into the fourth or fifth row. He was close by as Rushdie and Henry Reese, founder of Pittsburgh's City of Asylum, took their seats for what was supposed to be a conversation about freedom and safety for persecuted artists.

Filmmaker Bestor Cram listens to the morning lecture from Nobel Peace Prize winner Maria Ressa at the Chautauqua Institution Friday, Aug. 19, 2022. A week earlier, Cram was near the stage when Salman Rushdie was assaulted.

In the middle of all this, Cram said, he heard a scream or a yelp in the amphitheater, more than one voice recognizing that someone was jumping on the stage.

There was no time to process it: We just watched a figure literally dash as from the blue from the edge of the stage into the center and pounce on top of Salman Rushdie and begin raising a fist, up and down, up and down.

To be in that moment, Cram said, is impossible to fully describe. The audience went in an instant from the notion of the safe, the communal, the familiar, into raw witness of the unthinkable. He sees that element as a glimpse, a merciless bridge, toward so many historic acts of targeted bloodshed, killing and malice that degraded the sanctity of ordinary life including the horrific madness of the racist slaughter in Buffalo, three months ago at Tops.

It took a second to realize an attempted assassination was taking place, Cram said, and then several onlookers from the closest rows rushed forward to interrupt the stabbing, which Cram believes allowed Rushdie his chance to survive.

Cram quickly joined others hurrying toward the stage to help. Once there, he saw the attacker police later identified the suspect as Hadi Matar, 24, of New Jersey had been subdued and Rushdie and Reese were receiving aid. The documentarian in Cram kicked in: He pulled out his phone to record what he could, and a young man Cram believes was security pushed him and knocked the phone from his hand.

Visitors enjoy an afternoon in Bestor Plaza at the Chautauqua Institution.

While startled, he understood: Everyone was fraught. He picked up the phone and made his way through the stunned crowd to find Penny. Their immediate concern was Julian, especially since the boy was late getting home from camp for lunch, but they soon received a call from camp officials saying the children were safe.

Sitting with his grandparents an hour or two later, Julian explained how the kids had all been asked to shelter in place. The10-year-old already exactly knew what those words meant, and why he needed to listen:

He had been trained to realize, Cram said, that someone nearby was causing life-threatening harm.

As the day wore on, Cram had a visceral reaction: His body shook uncontrollably in response to what he saw. He and Penny joined some friends who had also been there to try and talk through all of it, their feelings echoing a response shared with me last week by Bethanne Snodgrass, who coordinates an annual literary arts contest at Chautauqua:

The word that keeps coming to Snodgrass is violation, above all else to the life and safety of Rushdie the writer whose survival and well-being is constantly on her mind and on a secondary level to everything Chautauqua is supposed to represent.

Rushdie, who has been living under death threats from Iran for more three decades after the publication of his book "Satanic Verses," is hospitalizedon a ventilator with critical injuries, said Andrew Wylie, his literary agent.

Cram felt the same thing in watching the chaos and violence on a stage whose long-accepted purpose is providing safe haven to national or global giants, women and men whose lives and acts are symbolic of hope.

Chautauqua, then, is an extension of that whole idea for Cram, framed not by easy definition but through encounters and discussions renewed for him since childhood. Right now, in a country torn into fierce, defensive cliques, he said the question there "on the tip of everyones tongue is the fear of all the division that is working to degrade the nation.

The gift and model of Chautauqua, he said, was always the notion that it is a safe place for those who reasonably and philosophically disagree. You never feel threatened because of a difference of opinion, Cram said, which makes the Rushdie attack as Snodgrass said - a kind of ultimate violation.

To come back from it, Cram said, will be a process of accepting that Chautauqua as a living institution will have this blood stain on its historical markers, and in some respects the trauma of that becomes part of its living history.

He sees the real question about change as not involving some landscape of brick and mortar, of rustling trees and quiet lanes, but in what happens within people who define the place. The whole point of Chautauqua, he said, is to take what you absorb and apply it to the world, which in reflection he knows he tried to do with his own life.

Documentary filmmaker Bestor Cram: As a child at Chautauqua, he grew up seeing his family name on this sculpture.

For now, his thoughts keep returning to Rushdie and his recovery. This weekend, before Cram, Penny and their grandson prepared to leave for their Boston home, Cram took another Friday walk to the amphitheater, where Maria Ressa was a speaker in the lecture series.

