Page 2,807«..1020..2,8062,8072,8082,809..2,8202,830..»

Google has over 8 million terabytes of iCloud data on its servers, report claims – The Apple Post

[mc4wp_form id="618"]

Apple is reportedly storing 8 million terabytes of iCloud customer data on third-party servers owned by Google, according to a report from The Information.

In an article published on Tuesday citing a person with direct knowledge of the matter, reportersAmir Efrati and Kevin McLaughlin claim that Apples spending on Googles storage services is on track to double this year, with Apple continuing to rely heavily on Google to keep up with the strong customer demand for its iCloud services.

The report claims Apple isGoogle Clouds biggest client, with Google codenaming Apple Bigfoot due to the large quantities of data stored by the company across Googles servers, which has cost Apple around $300 million this year alone to store.

Despite relying heavily on third-party storage services, Apple themselves own several data centres that serve users of iMessage, Siri, the App Store and other Apple services. With external cloud providers, all servers are encrypted using keys owned exclusively by Apple, so that private data is only accessible by the user, making it fairly irrelevant from a customers point of view which server stores their data.

Alongside Google, Apple also relies on Amazon Web Services for cloud storage.

See more here:
Google has over 8 million terabytes of iCloud data on its servers, report claims - The Apple Post

Read More..

Application Server Market Size to Touch USD 28.11 Billion by 2025 at 12.06% CAGR by 2025 – GlobeNewswire

New York, US, June 29, 2021 (GLOBE NEWSWIRE) -- Market Overview: According to a comprehensive research report by Market Research Future (MRFR), Global Application Server Market information by Application Type, by Deployment, by Vertical and Region Forecast to 2027 the market valued at USD 12.95 Billion in 2018 and is projected to reach USD 28.11 Billion by 2025 at a CAGR of 12.06%.

Application Server Market Scope: An application server is a form of platform middleware and is mostly used for cloud applications, mobile devices, and tablets. This is a system software that lies in between the operating system, external resources like database management system (DBMS), user application, communications and internet services. They act as a host for the business logic of the user while facilitating access to and also performance of the business application. It performs the basic business needs of the application regardless of the traffic and variable of client requests, software and hardware failures, the larger-scale applications distributed nature, and potential heterogeneity of processing resources and data. This server also supports multiple application design patterns as per the nature of the business application as well as the practices in the specific industry for which the application is designed. Application server supports multiple programming languages as well as deployment platforms.

Dominant Key Players on Application Server Market Covered Are:

Get Free Sample PDF Brochure: https://www.marketresearchfuture.com/sample_request/8634

Market USP Exclusively Encompassed:Market DriversAccording to the MRFR report, there are numerous factors that are propelling the global application server market share. Some of these entail the growing use of mobile and computer-based internet applications, rapid developments in mobile device systems and wireless networks, increasing adoption of m-commerce and e-commerce applications, growing adoption of IoT technology and cloud platform, increasing need for portable software and high-end interface among various organizations, rising sophisticated applications which support data management, development of advanced application tools, growing need to support legacy application, database integration, and system with advanced technologies among numerous organizations, and alluring application server features that plays a pivotal role in enterprise application integration and business-to-business integration (B2Bi). The additional factors adding market growth include rising digitalization among multiple sectors, growing awareness of the benefits of application server such as integrity of data, centralized control on access and resources, improved performance of large applications on clients server model, and centralization of business logic by single server unit, increasing need to manage growing data traffic on network for optimizing overall performance of service delivery of application at network level, and rising integration of emerging technologies like internet of things with wide applications for supporting and running various applications like easy, presentative, and smart graphical user interfaces in smartphones.

On the contrary, high maintenance cost related to application servers, and rise in complexity of large application integration may limit the global application server market growth over the forecast period.

Browse In-depth Market Research Report (111 Pages) on Application Server:https://www.marketresearchfuture.com/reports/application-server-market-8634

Segmentation of Market covered in the research:The MRFR report highlights an inclusive analysis of the global application server market based on vertical, deployment, and type.

By application, the global application server market is segmented into mobile applications and web applications. Of these, the mobile applications segment will lead the market over the forecast period.

By deployment, the global application server market is segmented into on-premise and on-cloud. Of these, the on-cloud segment will dominate the market over the forecast period.

By vertical, the global application server market is segmented into retail, manufacturing, telecommunication and IT, education, healthcare, government, BFSI, and others. Of these, the manufacturing segment will spearhead the market over the forecast period.

