Page 3,074«..1020..3,0733,0743,0753,076..3,0803,090..»

Quantum Computing & Technologies Market Expected to Grow at CAGR 32.5 % and Forecast to 2027 KSU | The Sentinel Newspaper – KSU | The Sentinel…

Quantum Computing & Technologies Market is Expected to Grow with a CAGR of 32.5 % over the Forecast Period.

Increased demand for handling & analyzing the data for making business decisions more effective and rising incidences of cybercrime are some of the major factors driving the growth of the Global Quantum Computing & Technologies Market.

Get Sample Copy of The [emailprotected]https://brandessenceresearch.com/requestSample/PostId/941

Quantum computing is a section of computing area which focuses on development of computer technology based on the concept of quantum mechanics. The quantum computing is used to know the behavior of energy and material on the atomic and subatomic levels. Quantum computing stores the data in the form of quantum bits or qubits. According to Institute of Quantum Computing at the University of Waterloo, the quantum computing field started in 1980. After discovering the quantum computer the problem which was unable to solve by classical computer can easily solve the problem with minimum time by using quantum computer. The quantum computer is used in the field of drug design, defense, artificial intelligence, in nuclear fusion, big data search, and military affairs and in many more fields. The Google announces that the quantum computer have achieved quantum supremacy on 23 October 2020 which means quantum computer can solve any problem quickly as compared to classical computer. The quantum computer is much faster than super computer. in 1998 Issac Chuang of the Los Alamos National Laboratory have invented first quantum computer which was loaded with data and output solution.

The global quantum computing market is segmented on the basis of components, application, end user and region covered. Based on components the global quantum computing is segmented as hardware, services and software. On the basis of application global quantum computing is classified as optimizing, automation, data analytics. Based on end user the global quantum computing is classified as healthcare and pharmaceuticals, energy and power, defense and others

Quantum computing & technologies consists of subatomic particles such as electrons, photons that exist in more than one state at any time. Unlike traditional computers, the quantum computer comprises series of bits with additional quantum analog qubits. Qubits are physically distinguishable two states quantum mechanical systems like electron and photon in the two dimensions which are responsible for the entanglement and super positioning movement. With the help of qubit, it becomes easy to identify, interpret and analyze the data stored in the warehouse system. Quantum computers can be operated at freezing temperatures near absolute zero which is most suitable to execute its functioning. Quantum computation is the scientific method of finding the most perfect and accurate solutions for problems that cannot be solved by traditional computers. Quantum computational technique is capable of solving polynomials, factorization, and exponential problems with the help of machine learning, Big Data, Internet of Things, Cloud Computing and artificial intelligence which consist of recurrent neural networks to optimize and extricate the dynamic data.

Quantum computing & technologies market report is segmented on the basis of type of technology, applications, component, end-user industry and by region & country level. Based upon technology, market is segmented into Blockchain, Adiabatic, Measurement-Based, superconducting and topological. Based upon applications, market is segmented into Cryptography, IoT/Big data/Artificial intelligence, teleportation, Simulation & data optimization and others. Based upon component, the market is classified as hardware, software & systems and services. Based upon end-user industry, the quantum computing & technology market is segmented into aerospace and defense, healthcare, manufacturing, it & telecommunications, energy and others.

The regions covered in this Global Quantum Computing & Technologies market report are North America, Europe, Asia-Pacific and Rest of the World. On the basis of country level, market of Global Quantum Computing & Technologies market is sub divided into U.S., Mexico, Canada, UK, France, Germany, Italy, China, Japan, India, South East Asia, GCC, Africa, etc.

Get Methodology Of The Report @https://brandessenceresearch.com/requestMethodology/PostId/941

Some major key players for Quantum Computing & Technologies market are,

Increased Demand for Handling & Analyzing the Data for Making Business Decisions More Effective and Rising Incidences of Cybercrime are Some of the Major Factors Driving the Growth of the Global Quantum Computing & Technologies Market.

The key factor for growth of global quantum computing market is increasing demand for new research and technology in field such as healthcare, defense, drug design and space technology are major factors driving the growth of quantum computing. The problem which cannot solve by using supercomputer can easily solve by using quantum computer the cloud processing is major part in quantum computing system which solves the complex problem with minimum time. The industries such as space and defense have the largest share in quantum computing market in 2020, the need of secure communication and data transfer with faster data operation which boosts the demand of quantum computing. In the last year the quantum volume of IBM was 16 and by now it has been doubled up to 32 quantum volume which is more high achievement in the field of quantum computing since 2017. However lots of error, high cost and lack of knowledge regarding quantum computing to people may restrain the growth of quantum computing market. However increasing investment in research and development for building low cost and efficient quantum computer will increase the opportunities in global market in expected period.