Nobel Peace Prize winner Maria Ressa gives the morning lecture at the Chautauqua Institution Friday, August 19, 2022. (Mark Mulville/Buffalo News)

Ressa, an investigative journalist, received a 2021 Nobel Peace Prize for risking her life to do her job in the Philippines, where she was arrested and faced government threats of retaliation. At the amphitheater, she acknowledged the bloodshed of a week earlier on the same stage, honoring Rushdie and the sacrifices he made so he could speak, and Cram listened intently as she made passionate use of the same freedom.

She described the dangers around the globe of the digital mob, whose cruelties and excess can suffocate discussion, threaten democracy and enflame violence, as in the radicalization of the accused killer in Buffalo. In an era that can seem despairing and overwhelming, she said unyielding empathy is an engine and strategy of hope, and she offered five elements that she prescribes as building blocks of courage.

Each of us, she said, needs to be ready to learn and to speak out, to trust and to have faith, and to draw a line a place of value, of bedrock belief in right and wrong that we will not cross, despite the threat or risks.

It was both inspiring and unsettling, exactly why Cram was grateful for the parting message. This was the creed he learned in childhood, unbroken at Chautauqua.

Sean Kirst is a columnist with The Buffalo News. Email him at skirst@buffnews.com.

The smart way to start your day. We sift through all the news to give you a concise, informative look at the top headlines and must-read stories every weekday.

Read the rest here:
Sean Kirst: After Rushdie stabbing, close witness seeks hope in deep roots of Chautauqua - Buffalo News

Read More..

How to enable end-to-end encryption on Messenger – KnowTechie

Facebook added end-to-end encryption to Facebook Messenger years ago, but its not enabled for users by default. Because of this, youll need to know how to enable end-to-end encryption in Facebook Messenger for private messaging.

Facebook has been reluctant to make end-to-end encryption the standard on the Messenger app. The company cites security reasons for its skepticism but says that end-to-end encryption will become the standard sometime in 2023.

But for now, youll have to enable it in each individual conversation if you want to ensure the privacy of your conversations. And unfortunately, its currently only available on the mobile Messenger app and not Messenger for the web.

Nevertheless, end-to-end encryption can be useful to ensure that only intended recipients are able to see conversations. So lets look at how it works in Messenger.

For now, users have a couple of different options for enabling end-to-end encryption in the Messenger mobile app for iOS or Android. And both options are relatively easy to set up from the apps settings.

The first method is called Vanish mode. Vanish mode is a setting that you can use temporarily to have immediate conversations with your friends.

In Vanish mode, any messages you send will automatically disappear when the user leaves the message window.

This is a useful setting for those quick conversations that you dont want anyone to know about. Just be aware that even you wont be able to see those messages afterward.

The other option is called Secret Conversations and is a more standard end-to-end encryption. Using this method creates an entirely new chat window with your friend that will be encrypted.

Only you and other recipients can see these messages and theyll be stored directly on your device instead of in the cloud.

First, well take a look at Vanish mode in the Messenger app. To reiterate, messages sent in this mode will automatically disappear once each user leaves the message window. So dont use this for anything youll need to reference in the future.

Vanish mode is super easy to enable. It starts from an already established chat window between you and your friends.

In the Messenger app open a conversation with your intended recipient

Swipe up from the bottom of the message window

Hold until the prompt tells you to release the swipe

That will open as a new Vanish mode window for chats between you and your friend. Then, you can message each other back and forth freely as long as you stay in that window.

But as soon as you leave, the conversation will disappear.

The Secret Conversations feature in Messenger is the more standard end-to-end encryption experience. You can toggle this setting on to create an entirely new chat window with your friend that only you and they can see.

This method is slightly more complex, but not by much. And with Secret Conversations, you can always come back and continue the conversation and all of the messages will remain end-to-end encrypted.

This will open an entirely new chat window with that person. If done correctly, you should see the image of a padlock in the profile picture of the other user in the Secret Conversation.

You can also set up disappearing messages when in a Secret Conversation. To do this, tap on the users profile picture at the top of the message window.

Then, select Disappearing messages under the Privacy section in that settings window.

With Disappearing messages in Secret Conversations, any messages will be automatically deleted after a certain time after they are read by everyone in the chat.

Its similar to Vanish mode, but the Secret Conversation chat window will remain in your feed even after you exit it.

When youre sending messages through Messenger, its sometimes easy to forget that Facebook has relatively unlimited access to those messages.