Share your Queries:https://www.marketresearchfuture.com/enquiry/8634

Regional Analysis North America to Have Lions Share in Application Server Market Geographically, the global application server market is bifurcated into Europe, North America, the Asia Pacific, & Rest of the World (RoW). Of these, North America will have the lions share in the market over the forecast period. The presence of a well-established network infrastructure, the presence of several key players, market players making heavy investments in R&D activities to create application servers with advanced capabilities, early adoption of technology, increasing smartphone penetration, the presence of a well-established business, rising penetration of mobile communication devices, and increasing adoption in the US are adding to the global application server market growth in the region.

Europe to Hold Second-Largest Share in Application Server Market In Europe, the global application server market is predicted to hold the second-largest share over the forecast period. Rising initiatives undertaken by the European government to adopt cloud-based m-commerce and e-commerce and rising advances in different technologies for high application services use among various business sectors are adding to the global application server market growth in the region.

APAC to Have Admirable Growth in Application Server Market In the APAC region, the global application server market is predicted to have admirable growth over the forecast period. Rising demand for m-commerce and e-commerce applications, growing adoption of IoT technology, the presence of skilled experts, growth of the service and manufacturing sectors, rising penetration of smartphones, development of high-speed wireless internet network infrastructure, advances in cloud computing and networking technologies, rise in IT service and software providers in China and India, and rising number of service-based and technology startups are adding to the global application server market growth in the region.

RoW to Have Sound Growth in Application Server Market In RoW, the application server market is predicted to have sound growth over the forecast period. Growing penetration of smartphone and internet-based services, increasing industrialization, and rising awareness about application servers across different industries are adding to the global application server market growth in the region.

To Buy: https://www.marketresearchfuture.com/checkout?currency=one_user-USD&report_id=8634

COVID-19 Impact on the Global Application Server MarketThe ongoing COVID-19 pandemic has cast its shadow on the global application server market. The immediate & long-term impact of the crisis, fluctuations in demand share, supply chain disruptions, and economic consequences of the pandemic had a negative effect on the market growth.

About Market Research Future:Market Research Future (MRFR) is a global market research company that takes pride in its services, offering a complete and accurate analysis regarding diverse markets and consumers worldwide. Market Research Future has the distinguished objective of providing the optimal quality research and granular research to clients. Our market research studies by products, services, technologies, applications, end users, and market players for global, regional, and country level market segments, enable our clients to see more, know more, and do more, which help answer your most important questions.

Follow Us:LinkedIn|Twitter

The rest is here:
Application Server Market Size to Touch USD 28.11 Billion by 2025 at 12.06% CAGR by 2025 - GlobeNewswire

Read More..

Scientists spotted an electron-capture supernova for the first time – Science News Magazine

A long-predicted type of cosmic explosion has finally burst onto the scene.

Researchers have found convincing evidence for an electron-capture supernova, a stellar explosion ignited when atomic nuclei sop up electrons within a stars core. The phenomenon was first predicted in 1980, but scientists have never been sure that they have seen one. A flare that appeared in the sky in 2018, called supernova 2018zd, matches several expected hallmarks of the blasts, scientists report June 28 in Nature Astronomy.

These have been theorized for so long, and its really nice that weve actually seen one now, says astrophysicist Carolyn Doherty of Konkoly Observatory in Budapest, who was not involved with the research.

Electron-capture supernovas result from stars that sit right on the precipice of exploding. Stars with more than about 10 times the suns mass go supernova after nuclear fusion reactions within the core cease, and the star can no longer support itself against gravity. The core collapses inward and then rebounds, causing the stars outer layers to explode outward (SN: 2/8/17). Smaller stars, with less than about eight solar masses, are able to resist collapse, instead forming a dense object called a white dwarf (SN: 6/30/21). But between about eight and 10 solar masses, theres a poorly understood middle ground for stars. For some stars that fall in that range, scientists have long suspected that electron-capture supernovas should occur.

Headlines and summaries of the latest Science News articles, delivered to your inbox

During this type of explosion, neon and magnesium nuclei within a stars core capture electrons. In this reaction, an electron vanishes as a proton converts to a neutron, and the nucleus morphs into another element. That electron capture spells bad news for the star in its war against gravity because those electrons are helping the star fight collapse.

