Page 2,465«..1020..2,4642,4652,4662,467..2,4702,480..»

Why Blockchain isnt as secure as you think – Evening Standard

B

lockchain has rapidly become one of the most disruptive technologies of the 21st century, but with the continuous improvements in quantum computing, the foundations of the technology are starting to falter.

Blockchain, cryptocurrencies, NFTs and decentralised finance have become common terms, with blockchain now hailed as an extremely secure and much faster method of recording transactions due to the computational intensity of attempting to break it. Both companies and people have poured endless amounts of capital into the technology by buying cryptocurrencies or by developing their own currency or asset chains.

But in a dynamic cyber environment, is this $2.7 trillion dollar market really future-proof and secure?

With every innovation in quantum computing, the threat to blockchain increases.

There are two main issues that face the technology, the first being its reliance on a form of encryption known as public key cryptography; and second, its reliance on a type of algorithm called a hash function.

Public key cryptography is a method of encryption that publishes a key for the world to use so that they can encrypt information that only the holder of the private key can see.

A hash is generated by running a widely known and well-established algorithm on a piece of information to create a near unique digital representation of it. It is computationally impossible to construct the original information from a hashed representation, and they are said to be resistant to finding another piece of data that has the exact same digital representation. In both proof-of-work and proof-of-stake blockchains, digitally signed hashes are used in combination with random numbers to sign off a block.

The threat from quantum computing to public key encryption is a known issue and has been discussed at length by many experienced professionals. It is an issue that both governments and commercial entities have recognised. NIST, the US National Institute of Standards and Technology, is currently in the process of defining what the next phase of encryption (also known as post-quantum encryption) will be. Many experts will highlight that the types of quantum computers that are capable of cracking this are still far away, which is true, but various competing technologies alongside quantum are bringing this to the forefront of the cybersecurity threat vector.

Therefore, one can see that the main near-term issue facing the chain comes from the threat to the hashing algorithm from quantum computing or quantum accelerated hardware. There are a few issues with the hash-method, however, the main issue facing these chains is that a quantum computer will be able to solve for these hashes at a much faster rate than any computational-based approach, thereby taking ownership of a network. Significant progress has been made in the past two years on a type of quantum algorithm called Grovers algorithm, which poses the greatest risk to the network as a fully well error-corrected quantum computer is not needed.

Evaluating and understanding the risk only gets us part way, says David Worrall, co-founder of Secqai. It is now time to implement the solutions available to prepare us for the future.

This risk is further accentuated due to the decentralised nature of blockchain, where the latest cyber technology hasnt been built to integrate easily with, for example, new hardware based cryptography such as secure entropy sources or quantum random number generators.

Indeed, research has shown that the deployment of post quantum safe algorithms in todays blockchain architectures is not possible without a huge increase in transaction costs sometimes outweighing the value of the transaction.

Conversely, traditional banking infrastructure is relatively easy to update as the back-end software and hardware is managed centrally by each bank and each integrated party, i.e. the list of parties that need to be secure is well known.

Blockchain developers understand the challenge today, and as has been shown need to start the work of preparing their systems by integrating post-quantum methods into their infrastructure and adopt best practice techniques to ensure that they are prepared for a quantum world.

Rahul Tyagi is an ex-management consultant, inventor and co-founder of cyber security start-up Secqai

See the original post:
Why Blockchain isnt as secure as you think - Evening Standard

Read More..

Tech pioneers to headline Princeton conference on innovation and entrepreneurship – Princeton University

Engage 2021, Princetons second annual innovation and entrepreneurship conference, will be held online Dec. 1 and 2, offering opportunities to learn about the transformation of discoveries into innovations that benefit society from biomedicine and clean energy to wireless, cryptocurrency and quantum computing.

The two-day virtual gathering, hosted by Princeton Innovation, will include tips and case studies on successful new technologies and academic-industry partnerships, as well as guidance on funding opportunities for research and entrepreneurship, with a special focus on the growing innovation ecosystem in New Jersey and the tri-state area.

Faculty, researchers, students and alumni from Princeton and other institutions, entrepreneurs and those entrepreneurially-minded, industry representatives and government policymakers, are invited to register for the conference, which which is free and open to everyone,

By bringing people together from across the regional and global innovation ecosystems, Princeton is helping to grow a robust and inclusive environment that brings positive impacts to the broader community, the economy, and to daily life, said Vice Dean for Innovation Rodney Priestley, the Pomeroy and Betty Perry Smith Professor of Chemical and Biological Engineering.