The key factor for growth of global quantum computing market is increasing demand for new research and technology in field such as healthcare, defense, drug design and space technology are major factors driving the growth of quantum computing. The problem which cannot solve by using supercomputer can easily solve by using quantum computer the cloud processing is major part in quantum computing system which solves the complex problem with minimum time. The industries such as space and defense have the largest share in quantum computing market in 2020, the need of secure communication and data transfer with faster data operation which boosts the demand of quantum computing. In the last year the quantum volume of IBM was 16 and by now it has been doubled up to 32 quantum volume which is more high achievement in the field of quantum computing since 2017. However lots of error, high cost and lack of knowledge regarding quantum computing to people may restrain the growth of quantum computing market. However increasing investment in research and development for building low cost and efficient quantum computer will increase the opportunities in global market in expected period.Growth of quantum computing & technologies is primarily driven by big data handling, problem-solving technique to optimize the data which are used in various industries including automotive healthcare energy & power. According to a research, everyday internet generates 2.5 billion gigabytes of YouTube shorts, viral news stories, click-bait articles, and blogs. Worldwide 3.58 billion internet users gather together to send 500 million tweets, publish 2 million articles, and send 281.1 billion emails every day. So, there is huge data and Quantum computing technology allows the user to simulate, detect, analyze, and diagnose the scattered data into well-structured data sets. According to the survey of IT, leaders from the top 400 organization quantum computing technology finds 71% view the emergence of quantum computers as a threat to cyber security. One of the biggest restraints of this technology is its high cost and it requires absolute zero temperature to operate so its difficult to maintain that temperature at low cost. Another big challenge faced by this technology is the lack of knowledge and awareness about encryption algorithms and codes used while performing some tasks in quantum computers.

In spite of that, incresaing technological advancements with high-performance quantum computing technology used in various industries such as aerospace & defense, BFSI, healthcare & life science, energy & utilities, and others fosters the growth of the market. Its excellent problem-solving power, growing spending and investment in the development and research by industry giants, has also increase the demand for quantum computing from medical research and financial sectors are expected to create great opportunity for the investors.

North America is Expected to Dominate the Global Quantum Computing & Technologies Market.

North America is dominating the growth in quantum computing market due to rapidly increase in new technology and initiative taken by government to increase the research in quantum computing. The government of US has signed a bill of 1.2 billion USD for countries effort towards quantum information science. Canada is one of the leading countries in quantum computing research. Canada has invested 1 billion USD in past decade, the government initiative; growing private sector impact drives the quantum technology development in Canada. The Europe Union is expected to drive the growth of quantum computing market. The Germany is going to invested 650 million Euros for quantum technology from basic research to market ready applications. The UK government have announced 1253 million Euros investment in quantum computing advancement the government is have invested 1.27 billion USD since 2014 and now the UKs National Quantum Technology Program have passed 1 billion Euros for development in quantum technology.

North America is emerged as a leading region in the global quantum computing & technologies market followed by Europe and Asia pacific. In the fiscal year, 2019 the U.S. government has provided $1.2 billion to fund the activities promoting quantum information science for an initial five-year period followed by U.S. the European Union has also launched a $1.1 billion investment in providing the top quantum computing strategic plan. One of the biggest competitors of the U.S. is China there is a race going on for using the most advanced technology of quantum computing. China is planning to build the worlds biggest quantum research facility for quantum computers and other revolutionary technology. The National Laboratory for Quantum Information Science of China will be located on a 37-hectare site next to a small lake in Hefei, Anhui province, China.

Key Benefits for Global Quantum Computing & Technologies Market Report

Global market report covers in depth historical and forecast analysis.

Global market research report provides detail information about Market Introduction, Market Summary, Global market Revenue (Revenue USD), Market Drivers, Market Restraints, Market opportunities, Competitive Analysis, Regional and Country Level.

Global market report helps to identify opportunities in market place.

Global market report covers extensive analysis of emerging trends and competitive landscape.

By Type of Technology: Block chain, Adiabatic, Measurement-Based, Superconducting, Topological

By Applications: Cryptography, IoT/Big data/Artificial intelligence/ML, Teleportation, Simulation & Data Optimization, Others

By Component: Hardware, Software & Systems, Services

By End-User Industry: Aerospace and Defense, Healthcare, Manufacturing, IT & Telecommunications, Energy and Power, Others

Regional & Country AnalysisNorth America, U.S., Mexico, Canada , Europe, UK, France, Germany, Italy , Asia Pacific, China, Japan, India, Southeast Asia, South America, Brazil, Argentina, Columbia, The Middle East and Africa, GCC, Africa, Rest of Middle East and Africa

Table of Content

1.1. Research Process

1.2. Primary Research

1.3. Secondary Research

1.4. Market Size Estimates

1.5. Data Triangulation

1.6. Forecast Model

1.7. USPs of Report

1.8. Report Description

2.1. Market Introduction

2.2. Executive Summary

2.3. Global Quantum Computing & Technologies Market Classification

2.4. Market Drivers

2.5. Market Restraints

2.6. Market Opportunity

2.7. Quantum Computing & Technologies Market: Trends

2.8. Porters Five Forces Analysis

2.9. Market Attractiveness Analysis

Get Full Report :@https://brandessenceresearch.com/technology-and-media/quantum-computing-technologies-market-size

Continued here:
Quantum Computing & Technologies Market Expected to Grow at CAGR 32.5 % and Forecast to 2027 KSU | The Sentinel Newspaper - KSU | The Sentinel...