According to quantum physics, when electrons are packed closely together, they start moving faster. Those zippy electrons exert a pressure that opposes the inward pull of gravity. But if reactions within a star chip away at the number of electrons, that support weakens. If the stars core gives way boom that sets off an electron-capture supernova.

But without an observation of such a blast, it remained theoretical. The big question here was, Does this kind of supernova even exist? says astrophysicist Daichi Hiramatsu of the University of California, Santa Barbara andLas Cumbres Observatory in Goleta, Calif. Potential electron-capture supernovas have been reported before, but the evidence wasnt definitive.

So Hiramatsu and colleagues created a list of six criteria that an electron-capture supernova should meet. For example, the explosions should be less energetic, and should forge different varieties of chemical elements, than more typical supernovas. Supernova 2018zd checked all the boxes.

A stroke of luck helped the team clinch the case. Most of the time, when scientists spot a supernova, they have little information about the star that produced it by time they see the explosion, the star has already been blown to bits. But in this case, the star showed up in previous images taken by NASAs Hubble Space Telescope and Spitzer Space Telescope. Its properties matched those expected for the type of star that would produce an electron-capture supernova.

All together, it really is very promising, says astrophysicist Pilar Gil-Pons of Universitat Politcnica de Catalunya in Barcelona. Reading the researchers results, she says, I got pretty excited, especially about the identification of the progenitor.

Finding more of these supernovas could help unveil their progenitors, misfit stars in that odd mass middle ground. It could also help scientists better nail down the divide between stars that will and wont explode. And the observations could reveal how often these unusual supernovas occur, an important bit of information for better understanding how supernovas seed the cosmos with chemical elements.

Read the original post:

Scientists spotted an electron-capture supernova for the first time - Science News Magazine

Read More..

Wild new theory says the Big Bang wasn’t the beginning – The Next Web

The prevailing theory on the origin of our universe goes like this: about 13.7 billion years ago a single particle exploded. The resultant blast created an ever-expanding universe that, eventually, became home to the planet we call Earth.

The Big Bang theory first appeared in a scientific paper in 1931. Physicist Georges Lemaitre is credited with its creation. And the bulk of our assumptions about the universe and its rate of expansion are based on his ideas.

In 2019 that rate of expansion, called the Hubble Constant, was put into question by various teams that determined either the rate of expansion had been incorrectly calculated or something was seriously wrong with the universe.

[Read: Either the Hubble Constant is wrong or the universe is ripping itself apart]

Scientists are still sorting things out and working towards an explanation that can reconcile both the Big Bang and our modern observations.

The reason why we cant just punch some numbers in a supercomputer and determine the truth is because we dont have all the information.

Trying to determine how old the universe is by measuring its current rate of expansion is like trying to pick the winner of a NASCAR race based on a blurry, out-of-context photograph of one racers left rear tire.

To that end, the Big Bang theory only really works if we assume it was the beginning of our universe. Doing so makes it the one piece of the entire puzzle that corresponds with what were actually able to see and measure.

But what if the Big Bang wasnt the beginning?

Chanda Prescod-Weinstein, a physicist at the University of New Hampshire, has a differing theory.

Writing for New Scientist, they claim it makes more sense to assume the universe has been expanding forever.

Per the article:

The universe may not have had a beginning moment, and we may live in what is called an eternally inflating universe. One that was expanding exponentially even before what we call the big bang. Mathematically, this seems the most likely scenario assuming inflation is correct.

The ramifications of such a theory may seem trivial one explanation for a number is as good as another until were able to measure more. But a lot of our assumptions concerning both classical and quantum physics are grounded in the idea that time is more than just a construct.

Whether were discussing Newtons Laws or breaking down the nature of relative observations in quantum physics, the idea is that theres a dimensional quality called time thats codified by distinct points representing the beginning and end of an event.

Without a finite moment at the creation of the universe where nothingness became something, theres no origin point for time there are no beginnings.

The concept of infinite expansion without a beginning may be difficult to wrap our heads around, but it kind of adds up. After all, it seems paradoxical to imagine a period in which the universe itself, and thus time, didnt exist at all because youre forced to wonder how long time didnt exist for before it finally did.

But, if times always existed because the universe itself has always existed then perhaps its never existed. What is time without a beginning or end?

Greetings Humanoids! Did you know we have a newsletter all about AI? You can subscribe to itright here.