Priestley leads Princeton Innovation, a University initiative that supports faculty, students and researchers as they transform discoveries emerging from science, engineering, social sciences and humanities into ventures and activities that can create a positive impact on society. Priestley will kick off Engage 2021 with updates on the initiative, which is part of Princetons Office of the Dean for Research.

Marian Croak, Class of 1977 and vice president of engineering at Google

Headlining the conference will be Marian Croak, Class of 1977 and vice president of engineering at Google, in a conversation with chair of computer science Jennifer Rexford about the contributions of women in STEM fields, the importance of mentorship, and being an intrapreneur andinnovator at a large company. This year, Croak became one of the first two Black women inducted into the National Inventors Hall of Fame, in recognition of her work on advancing Voice over Internet Protocol (VoIP) technologies, a key development in audio and video conferencing.

Another keynote session will feature a conversation between Andrea Goldsmith, dean of Princetons School of Engineering and Applied Science, and Naveen Verma, director of the Keller Center for Innovation in Engineering Education. They will discuss developments and opportunities for innovation in the New Jersey region, and connections between entrepreneurship, research and teaching at Princeton.

This conference will help enable all of us seeking to make a positive difference engineers, scientists, humanists, social scientists, business leaders and startup enablers to engage with each other in fostering innovation that strengthens society, said Goldsmith, the Arthur LeGrand Doty Professor of Electrical and Computer Engineering, who has founded two companies around her expertise in wireless technology.

As part of the conference, the 13th annual Celebrate Princeton Innovation showcase will honor Princeton faculty-led discoveries in life sciences and technology that have the potential to become everyday innovations.

The showcase features 10 Princeton faculty experts discussing their discoveries on topics including a new technology to prevent smartphone theft, new anticancer therapeutic strategies, early detection of autism and other neurobehavioral conditions, clean and inexpensive lithium-ion battery recycling, electric bandages, and more. The keynote address will feature blockchain-technology startup Offchain Labs cofounder Edward Felten, the Robert E. Kahn Professor of Computer Science and Public Affairs, Emeritus.

Mohammad Seyedsayamdost, professor of chemistry, has been selected to receive Princetons second annual prize for innovative faculty, the Dean for Research Award for Distinguished Innovation, for the creation of a method for discovering new anti-infective agents, including drugs that treat bacterial, viral and fungal infections. Seyedsayamdost, who has cofounded the startup Cryptyx Bioscience, will receive the award and give a talk about his technology.

Engage 2021 will also feature a New Jersey startup showcase of academic scientists and engineers raising venture funds for companies based on their research, including Marcus Hultmark, an associate professor of mechanical and aerospace engineering at Princeton. Hultmark and his team recently received an Edison Patent Award from the Research and Development Council of New Jersey for their low-cost, nanotechnology-based industrial velocity sensors.

Hultmarks company, Tendo Technologies, was launched in 2018 with support from the National Science Foundation Innovation Corps (I-Corps) program and the eLab Summer Accelerator at Princetons Keller Center. Princeton is now the leading institution of the I-Corps Northeast Hub, which was announced earlier this year with a $15 million grant to accelerate the impact of federally funded research and advance diversity in entrepreneurship. I-Corps Northeast Hub leaders from Rutgers, Rowan and Drexel Universities will discuss the hubs activities and opportunities in a panel discussion.

Another panel discussion will cover the benefits of joining a startup accelerator, and how to choose the right accelerator and create a strong application. Representatives from the accelerators QED, VentureWell and FedTech will join the conversation, as will Garrett Winther of the HAX accelerator. HAX recently announced it would establish its U.S. headquarters in Newark, New Jersey, after a persuasive State of New Jersey pitch supported by Princeton Engineering dean Goldsmith on behalf of Princeton. HAX aims to invest $25 million in 100 new technology companies over the next five years with a focus on re-industrialization and decarbonization of the U.S.

Engage 2021 sessions will feature many Princeton science and engineering faculty members, along with panelists from industry and other universities, discussing emerging technologies in decarbonized transportation, cancer research, quantum computing, wireless communications, and artificial intelligence in bioengineering.

