Page 333«..1020..332333334335..340350..»

New Apple silicon security flaw could allow the extraction of encryption keys, but don’t dust down that old Intel Mac just yet – iMore

Apple silicon has transformed the Mac since the M1's introduction and that continued with the M2 and the latest M3, the chip that powers the latest MacBook Air and other best MacBooks. It brought with it a level of performance and battery life that was previously not possible when using Intel's chips and the fluidity of the chipmaker's roadmap made it difficult to plan products around. But while the M-series chips have been a revelation, they aren't perfect as news of a newly found security flaw proves.

The flaw, which just so happens to be unpatchable, has the potential to open the doors to Mac's encryption keys. That's bad news for anyone who values their privacy and security, although there is a discussion to be had about just how much of a problem the flaw really is. What we do know is that the flaw is real, however, and it's present in all M1, M2, and M3 Macs as well as potentially future models as well.

This isn't the first Apple silicon security flaw of course, but any new flaw is sure to be a thorn in the side of Apple's much-flaunted silicon team.

The flaw was first reported by ArsTechnica and the outlet explains that the issue comes thanks to the way that modern chips, like the M-series, process information. The Dara Memory-dependent Prefetchers (DMP) are used to optimize the performance of chips and are actually an expansion of prefetchers that have been around for years.

"The threat resides in the chips data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future," Ars explains. "By loading the contents into the CPU cache before its actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing."

But researchers have spotted a bug in the DMP which, because of the nature of the beast, cannot be fixed. A workaround could be done via software, but it'll likely have a notable impact on performance when performing cryptographic tasks.

Researchers say that "prefetchers usually look at addresses of accessed data (ignoring values of accessed data) and try to guess future addresses that might be useful. The DMP is different in this sense as in addition to addresses it also uses the data values in order to make predictions (predict addresses to go to and prefetch). In particular, if a data value 'looks like' a pointer, it will be treated as an 'address' (where in fact it's actually not!) and the data from this address will be brought to the cache. The arrival of this address into the cache is visible, leaking over cache side channels." It's the leaking that the researchers have been able to use when developing their attack on the system.

iMore offers spot-on advice and guidance from our team of experts, with decades of Apple device experience to lean on. Learn more with iMore!

"We cannot leak encryption keys directly, but what we can do is manipulate intermediate data inside the encryption algorithm to look like a pointer via a chosen input attack," the researchers told Ars via email. "The DMP then sees that the data value 'looks like' an address, and brings the data from this 'address' into the cache, which leaks the 'address.' We dont care about the data value being prefetched, but the fact that the intermediate data looked like an address is visible via a cache channel and is sufficient to reveal the secret key over time.

However, as problematic as this might be, it's unlikely to be an issue for the vast majority of people. The tool the researchers created as a proof of concept requires a little less than an hour to do its work, and that's to extract a 2048-bit RSA key. The stronger the key, the more time is required all the way to around 10 hours for a Dilithium-2 key. That means people would need to unwittingly download and run an unknown app and then have it running for around an hour before there would be any chance of anything being extracted. And considering most Macs are configured not to run apps that have not been signed by Apple by default, that's even less likely to happen.

Here is the original post:
New Apple silicon security flaw could allow the extraction of encryption keys, but don't dust down that old Intel Mac just yet - iMore

Read More..

Apricorn Introduces Industry’s First 24TB Hardware Encrypted USB Drive – PR Newswire

Massive 24 TB Aegis Padlock DT and Padlock DT FIPS Desktop Drives Offer Encrypted Storage for Healthcare, Finance, Government and other Industries' Data at Rest

POWAY, Calif., March 21, 2024 /PRNewswire/ -- Apricorn, the leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB data storage devices, today announced the release of a 24TB version of its Aegis Padlock DT and Padlock DT FIPS Desktop Drives. Continuing its position as an industry leader, Apricorn is the first to bring a 24TB encrypted drive to market, delivering high performance and mass capacity to industries such as healthcare, financial services, education, and government, while ensuring the security of users' data. This is the third time Apricorn has brought to market the industry's largest capacity hardware encrypted USB drive, having previously done so in 20TB and 22TB sizes.

"Microsoft this month disclosed that the nation state attack it identified in January wasstill not fully contained. Since Microsoft is so deeply entrenched in just about every facet of our workflow, encrypting and storing data offline adds a layer of protection and resilience in the face of potential future attacks that could stem from breaches of this nature," said Kurt Markley, U.S. Managing Director at Apricorn. "The Aegis Padlock DT line is an ideal way for large organizations to protect vast amounts of data at rest in a highly secure and economic way."

Both the Padlock DT and Padlock DT FIPS Desktop Drives come with AegisWare - the proprietary firmware and feature set unique to Apricorn's Aegis Secure Drives and Secure Keys. Consistent with the Apricorn line of secure drives, passwords and commands are entered by way of the device's on-board keypad. All authentication and encryption processes take place within the device itself and never involve software or share critical security parameters (such as passwords) with the host computer. Additionally, all have military grade 256-bit AES XTS encryption so firmware is locked down and can't be updated or modified, defending against malware and ensuring data remains secure and accessible only by the user.