Continued here:

Wild new theory says the Big Bang wasn't the beginning - The Next Web

Read More..

Leveraging Encryption Keys to Better Secure the Federal Cloud – Nextgov

Delteks Federal Cloud Computing Market, 2020-2022 Report predicts federal cloud investments will reach $7.8 billion by fiscal 2022.For government agencies, migrating resources to the cloud increases flexibility, efficiency and promises enhanced security features.But in a cloud-centric world, security is increasingly complex. While security tools do exist within platforms, users may accidentally or unknowingly disable security features.

Additionally, cloud-based applications must be protected from cloud infrastructure attacks, including insider threats.This requires encrypting data at rest and end-to-end encryption for data-in-transit. Taking it a step further than encryption itself, agencies must consider security and access to the keys used to encrypt data.

Have You Seen My Keys?

When employing a cloud solution, agencies may enlist multiple providers to create a multi or hybrid cloud environment. Utilizing multiple clouds can mean encryption keys end up stored in more than one location across various infrastructures, enhancing the risk of the keys falling into the hands of a bad actor.

In the same way we use a key to lock valuable assets in a safe deposit box, agencies can lock up encryption keys for personally identifiable information, such as email addresses and mobile device management credentials. Locking encryption keys grants agencies the ability to control access to keys, manage key rotation and handle data within a specific region, which is especially helpful in government, as agencies face FISMA compliance regulations.

The cloud will continue to grow in importance for federal agencies and the time is now to ensure the government cloud is as secure as possible. The Cloud Security Alliance recommends encrypting data in the cloud and managing the encryption keys on-premises within a FIPS-certified boundary. Keys should be managed and secured in a FIPS 140-2 certified key manager.

Tamper-resistant FIPS 140-2 Level 3 Hardware Security Modules provide the highest level of security against internal and external threats that may result from an increased number of endpoint devices connecting to resources via the cloud.

Cloud Encryption and Mobile Applications

Cloud-based applications often connect directly to mobile and other endpoint devices. By processing and storing data on the cloud, mobile applications can function more efficiently, extending battery life and improving reliability. However, with multiple cloud applications connecting to agency resources through mobile devices, the threat landscape is greatly expanded.

Cloud-based applications on mobile devices can also serve as entry points for bad actors through malicious apps, mobile phishing and more. As such, encryption and other cloud security must extend to mobile.

Protection on mobile devices needs to include, but go beyond, cloud encryption for comprehensive mobile endpoint security. Precautions, such as user education and a zero-trust policy that extends to mobile, can ensure mobile devicesand the information they contain stay safe.

To fully protect an agency and its information, mobile security needs to protect applications, networks and devices from phishing and other mobile threats. While workers may be able to identify phishing attacks on desktops or laptops, it becomes much more difficult on mobile devices. Attacks may be harder to spot due to small screen size and layout of a mobile device but can gain the same access to agency data if successful.

Cloud Is Here to Stay

As agencies continue to prioritize cloud in a government, the ability to manage encryption keys offers assurance that sensitive data can never be accessed or controlled by unauthorized individuals. This includes apps on mobile endpoint devices, which constantly communicate with the cloud, transferring data to and from the device. Mobile security must extend to the cloud, keeping agencies and the devices accessing their resources protected from cybercriminals and malicious nation-states as attacker strategies evolve.

Tim LeMaster is vice president ofWW Systems Engineering at Lookout.

See more here:
Leveraging Encryption Keys to Better Secure the Federal Cloud - Nextgov

Read More..

If full encryption of police radios necessary? Berkeley may allow public to hear one of their channels – The Daily Post

This story was originally published June 30 in the Daily Post. To get all of the local news first, pick up the Post in the mornings at 1,000 Mid-Peninsula locations.

BY ELAINE GOODMANDaily Post Correspondent

The Berkeley Police Department might decide to keep one of its radio channels unencrypted, meaning the public would be able to listen in to some police activities, an official said yesterday.

If Berkeley keeps a radio channel public, it would be a departure from the approach taken by Palo Alto, Mountain View and Los Altos, which fully encrypted their police radio transmissions earlier this year.

The Berkeley Police Department is still undecided if we will encrypt BPD-1 as well; or just BPD-3 (RB-1), Berkeley Police Capt. Kevin Schofield said in a written statement provided to the Post.