Read More..

Play Chess With Agadmator, Nemo, Cramling, Canty, And More – Chess.com

If you enjoyed playing chess against our virtual personalities like the PogChamps participants or Beth Harmon, we have good news! Chess.com is happy to announce the release of six brand new bots that emulate fan-favorite chess streamers, personalities, and top players.

You can now play against the virtual versions of Agadmator, WGM Nemo Qiyu Zhou, WFM Anna Cramling, NM James Canty III, FunMasterMike, and GM Wesley So. You will find them after the "master" bots on the Play Computer page.

Here is a quick look at each of the new computer personalities:

Playing strength: 2000

Agadmator (Antonio Radic) is a Croatian candidate master and content creator. Can you stop the world's biggest chess YouTuber?

Playing strength: 2100

Anna Cramling is a Swedish woman FIDE master, chess streamer, commentator, and celebrity. Can you defeat this talented player?

Playing strength: 2300

WGM Nemo Qiyu Zhou is a Canadian streamer, commentator, and CLG team member. Can you defeat the former world youth champion?

Playing strength: 2300

NM James Canty III a streamer, content creator, coach, and "Master Jedi." Don't let your guard down, or you might fall victim to his lightsaber!

Playing strength: 2300

Mike Klein, more commonly referred to as FunMasterMike, is the face of ChessKid.com. How will you do against the American FIDE master?

Playing strength: 2750

Wesley So is a Filipino-American super grandmaster and one of the best players in the world. Can you beat this elite chess player?

Head over to Chess.com/Play/Computer now to play against the newstreamer bots! While you are there, try out the personalities bots like IM Danny Rensch, and other top players like GM Hikaru Nakamura and more!

Link:
Play Chess With Agadmator, Nemo, Cramling, Canty, And More - Chess.com

Read More..

Battle of the Minds: 4 legends compete in chess and poker – chess24

Peter Svidler and Patrick Leonard will team up to play chess and poker against a rival team consisting of Alexander Grischuk and Isaac Haxton. Patrick and Isaac are as famous in the poker world as Peter and Sasha are in the chess world! We're also launching a Freeroll Series that you can play, each Sunday of March and April, on partypoker.

On Wednesday, March 10 at 8 pm CET, Peter Svidler will give a streamed chess lesson to his partner Patrick Leonard and will receive a poker lesson in exchange.

8-time Russian Chess Champion Peter Svidler started to play poker in 2010 and used to play a lot, but has done so less in the last couple of years. He describes himself as a "bad regular"... which is exactly what a humble "good regular" would say!

Patrick used to be World n1 on the PocketFives rating and is part ofTeam partypoker.

The day after, on Thursday, March 11 at 8 pm CET, it will be the turn of Alexander Grischuk and Isaac Haxton to train each other in order to get ready for the Battle.

You might remember from my articleGreat minds: 10 players who excel at both chess and pokerthat World n6 Alexander Grischuk made 8 cashes in the last World Series of Poker, including a 6th place for $30k!

As good in poker as Sasha might be, he will probably have a thing or two to learn from his partner, the great Isaac Haxton.

Also part of Team partypoker, Isaac is n16 on the All-Time Money List with $28 million in earnings! He is regarded as one of the best Heads-Up specialists in the world... and that's exactly what they are going to play.

The Battle will take place on Friday, March 12 at 8 pm CET.Team Peter and Patrick will face Team Alexander and Isaac.

Here's a quick summary of the format:

If you want to know the details:

As exciting as watching the world's best players can be, nothing compares with playing yourself!

That is why we are launching the Battle of the Minds Freeroll Series that starts this Sunday, March 7.

The whole competition is entirely free and while there are no cash prizes, you can still win some nice prizes.

One freeroll each Sunday of March and April at 8 pm CET/CEST.

All the freerolls are 6-max No-Limit Holdem Tournaments - only the speed changes, alternating between Turbo and Hyper.

In each Freeroll you can win:

At the end of April, after 8 tournaments, the top 4 on the leaderboard will play a knockout Heads-Up tournament and compete for these prizes:

4th place

3rd place

2nd place

1st place

Let's answer a few questions you might have:

Is it really free?Yes, absolutely. There are no fees and no deposit is required.

Where does the competition take place?On partypoker.com

Who can participate?All adults over 18 years old, who are living in a country where partypoker.com operates. This includes: Russia, UK, Ireland, Germany, Austria, Hungary, Canada, Holland, LATAM

How to participate?Go to partypoker.com and register if you don't already have an account. In the lobby, find the tourney named Battle of the Minds Freeroll Series #1. A password is needed: Chessparty

We will publish the leaderboard soon after the end of the tournament. Good luck!

Originally posted here:
Battle of the Minds: 4 legends compete in chess and poker - chess24

Read More..