Our vision is for Princeton to be a catalyst for a diverse, inclusive and human-centered high-tech hub for the entire tri-state region, said Goldsmith. We have much exciting progress, but we need to keep building partnerships. I encourage anyone with a passion for building new ventures and harnessing technology for the good of humanity to join us.

Original post:
Tech pioneers to headline Princeton conference on innovation and entrepreneurship - Princeton University

Read More..

193 countries adopt the first global agreement on the Ethics of Artificial Intelligence – UN News

Artificial intelligence is present in everyday life, from booking flights and applying for loans to steering driverless cars. It is also used in specialized fields such as cancer screening or to help create inclusive environments for the disabled.

According to UNESCO, AI is also supporting the decision-making of governments and the private sector, as well as helping combat global problems such as climate change and world hunger.

However, the agency warns that the technology is bringing unprecedented challenges.

We see increased gender and ethnic bias, significant threats to privacy, dignity and agency, dangers of mass surveillance, and increased use of unreliable AI technologies in law enforcement, to name a few. Until now, there were no universal standards to provide an answer to these issues, UNESCO explained in a statement.

Considering this, the adopted text aims to guide the construction of the necessary legal infrastructure to ensure the ethical development of this technology.

The world needs rules for artificial intelligence to benefit humanity. The Recommendation on the ethics of AI is a major answer. It sets the first global normative framework while giving States the responsibility to apply it at their level. UNESCO will support its 193 Member States in its implementation and ask them to report regularly on their progress and practices, said Audrey Azoulay, UNESCO chief.

Unsplash/Maxime Valcarce

The increase in data is key to advances made in artificial intelligence.

The text aims to highlight the advantages of AI, while reducing the risks it also entails. According to the agency, it provides a guide to ensure that digital transformations promote human rights and contribute to the achievement of the Sustainable Development Goals, addressing issues around transparency, accountability and privacy, with action-oriented policy chapters on data governance, education, culture, labour, healthcare and the economy.

One of its main calls is to protect data, going beyond what tech firms and governments are doing to guarantee individuals more protection by ensuring transparency, agency and control over their personal data. The Recommendation also explicitly bans the use of AI systems for social scoring and mass surveillance.

The text also emphasises that AI actors should favour data, energy and resource-efficient methods that will help ensure that AI becomes a more prominent tool in the fight against climate change and in tackling environmental issues.

Decisions impacting millions of people should be fair, transparent and contestable. These new technologies must help us address the major challenges in our world today, such as increased inequalities and the environmental crisis, and not deepening them. said Gabriela Ramos, UNESCOs Assistant Director General for Social and Human Sciences.

You can read the full text here.

Read the original here:
193 countries adopt the first global agreement on the Ethics of Artificial Intelligence - UN News

Read More..

Global AI (Artificial Intelligence) Market Report 2021: Ethical AI Practices and Advisory will be Incorporated in AI Technology Growth Strategy to…

DUBLIN, Nov. 25, 2021 /PRNewswire/ -- The "Future Growth Potential of the Global AI Market" report has been added to ResearchAndMarkets.com's offering.

Artificial intelligence (AI) is transforming organizations, industries, and the technology landscape. The world is moving to the increased adoption of AI-powered smart applications/systems, and this trend will increase exponentially over the next few years. AI technologies are maturing, and the need to leverage their capabilities is becoming a CXO priority.

As businesses make AI part of their core strategy, the transformation of business functions, measures, and controls to ensure ethical best practices will gain importance. The implementation and the governance of ethical AI practices will become a priority and a board-level concern.

The deployment of AI solutions that are ethical (from a regulatory and a legal standpoint), transparent, and without bias will become essential. As governments and industry bodies across the world articulate AI regulations, AI companies must establish their ethical frameworks until roadmaps are clearly defined.

The operationalization of ethical AI principles is challenging for enterprises, given the large volumes of user-centric data that need to be processed, the breadth of use-cases, the regulatory variations in operating markets, and the diverse stakeholder priorities.

This also opens up opportunities for technology vendors and service providers. To effectively partner with enterprises and monetize these opportunities, ICT providers need to assess potential areas impacting AI ethics and evaluate opportunities across the people-process-technology spectrum.