Details werent immediately available on what information would be transmitted over BPD-1 versus BPD-3. A police department manual on the citys website described BPD-1 as a primary channel for patrol officers, and said RB-1 is used to communicate with the records center.

The question of encrypting police radio transmissions comes after the California Department of Justice in October told law enforcement agencies that they have to protect individuals personally identifiable information and criminal justice information when using the California Law Enforcement Telecommunications System, or CLETS. Examples of information that needs protecting are a persons drivers license number, Social Security number or criminal history.

The DOJ memo, from Joe Dominic, chief of the California Justice Information Services Division, described two ways a law enforcement agency could protect the information: by encrypting radio traffic, or establishing a policy to not publicly broadcast certain types of information.

Police scanners go silent

Police departments in cities including Palo Alto, Mountain View, and Los Altos responded to the DOJ memo by going to full encryption of their radio channels. News reporters and the public can no longer tune in using police scanners to hear what officers in those cities are doing. Police scanners have been in existence for about 70 years.

But some cities are taking a different approach. As the Post reported last month, the San Francisco Police Department will partially encrypt its radio transmissions when it moves to a digital system this year.

San Francisco dispatchers will use a public channel to send officers to an incident, such as a report of a robbery at a particular location. After that, radio communications related to the incident will be encrypted and the public wont be able to listen in. But when the incident concludes, dispatchers will state on an unencrypted channel what the outcome was, for example, officers took a report or made an arrest.

San Francisco officers will check a persons drivers license information or criminal history using encrypted channels.In Berkeley, whose police department is closer in size to that of Palo Alto, the move to encryption is complicated by a number of factors, according to information obtained by the Post through a public records request.

The department noted that Berkeley is a member of the East Bay Regional Communications System, or EBRCSA, a radio system that operates under a joint powers agreement between Alameda and Contra Costa County. EBRCSA owns and manages the digital radio system.

It could take more than two years for EBRCSA members to move to encryption. In the meantime, the Berkeley PD is taking steps to protect subjects personal information.

Phones for confidential information?

In the interim, we will attempt to use our MDTs, department cellular phones, or land line telecommunications to transmit and receive PII, the police department stated in a letter. An MDT is a mobile data terminal, or computer, that officers use in their patrol cars. PII refers to personal identifiable information.

In Palo Alto, Police Chief Robert Jonsen said in a January blog post that alternative methods of protecting personal information, such as using cell phones, are not operationally practical or safe for our personnel.

In Berkeley, officers have a strategy to help protect personal information when cell phones or MDTs arent feasible and they transmit the information over the radio. In those cases, officers will break up the personal information by transmitting details such as a persons name, birthday and address in separate transmissions, or even in different channels, Berkeley PD said in its letter.Budget shortfalls may hamper the move to encryption, the letter said.

Due to Covid-19, we are anticipating budget shortfalls in our projected revenue for projects such as this, the letter stated. In addition, the community is asking to reduce our budgets.

The letter ends by referring further questions to Lt. Peter Hong. Hong did not respond to the Posts request for a telephone interview yesterday.

Previous stories about the encryption of police radios

June 16, 2017, Palo Alto to spend $4 million on new radio system; Redwood Citys experience was a fiasco

Jan. 6, 2021, Police cut off their radio transmissions to the public

Jan. 8, 2021, Editorial, Police decision to encrypt police radio transmissions reduces transparency

Jan. 11, 2021, Mayor says that encrypting police radio signals was a mistake

Jan. 11, 2021, Palo Alto Council will discuss police radio encryption, Mountain View will follow Palo Altos lead

Feb. 14, 2021, Opinion, Encryption isnt a mandate, its a choice

March 29, 2021, Police chief willing to consider alternatives to full encryption but lacks examples

April 1, 2021, One city is reluctant to switch to encrypted police radio

April 5, 2021, Palo Alto Police ask state if they can temporarily drop encryption

May 24, 2021, San Francisco finds an alternative to full encryption of police radios

May 27, 2021, Opinion, 55 days later and state DOJ hasnt complied with records request for information on police radio encryption

Read more:
If full encryption of police radios necessary? Berkeley may allow public to hear one of their channels - The Daily Post

Read More..

Benefits of Adopting Data Encryption in Businesses – CIOReview

The companies apply the data encryption process in their businesses because it offers the best protection against unauthorized access to data.

