Page 2,803«..1020..2,8022,8032,8042,805..2,8102,820..»

5+ best antivirus options for Windows 11 to try out today – WindowsReport.com

by Vladimir Popescu

Managing Editor

Windows 11 is capable of far more security and privacy than any of the previous releases from Microsoft, having as one important requirement the need for a TPM 2.0 chip.

The TPM chip, also known as Trusted Platform Module, enables your newly installed Windows 11 OS to manage all encryption policies and other security features more effectively and productively.

If youre interested, or simply curious, you can always find out more information about the TPM chip.

This in turn enables you more freedom to explore the web without feeling insecure about third-parties getting access to your data, or following your activity online.

Even though there are mentions about Windows 11 being installed on systems without this security module, if you want to upgrade to the new OS and dont have the required capabilities, you can always invest in a TPM-enabled motherboard, or buy a laptop with these elements built-in.

All of these elements being considered dont subtract from the fact that your Windows 11, much as any other OS before it, will need additional security elements.

To improve your security even further you can try a variety of methods, including getting a stable and efficient VPN software running.

The other way in which you can perform this important task is to install a powerful antivirus on your Windows 11 system.

In todays guide, we will discuss the latter element in its entirety, and we will also explore some of the best options found on the market this year.

As in the case of any other software, no matter if its related to your systems security or not, will have specific targets to achieve to be worthy of its presence on a list comprised of the best options.

Our team of testers, which accumulate over 15 years of experience in the field, have tested more than 10.000 devices and software options ranging from monitors to KVM switches, and from image editing software to the best coding platforms.

Their experience, combined with an objective and thorough approach, allows us to be extremely confident about recommending software and hardware, thus enabling you to make a fast and efficient choice depending on a variety of personal factors.

Below you will find some of the most important factors that our team of testers considered when scouring for the best antivirus software for Windows 11.

To understand what elements have been considered by our testing team when creating the list for the best antivirus software for Windows 11, here is a shortlist:

Compatibility Scanning capabilities Script blocking Malware and virus databases Ransomware protection Firewall availability File removal capability

Because mentioning these factors is not enough for you to understand the implications of each of the above-mentioned wanted features, further, were going to break each of them down and discuss them shortly.

As you might assume, having antivirus software installed that doesnt work optimally, or doesnt work at all on your OS is not a good idea.

Besides the fact that you wont be able to get the full protection offered by an antivirus, it might even cause system instabilities and de-activate whenever you need it to protect you from third parties, phishing attacks, etc issues.

As our subject in this article covers only antivirus software that will run optimally on Windows 11, you dont need to worry about this aspect. Weve got you covered with this list.

A good antivirus will need to have the capability to analyze every attempt of connecting or intrusions from third parties, no matter if it comes in the form of data packets from the network or files from your browser.

This type of scanning is called reactive scanning, and it is extremely important to ensure the protection of your system.

Another aspect of scanning that is worth considering is the antiviruss capability to deal with threats that have already passed the aforementioned barrier, and are now on your system.

This type of scanning is called in-depth scanning or most commonly known as a full system scan. This element allows you to scan your system in-depth and ensures the ability to identify threats, and then isolate or remove the script, file, or program thats causing the issue.

The antivirus options well explore in this list provide full reactive scanning features and full system scans with a high degree of thoroughness, so you wont need to keep an eye out for this detail.

One other important element of powerful antivirus software is the capability to stop any scripts from running without permission.

As many ActiveX or Java scripts can infiltrate your system with ease, a good antivirus will have the ability to identify the attempt and stop it before the actual infestation takes place.

Plugins that use either ActiveX or Java as their platform can inject a variety of harmful elements inside your system, some of the most common being botnets, inject codes, and drive-by downloads.

As no antivirus software can be efficient if it doesnt have an updated list of the recent malware and virus databases, this element ends up being one of the most important of them all.

The databases of good antivirus software will need to be constantly updated by the softwares providers and offer easily accessible database packages containing new iterations of viruses and malware information, to allow a thorough and exact identification process.

Ransomware protection

As the name already suggests, besides having the capability to identify viruses and malignant scripts, a good antivirus will ensure that no ransomware could be used against you.

The amount of ransomware appearing online has been increased over time, so owning an antivirus capable of protection from this element is a sure plus.

Firewall

Even though most antivirus software has some sort of firewall built into its structure, not all firewalls are built the same.

Considering this idea, your choice of antivirus must have a capable and thorough firewall included, which will ensure that the entire process of reactive scanning will take place optimally.

File Shredder

To ensure that the files you want to remove from your system are actually removed without any traces left behind, having a good file shredder incorporated inside your antivirus choice is a big plus as well.

Because your antivirus choice will constantly run in the background, it is also extremely important to know that it wont interfere too much with your everyday usage.

To ensure that thats the case, a good antivirus will be optimized in such a way that it will offer great protection levels, while also not hogging too much of your systems resources.

This applies both to the background operations, but even more when it comes down to the scanning process.

The NOD32antivirus from Eset is one of the most powerful and versatile antivirus options found on the market this year.

Ensuring amazing security and privacy features, and wrapped into a beautiful and easy-to-use UI, it is not hard to understand why this antivirus software has been chosen as one of the best options for Windows 11.

This antivirus software offers great firewall protection, spam filter, and some useful parental control features that will enable you to manage what your children are able or are not able to explore on the web.

The parental control feature has been upgraded constantly across time, now being a reliable and useful tool that not only offers you peace of mind but also protects your childrens development by eliminating any violent content from their browsing experience.