Forward-thinking technology and service companies, including large ICT providers and start-ups, are working with enterprises and industry stakeholders to leverage potential opportunities. Ethical challenges will continue to be discovered and remediated to create sustained growth in potential advisory services.

As enterprises define goals, values, strategic outcomes, and key performance metrics, the time is right for technology companies to strategically partner with enterprises in the detection and the mitigation of ethical AI concerns.

Key Topics Covered:

1. Strategic Imperatives

2. Growth Environment

3. Growth Opportunity Analysis

4. Growth Opportunity Universe

For more information about this report visit https://www.researchandmarkets.com/r/l7isqw

Media Contact:

Research and Markets Laura Wood, Senior Manager [emailprotected]

For E.S.T Office Hours Call +1-917-300-0470 For U.S./CAN Toll Free Call +1-800-526-8630 For GMT Office Hours Call +353-1-416-8900

U.S. Fax: 646-607-1904 Fax (outside U.S.): +353-1-481-1716

SOURCE Research and Markets

http://www.researchandmarkets.com

See the original post here:
Global AI (Artificial Intelligence) Market Report 2021: Ethical AI Practices and Advisory will be Incorporated in AI Technology Growth Strategy to...

Read More..

Artificial intelligence and mobility, who’s at the wheel? – Innovation Origins

Last week, the Dutch Scientific Council for Government Policy (WRR) found that the Netherlands is not well prepared for the consequences of artificial intelligence (AI). In Challenge AI, The New Systems Technology (in Dutch), the council calls for regulation of technology and data, its use, and social implications. And rightly so. Machines will have more computing power than humans in a few decades. If devices with artificial intelligence then start to think and decide for themselves, it is to be hoped that they will observe a number of commandments.

AI is also entering mobility, and the problems the WRR refers to are also at play there. The most imaginative AI appearance in mobility is the autonomous car. It is potentially much safer and more comfortable, but there are tricky liability issues if an accident occurs. Should you as a human always be able to override the system? And what would it take for a self-driving car to interpret the law flexibly when necessary? This is something we, as humans, do every minute in daily traffic, precisely in the service of safety.

One day, when I was driving along with traffic at 120 km/h on the E25 through the Ardennes, my automatic cruise control suddenly lowered the speed limit to 70 km/h because the road workers had forgotten to remove a speed sign. Fortunately, I was able to override that and not adhere to that officially legal speed limit. Despite this example, however, in the future, we should not start allowing extremely smart machines to be flexible with the rules, just like us, without any ethical or moral framework. That could lead to dystopian states where machines, perhaps unintentionally, start endangering humanity.

Want to be inspired 365 days per year? Heres the opportunity. We offer you one "origin of innovation" a day in a compact Telegram message. Seven days a week, delivered around 8 p.m. CET. Straight from our newsroom. Subscribe here, it's free!

But the AI issues in mobility go far beyond the self-driving car. What if Google or TomTom takes over traffic management from the road authority? What if the big tech giants take over the entire planning of public transport once people plan their journeys solely through their services? What if those platforms, after a friendly free initial period, start abusing their achieved monopolies? Who will guarantee availability and safety? Cab services like Uber are more popular than the classic taxi, but who can oblige them, as with regulated cab transport, to also accept guide dogs and wheelchairs, for example, so that a significant part of society is not left aside?

Artificial intelligence will make mobility better, safer, and more comfortable. But these systems need ethical and moral frameworks within which they can achieve this. In the Netherlands, companies, and knowledge institutions have already united in the Dutch AI Coalition. They received 276 million from the growth fund earlier this year to strengthen the Dutch position internationally. Wisely, the first part of that goes to so-called Elsa labs: Ethical, Legal & Societal aspects of AI, in which consortia focus on these aspects. Just as in mobility, AI will help steer other areas as well, but we still want to be able to take the wheel ourselves.

Maarten Steinbuch and Carlo van de Weijer are alternately writingthis weekly column, originally published (in Dutch)in FD. Did you like it? Theres more to enjoy: a book with a selection of these columns has just been published by24U and distributed byLecturis.

See the original post here:
Artificial intelligence and mobility, who's at the wheel? - Innovation Origins

Read More..