FREMONT, CA: The cyber threat landscape is becoming increasingly volatile. Today ransomware threats are becoming a common occurrence. The risks are serious, and people's confidential information is in danger. If data security is the primary priority, innovative data encryption is the best technique companies can utilize.

Encryption and cryptography are complicated concepts to understand. For the ordinary individual, the more they learn about it, the more they realize how little they know.

Data encryption is the most effective method of preventing unauthorized access to data. Even though encryption has been demonstrated to be essential for businesses that hold large amounts of sensitive data, it is still not universally used, and much crucial information remains unsecured and vulnerable to hackers. All data, whether at rest or in transit over a network, can be encrypted.

For businesses, implementing efficient data encryption for the first time can be difficult, with the most challenging part is determining where to start. The process of implementing data encryption techniques can be made more accessible by following best practices.

Assess the Data to Encrypt

The companies must evaluate which data can cause the most damage if lost or compromised before encrypting it. Encrypt sensitive information like credit card numbers, names, social security numbers, and trade intellectual property.

To comply with the current compliance regulations, personally identifiable information (PII) needs specific encryption. Even if regulations do not require encryption, it may be the only reasonable and acceptable security for sensitive data and must be used.

Establish Appropriate and Secure Key Management

Once data encryption is in place, the companies must ensure that all decryption keys are appropriately secured and backed up. Before deploying encryption, such keys constitute security vulnerabilities that must be recognized and resolved. Find a safe place to keep encryption keys, and make sure it's not in the same place as the data. It is also essential to keep the backup key in a separate location.

To reduce the risk of isolation generating vulnerabilities, centralize key management is crucial. Keys must be kept in a hardware security module (HSM), which offers hardware-based security.

Assess Encryption Performance

Be sure to evaluate the efficiency of the data encryption method after it has been successfully implemented. If data encryption generates performance problems, like excessive CPU usage, companies must consider using an alternative encryption algorithm or encryption tool.

Logging tools can aid in evaluating the encryption's performance by providing information on what data is being obtained, who is accessing confidential data, and when.

Original post:
Benefits of Adopting Data Encryption in Businesses - CIOReview

Read More..

Encryption can be lucrative, but with environmental costs – Floridanewstimes.com

Lansing, Michigan Luke Lauterback has begun Mining cryptocurrency Because he was cold. Mining cryptocurrencies on his underground computer replaced the space heater.

At some point, I realized it was like throwing away my electricity and money, Rotorbach said. So,Well, my computer gets hot. Why dont you try this cryptocurrency and see if you can make a few dollars trying to replace the space heater?'

Cryptocurrency mining requires a lot of power, so the rotorback computer gets hot enough to keep him warm.

According to the report, a single Bitcoin transaction uses the same amount of power that the average American home consumes in a month. Digiconomist, And is responsible for about one million times more carbon emissions than a single visa transaction.

Cryptocurrency mining on his underground computer has replaced their space heaters.

Cryptocurrencies like Bitcoin are basically digital money, and those who mine it help create it. Mining basically uses a computer to verify cryptocurrency transactions.

Computers perform complex math problems through mining software. Every time the computer solves a math problem correctly and validates a transaction, a small amount of cryptocurrency is created. The percentage of that new currency goes to the miner.

For one husband and father, Lauterback, being a miner was quite beneficial.

For one husband and father, Lauterback, being a miner was quite beneficial.

Whenever the computer is idle, it mine for about 23 hours a day, he said. Ive been doing this for about six months and Im making about $ 230 a month.

Even if you dont know anything about technology, you can easily get started with crypto mining in just a few minutes, he added.

Its so easy that cryptominig has taken off in recent years. Small investors, backed by their support for billionaires like Elon Musk and currencies like Dogecoin, also promoted the spread of practices.

A January 2021 Survey by New York Investment Group We found that an estimated 22% of adults in the United States are investing in Bitcoin. Of these respondents, 83% are considering including Bitcoin in their future financial plans.

So whats the problem? Environmental impact of all computers mining crypto.

Thomas Holt is the director of the Criminal Justice School at Michigan State University. He studies cryptocurrencies and says that if they continue to grow, their environmental impact can be enormous.

Mainly because we use so much electricity to produce the mine, the impact can be quite large, he said.

Mainly because we use so much electricity to produce the mine, the impact can be quite large.

China does most of the worlds crypto mining, most of their electricity depends on coal.

Therefore, the impact of coal on the environment is part of the problem, Holt said.