Ahmed Adly wins Arab-African Online Individual Chess Championship 2021 – Chessbase News

Arab-African Online Individual Chess Championship 2021

Recently we have reported on the Africa Online Individual Championship https://en.chessbase.com/post/africa-online-individual-chess-championship-2021 Now, a title African-Arab Online Individual Championship might sound slightly confusing. Such a Championship indeed took place from 25th to 27th February, 2021. It was a brain child of the President of the Arab Chess Federation, Mr Saud bin Abdul Aziz Al Mualla who was also Head of the Championships Organising Committee. On his initiative, prompted by the current trend of online competitions, the African Chess Confederation and the Arab Chess Federation merged, for this occasion, so that players from both federations had the opportunity to compete. The goal was achieved by the starling number of participants: more than 1600!

It was meant to be the regular Arab Chess Championship until the Arab Chess Federations president got the ingenious idea to invite to a marriage of convenience the African Chess Confederation. The move had positive implications on several accounts: using the chess playing platforms online, players that would normally be restricted to travel could play on an international level and gain both experience and rating opportunities.

Saud bin Abdul Aziz Al Mualla, the Arab Chess Federations president

TheArab Worldis composed of22 countriesin the Middle East and North Africa: Algeria, Bahrain, the Comoros Islands, Djibouti, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Morocco, Mauritania, Oman, Palestine, Qatar, Saudi Arabia, Somalia, Sudan, Syria, Tunisia, the UnitedArabEmirates, and Yemen. When it comes to chess, some African nations have the best of both worlds being African by geographical position and Arab by ethnic and cultural identity.

In the Invitation letter to the Heads of the Arab and African Chess Federations the following aims are stated:

Starting on Thursday 25 February, 2021 at 4:00 pm (GMT) and finishing on 27 February, 2021 the Championship was held in four stages: preliminary, mens semi-final, females final and mens final. The time control for each round was three minutes with an additional two seconds from the first move.

The Preliminary stage was actually an Open tournament in which Arab and African players with a standard rating of less than 2000, as well as non- rated players could participate. The first thirty winners would move to the semi-final stage for men from the category of male players.

The twenty best women from the preliminary stage would play in the final stage for female players.

The preliminary stage opened the door to all players, included unrated ones, among whom often there are some hidden talents. Like the unrated Moroccan player Arrami Mohamed who climbed to the first place in a competition against opponents rated up to 2000.

Arrami Mohamed from Morocco (Photo: the players Facebook page)

In the Semi-Final stage for men, the thirty finalists were joined by Arab and African male players with a standard rating between 2000 and 2400. Twenty top finishers of 180 players that took part in this stage would qualify for the final stage for men.

The five best players in the Semi-Final stage were awarded prizes: Adjerit Nourreddine (1967) from Algeria, Chigodo Mukai Cyril (1953) from Zimbabwe, IM Ameir Moheb (2339) from Egypt, IM Boudriga Mohamed Ali (2294) from Tunisia and FM Sadek Sameh (2264) from Egypt.

Adjerit Nourreddine, the unrated Algerian won the first place in the Semi-Finals

Participants in the Final stage were Arab and African male players rated above 2400, in addition to the first twenty finishers from the Semi-final stage for men and the first placed winner of the females final stage.

Egyptian GM Ahmed Adly continues his victorious streak by winning this Championship as well, after claiming victory in the recently finished African Online Individual Championship https://en.chessbase.com/post/africa-online-individual-chess-championship-2021) He was followed by Algerian grandmasters Bilel Belhacene and Muhammad Haddouche, GM Adham Fawzy from Egypt and Keith Khumalo, the promising candidate master from South Africa.

The Final Stage winners

In the preliminary stage-women, the first four places were won by Algerians Nassr Rania (1745), Nassr Lina (1960), Hamza Amira (1882) and Guenadez Amina (1492); on the fifth place was Botlhole Kgalalelo (1713) from Botswana. From these, only the 18 year old Nassr Lina kept the pace until the end finishing fifth in the final stage.

WIM Botlhole Kgalalelo, a member of the Botswanas national womens team (Photo: Botswana Chess Federation)

In the final stage-women some of the best African and Arab women chess players participated, but the finalists did not come necessarily from the ranks of the highest rated representatives.

The African-Arab woman champion is WFM Alattar, Ghayda M.(1868) from Jordan. She was better on tie break but otherwise shared the first place with another Jordanian, WFM Boshra, Alshaeby (2033). They were followed by WIM Ayah Moaataz (2028) from Egypt, WGM Shahenda Wafa (2145) also from Egypt and WIM Nassr Lina (1960) from Algeria. The woman champion was entitled to take part in the mens final stage.

The five women finalists in the Arab-African Online Championship

Apart from the great playing opportunity and experience that a huge number of players enjoyed, the Prize Fund was not negligible either. 100 USD received ten players from the Preliminary stage, the best male and the best female player in each of the rating groups U-1200, U-1400, U-1600, U-1800 and U-2000.

The first five top finishers in each stage were awarded equal prizes in the men and women groups, the highest being 400 USD in the Preliminary Stage and 600 USD in the Semi Final men and the Final women. In the Final Stage men the first place was awarded 1200 USD.