[Webinar] Balancing Compliance with AI Solutions – How Artificial Intelligence Can Drive the Future of Work by Enabling Fair, Efficient, and Auditable…

December 7th, 2021

2:00 PM - 3:00 PM EDT

*Eligible for HRCI and SHRM recertification credits

With the expansion of Talent Acquisition responsibilities and complex landscape from hiring recovery, talent redeployment, the great resignation, and DE&I initiatives, there has never been a greater need for intelligent, augmentation and automation solutions for recruiters, managers, and sourcers. There is also growing awareness of problematic artificial intelligence solutions being used across the HR space and the perils of efficiency and effectiveness solutions at the cost of fairness and diversity goals. These concerns are compounded with increased inquiries from employees and candidates of the AI solutions used to determine or influence their careers, particularly whats inside the AI and how they are tested for bias. Join this one-hour webinar hosted by HiredScore CEO & Founder Athena Karp as she shares:

Speakers

Athena Karp

CEO & Founder @HiredScore

Athena Karp is the founder and CEO of HiredScore, an artificial intelligence HR technology company that powers the global Fortune 500. HiredScore leverages the power of data science and machine learning to help companies reach diversity and inclusion goals, adapt for the future of work, provide talent mobility and opportunity, and HR efficiencies. HiredScore has won best-in-class industry recognition and honors for delivering business value, accelerating HR transformations, and leading innovation around bias mitigation and ethical AI.

Continued here:
[Webinar] Balancing Compliance with AI Solutions - How Artificial Intelligence Can Drive the Future of Work by Enabling Fair, Efficient, and Auditable...

Read More..

Boxcryptor protects business data in Microsoft Teams with end-to-end encryption features – Help Net Security

Already since summer 2020, the encryption software Boxcryptor offers additional security for data in Microsoft Teams. Now there is a major update that brings new features.

Among other things, users can send messages in end-to-end encrypted form. Passwords, bank data, any messages with sensitive content: Thanks to encryption by Boxcryptor in Microsoft Teams, it will not end up in the wrong hands and is secured in a GDPR-compliant manner.

Numerous companies, educational institutions, and organizations use Microsoft Teams as a collaboration tool. At the same time, the demand for a solution like Boxcryptor that reliably protects business data in Microsoft Teams also increased last year, especially due to the Corona pandemic.

After all, only consistent end-to-end encryption ensures that authorized people have exclusive access. If you do not want potential hackers or even Microsoft employees to gain insight into confidential data, you have to encrypt data and not let the key out of your hands during the entire process.

So far, Boxcryptor could be used in two ways in Microsoft Teams, as a personal app and in the team channels. Via the personal app, there is the possibility to access encrypted data in the personal OneDrive. In a team, Boxcryptor is available as a channel app. All members of the channel can request access to encrypted files in a channel and collaborate on these documents. Files can also be posted in channels securely encrypted, of course.

Encrypted messages: Anyone who wanted to share confidential information or personal data in Microsoft Teams and was previously unable to do so in a secure way can now easily send the information in a message, encrypted with Boxcryptor. This ensures that only authorized persons have access to sensitive information.

Application for mobile devices as well as in the browser: Apart from Windows and macOS, Boxcryptor for Microsoft Teams is now also available on iOS and Android, and in the browser version. Therefore, encrypted files can now be shared and accessed on all major platforms.

Encrypted files in private channels: Another new feature that many Boxcryptor customers have already been waiting for is the ability to work with encrypted data in private channels and chats as well. The way it works for users is the same as in the public channels.

See the article here:
Boxcryptor protects business data in Microsoft Teams with end-to-end encryption features - Help Net Security

Read More..

NordLocker goes mobile: Encrypt your files on iOS and Android now with 60% off – GlobeNewswire

LONDON, Nov. 24, 2021 (GLOBE NEWSWIRE) -- NordLocker, an encrypted cloud storage provider, is proud to announce that its bringing end-to-end encryption to files on smartphones by introducing iOS and Android mobile wrapper apps. This is made possible by a major change to NordLocker the Web Access feature which allows using the service while away from a computer.

Its a big step towards data security on the go, says Aiste Araminaite-Pivore, Head of Product at NordLocker. One of our core goals is to ensure that our users privacy does not depend on the device or operating system they use. This is why weve recently introduced Web Access, a feature to make sure your files are always secure and within reach.