Even though it would be helpful for the parent controls to extend further than the browsing experience, the scores obtained at this level by Eset NOD32 are still impressive.

To ensure that your privacy is protected at all times, NOD32 deploys state-of-the-art webcam security, thus blocking any unwanted attempts of spying or remote camera activation while exploring the web, and while your computer is in standby mode.

Because the developers at Eset understand how important your financial privacy is, they also enable you to protect your online banking transactions with high-grade encryption, thus eliminating the possibility that a third party could use your credit card details in any way.

As you can see from the image below, Eset NOD32 stats have improved considerably over time, offering great protection levels, great performance, and usability levels are also very good.

To round up this powerful antivirus and protection service, NOD32 also comes with a useful network analyzer, that not only protects the network itself from intrusions but also ensures that the data transferred through it is protected and managed at all times.

Other useful features:

Powerful protection bundled into an easy-to-understand user interface for your new Windows 11 OS.

Bitdefender is also a force to be reckoned with in the field of antivirus software for Windows 11, offering a wide range of useful features, and full compatibility with the new Microsoft OS.

As the developers of Bitdefender focus primarily on the security of its users, the app itself shows this element by offering a great set of extra features besides protection from viruses.

The password management system contained by this antivirus software enables you to rest assured that all your private credentials are stored securely and privately, without any risk of the data being stolen and used against you.

To cover the online transactions section of security, Bitdefender offers enhanced security in this department as well, allowing you to manage any data by clicking your mouse a couple of times.

No all-around security application would be complete without powerful ransomware protection services, and a VPN. Bitdefender doesnt lack in these departments either, offering top-of-the-range ransomware identification and protection, and a VPN that can rival some of the best stand-alone VPNs on the market.

Where BitDefender truly shines is the phishing protection level, which protects your system from being attacked with this modality, and thus protecting your user data, and eliminating any risks involving fake websites and applications.

As you can see from the graph below, BitDefender not only performs well but offers users constant protection without lacking in usability.

The entire series of Network Threat protection components work perfectly with the Online Threat Protection, covering the entire spectrum of possible threats, while also covering the duties of a firewall, and adds the Anti-Tracker component which installs in your browser for an extra layer of security.

Other useful features:

Compiling an amazing array of useful features that not only protect your privacy but also offer great security, Bitdefender also works great on Windows 11.

Bullguard is another great contender for the list of the best antivirus software to use on Windows 11, offering amazing threat identification features, and at the same time protecting your system from phishing, malware, and network data collection.

This antivirus software enables you to easily clean any malware infestation, while also preventing you from being exposed to any other new attacks, and to top it off, it stops you from accessing fraudulent websites by displaying a message whenever it detects a problem.

Added to this, as soon as you complete the installation process, Bullguard automatically updates all the virus definition packets, to ensure that its ready to tackle any threat, no matter how current it is.

Besides the modern UI that offers you an easy-to-understand installer, Bullguard uses a set of multiple elements to protect you from the biggest threats in the online world.

The multi-layered protection Bullguard has to offer include 6 total levels:

Its modern user interface not only looks good but also offers you quick access to the entire set of features you need to keep your system protected.

To do so, Bullguard keeps all the relevant information bundled in the main menu, thus whenever youre starting a scan and checking for system vulnerabilities, everything is presented in the respective box.

Below you can see the results of testing for the level of protection, performance, and also usability for this powerful antivirus.

As you can see, the protection level has stayed consistent, and the performance as well, while usability has been increased exponentially over the last year, making Bullguard one of the best options on the market.

Other useful features:

With BullGuard, you can rest assured that your system is protected entirely, and focus entirely on using your newly installed Windows 11.

Kaspersky Internet Security is another powerful application that enables you to easily protect both your local and online security, with a list of amazing features.

Even though it is only in the 4th position in this list, this doesnt make it any less capable of solving your security issues and does it with a beautiful and slick user interface, which enables quick access and quick control of all the aspects of your PCs security level.

After youve installed the application, once you open it, you will see the window presented below, which enables you to type in your email address and connect your account to automatically activate the license.

Making the setup process so easy to complete says a lot about the entire utilizability level of this powerful software, the same principles applying to all aspects of the program.

When it comes to the main focus of Kaspersky security this software proves to be a great contender for the software found in the first positions on this list.

Other useful features:

As you can see from the image below, added to the amazing set of features presented above, you also get access to a powerful Webcam Protection service which ensures that your privacy will always be protected.

These also include Account Check and Private Browsing to round it up nicely and offer protection in all departments.

Below, you can also observe the stats regarding how the services have evolved across time with Kaspersky:

As you can see from the data above, the stability of usability in the last year is absolutely spotless, while in terms of protection and performance, even though things have been shaky from time to time, it offers great overall results.

Make sure that you are always protected while using the Internet on Windows 11 with this powerful software.

Norton Antivirus Plus is very close to the first positions presented in this list in terms of security, optimization, and privacy features.

This powerful antivirus software offers full tech support no matter what your problem is, so in the case that Norton will fail when trying to remove malware from your system, experts from the company will help you by logging into your PC remotely and resolving the problem.

This service makes you feel like you have a full team of experts ready to tackle any sort of problems with the software, which makes it an incredible addition both for common users, but especially for enterprises and companies.

Besides this incredible customer service, Norton Antivirus Plus also includes a variety of other systems that allow you peace of mind no matter what your issues are.