Thats why end-to-end encryption is such a difference maker. It makes it much harder for Facebook or anyone else to hack their way into your private conversations.

For now, you still have to manually enable end-to-end encryption in Messenger to truly have privacy in your messages. But, hopefully, encryption will become the standard on the app in 2023, as the company has promised.

Have any thoughts on this? Let us know down below in the comments or carry the discussion over to ourTwitterorFacebook.

Contributing writer with a passion for gaming and tech. Probably getting wrecked by some kids in Rocket League.

See the original post:
How to enable end-to-end encryption on Messenger - KnowTechie

Read More..

More users want encryption, but the transition can be complicated for messaging apps – Marketplace

End-to-end encryption is a way to keep messages private. Its sometimes used by apps, which basically turn those messages into unintelligible chunks of data as soon as a user hits Send.

The idea is that no one except sender and recipient can access that message. Not hackers, not third parties, not even the app platform itself. And you have to have special keys stored on an individual device to decrypt it.

But many messaging platforms dont have this kind of encryption, and some provide it only as an option.

Kimberly Adams of Marketplace Tech spoke with Matthew Green, a professor at the Johns Hopkins Information Security Institute, about why more apps dont have end-to-end encryption by default. The following is an edited transcript of their conversation.

Matthew Green: One of the problems is that that services like Facebook Messenger, theyre designed to work across multiple different devices, right? And getting all of that to work with encryption is hard because it means you have to have encryption keys delivered to all those different phones. Thats challenging. And then law enforcement and platform abuse teams, theyre worried that people will break laws, send abusive pictures and so on. And end-to-end encryption is very nerve-wracking for those interests because they cant see the images.

Kimberly Adams: From a design standpoint, does it matter when you add encryption to a messaging service?

Green: Yes, it makes much more sense to add encryption from the beginning. If you design a new messaging service and it has encryption right from the start, like Signal, for example, then its really easy to deploy that. You can figure out each time you add a new feature, you say, How does this fit into the encryption? How do I do things? In the other direction, when youre basically going backwards to a very popular service that already does not use encryption, adding encryption can be challenging because you have to think about all these features you support, like multiple devices, working on arbitrary web browsers, bots, things like that. Each of those services has to be adapted to use encryption. And thats why Facebook Messenger in particular Facebook is now deploying encryption across all of its existing services its taking them a long time to figure out all those details.

Adams: How does money factor into the encryption debate? Because, I mean, these messaging services could potentially provide a lot of useful user data that could be monetized or used to create targeted ads. And I imagine if you have really good end-to-end encryption, that ability to monetize that content theoretically goes away, right?

Green: My impression is that a lot of these advertising-supported networks like Google and Facebook, they have more user data about you than they know what to do with. So for them, theres actually kind of a balance where, hey, yes, we could have access to all your private conversations and thoughts. But we already have so much data, do we really want to be the people who are mining your private conversations to get that? And thats why I think so many of these providers, particularly Facebook, are moving to encryption, is they just dont need that private conversation data. They already have enough.

Adams: What do you see as the demand moving forward by users, at least, for encrypted messaging apps and services?

Green: Well, one of the things thats been amazing to me is over the last year or so I use this app called Signal, which is a great thing. And I get notifications saying, So-and-so is on Signal. And it used to be that so-and-so was some computer scientist or technical person I work with. And nowadays, so-and-so is my neighbor who I dont even think knows how to use a computer. The impression I get is that people genuinely feel that private messages should be private. And so I think that now they know that the older systems arent very private, theyre happy to switch to these newer technologies that doesnt cause them any controversy or any pain.

Adams: As somebody who studies this all the time, how have you noticed, sort of, the public perception and knowledge around issues of encryption change?

Green: Encryption used to be one of those science fiction things. Youd see it on TV, you know, Star Trek, or youd see it on cop shows occasionally. But it was always a criminal using encryption. I think that whats really changed is that encryption has gone from this thing that was mostly used by mobsters or the bad guys on TV to something that everyone just kind of takes for granted. And we understand why, right? Because were all carrying our entire lives around with us, all our private conversations on this little computer in our pocket. And we really, really are sensitive to the fact, even if not consciously, were sensitive to the fact that all of our private information could go so easily. And I think nowadays, the people who think about this stuff, they think about encryption as basically the only antidote against, you know, losing everything that you care about. And so encryption has gone from being kind of an exotic, dirty word, to just being a technology that is there and protects us.