"Across both the public and private-sectors, organizations are creating more data year-over-year, while also dealing with increased rates of breach brought on by ransomware and other cyber threats. It is more critical than ever to create a secure backup and resiliency program that includes encrypting data offline," continued Markley. "The Aegis Padlock DT has proven to be an ideal option for organizations that need to ensure their sensitive data stays secure. Apricorn is the only vendor to offer a hardware encrypted 24TB option, making it easier than ever for our customers to store staggering amounts of data securely."

Featuring the largest encrypted external USB storage capacity in its class, the Aegis Padlock DT and Aegis Padlock DT FIPS Desktop Drives offer 11 capacities ranging from 2TB, up to the new 24TB of secure storage. Fully hardware-based and 256-bit AES XTS encrypted, the Padlock DT series bolsters on-board keypad PIN authentication and ultra-fast USB 3.2 (3.0) data transfer speeds. All data is encrypted on the fly as it's being written to the drive, and the devices' PINs and data remain encrypted when the drives are at rest.

Apricorn devices provide a simple and secure method for transporting sensitive data outside the firewall or storing offline, and help companies in regulated industries adhere to compliance regulations including finance, government, power & energy, legal and healthcare. Visit http://www.apricorn.com for more information on the Aegis Padlock DT FIPS Desktop Drives.

About Apricorn

Apricorn provides secure storage innovations to the most prominent companies in the categories of finance, healthcare, education, and government throughout North America and EMEA. Apricorn products have become the trusted standard for a myriad of data security strategies worldwide. Founded in 1983, numerous award-winning products and patents have been developed under the Apricorn brand as well as for a number of leading computer manufacturers on an OEM basis.

Media ContactSarah Hawley Origin Comms t. +1 480-292-4640 e. [emailprotected]

SOURCE Apricorn

See original here:
Apricorn Introduces Industry's First 24TB Hardware Encrypted USB Drive - PR Newswire

Read More..

JV video: GeologicAI rethinks mining data and cuts carbon emissions – The Northern Miner

The Bill Gates-backed firm GeologicAI has seen a rapid uptake of its technology among global mining majors, demonstrating a 5% reduction in carbon dioxide emissions at operations in Africa, the company says.

GeologicAI uses artificial intelligence (AI), new data types and superior algorithms to scan rocks and gather information for thorough mineral analyses, founder and president Grant Sanden explained during an interview.

The technology aims to handle uncertainty in resource estimation, thereby significantly improving the economics and environmental efficiency of mining operations, Sanden told The Northern Miners western editor, Henry Lazenby, during the recent Prospectors and Developers Association of Canadas convention in Toronto.

GeologicAI in 2023 merged with another service provider, RMS (Resource Modelling Solutions), enhancing their data analytics and algorithms in mining.

Watch the full interview below.

Joint venture videos are paid-for content in arrangement with The Northern Miner.

Go here to see the original:

JV video: GeologicAI rethinks mining data and cuts carbon emissions - The Northern Miner

Read More..

Ethiopia Set to Pioneer Bitcoin Mining in Africa – Tech in Africa

Last Thursday, February 15, Ethiopian Investment Holdings (EIH), the investment arm of the Ethiopian Government, signed a memorandum of understanding with Hong Kong-based West Data Groups Center Service PLC to initiate bitcoin mining operations.

The collaboration is governed by a comprehensive agreement for a significant $250 million data mining initiative aimed at establishing state-of-the-art infrastructure for data mining and artificial intelligence training operations in Ethiopia, as stated by the EIH. Ethiopia is strategically positioning itself as a frontrunner in the data center sector in Africa, which is projected to reach $5.4 billion by 2027, according to Aritzon Advisory and Intelligence.

According to Kal Kassa, CEO for Ethiopia at Hashlabs Mining, the development is aligned with the Ethiopian Governments goal of boosting economic growth through the strategic use of technology and energy resources to attract foreign investments.

The EIH has not confirmed the specifics of its bitcoin mining operations or provided any comments to other publications. However, as the project develops, we anticipate receiving more detailed information from them regarding the arrangement.

In 2022, despite the ban on crypto trading in the country, there was a significant development with the ratification of favorable data mining laws allowing for high-performance computing and data mining, encompassing bitcoin mining. This shift has attracted a surge of miners due to the comparatively positive reception towards bitcoin mining, abundant hydro-based energy sources, optimal weather conditions, and cost-efficient energy.

In 2023, Ethiopia emerged as the fourth leading destination for Bitcoin mining rigs, trailing only the USA, Hong Kong, and Asia, as reported by Bitcoin mining services company Luxor Technologies. The country has witnessed significant developments in this sector, with Russian company Bitcluster establishing a 120 MW bitcoin mining facility and Hashlabs Mining commencing the construction of bitcoin mines to cater to global clients.