The organisers of the Arab-African Online Chess Championships 2021, Lewis Ncube, the president of the African Chess Confederation and Saud bin Abdul Aziz Al Mualla, president of the Arab Chess Federation

Go here to see the original:
Ahmed Adly wins Arab-African Online Individual Chess Championship 2021 - Chessbase News

Read More..

What is end-to-end encryption & how does it work? – Security Boulevard

This blog provides overview of end-to-end encryption and how it protects the enterprise.

Over the past few years, the vulnerability of social networks like Facebook or messaging apps like Chat has given rise to using end-to-end encrypted platforms to protect communications. Today, platforms like WhatsApp, Signal and PreVeil use end-to-end encryption to protect the exchanges of users data. Yet what is end-to-end encryption and how does it work? How does it differ from other forms of data protection and how does end-to-end encryption ensure the protection of data?This piece will focus on providing answers to these questions.

End-to-end encryption provides the gold-standard for protecting communication. In an end-to-end encrypted system, the only people who can access the data are the sender and the intended recipient(s) and no one else. Neither ackers nor unwanted third parties can access the encrypted data on the server.In true end-to-end encryption, encryption occurs at the device level. That is, messages and files are encrypted before it leaves the phone or computer and isnt decrypted until it reaches its destination. As a result, hackers cannot access data on the server because they do not have the private keys to decrypt the data. Instead, secret keys are stored with the individual user on their device which makes it much harder to access an individuals data.The security behind end-to-end encryption is enabled by the creation of a public-private key pair. This process, also known as asymmetric cryptography, employs separate cryptographic keys for securing and decrypting the message. Public keys are widely disseminated and are used to lock or encrypt a message. Private keys are only known by the owner and are used to unlock or decrypt the message.In end-to-end encryption, the system creates public and private cryptographic keys for each person who joins.

An example

Lets say Alice and Bob create accounts on the system. The end-to-end encrypted system provides each with a public-private key pair, whereby their public keys are stored on the server and their private keys are stored on their device.Alice wants to send Bob an encrypted message. She uses Bobs public key and encrypts her message to him with it. Then, when Bob receives the message, he uses his private key on his device to decrypt the message from Alice.When Bob wants to reply, he simply repeats the process, encrypting his message to Alice using Alices public key.

Security practitioners often point out that security is a chain that is only as strong as the weakest link. Bad guys will attack the weakest parts of your system because they are the parts most likely to be easily broken. Given that data is most vulnerable when stored on a server, hackers techniques are focused on gaining access to servers.As the Department of Homeland Security has written:Given that attackers will go after low hanging fruit like where the data is stored, a solution that does not protect stored data will leave information extremely vulnerable.End-to-end encryption however does protect stored data. In fact it secures and protects data throughout its journey. As such, end-to-end encryption is the safest option for data security available.As the DHS goes on to state in its report:Attacking the data while encrypted is just too much work [for attackers].

End-to-end encryption is important because it provides users and recipients security for their email and files from the moment the data is created by the user until the moment it is received by the recipient. It also ensures that no third party can read the exchanged messages.Services like Gmail, Yahoo or Microsoft enable the provider to access the content of users data on its servers because these providers hold copies to the decryption keys. As such, these providers can read users email and files. In Googles case, its possession of decryption keys has enabled them in the past to provide the Google account holder with targeted ads.By contrast, in well-constructed end-to-end encrypted systems, the system providers never have access to the decryption keys.

The NSA recently issued guidelines for using collaboration services. At the top of the NSAs list was the recommendation that collaboration services employ end-to-end encryption.End-to-ends inclusion in the NSAs list highlights its shift to the mainstream by an organization known to seek the highest levels of security for themselves and their technologies. The NSA notes that by following the guidelines it defines, users can reduce their risk exposure and become harder targets for bad actors.

The U.S. State Department has also wised up to the benefits of end-to-end encryption with their ITAR Carve out for Encrypted Technical data . The carve out establishes that defense companies can now share unclassified technical data outside the U.S. with authorized persons. This exchange can be done without requiring an export license so long as the data is properly secured with end-to-end encryption. If the data is end-to-end encrypted, the exchange is not considered an export.The NSAs and State Departments statements acknowledge that end-to-end encryption provides a significant advantage to users over traditional forms of encryption. End-to-end encryption secures data on the users device and only ever decrypts it on the recipients device. This means, the data can never be decrypted on the server nor in transit nor on the users device.

At PreVeil, end-to-end encryption is at the core of how we users protect email and files. Today, hundreds of companies rely on PreVeil to protect their customers most sensitive data.Learn more about how PreVeil uses end-to-end encryption to protect your data. Download our architectural whitepaper today.

The post What is end-to-end encryption & how does it work? appeared first on PreVeil.

*** This is a Security Bloggers Network syndicated blog from Blog PreVeil authored by Orlee Berlove. Read the original post at: https://www.preveil.com/blog/end-to-end-encryption/

Read more:
What is end-to-end encryption & how does it work? - Security Boulevard

Read More..