Bitcoin is one of the most environmentally friendly currencies, depending on how currency creation works.

Bitcoin is one of the most environmentally friendly currencies, depending on how currency creation works.

They use the so-called proof of work to validate transactions within the blockchain, Holt said. That basically means that you have multiple computers, multiple mining systems, all trying to solve math puzzles at the same time. The first one to get it right is , Get credit on the blockchain.

Some new cryptocurrencies are moving away from the proof of work and using the proof of stake.

The Proof of Stake uses much less energy, but retains a more sustainable future for cryptocurrencies because it is obtained from only one computer that eliminates mining.

Ethereum mined by Rotorback is one of the cryptocurrencies that will switch to the Proof of Stake.

Ethereum mined by Rotorback is one of the cryptocurrencies that will switch to the Proof of Stake.

Ethereum will move to Ethereum 2.0 in the next few years and will stop mining to consume less electricity than it does now, said Roterbach. What that means to me is that I can no longer mine Ethereum, and this will probably not be profitable within a few years, but it will be eliminated, so its for the crypto community That environmental barrier will be positive overall.

The TRG data center in Houston, Texas, investigated which cryptocurrencies were the most environmentally friendly and ranked them by the amount of energy needed to power each transaction.

click here To read that list.

This story was originally published by Sarah Grimmer at the Scripps Station WSYM In Lansing, Michigan.

xfbml : true, version : 'v2.9' }); }; (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "https://connect.facebook.net/en_US/sdk.js"; js.async = true; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));

Here is the original post:
Encryption can be lucrative, but with environmental costs - Floridanewstimes.com

Read More..

UK Government has suggested messaging apps to avoid using end-to-end encryption on the accounts of children because that can be harmful to them -…

It is obvious that end-to-end encryption of chats protects the confidentiality of users from falling into wrong hands including their photos, videos, and important chats that is why many messaging applications including WhatsApp, Messenger, and Telegram use end-to-end encryption. However, this encryption process can also become very dangerous for children and youngsters as the cases of harassment have been increasing during the pandemic situation. These criminals take the advantage of chat encryption and try to sexually harass kids. Therefore, the UK has requested messaging apps not to use end-to-end encryption because the accounts of children should always be kept under supervision so that it becomes easy to catch those criminals.

The DCMS has directed the social media applications like Facebook, Twitter, Instagram, and other messaging platforms to avoid the procedure of chat encryption. Last month, the Online security bill was also passed in the parliament of the UK which insists that the content of the people on social media websites should be sheltered from prohibited material, and it will be the duty of the social platform to take some strict actions against the extreme contents and the criminals involved in scams such as child abuse, romance swindles, and harassment.

The Government of the UK wants to protect the rights of children at any cost because the increasing cases of child abuse have become an alarming situation for all social media platforms. Therefore, they should supervise the varieties of content even from extreme to light harm. If the Government of the UK follows its own unreliable concepts such as safety means that protection needs to be substituted by extensive shadowing to retain the children safe on the social platform. However, this was not the first time unrealistic proposal that was given by the government of the country, another idea was also given about two years ago that the social apps to verify the ages of all people using the platform but later it was considered controversial because of the reason that it can put the confidentiality of users at danger.

Now solitary suggestion has been set in the latest bill to evade the practice of e2e. Though, the confirmation of ages of people and all classes of material observing tools also seem to propagate the outcome of recent tactic. Social media companies have given their opinion that if the strategy is just to keep an eye on content material of users, it will merely destroy the liberty of expression because the department of the UK is trying to promote the country as the safest country where you can conveniently go online. The policy leader named Heather Burns for ORG has said that the strategy of the government for this bill is to put a limit on chats, if not the absolute illegalization of the e2e process.

Many ministers of the country were targeting encryption procedure as the worst idea because it could also protect the terrorists. Under new PMs of the country, child defense rhetoric has treaded high to the rule that where messaging apps are promoted to evade the encryption tool on chats of children. Heather Burns the policy director for ORG has criticized the idea of this bill is to make Britain as safest home; in fact, it will give show adverse consequences such as numerous companies will vacillate to do business in the country. He further said that the people of the UK should get VPN to keep their info safe and sound. In the segments of the DCMS direction, it is clearly written in highlighted words that e2e is putting the users at risk therefore; the government officials are trying to impose the safety law on the internet. The one thing that can disrupt utmost dangerous portions of the recent bill that if the citizens of the country rouse up to perils it postures to the confidentiality of all people using the social platforms and if adequate parliament ministers should take action and try to modify.