The scanning array on Norton Antivirus Plus is absolutely amazing, offering a wide array of options, added to a Power Eraser, Norton Insight, and the capability to create Diagnostic Reports.

To get started, you get an Online Banking Protection feature, which, as described by the name itself protects your online payment processing at all times.

No antivirus would be complete without a Data Protector, which Norton does flawlessly, having an incredible rate of ransomware detection.

while also using Script Control and Wi-Fi security detectors to cover this area of your experience with the software.

My Norton is a central hub that gathers data from all the Norton elements you use across your devices.

This element can prove extremely useful if you want to manage the entire set of security systems with just a few clicks of the mouse.

Now lets see how Norton Antivirus Plus ranks when it comes to stability over time, in terms of protection, performance, and also usability.

As you can see, the results are extremely promising, and even though there were some issues here and there, Norton Antivirus Plus doesnt disappoint in any department.

Other useful features:

Explore the web on Windows 11 without any worries about phishing, malware, or attempts on your privacy, with this amazing software.

McAfee also deserves to be part of our best antivirus software list for Windows 11 as it ticks all the required boxes without any issues.

Continue reading here:
5+ best antivirus options for Windows 11 to try out today - WindowsReport.com

Read More..

India will be engine of global growth after 2nd Covid wave: Jaishankar – Hindustan Times

Indias strong economic recovery after it emerges from the second wave of Covid-19 infections will be an engine of growth for the global economy, external affairs minister S Jaishankar said on Tuesday.

Jaishankar made the remarks while addressing the maiden edition of the Indo-Pacific Business Summit organised by the external affairs ministry and Confederation of Indian Industry (CII) as part of efforts to drive post-pandemic economic growth.

The Indo-Pacific concept reflects the reality of globalisation, the emergence of multi-polarity and the benefits of rebalancing, and means the overcoming of the Cold War and a rejection of bipolarity and dominance, he said. It is also an expression of the collective interest in promoting global prosperity and securing the global commons, he added.

India is coming out of the second wave and will witness a strong economic recovery. It will be a more dynamic and friendlier business destination. We will contribute to being an engine of growth for the global economy, Jaishankar said.

And we will be very much a part of more reliable and resilient supply chains that the post-Covid world requires. International cooperation...will be very much a key to the better world that we all seek. The Indo-Pacific a region in which we are so deeply invested historically will be an arena of particular activity and energy, he said.

Several sessions of the business summit on Tuesday were addressed by envoys of key countries, including Singapore high commissioner Simon Wong, Vietnam ambassador Pham Sahn Chau and United Arab Emirates ambassador Ahmed Al-Banna.

Jaishankar noted that the transformation of the past decade has been overshadowed by the impact of Covid-19, which disrupted supply chains, negatively impacted manufacturing, made international trade unpredictable and ruined many services sectors.

Globalised production networks remain vulnerable and fragile, with global merchandise trade falling by 5.6% in 2020, compared to 2019, and the predicted trade in services declining by as much as 15.4% in the same duration...The hit taken by travel, transport and tourism activities is alarming and really moves us into unchartered territory, he said.

Three factors the salience of health, the power of digital, and the importance of re-building greener will be crucial as countries chart a course towards recovery, he said.

Covid-19 had brought out many inadequacies in the global health system and the resulting debates are taking place elsewhere. What is relevant for us here is to recognise that in every society, the expectation of our public with regard to health has gone up, he said.

Whether it is the next wave, the next pandemic or indeed something quite different, part of the answer lies in greater international collaboration. By that I mean the working together not just of governments, but of businesses and the medical and scientific professions, he added.

High-speed internet, cyber security, enhanced digital literacy, regional e-commerce and efficient e-governance will become more important and the strengthening of digital connectivity within and between countries of the Indo-Pacific is essential for economic prosperity, Jaishankar said.

Collective efforts are also needed to re-define infrastructure and urbanisation, and can make agriculture more sustainable. Physical and digital connectivity remain important for supporting shorter, efficient and diversified supply-chains, risk mitigation, enhanced trade facilitation, and reduction in the costs of intra-regional trade, he remarked.

Read the original post:
India will be engine of global growth after 2nd Covid wave: Jaishankar - Hindustan Times

Read More..

Quantum Blockchain Technologies Plc – Working with D-Wave Systems – Yahoo Finance UK

6 July 2021

Quantum Blockchain Technologies Plc(QBT or the Company)

QBT To Use D-Waves Quantum Technologies In Cryptography Algorithms

Quantum Blockchain Technologies Plc (AIM: QBT), the UK Quantum Computing Cryptography and Artificial Intelligence research and development (R&D) and investment company, listed on the London Stock Exchanges AIM market, announces it will use the Leap quantum cloud service from D-Wave Systems Inc., the leader in quantum computing systems, software and services, to develop cryptography algorithms for crypto currency mining.

QBT will now be able to access D-Waves quantum-classical hybrid solvers, which leverage both quantum solutions and best-in-class classical algorithms to run large-scale business-critical problems. With real-time access to quantum computers via the cloud, QBT aims to transform classic computing cryptography algorithms, such as the one used for Bitcoin mining, in quantum computations, or quantum-classic hybrid computations.

QBTs quantum computing team is working on the Leap platform with the goal to exploit the speed of quantum computations, which can be, under the appropriate conditions, several order of magnitudes faster than a classic computer.