NordLockers mobile experience

NordLocker mobile wrapper apps for Android and iOS are available for download now, while native applications are in progress. However, there is still plenty a user can do with the current version. For example:

What else has recently come to NordLocker?

2TB plan. NordLocker users can choose between three plans: a freemium version of 3 GB and paid 500 GB or 2 TB of private cloud storage for their files.

Award-winning product. NordLocker has won the Consumer Encryption Solution of the Year award by CyberSecurity Breakthrough, an independent organization that recognizes the top companies, technologies, and products in the global information security market.

Increased bug bounty. Together with other Nord brands, NordLocker increased its bug bounty rewards by ten times on the HackerOne platform. Ethical hackers who report unknown critical vulnerabilities now can expect US$50,000 or more.

Future plans

Besides the native iOS and Android apps, two more features are being developed to offer our users more convenience and improve file accessibility, says Aiste Araminaite-Pivore.

Third-party logins. In addition to the traditional login process and one-time codes, users will now be able to use Google and Apple logins to enter their existing Nord Account, the home platform to all Nord products.

Cloud locker sharing. A safe and easy way to share your encrypted cloud lockers. Just enter the receivers email address to make the locker appear in their app. If the receiver isnt a NordLocker user, theyll get an invitation.

Share via link. This will allow users to share their files via a link so that the receiver can open them without NordLocker.

NordLocker for business. Were launching a NordLocker business solution to improve our business users experience with functionalities such as an admin panel, user groups, and advanced security control.

By the way, NordLockers Premium plan is now 60% off. Thats unlimited file encryption and 500 GB of private cloud storage for just $3.19/month or 2 TB for $7.99/month. All plans come with a 30-day money-back guarantee.

ABOUT NORDLOCKER

NordLocker is the worlds first end-to-end file encryption tool with a private cloud. It was created by the cybersecurity experts behind NordVPN one of the most advanced VPN service providers in the world. NordLocker is available for Windows and macOS, supports all file types, offers a fast and intuitive interface, and guarantees secure sync between devices. With NordLocker, files are protected from hacking, surveillance, and data collection. For more information: nordlocker.com.

ContactSkirmante Akinyteskirmante@nordsec.com

Here is the original post:
NordLocker goes mobile: Encrypt your files on iOS and Android now with 60% off - GlobeNewswire

Read More..

Artificial intelligence in the healthcare sector: Lindera successfully closes financing round of six million euros – KULR-TV

Lindera one of the leading deep-tech companies in the field of computer vision has successfully closed a Series A financing round. The Berlin-based health-tech company is receiving additional growth capital from new investors as well as from its existing shareholders from the Rheingau Founders circle. With its technology, Lindera is democratising the use of high-precision 3D motion tracking in the healthcare sector. Lindera's scientifically tested and validated solution makes it possible to create motion analyses with a smartphone camera, comparable to the gold standard in measurement accuracy (GAITRite).

Karsten Wulf, Co-founder of buw Holding and Shareholder of family office zwei.7, comments on his investment: "Given the demographic developments and ongoing shortage of skilled care professionals, we see enormous potential in digital health and care applications. This is not only about the sustainable improvement of efficiency but also about increasing the quality of patient care. We are convinced that Lindera, with the cutting-edge digital technology it has developed in-house and its scientific excellence, will play an important role in this area while at the same time keep the focus on people." Commenting on the successful financing round, Diana Heinrichs, Founder and CEO of Lindera, says: "Similar to how Amazon has evolved from a pioneer in online book retail to one of the leading tech companies, backed by zwei.7 we are now developing from an AI pioneer in care into a movement specialist along the entire health supply chain."

With its AI-based mobility analysis, Lindera SturzApp, the Berlin-based company is already successfully in use in more than 350 care facilities and therapy centres throughout Germany. Its customer base includes some of the largest German care facility operators. Lindera is also planning to expand internationally via a pilot project in Paris. In addition, long-term cooperations with customers and health insurance companies, as well as deep roots in the care structures, have created the basis for further growth.