Can WhatsApp stop misinformation without compromising encryption? – Quartz

On a jaunt through the darker corners of the internet, a conspiracy-minded reader might come across a fake news story claiming that 5G cell towers spread Covid-19. Alarmed, he sends the story to his family WhatsApp group. A cousin forwards it to a few of her friends, and one of them forwards it to a group of 200 people dedicated to sharing local news. As the lie gains traction, WhatsApp helps it reach more people more quicklybut the apps managers have no way of knowing.

WhatsApp, the Facebook-owned messaging platform used by 2 billion people largely in the global south, has become a particularly troublesome vector for misinformation. The core of the problem is its use of end-to-end encryption, a security measure that garbles users messages while they travel from one phone to another so that no one other than the sender and the recipient can read them.

Encryption is a crucial privacy protection, but it also prevents WhatsApp from going as far as many of its peers to moderate misinformation. The app has taken some steps to limit the spread of viral messages, but some researchers and fact-checkers argue it should do more, while privacy purists worry the solutions will compromise users private conversations. As every social network does battle against the spread of viral lies, WhatsApp faces its own impossible choice: Protect user privacy at all costs, or go all in on curbing the spread of misinformation.

Digital encryption grew out of military efforts to create uncrackable secret codes, which date back at least as far as the Spartans. In the modern era, government scientists working with top secret clearances dominated the field until the 1970s, when computers started to gain commercial use. Among the earliest private sector adopters were banks, which needed a secure way to transmit financial information.

Consumer-facing encrypted messaging began in earnest in the 1990s, with the development of the Pretty Good Privacy protocol, which formed the backbone of early private-messaging software. The much more secure Signal protocolwhich powers the open-source encrypted messaging app of the same namewas developed in 2014. WhatsApp gave users the options to send messages using Signal encryption that year, and made it standard for all messages in 2016. Facebook added an optional encryption feature soon after, and in 2018 Google announced all conversations on its Android messenger would be encrypted.

Encryption is a key privacy protection, and ensures that WhatsApp is one of the few remaining places on the Internet where you can communicate without being snooped on by big businesses or governments. Activists and dissidents living under repressive regimes rely on encryption to communicate freely. But it also makes the conversations that happen in WhatsApp impossible to moderate.

Unlike Facebook and Twitter, which have redoubled their efforts to use algorithms and human fact-checkers to flag, hide, or delete the most harmful viral lies that spread on their platforms, WhatsApp cant see a single word of its users messages. That means misinformation about politics, the pandemic, and Covid-19 vaccines spread with little resistance, raising vaccine hesitancy, reducing compliance with public health measures like social distancing, and sparking several mob attacks and lynchings.

WhatsApp has already taken some steps to curb misinformation without eroding encryptionbut its options are limited. In April 2020, WhatsApp began slowing the spread of highly forwarded messages, the smartphone equivalent of 1990s chain emails. If a message has already been forwarded five times, you can only forward it to one person or group at a time.

WhatsApp claims that simple design tweak cut the spread of viral messages by 70%, and fact-checkers have cautiously cheered the change. But considering that all messages are encrypted, its impossible to know how much of an impact the cut had on misinformation, as opposed to more benign content like activist organizing or memes. Researchers who joined and monitored several hundred WhatsApp groups in Brazil, India, and Indonesia found that limiting message forwarding slows down viral misinformation, but doesnt necessarily limit how far the messages eventually spread.

WhatsApp also now affixes a magnifying glass icon to highly forwarded messages, which signals to the recipient that this is not an original missive from their friend but a viral message that has been ricocheting around the web. Users can tap the magnifying glass to quickly google the content of the message. But that puts the onus on people to do their own fact-checking, when they might be more inclined to trust information coming from a friend or family member.

Currently, fact-checking anything on WhatsApp is extremely labor-intensive. A handful of media outlets and nonprofits have set up tip lines, where users can forward any message they suspect might contain misinformation. Journalists on the other end of the line check out the claim and manually respond to each person with their findings, encouraging the recipient to pass on the fact-check to whoever sent them the message in the first place.

They have pretty limited reach, says Kiran Garimella, a postdoctoral fellow at MIT who studies WhatsApp misinformation. Not a lot of people are aware of them. Theres also the supply side: Journalists cannot scale, so if a million people suddenly start sending their tips, its a very labor-intensive process and they cannot do this at scale.

Garimella and others have called on WhatsApp to make more drastic changes, including enabling on-device fact-checking. They say WhatsApp could put together a list of known misinformation posts that are going viral in a given moment. Since WhatsApp cant read anyones messages, they might base this list on the debunked messages users have sent to fact-checking tip lines, or the most popular lies spreading on Facebook or Twitter. (There is considerable cross-pollination between misinformation on WhatsApp and other platforms.)

Then, WhatsApp could send this most wanted list out to every users phone. When a user sends or receives a message, their phone would check it against the constantly updated list of viral misinformation, and warn the user if theres a match. In this way, proponents argue, WhatsApp can flag at least some false content without snooping on users conversations.