D-Waves new quantum computer, Advantage, includes more than 5,000 qubits and 15-way qubit connectivity. More qubits and richer connectivity provide programmers and businesses access to a larger, denser, and more powerful graph for building commercial quantum applications.

The hybrid solver services in the Leap platform combine the power of Advantage with classical resources, enabling businesses and developers to build, run and solve complex, large-scale business-critical problems with up to 1 million variables.

QBT has already created a team, which has started working on the conversion of optimised cryptographic algorithms, in order to make them suitable to run on D-Waves quantum system and quantum hybrid solvers.

Francesco Gardin, CEO and Executive Chairman of QBT, commented, QBT is delighted to work with the D-Wave team, which we believe will provide us with an alternative approach to the computation of cryptographic algorithms. We have selected what we believe is a major international consolidated player in the quantum computing market and we look forward to working with them during the first phase of the project. In particular, we are excited to have the benefit of utilising D-Waves Advantage quantum processor, with more than 5,000 qubits where we intend to develop our optimised cryptographic algorithms.

Story continues

Alan Baratz, CEO of D-Wave Systems Inc., commented, Bringing quantum computing to the world requires a robust ecosystem of developers and researchers, as well as forward-thinking businesses that are committed to building practical and applied quantum computing applications. QBT is a leader in developing new and disruptive approaches to blockchain technology an important innovation with the power to change the world.

For more information on D-Wave, please go to: https://www.dwavesys.com/quantum-computing

-ends-

For further information please contact:

Quantum Blockchain Technologies PlcFrancesco Gardin, CEO and Executive Chairman

+39 335 296573

SP Angel Corporate Finance(Nominated Adviser & Broker)Jeff Keating

+44 (0)20 3470 0470

Leander (Financial PR)Christian Taylor-Wilkinson

+44 (0) 7795 168 157

About Quantum Blockchain Technologies (AIM: QBT)

Quantums R&D focus is on Cryptography and AI using Quantum Computing, bringing together the most advanced classic computing technology, along with quantum computing and AI deep learning, to develop, among other things, a new and disruptive approach to blockchain technology, which includes cryptocurrencies mining and other advanced blockchain applications.

The Company has set up a team of international experts in the above sectors, as well as a computing infrastructure to support the development of the most advanced innovative solution based on the front-line IT technologies.

For further information, please visit, http://www.quantumblockchaintechnologies.co.uk

Originally posted here:
Quantum Blockchain Technologies Plc - Working with D-Wave Systems - Yahoo Finance UK

Read More..

Conclusions from Forum TERATEC 2021: European Cooperation, Novel Uses of HPC – HPCwire

July 1, 2021 As the world enters the quantum era while politicians define the future face of a digital Europe, High Performance Computing (HPC) shape the necessary and expected post-Covid rebound. Held from June 22 to 24, 2021, the 16th Forum Teratec highlighted the major challenges facing the entire HPC sector and the European community: autonomous production of supercomputers, democratization of HPC uses, and pooling of knowledge and skills at the European level.

Democratization of HPC use across businesses

As participating companies have shown us during thisTeratecForum, supercomputers are becoming increasingly popular in several sectors even outside industry, such as medical optics for smart glasses, and archaeology for large-scale, ultra-precise surveys However, these are still unsettled uses.

Industries in all sectors see supercomputers as a possible solution to the complex problems encountered by their customers along with new products yet to be created to address them.

With growing number and diversity of users of High Performance Computing (HPC) as for data storage consequently, new challenges will appear to manufacturers and technology providers.

The increase in demand will match an increase in computer power and, consistently in energy consumption and computer costs. As President ofTeratec, DanielVerwaerde, points out: In the next few decades, the world of supercomputers must be able to offer solutions closely reaching carbon neutrality.

If they want to offer seamless interfaces without loss of performance and from a sole technical standpoint, manufacturers will need to ensure that data is managed consistently between conventional processor, accelerator, and coprocessor.

Minister Delegate to the Minister of Economy, Finance and Recovery, in charge of Industry, Agns Pannier-Runacherrecalled that if quantum technology is to bring the promise of a major technological breakthrough by shortening computing times by a factor of 1 billion within 5 to 10 years, the investment will of course have to be made in hardware equipment as planned by the French Quantum Plan (1.8 billion euros over five years) beside European projects, also enabling to engage accelerators and quantum computers in operation within computing centers.

As reported by DanielVerwaerde: Failing to work in these three areas simultaneously, the investments made will be all the more useless because they are so important.

Europe-wide cooperation

Whether France aims to be among leaders in these technologies and particularly in quantum computing requires cooperation on a European scale. Even if France indeed has been pursuing a proactive policy in this field since the 1960s, financial stakes for the next generations of supercomputers are such that the nation cannot act alone. Since French and European policies are in line with each other, the expertise acquired over decades can only give France a leading role.

As DanielVerwaerdereaffirmed: for supercomputers are strategic tools for our European development and our collective security, failing to be autonomous in this field would be a serious economic handicap (supercomputers are high value-added products) but also a societal one (production generates jobs, from most qualified to other many technical and manufacturing skills).

Anders Dam Jensen, Executive Director ofEuroHPC, recalled the missions of the joint European venture: to provide Europe with eight supercomputers ranked, if possible, in the top five in the world which will enable it to compete on equal footing with its competitors, and to develop a complete supply chain so that Europe can be autonomous in the production of such supercomputers. One among deadlines is to produce a European-based technology computer over the next call for tenders for the production of exaflops computers starting in 2023.