In addition to nursing care, Lindera has been deploying its technology in other medical areas for a long time. The company is using patented, self-learning computer vision technology to address inefficiencies in care structures and to standardise billing-relevant movement assessments at the highest level with the goal of increasing the quality of care measurably. As a result, Lindera aims to use its AI-driven medical devices to make lasting changes in other healthcare areas, such as orthopaedics, geriatrics, neurology, and physical rehabilitation. With "LTech" its own software development kit Lindera also provides its smart 3D algorithm to developers of other healthcare applications, contributing to the development of apps, for example, in the field of physiotherapy.

Within the care sector, Lindera has now received one of the largest investments in the DACH region to date. The team intends to use the additional capital to establish an objective, patient-centred quality standard in care, grow internationally, and advance the development for admission, treatment, and discharge management in hospitals.

Issued by news aktuell/ots on behalf of Lindera GmbH

See the article here:
Artificial intelligence in the healthcare sector: Lindera successfully closes financing round of six million euros - KULR-TV

Read More..

How Does End-To-End Encryption Works In WhatsApp? – Wales247

End-to-end encryption has become a common term while talking about the security of any app. WhatsApp has particularly popularised the term end-to-end encryption with the tagline, Message Privately. WhatsApp has used end-to-end encryption to attract billions of users globally. End to end encryption is used to protect personal data such as messages from any middle man by ensuring the message only stays between the receiver and sender.

The end-to-end encryption of WhatsApp ensures that the message that is sent by the sender, stays between for whom the message is meant. No one, not even WhatsApp can read the message that is being shared between the sender and the receiver. It is because end-to-end encrypted messages come with a special key that can only be unlocked by the recipient. To provide the users with end-to-end encryption, it uses Signal Protocol which is being developed by Open Whisper System.

When a user first installs WhatsApp on their device, one public and the private key are generated and the entire encryption process takes place in the smartphone itself. The private key that is being generated stays with the user and with the help of the centralised WhatsApp service, the public key is transferred to the receiver. When a message is being sent, even before the message reaches the centralised server, the public key encrypts the message that is being sent. Even though WhatsApp messages are encrypted, WhatsApp Status are not as it can be viewed by all the people in the contact. However, the statuses that you upload, like the Attitude Status and your images, can be protected by making changes to who can see the statuses. The WhatsApp server is only used for transferring such encrypted messages and this message can only be unlocked by the receiver.

WhatsApp offers end-to-end encryption and it is because security plays a vital role for the company. Digital security has become very important in the digital world and therefore, WhatsApp has started offering end-to-end encryption in 2016.

The encrypted messages that are being shared through WhatsApp cannot be read by WhatsApp. It is because the entire encryption and decryption of the messages take place only on the device. When a sender sends a message, the message is locked using a cryptographic lock and the key of the lock lies only with the recipient. To make the security more robust, WhatsApp changes the keys after every single message is sent.

End-to-end encryption offered by WhatsApp can be verified manually. For manually verifying the encryption offered by WhatsApp, tap on a contact name present in WhatsApp for the receiver for whom you want to verify the encryption. Now, tap on Encryption. This will allow you to view a QR code along with a 60-digit number. To verify the messages and calls with a particular contact are verified, you can scan the code present in the sender with the receiver. Further, the 60-digit numbers can also be compared.

WhatsApp, by default, offers end-to-end encrypted messages. However, the user can now choose whether they want the same layer of protection for their chat backup that is mostly stored either on iCloud or Google Drive. For enabling end-to-encryption of WhatsApp chat backup, go to Settings and then tap on Chats and then tap on Chat Backup and select End-to-End Encrypted Backup, then simply tap on Turn On. When you turn on end-to-end encryption for WhatsApp chat backup, no one will be able to access the backup of WhatsApp.

For creating a backup that is end-to-end encrypted, you will have to create a password. The encryption can be done either by creating a password or by using a 64-digit encryption key. If by accident, if you ever end up losing the password, WhatsApp will help the user to recover the backup.

Even though end-to-end encryption offered by WhatsApp is highly secure, it is not totally secure because just like any other app, even WhatsApp comes with its anomalies. These anomalies can result in data breaches. The same breach in security is visible through the Pegasus that have successfully explored the vulnerability of WhatsApp to leak important data. Such a cyber attack is possible but in no way, it means that WhatsApp is insecure. WhatsApp has always worked towards improving its security.

Continue reading here:
How Does End-To-End Encryption Works In WhatsApp? - Wales247

Read More..