Guaranteeing the privacy of the users is as important as combating misinformation, Garimella and colleagues wrote in an article for the Harvard Kennedy Schools Misinformation Review. In our understanding, both can coexist in parallelour objective is to provide a middle-ground solution which could satisfy those who request actions in combat of misinformation spreading in such platforms, but also keep the privacy of the users phone before it is encrypted.

So far, the idea has met fierce resistance from online privacy advocates like the Electronic Frontier Foundation (EFF), who argue that it would undermine encryption and amount to an unacceptable assault on digital freedoms.Its simply not end-to-end encryption if a companys software is sitting on one of the ends silently looking over your shoulder and pre-filtering all the messages you send, the organization wrote in a blog post.

This isnt just a semantic argument, says EFF strategy director Danny OBrien. Even the smallest erosion of encryption protections gives Facebook a toehold to begin scanning messages in a way that could later be abused, and protecting the sanctity of encryption is worth giving up a potential tool for curbing misinformation. This is a consequence of a secure internet, OBrien says. Dealing with the consequences of that is going to be a much more positive step than dealing with the consequences of an internet where no one is secure and no one is private.

Still, others are holding out hope for a middle path that can bring automatic fact-checking to WhatsApp without trading away too much privacy. WhatsApp might give users a chance to opt out of fact-checking or let them decide which organizations they get fact checks from, suggests Scott Hale, an associate professor of computer science at Oxford.

My vision for misinformation would be more like antivirus software, Hale wrote in an email. I choose to use it; if it detects a virus it alerts me and does nothing without my express permission. Like antivirus software, I would ideally have a choice about what (if any) provider to use.

No matter what WhatsApp does, it will have to contend with dueling constituencies: the privacy hawks who see the apps encryption as its most important feature, and the fact-checkers who are desperate for more tools to curb the spread of misinformation on a platform that counts a quarter of the globe among its users. Whatever Facebook decides will have widespread consequences in a world witnessing the simultaneous rise of fatal lies and techno-authoritarianism.

Read the rest here:
Can WhatsApp stop misinformation without compromising encryption? - Quartz

Read More..

End-to-End Encryption Coming to Teams – UC Today

Microsoft has revealed that end-to-end encryption will be coming to Microsoft Teams later this year.

At Ignite 2021, the vendor said the encryption will support one-to-one calls for commercial customers. It will be available in preview in the first half of this year.

Microsoft said it will help customers meet their security and compliance requirements by providing an additional option for conducting sensitive online conversations.

For example, a call from an IT admin giving an employee her password over Teams could be conducted with E2EE, Microsoft said.

In the first release, customers will be able to enable the encryption for unscheduled calls.

Microsoft added that further updates would support customers evolving compliance needs and expand to scheduled calls and online meetings.

IT departments will have full discretion over who in an organisation can use encryption.

Nicole Herskowitz, General Manager of Microsoft Teams, said:Regardless of how and where work happens, you shouldnt have to compromise the safety of your people and data.

Think of when you review financial data or discuss a confidential new product launch. You want to ensure that what is discussed stays between people in the conversation.

It is our commitment to continue partnering with our customers to support more secure and trustworthy communications and collaboration

This will be the first time end-to-end encryption has been a feature of Teams, with data currently encrypted in transit and at rest. SharePoint files are protected by SharePoints encryption, with OneNote encryption protecting notes, according to Microsoft.

From a compliance perspective, Teams multi-geo support will also be added in H1 this year.

This will give customers greater control over where their Teams date is stored similar to the controls they already have in place for date in Exchange Online and SharePoint Online.

Microsoft also revealed an invite-only function stops participants who werent directly invited from entering meetings, even if the invite has been forward to them.

You can view our Ignite content hub here.

See the original post here:
End-to-End Encryption Coming to Teams - UC Today

Read More..

Feds warn threats are harder to track as extremists shift to encryption – Axios

Included in a new federal government report on possible extremist attacks on the Capitol is a warning that information on specific threats has become harder to come by in the wake of the Jan. 6 siege amid a shift toward encrypted communications programs.

Why it matters: The finding is likely to put the long-simmering debate over strong encryption back on the front burner.

What they're saying: "Our insight into specific threats is increasingly constrained by the expanding use of secure communications by [domestic violent extremists] following the arrest of individuals involved in the Capitol breach," the FBI and Homeland Security Department said in the report, which Axios covered on Wednesday.

Between the lines: While it is likely that more extremists are using encrypted communications, law enforcement could have political reasons for playing up the threat, given their longstanding desire to see tech companies forced to include backdoors allowing law enforcement access to encoded messages.

The other side: Security experts say backdoors in encryption technologies sooner or later escape the control of law enforcement and end up in the wrong hands, leaving everyone less secure.

See the original post:
Feds warn threats are harder to track as extremists shift to encryption - Axios

Read More..