This collaboration is fully expressed in the future implementation of one interconnection between all the major European computing centers, planned after 2025. National competence centers will be referenced for each member country so that all industrial companies have access to high-performance computing, including SMEs and government agencies. In France,Teratechas been designated by the government andEuroHPCto be the national competence center, in cooperation withCerfacs(European Center for Research and Advanced Training in Scientific Computing) and GENCI (GrandEquipementNational deCalculIntensif).

We are at a turning point [] and this is where European involvement is particularly important, saidHervMouren, Director ofTeratec. And DanielVerwaerdeadded: Investing in the European project increase chances that the policy decided by Europe will be the one that France needs.

To be released, a summary of various presentations at Teratec:

A summary will soon be available to outline the richness of interventions that took place during the 16th Forum Teratec.

Workshops were also held on targeted topics: hybrid quantum computing, communicable diseases, cyber threats, satellite data for the environment and climate, autonomous systems and HPC storage.

Finally, focusing on technological challenges of high-performance simulation and the diversity of uses of HPC, the roundtables reviewed:

The next Forum Teratec 2022 will be held June 14 & 15, 2022.

Find more information on Forum 2021 here:

https://teratec.eu/forum/index.html

Source: TERATEC

Read more:
Conclusions from Forum TERATEC 2021: European Cooperation, Novel Uses of HPC - HPCwire

Read More..

Quantum Key Distribution: Is it as secure as claimed and what can it offer the enterprise? – The Register

Feature Do the laws of physics trump mathematical complexity, or is Quantum Key Distribution (QKD) nothing more than 21st-century enterprise encryption snake oil? The number of QKD news headlines that have included unhackable, uncrackable or unbreakable could certainly lead you towards the former conclusion.

However, we at The Reg are unrelenting sceptics for our sins and take all such claims with a bulk-buy bag of Saxa. What this correspondent is not, however, is a physicist nor a mathematician, let alone a quantum cryptography expert. Thankfully, I know several people who are, so I asked them the difficult questions. Here's how those conversations went.

I can tell you what QKD isn't, and that's quantum cryptography. Instead, as the name suggests, it's just the part that deals with the exchange of encryption keys.

As defined by the creators of the first Quantum key distribution (QKD) protocol, (Bennett and Brassard, 1984) it is a method to solve the problem of the need to distribute secret keys among distant Alice and Bobs in order for cryptography to work. The way QKD solves this problem is by using quantum communication. "It relies on the fact that any attempt of an adversary to wiretap the communication would, by the laws of quantum mechanics, inevitably introduce disturbances which can be detected."

Quantum security expert, mathematician and security researcher Dr Mark Carney explains there "are a few fundamental requirements for QKD to work between Alice (A) and Bob (B), these being a quantum key exchange protocol to guarantee the key exchange has a level of security, a quantum and classical channel between A and B, and the relevant hardware and control software for A and B to enact the protocol we started with."

If you are the diagrammatical type, there's a nifty if nerdy explanatory one here.

It's kind of a given that, in and of themselves, quantum key exchange protocols are primarily very secure, as Dr Carney says most are derived from either BB84 (said QKD protocol of Bennett and Brassard, 1984) or E91 (Eckert, 1991) and sometimes a mixture of the two.

"They've had a lot of scrutiny, but they are generally considered to be solid protocols," Dr Carney says, "and when you see people claiming that 'quantum key exchange is totally secure and unhackable' there are a few things that are meant: that the key length is good (at least 256 bits), the protocol can detect someone eavesdropping on the quantum channel and the entropy of the system gives unpredictable keys, and the use of quantum states to encode these means they are tamper-evident."

So, if the protocol is accepted as secure, where do the snake oil claims enter the equation? According to Dr Carney, it's in the implementation where things start to get very sticky.

"We all know that hardware, firmware, and software have bugs even the most well researched, well assessed, widely hacked pieces of tech such as the smartphone regularly has bug updates, security fixes, and emergency patches. Bug-free code is hard, and it shouldn't be considered that the control systems for QKD are any different," Carney insists.

In other words, it's all well and good having a perfected quantum protocol, but if someone can do memory analysis on A or B's systems, then your "super secure" key can get pwned. "It's monumentally naive in my view that the companies producing QKD tech don't take this head on," Dr Carney concludes. "Hiding behind 'magic quantum woo-woo security' is only going to go so far before people start realising."

Professor Rob Young, director of the Quantum Technology Centre at Lancaster University, agrees that there is a gap between an ideal QKD implementation and a real system, as putting the theory into practice isn't easy without making compromises.

QKD connections can be blocked using a DDoS attack as simple as using a pneumatic drill in the vicinity of the cable

"When you generate the states to send from the transmitter," he explains, "errors are made, and detecting them at the receiver efficiently is challenging. Security proofs typically rely on a long list of often unmet assumptions in the real world."

Then there are the hardware limitations, with most commercially implemented QKD systems using a discrete-state protocol sending single photons down low-loss fibres. "Photons can travel a surprising distance before being absorbed, but it means that the data exchange rate falls off exponentially with distance," Young says.

"Nodes in networks need to be trusted currently, as we can't practically relay or switch quantum channels without trusting the nodes. Solutions to these problems are in development, but they could be years away from commercial implementation."

This lack of quantum repeaters is a red flag, according to Duncan Jones, head of Quantum Cybersecurity at Cambridge Quantum, who warns that "trusted repeaters" are not the same thing. "In most cases this simply means a trusted box which reads the key material from one fibre cable and re-transmits it down another. This is not a quantum-safe approach and negates the security benefits of QKD."