You may have heard last week that Meta is testing new encryption features in its Messenger app. The company has said it would take years to add more secure encryption to Messenger by default.

Meta made the announcement after it complied with court orders and released chat histories between a Nebraska woman and her teenage daughter. The messages are allegedly about the daughter seeking abortion services more than 20 weeks into her pregnancy, which is illegal in that state.

Meta has said its decision to roll out additional encryption features in Messenger is not related to that court order.

If you want to know how to test that new end-to-end encryption feature on your Messenger app, The Verge has a handy summary.

But if youre in the market to try an app thats already encrypted, PC mag published its take on the best, most secure messaging apps of 2022.

Theyre in no specific order: WhatsApp, Telegram and a favorite here in Washington, D.C. Signal.

View original post here:
More users want encryption, but the transition can be complicated for messaging apps - Marketplace

Read More..

Bellabeat is First Period and Pregnancy Tracking App and Wearable to Implement Private Key Encryption (AES-256) Security Feature to Protect Women’s…

PopularPeriod and Pregnancy Tracking Wearable for Women is One of Safest Cyber Security and Data Wise

SILICON VALLEY, Calif., Aug. 18, 2022 /PRNewswire/ --In early July,Bellabeatwas the first pregnancy tracker to roll out a new layer of data security to protect their base of all female end users' data in the wake of the United States Supreme Court overturning Roe Vs. Wade. Like many mobile apps, they had been using full end-to-end encryption of their Bellabeat mobile app for users of all of their Bellabeat wearable products, with end-to-end encryption being the common and secure way to protect customers' data. The company determined that to protect their health data, it is necessary to take data their security a step further without haste. As of August 17th, 2022, eighteen out of 25 reproductive health apps and wearable devices that Mozilla investigated for privacy and security practices received a*Privacy Not Includedwarning label. Bellabeat did not receive a warning label as they have been exceptionally public in immediately taking the following steps after the newest Roe vs. Wade ruling.

The newly implemented Private Key Encryption (AES-256) feature will enable all Bellabeat users to access and decrypt her data using a private key via her Bellabeat smartphone app. Any data stored on the Bellabeat servers will be in an encrypted form only. Thus, no one can access the Bellabeat servers (lawfully or unlawfully). Also, adding the extra layer of security where data stored on the company's servers cannot be read without holding an individual user's private key. The only person that can access the confidential health data and info in its decrypted form will be the Bellabeat customer herself. The private key is a password or a pin code that only the user herself knows or stores on her private device. Without that key, her data is unreadable. Ideally, implementing the new security feature gives full control and ownership of data to Bellabeat's end users. The company will therefore not be able to benefit from collecting end-user data in any shape or form, including for internal research or product improvements. Bellabeat executives determined that there was not a question in options and that users' safety at this time is of the utmost importance. The feature is currently in testing and will be rolled out within all Bellabeat products having women's' reproductive health tracking features (period and pregnancy data tracking) by end of July.

Story continues

The decision for the exceptional layer of data security comes in the wake of the U.S. Supreme Courts June 24th, 2022, ruling to overturn the landmark case Roe v. Wade, in which the Court ruled thatthe Constitution of the United States generally protects a pregnant woman's liberty to choose to have an abortion. The overturning of Roe Vs. wade now gives states a license to ban abortion. Thirteen U.S. states, mainly within the south and midwest, had trigger bans to be activated upon supreme court decision and will now start taking effect. Some immediately upon the ruling being released. As Bellabeat is a Women's health tracker with a specific focus on menstrual, reproductive, and fertility tracking, end-to-end encryption was determined to be of the utmost importance to protect the fast-growing companies' customers.

"Our business is helping women to track and understand their cycles and bodies. The Overturning of Roe Vs. Wade is a tremendous blow to women's rights. It is an incredibly sad and terrifying day for Women's health and Women's rights. Many women are now in fear of exactly what to share and where to share it. This ruling will change how health data and records are maintained offline with OBGYNs and primary care physicians, what women feel safe to disclose, and will grossly change how women will choose to share their reproductive information online. We will continue to be a safe and progressive space for women to track their cycles, fertility, and all wellness concerns," states Urska Sren Co-Founder of Bellabeat. "Incorporating the Private Key encryption feature means an extra layer of security designed to ensure our users' safety. This also means our end users can be sure that we are unable to leak or sell their data and that a breach or break within Bellabeat's servers will never mean a threat to their personal safety."