In May, ORG accompanied by thirty further human rights protection cohorts called parliament ministers to merely ensure that and assist retain citizens information confidential by defending the e2e tool from lawmaking coercions that is a caveat that this simple safekeeping practice is at danger from sections in the recent bill that brings the condition to businesses to observe private chats as a substantiation. Open Right Group has proposed that those companies who want to guard the confidentiality of users through e2e will be considered as a breach of law and that will result in half shutdowns or can be arrested in the country.

An appeal has been made in the parliament of the UK that the e2e process should be promoted as wrongdoing or those companies trying to secure the information of their users should be keeping outside of the bills requests. One minister named Caroline Dinenage has stated that the government of the country wants to assist corporations to maintain their security standards before the requirement of the internet bill is implemented. This was the advice to all natures of businesses whether small or giant in the country to start defending the rights of children even from now on.

According to a new update, the representative of the Govt. has said that it was the voluntary direction for businesses to make their platforms environment more secure for kids and this can be done through e2e tool like that is reliable with the shield of citizens and enterprises should certify that they have sufficient extenuations to protect youngsters. DCMS has recently acknowledged the chat encryption process and further said that there is not any inconsistency in its stand on the safety of users of apps that is indispensable for nationwide development.

Photo: Getty / Maskot

Read next:Google Play Store Has a Serious Privacy Problem with Android Apps for Kids

See more here:
UK Government has suggested messaging apps to avoid using end-to-end encryption on the accounts of children because that can be harmful to them -...

Read More..

Diavol ransomware linked to Trickbot botnet – IT PRO

Security researchers have made a connection between a new strain of ransomware and the cyber criminal gangbehind the Trickbot botnet.

Fortinet discovered the ransomware after it was blocked by the companys FortiEDR product on a customers system. Two files were isolated that were not found on VirusTotal:locker.exeandlocker64.dll. the two bits of malware were deployed a day apart.

While locker64.dll appeared to be a Conti (v3) ransomware, locker.exe was entirely different. The second ransomware was dubbed Diavol by researchers.

Researchers said that as part of a rather unique encryption procedure, Diavol operates using user-mode Asynchronous Procedure Calls (APCs) without a symmetric encryption algorithm.

Usually, ransomware authors aim to complete the encryption operation in the shortest amount of time. Asymmetric encryption algorithms are not the obvious choice as they are significantly slower than symmetric algorithms, said researchers.

The researchers said that asDiavol was deployed in conjunction with the Conti ransomware in this attack, albeit on different machines,they tried to see if there was any correlation between them. They found that command-line parameters used by Diavol are nearly identical to those of Conti and used for the same functionality: log file, encrypt local drives or network shares, and scan specific hosts for network shares.

In addition, Diavol and Conti both operate similarly with asynchronous I/O operations when queuing the file paths for encryption, said researchers.

The researchers said there might also be a link between Diavol and Egregor ransomware. Some lines in the ransom note are identical, they said. Although this is not reliable as it could simply be a red herring that Diavols authors planted.

Some have reported a link between Wizard Spider, the threat actor behind Conti, and Twisted Spider, the threat actor behind Egregor. Allegedly, these gangs cooperate on various operations. They are also both notoriously known for double ransoming their victims (data theft and encryption), researchers added.

Researchers said the source of the intrusion is unknown. The parameters used by the attackers, along with the errors in the hardcoded configuration, hint to the fact that Diavol is a new tool in the arsenal of its operators which they are not yet fully accustomed to.

As the attack progressed, we found more Conti payloads namedlocker.exein the network, strengthening the possibility the threat actor is indeed Wizard Spider. Despite a few similarities between Diavol, Conti, and other related ransomware, its still unclear, however, whether theres a direct link between them, the researchers added.

Spotlight: The state of the UK & Ireland mid-sized business and IT today 2021

The UK and Irelands mid market firms faced a difficult 2020 but have a strong platform for recovery

The secure cloud configuration imperative

The central role of cloud security posture management

Empowering the dynamic worker

How CIOs and IT teams can support a distributed workforce

A new trust model for the 5G era

Data-in-motion security through a 5G infrastructure

More:
Diavol ransomware linked to Trickbot botnet - IT PRO

Read More..