Then there's the motorway junction conundrum. Over to Andersen Cheng, CEO at Post-Quantum, to explain. Cheng points to problems such as QKD only telling you that a person-in-the-middle attack has happened, with photons disturbed because of the interception, but not where that attack is taking place or how many attacks are happening.

"If someone is going to put a tap along your 150km high-grade clear fibre-optic cable, how are you going to locate and weed out those taps quickly?" Cheng asks.

What if an attacker locates your cable grid and cuts a cable off? Where is the contingency for redundancy to ensure no disruption? This is where the motorway junction conundrum comes in.

"QKD is like two junctions of a motorway," Cheng explains. "You know car accidents are happening because the road surface is being attacked, but you do not know how many accidents have happened or where or who the culprit is, so you cannot go and kick the offenders out and patch up the road surface."

This all comes to the fore when Anderson insists: "QKD connections can be blocked using a DDoS attack as simple as using a pneumatic drill in the vicinity of the cable."

Sally Epstein, head of Strategic Technology at Cambridge Consultants, throws a couple of pertinent questions into the "ask any QKD vendor" ring.

Quantum-safe cryptography, coupled with verifiable quantum key generation, is an excellent approach to the same problem and works perfectly today

"1. Supply chain: There is a much greater potential for well-funded bad actors to get into the supply chain. How do they manage their supply chain security?

"2. Human fallibility: There are almost certainly exploitable weaknesses in the control software, optical sub-assemblies, electronic, firmware, etc. What penetration testing has the supplier conducted in terms of software and hardware?"

Professor Young thinks that QKD currently offers little return on investment for your average enterprise. "QKD can distribute keys with provable security metrics, but current systems are expensive, slow and difficult to implement," he says.

As has already been pointed out, security proofs are generally based on ideal cases without taking the actual physical implementation into account. This, Young says, "troubles the central premise of using QKD in the first place."

However, he doesn't think that the limitations are fundamental and sees an exciting future for the technology.

Because QKD technology is still maturing, and keys can only be sent across relatively short distances using dedicated fibre-optic cables, Jones argues that "only the biggest enterprises and telcos should be spending any money on researching this technology today."

Not least, he says, because the problems QKD solves are equally well addressed through different means. "Quantum-safe cryptography, coupled with verifiable quantum key generation, is an excellent approach to the same problem and works perfectly today," Jones concludes.

Professor Andrew Lord, head of Optical Network Research at BT, has a less pessimistic outlook.

"Our trial with NCC in Bristol illustrates a client with a need to transmit data which should remain secure for many years into the future," Lord told The Reg. "QKD is attractive here because it provides security against the 'tap now, decrypt later' risk, where data could be stored and decrypted when a quantum computer becomes available."

The UK's National Cyber Security Centre (NCSC) has gone on the record to state it does not endorse the use of QKD for any government or military application, and the National Security Agency (NSA) in the US has reached the same conclusion.

Jones of Cambridge Quantum says he completely agrees with the NCSC/NSA perspectives because the "first generation of quantum security technologies has failed to deliver tangible benefits for commercial or government applications."

Young goes further: "Both NCSC and NSA echo the views of all serious cryptographers with regards to QKD, and I am in complete agreement with them."

So what needs to change to make QKD solutions relevant to enterprises in the real world? Lord admits that the specialised hardware requirements of QKD does mean it won't be the best solution for all use cases, but foresees "photonic-chip based QKD ultimately bringing the price down to a point where it can be integrated into standard optical transmission equipment."

Dr Carney adds: "In closing, all this leaves us with the biggest misunderstanding about QKD vs classical key exchange; in classical key exchange the mathematics that makes Elliptic Curve Diffie-Hellman Ephemeral (ECDHE) or your favourite Post-Quantum Cryptography (PQC) key exchange secure is distinct and independent of the physical channel (the classical channel) that is being used for the protocol.

"On a QKD system, the mathematics is in some way intrinsically, and necessarily, linked to the actual physicality of the system. This situation is unavoidable, and we would do well to design for and around it."

Visit link:

Quantum Key Distribution: Is it as secure as claimed and what can it offer the enterprise? - The Register

Read More..

Bulls are back, but regulatory fears hamper the DeFi and altcoin recovery – Cointelegraph

On May 19, the total cryptocurrency market capitalization nosedived by 19% and has since failed to recover to the $1.8 trillion mark. More than 40 days have passed, and investors have begun to question what could happen to altcoins if the current bear market takes longer than expected to recover.

Before digging into that, analysts first need to understand whether specific sectors held out better than most, and more importantly, they should distinguish which cryptocurrencies have managed to stay afloat over the past 30 days.

Although the total crypto market cap is down 5% in 30 days, nearly 44 of the top 100 coins are down 19% or more during this period. This data is a strong indicator that investors have been cutting losses on some altcoins.

The list of worst performers displays an impressive number of tokens from smart contract platforms. In fact, five out of the top six fall under that category. One key aspect could be the sharp drop in Ethereum network gas fees, which is causing less demand for alternative solutions.

Another pattern that has emerged is the synthetic assets category, represented by Synthetix Network Token (SNX), UMAand Perpetual Protocol's PERP token. Investors could be sensing potential issues, as the World Economic Forum recently published a policy toolkit for decentralized finance regulation. Furthermore, Dan Berkovitz, commissioner of the U.S. Commodity Futures Trading Commission,stated that DeFi is likely illegal.