In a recentWall Street Journal articlelegal experts are quoted to say that in a scenario where Roe is overturned, your digital breadcrumbsincluding the kind that come from period trackerscould be used against you in states where laws criminalize aiding in or undergoing abortion.

"It is a horrific idea that your health data and digital breadcrumbs could be used against you to criminalize women making life-changing reproductive choices. It's not a sentiment reflected anywhere in healthcare or health rights for the male body. We stand with women everywhere and have taken the necessary steps End-to-end. We also do not sell or share our customer info," states Sandro Mur, CoFounder of Bellabeat. "The implementation of the Private Key Encryption ensures that we will never be placed in a position, as a company, where we could be forced to submit user's private health data in its readable form."

Bellabeat is a leader in creating wellness technology whose products include wearables are specifically made for women that track health, wellness, and reproductive info via The Bellabeat Ivy, Leaf Urban, and Leaf Chakra. Bellabeat is aimed exclusively at women and recently announced that they have started the process of submitting an official application to the FDA for their product, the Bellabeat Ivy. Obtaining a license from the U.S. Food and Drug Administration (FDA) would allow doctors and clinicians to officially use the Ivy wearable technology to monitor the menstrual cycle in the treatment of women. The Bellabeat Ivy is specifically made for women. In recent coverage, it has been seen as an outstanding health tracker to monitor and track a woman's menstrual cycle, fertility, postpartum depression symptoms, menopause symptoms, and more.

For media inquiries on the Bellabeat mobile app or additional quotes or interviews surroundingBellabeat data protectionupon the overturning of Roe Vs. Wade, please emailmtatum@bpm-prfirm.comor call 877.841.7244.

About Bellabeat

Bellabeat Inc. is a Silicon Valley company building tech-powered wellness products for women. The Bellabeat team previously released the Bellabeat Ivy and disruptive Leaf health tracking jewelry for women and the first smart water bottle powered by A.I. Bellabeat is now revolutionizing the FemTech space by taking natural cycles into account when creating its guided programs and Ivy Smart Bracelet, helping women reach their health goals more effectively and enjoyably. Visithttps://bellabeat.com/for additional information.

Media Contact:Monique Tatum877.841.7244342922@email4pr.com

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/bellabeat-is-first-period-and-pregnancy-tracking-app-and-wearable-to-implement-private-key-encryption-aes-256-security-feature-to-protect-womens-data-in-the-wake-of-roe-vs-wade-overturn-301608919.html

SOURCE Bellabeat

Visit link:
Bellabeat is First Period and Pregnancy Tracking App and Wearable to Implement Private Key Encryption (AES-256) Security Feature to Protect Women's...

Read More..

Cloud Encryption Market Growth Set to Surge Significantly during the Forecast Period 2022-2028 | Cipher Cloud Inc. (U.S.), Hytrust Inc. (U.S.),…

-https://www.coherentmarketinsights.com/insight/request-sample/1344

The Cloud Encryption Market Research report provides a detailed, qualitative analysis of business growth, cutting-edge growth strategies, current trends, and forecasts for the future. The report also offers in-depth analysis of the Cloud Encryption Markets size, share, and overall strategic business planning, as well as product details, CAGR status, SWOT analysis, and Porters Five Forces analysis. The impact of future factors on the global market is thoroughly examined in every way. Primary studies have been conducted using the ideas generated by surveys, interviews, and expert analyst opinions. As opposed to secondary research, which uses information from trusted paid sources, trade magazines, and databases maintained by industry bodies. With the aid of current market projections, company segment strategic recommendations are also made.

Cloud Encryption Market Scope:

The Global Cloud Encryption Market Report is a detailed and comprehensive research of the market with a focus on the analysis of global market trends. The objective of the study is to provide a complete market segmentation by type, application, and geography along with an overview of the Cloud Encryption industry. The forecast term is expected to see rapid expansion in the global Cloud Encryption Market. The report analyses key trends and opportunities in the industry and also important information on the market position of the major Cloud Encryption Market players.

Cloud Encryption Market Competitive Landscape and Segmentation Analysis:

The research includes a number of significant market manufacturers. It aids readers in understanding the alliances and strategies that market players employ to stave off competition. This thorough research provides a thorough analysis of the market. The footprints can be found by looking at the manufacturers global revenue and global price.