SecureMyEmail Offers Free Encrypted Email Service Without the Need to Switch Email Providers – PRNewswire

RESTON, Va., March 4, 2021 /PRNewswire/ -- Veteran VPN and internet privacy and security services provider, WiTopia, https://www.witopia.com, announced today they are offering free end-to-end encryption for Gmail, Yahoo, and Microsoft email users through their SecureMyEmail encrypted email service. SecureMyEmail 's unique approach allows users to keep their current email addresses while adding modern security and privacy features.

Despite email's ubiquity as a global communication and data archivingplatform, it has lagged far behind the safety and privacy offered by modern messaging applications.

This exposes personal and business email users to serious and unnecessary risks to their privacy, intellectual property, and the general safety of their communications and saved files. This is evidenced by a seemingly endless series of major email hacks in recent years as well as growing concerns that email providers, and their partners, actively scan emails to capture and sell userdata to third parties.

"We all use email to share and save important personal and business information because it's familiar and easy, but it's actually dangerous," said Bill Bullock, CEO of WiTopia."Email's current security and privacy protections are inadequate and antiquated,"continued Bullock. "If email came out today, nobody would even think of using it."

SecureMyEmail's zero-knowledge architecture ensures encrypted emails and attachments are only viewable by the sender and their recipients. No one, including the user's email provider, internet company, or even Witopia itself, ever has access to the encrypted email or attachments.

This protection remains even when the emails are saved on the email providers' servers. In fact, even if a user has their email account hacked, messages encrypted with SecureMyEmail, will remain protected.

SecureMyEmail's free service offers unlimited use for a single email address that ends in Gmail.com, Yahoo.com, or most Microsoft consumer addresses, including Hotmail, MSN. Live, and Outlook.com.

If a user wishes to encrypt more than one email address, has a different email provider, or uses a custom personal or business domain, they receive a zero-obligation 30-day free trial of SecureMyEmail's paid service.

About WiTopia

WiTopia is an internet privacy and security company based in Reston, Virginia. In early 2005, the launch of our personalVPN service pioneered the use of Virtual Private Network (VPN) technology, then used solely to protect government and business data, to give individuals the ability to connect to the internet privately, securely, and without censorship or geo-restrictions.With the addition of our CloakBox VPN Router and SecureMyEmail encrypted email service, we continue to work to ensure that a secure, private, and censorship-free internet is available to everyone. Today, WiTopia's products and services provide internet freedom, security, and privacy to individuals, businesses, and organizations in more than 190 countries.

For more information, please email us at [emailprotected] , or visit https://www.securemyemail.com/or https://www.witopia.com.

SOURCE WiTopia

https://www.witopia.com/

Excerpt from:
SecureMyEmail Offers Free Encrypted Email Service Without the Need to Switch Email Providers - PRNewswire

Read More..

DSCI, Ashoka University launch CIPHER for promoting holistic encryption regime – Business Today

With a committment to preserve privacy and promote digital trust by leveraging cutting edge cryptographic technologies, the Data Security Council of India (DSCI), in collaboration with Ashoka University, has launched the Coalition of India for a Progressive and Holistic Encryption Regime (CIPHER).

CIPHER is a a coalition of like-minded institutions and individuals. The idea behind CIPHER is to strive towards building a nuanced understanding of encryption among policymakers; assist policymakers in building optimal crypto-based solutions for improving governance in India and promote development of encryption-based technologies; and nurture India's start-up ecosystem in this domain, a release said.

"Given the importance of encryption in the digital ecosystem and its cross-cutting impact on the overall policy discourse, it is imperative to hold constructive discussions and bring together a wide variety of stakeholders. CIPHER provides a platform to carry out these difficult yet important conversations, and will strive to create awareness about trust, privacy, and cryptography. We welcome everyone who is interested to join the alliance for a meaningful and solution-oriented approach towards encryption," says DSCI CEO Rama Vedashree.

CIPHER aims to foster frank discussions around critical issues related to encryption by holding seminars, writing whitepapers, and developing standards and best practices.

It will aim to achieve objectives such as building a community of like-minded institutions and individuals to promote use of encryption, a nuanced understanding of encryption among government entities, policymakers, and parliamentarians, assisting policymakers in building cryptographic solutions for improving governance in India.

It also aims to assist policymakers and the industry in the regulation of cutting-edge technologies that leverage cryptography, promote development of encryption-based technologies and nurture India's start-up ecosystem in this domain, develop research materials and explainers for policy issues involving cryptography such as an end to end encryption. CIPHER will also help improve user privacy and security for the average citizen.

"For too long, cryptographers, policy makers, civil rights activists, and law enforcement have been having parallel conversations around encryption, privacy, and data security without a coherent exchange of ideas. Given the multidimensional nature of these issues, it is critical that we have a common platform to systematically discuss and resolve problems. It is with this hope that we are building CIPHER," says Debayan Gupta, Asstistant Professor, Department of Computer Science, Ashoka University.

Also read: Facebook is on the offensive against Apple's upcoming data privacy update

See the article here:
DSCI, Ashoka University launch CIPHER for promoting holistic encryption regime - Business Today

Read More..