On the other hand, the list of outliers over the past month is significatively shorter. Only 12 of the top 100 managed to present positive performances.

This time around, it is difficult to find a common trend among the top performers. Both Flexa's AMP tokenand Quant's QNTwere recently listed on Coinbase Pro. Meanwhile, Theta is expected to launch its Mainnet 3.0 on June 30. Lastly, Solana Labs, which is behind the popular SOL token, raised $314 million through a private token sale.

Therefore, some conclusions can be drawn from the analysis. The fact that only 12 tokens could present gains over the past 30 days shows that diversification into altcoins may not have paid off. Meanwhile, bets on "Ethereum killers" offered higher losses, as the bear market itself managed to curb excessive gas fees.

Lastly, the regulatory uncertainty around DeFi is realistically not going to be solved over the next 30 days. There is reason to believe that July's Ethereum network upgrade and the reverberatons of El Salvador's decision to make Bitcoin (BTC) an official currency will likely concentrate investors' attention and money on BTC and Ether (ETH).

The views and opinions expressed here are solely those of the author and do not necessarily reflect the views of Cointelegraph. Every investment and trading move involves risk. You should conduct your own research when making a decision.

Link:
Bulls are back, but regulatory fears hamper the DeFi and altcoin recovery - Cointelegraph

Read More..

Analyst Says Crypto Traders Are Sleeping on One Altcoin As Final Leg of Bull Run Approaches – The Daily Hodl

Popular trader Credible Crypto thinks one large-cap altcoin that some are counting out could see new all-time highs in the coming months.

The pseudonymous analyst tells his 222,000 Twitter followers that Litecoin (LTC) could capitalize on the final legendary leg of the current bull run.

Seeing a lot of people saying LTC had its bull run and its headed to the grave.

I dont trade fractals, but I do think we will see something similar to what we saw in 2017 on the left. Not just for LTC but for much of the old guard. Still think new ATH is on the cards.

As for the timing of his prediction, he thinks the final rally will begin after some months of consolidation have passed.

Credible Crypto also thinks Bitcoin Cash (BCH) could see all-time highs. And he warns traders not to count out XRP.

XRP was also one of the worst-performing majors in 2017, until it wasnt. In the 30 days following BTCs peak, XRP rallied over 10x bringing total gains for its cycle to 62,947% or 629x. Dont count it out simply because it has had a slow start.

Additionally, the analyst says the market is pushing into a key area of demand for the decentralized public network Hedera Hashgraph (HBAR).

Did not think we were going to get a 3rd chance to buy at these levels but the market felt kind.

Note that each successive drive down is aggressively bought up indicating seller absorption as we push into a key HTF area of demand. Buyers are stepping in here, repeatedly.

Credible Crypto predicts that Bitcoin (BTC) will move towards $45-55,000 if it can break $35-38,000. If it goes higher, he plans to short it.

If we can get to 55k Ill look to hedge short. I know if we manage to get there many will be euphoric- calling for new ATH when in reality that region is the most likely place to see a mid-term rejection. Have a plan.

Featured Image: Shutterstock/Wlad74

Read the original post:
Analyst Says Crypto Traders Are Sleeping on One Altcoin As Final Leg of Bull Run Approaches - The Daily Hodl

Read More..

Enterprise Adoption Will Trigger Billion-Dollar Surge in Two Altcoins, Predicts Crypto Trader Tyler Swope – The Daily Hodl

Crypto trader Tyler Swope predicts a billion-dollar deluge of capital will flow into two digital assets, allowing them lead the way in the next altcoin boom.

The host of Chico Crypto tells his 255,000 YouTube subscribers that Compound Finance (COMP) is likely to move much higher on the list of crypto assets by market cap.

Swope references an announcement from Circle where the blockchain giant reveals it will utilize Compound Finance in its plans to give businesses access to decentralized finance (DeFi) lending markets, as well as other services.

This DeFi protocol is going to be the first one which works with Circles DeFi API So why is this a pick of mine besides that blog? Well, for one, it has slipped way down the charts, down to rank 58, while a bunch of token crap is ranked higher with no use.

And you even have some of its C tokens, CETH, CDAI, CUSDC ranked higher than Compounds governance token. This proves massive use of the Compound protocol having those tokens up higher, and I think the governance token should be ranked higher than those At least in the top 30 cryptos.

At time of writing, COMP is trading at $375.34 and is currently the 49th largest crypto asset according to CoinGecko.

The second altcoin on Swopes list is Unibright (UBT), which develops enterprise blockchain solutions, and builds integration platforms and ecosystems for tokenized assets.

Unibright also plays a major role in developing the Baseline Protocol and Baseledger, which is an open-source initiative to provide a suite of new blockchain-based services to business enterprises.

Swope takes note of a recent discussion between developers, who say announcements on the platforms corporate adoption are in the pipeline.

At time of writing, UBT is trading at $1.17, trading almost completely sideways for the past 30 days according to CoinGecko.

I

Featured Image: Shutterstock/Gorodenkoff

Read this article:
Enterprise Adoption Will Trigger Billion-Dollar Surge in Two Altcoins, Predicts Crypto Trader Tyler Swope - The Daily Hodl

Read More..

What is an Altcoin? | Cryptocurrency – Investment U

Cryptocurrency is well-established as a mainstream investment vehicle, thanks largely to the popularity of Bitcoin. But Bitcoin isnt the only crypto asset to gain steam. There are hundreds of different altcoins out there, some more popular and stable than others. What is an altcoin? Really, its any other crypto asset outside of Bitcoin; however, serious investors usually only group stable, established crypto assets under this umbrella.