Our report focuses on top players in global Cloud Encryption Market, with production, price, revenue and market share for each manufacturer, covering:

:Cipher Cloud Inc. (U.S.), Hytrust Inc. (U.S.), Gemalto N.V. (the Netherlands), IBM Corporation (U.S.), Secomba GmbH (Germany), Sky-high Networks Inc. (U.S.)., Sophos Group Plc. (U.K.), Vormetric (U.S.), Boxcyrptor (U.S.), Viivo, Wave System, Symantec Corporation (U.S.), and Thales e-Security Corporation (France).

Detailed Segmentation:

:

: United States, Canada, and Mexico & : Argentina, Chile, Brazil and Others & : Saudi Arabia, UAE, Israel, Turkey, Egypt, South Africa & Rest of MEA. : UK, France, Italy, Germany, Spain, BeNeLux, Russia, NORDIC Nations and Rest of Europe. -: India, China, Japan, South Korea, Indonesia, Thailand, Singapore, Australia and Rest of APAC.

:https://www.coherentmarketinsights.com/insight/request-pdf/1344

Growth Mapping:

The objective of the study is to provide clients with a map of market growth and help them create plans to meet their business objectives. To analyze the markets growth, a variety of quantitative and qualitative approaches can be used. These methods include SWOT analyses of various markets, PESTEL analysis for various geographical areas, and Porters Five Forces analyses to identify various elements such as buyer and seller abilities, substitution effects, level of competition, and threats from new players.

Research Methodology:

The reports foundation is certainly created in-depth solutions offered by skilled data analysts. The research approach entails analysts gathering data only to have it properly examined and filtered in an effort to make meaningful forecasts about the market over the review period. The primary research is made relevant and useful by the inclusion of interviews with important market influencers. By analysing the market against a variety of criteria, the research approach clearly indicates the intention to derive a comprehensive view of the industry. The important contributions improve the report and provide it a competitive edge.

:

The deployment of recent data acquired by our own researchers. These provide you historical and future data that is analysed to show you why the market for Cloud Encryption Market is changing; this enables you to foresee changes in the industry and keep a step ahead of your competitors.

The concise analysis, understandable graph, and table format will help you quickly find the information you want.

Indicates the region and market sector that is most likely to grow quickly and take over the market.

A regional study demonstrating how the product or service is used in each location and the factors affecting the market there.

Complete company profiles for the major market players, including company overviews, company insights, product benchmarking, and SWOT analysis for the major market players, as well as new service/product launches, partnerships, business expansions, and acquisitions of companies profiled in the past five years.

The market forecast for the sector, taking into account recent developments including growth prospects and drivers as well as difficulties and constraints in both emerging and developed economies.

Porters five forces analysis is applied to give a thorough understanding of the market from many perspectives.

Provides market development possibilities in the upcoming years as well as industry comprehension through Value Chain Market Dynamics scenario.

:https://www.coherentmarketinsights.com/insight/buy-now/1344

:

What is the size of the overall Cloud Encryption Market and its segments by 2028? Which market segments and sub-segments are the most important? What are the Cloud Encryption Markets major drivers, restraints, opportunities, and challenges, and how are they projected to affect the market? What are the markets lucrative investment options for Cloud Encryption Markets? How big is the Cloud Encryption Market in each country and region? Who are the main market participants and their main rivals? What growth strategies have the major companies in the Cloud Encryption Market adopted? What are the current market trends for Cloud Encryption Markets? What obstacles face the expansion of the Cloud Encryption Market? What are the main market trends that are influencing the expansion of the Cloud Encryption Market?

:

1. Research Objectives and Assumptions

2. Market Purview

3. Market Dynamics, Regulations, and Trends Analysis

Continue

About Coherent Market Insights:

Coherent Market Insights is a global market intelligence and consulting organization thatprovides syndicatedresearch reports,customized research reports,and consulting services. We are known for our actionable insights and authentic reports in various domains including aerospace and defense, agriculture, food and beverages, automotive, chemicals and materials, and virtually all domains and an exhaustive list of sub-domains under the sun. We create value for clients through our highly reliable and accurate reports. We are also committed in playing a leading role in offering insights in various sectors post-COVID-19 and continue to deliver measurable, sustainable results for our clients.

Contact Us:-Mr. ShahCoherent Market Insights1001 4th Ave, #3200Seattle, WA 98154Phone: US +12067016702 / UK +4402081334027Email:[emailprotected]

See the original post:
Cloud Encryption Market Growth Set to Surge Significantly during the Forecast Period 2022-2028 | Cipher Cloud Inc. (U.S.), Hytrust Inc. (U.S.),...

Read More..