If youre interested in crypto investing but want to avoid the hype surrounding Bitcoin, consider an altcoin. From stablecoins to utility tokens, theres plenty of opportunity out there. Heres a look at altcoins and why investors are flocking to them as Bitcoin paves the way for crypto stability.

Bitcoin (BTC) is by far the most popular cryptocurrency out there. However, at more than $30k per coin, most investors can only afford to invest in a fraction of Bitcoin. Instead, theyre flocking to similar promising coins to make alternative investments in crypto. Theres a sea of cryptocurrencies out there, including popular favorites like Ethereum (ETH) and Litecoin (LITE), which trade for significantly less than Bitcoin.

Theres also a burgeoning small market for upstart altcoins. Coins structured similar to Bitcoin and Ethereum offer the promise of future growth in the early stages of mining, when its possible to accumulate tokens worth very little. Many investors buy into young cryptocurrencies in the hope that theyre the next Bitcoin. Unfortunately, there are more scam coins and unstable coins than there are viable cryptocurrencies. Altcoin investors need to beware.

Before investing in altcoins, investors should be aware of what type of crypto asset theyre investing in. Most people tend to consider all crypto assets currency, but there are different types of coins, as well as tokens to consider. Some of the most popular include:

As the crypto market grows, more and more altcoins spawn into existence. As they do, they take different formseach of which offers some form of value to the holder.

While its nearly impossible to account for all of the new cryptocurrencies and altcoins that pop up each year, there are a few that rise in popularity and value. These tend to be stable altcoins (different from stablecoins) that are well-moderated and designed to control inflation and dilution. Some of the most popular altcoins in recent years include:

These cryptocurrencies range from pennies to thousands of dollars, representing the gamut of opportunities within the altcoin market. Moreover, the crypto landscape is changing so far that a year from now, theres likely to be a new wave of profitable, stable altcoins.

For those interested in an alternative investment, altcoins are a great opportunity. While volatility is a concern in crypto markets, altcoins benefit from tremendous investor sentimentmeaning everyones looking for the next Bitcoin. Even smaller, micro-cap coins have a chance to gain incredible momentum and grow.

Altcoins are also great because theyre generally not affected by peripheral markets. As such, theyre a great hedge against traditional markets, like the stock market or the forex market. This also means theyre less subject to regulation, which allows for more natural development of altcoins as investors take an interest in them.

The big drawbacks of altcoins are the same as any crypto asset. First, theyre new and not well-understood by the common investor. This can mean poor decision-making when investing. Second, the sheer volatility of the crypto market can result in major swingsespecially for less stable altcoins. Finally, theres a threat of market manipulation by bad actors. Small coins with momentum tend to attract pump-and-dump scammers or those who inflate the price with the intent to crash it. All in all, crypto is still an untamed, unpredictable market.

What is an altcoin? Really, any crypto asset outside of Bitcoin is an altcoinbut that doesnt mean every altcoin is a viable one. Altcoins represent an opportunity for investors to get into crypto markets at a lower entry point than Bitcoin, and with more upside. The popularity and support for many altcoins has made them a staple in many modern investors portfolios.

To leasrn more about cryptocurrencies, sign up for the Manward Financial Digest e-letter below. The team at Manward is dedicated to and enthusiastic about the potential and future of crypto. Join them on their journey for more insights, trends and analysis.

Should you invest in altcoin? It really depends on your risk tolerance and understanding of these investments. If you know how they work and have an appetite for the sometimes-volatile world of crypto assets, opening an altcoin position isnt a bad idea. Just make sure youre avoiding meme coins and crypto assets destined for implosion due to poor fundamentals. If its too good to be true, it likely is.

The rest is here:
What is an Altcoin? | Cryptocurrency - Investment U

Read More..

Top Trader Says This Group of Altcoins Poised To Massively Thrive in Next Bitcoin and Crypto Bull Run – The Daily Hodl

A popular crypto analyst believes a specific set of altcoins could steal the show in a renewed crypto bull run.

The pseudonymous trader, known in the industry as Altcoin Psycho, tells his 278,000 Twitter followers that crypto projects connected to the interoperable blockchain network Cosmos (ATOM) are poised to outperform the market.

Prediction: Cosmos ecosystem will massively thrive in the next alt run. Tendermint making aggressive moves in this shit market is big.

In my opinion, most alts go lower first, but I think an eventual THORChain (RUNE) run will violently drag up Cosmos projects like Persistence (XPRT), Akash (AKT) and DVPN (Sentinel).

Other projects in the Cosmos network include the decentralized derivatives platform Injective Protocol (INJ), decentralized finance (DeFi) liquidity project Kira Network (KIRA) and omni-chain decentralized exchange (DEX) Sifchain (EROWAN).

As for the economy at large, the trader is making made another bold prediction, suggesting many asset bubbles will burst by next year.

In my opinion, in the next 6-12 months, well see people who claim fiat is worthless get burned hard.

Every sub-asset class is in a mini bubble. Look at lumber, real estate, used cars, startup valuations all bubbles. Having sidelined cash may give a generational opportunity soon.

Featured Image: Shutterstock/Zita/REDPIXEL.PL

More here:
Top Trader Says This Group of Altcoins Poised To Massively Thrive in Next Bitcoin and Crypto Bull Run - The Daily Hodl

Read More..