According to a forecast by a senior executive at Bitmain and reported by Bloomberg, Ethiopias energy potential could soon rival Texass generation capacity. Currently, Texas accounts for an impressive 28.5% of the USs 40% global hash rate.

However, bitcoin miners are expressing caution regarding the future of regulation in the country. As demonstrated in other regions, bitcoin mining is not immune to changing regulatory landscapes. It is still premature to anticipate whether Ethiopia will follow the lead of Iran and Kazakhstan, altering its stance on bitcoin mining as they did when faced with competition from domestic energy demand.

In any case, the government is committed to increasing its foreign currency reserves to address its economic challenges. It sees mining as a promising investment opportunity to achieve this objective.

With the energy infrastructure still struggling to meet the demand for electricity in many African countries, bitcoin mining has emerged as an appealing solution to provide power to millions.

In Ethiopia, more than 40% of its population, approximately 120 million people, lack access to electricity. However, the country boasts an installed capacity generation of over 5,000 MW, with plans for an additional capacity generation of approximately 5,150 MW upon the completion of the Grand Ethiopian Renaissance Dam (GERD), the largest hydroelectric project in Africa.

Drawing inspiration from successful mining projects in Africa like Gridless and Trojan Mining, Ethiopia has the opportunity to harness its surplus green energy to power bitcoin mining operations and provide electricity to its citizens. This pioneering initiative could set a precedent for other African nations with similar energy resources, offering a viable solution to common economic challenges.

Moreover, integrating bitcoin mining into the Ethiopian economy has the potential to contribute $2 to $4 billion to its GDP, as per data from Project Mano. This open collective aims to educate the government on the economic benefits of bitcoin for the country.

Ethiopia stands to gain immense economic advantages by strategically harnessing its abundant energy resources for Bitcoin mining. Its only a matter of time before other African nations follow suit, tapping into this lucrative opportunity.

Bitcoin mining has the potential to significantly contribute to addressing the economic challenges faced by several African countries.

Source

Link:

Ethiopia Set to Pioneer Bitcoin Mining in Africa - Tech in Africa

Read More..

10 Python Libraries for Data Cleaning and Preprocessing – Analytics Insight

In data science, data cleaning and preprocessing are key steps in preparing raw data for analysis and modeling. Pythons vast ecosystem of libraries provides severaltools to assist with these tasks. In this article, well explore the top 10 Python libraries for data cleaning and preprocessing, providing insights into their features, benefits, and recommendations for optimizing your data analysis workflow.

Pandas is a robust data manipulation librarythat offers high-performance, user-friendly data structures and analytical tools in Python. Pandas enables users to import, clean, transform, and analyze structured data efficiently. It offers flexible data structures such as DataFrames and Series, along with a wide range of functions for data cleaning, preprocessing, and exploration. Pandas is a versatile library that is commonly used in data science projects for tasks such asdata cleaning, filtering, grouping, and visualization.

NumPy is a fundamental library for numerical computing in Python, including multidimensional arrays and matrices. It provides a diverse set of mathematical functions and operations for data manipulation, such as array manipulation, linear algebra, statistical analysis, and random number generation. NumPys array-based computing capabilities make it ideal for data preparation tasks including datanormalization, scaling, and transformation. It is a core component of the Python scientific computing ecosystem and is often used in conjunction with other libraries such as Pandas and Matplotlib.

SciPy is an open-source Python library for scientific computing that includes a variety of functions and algorithms for numerical optimization, integration, interpolation, and signal processing. It builds upon NumPy and provides additional functionality for scientific and technical computing tasks.SciPys optimization and interpolation methods are very useful for data preparation tasks like feature engineering, dimension reduction, and data imputation. It is popularly usedin data science and machine learning projects due to its extensive collectionof algorithms and tools.

scikit-learn is a versatile Python machine-learninglibrary that offers simple and efficient tools for data mining and analysis. It provides a wide rangeof algorithms for classification, regression, clustering, dimensionality reduction, and model selection. scikit-learns preprocessing module includes functions for data scaling, normalization, encoding categorical variables, and handling missing values. It is widely used in data preprocessing pipelines for machine learning tasks and provides a consistent interface for building and evaluating predictive models.

TensorFlow Data Validation (TFDV) is a library for exploring and validating datasets for machine learning. It includes tools for assessing the characteristics of datasets, detecting abnormalities, and determining data quality issues. TFDVs features include schema inference, data drift detection, and anomaly detection, making it useful for data cleaning and preprocessing tasks. It is often used in conjunction with TensorFlow Extended (TFX) for building end-to-end machine learning pipelines.

Feature-Engine is a Python library that facilitates feature engineering and selection in machine learning projects. It includes a wide range of transformers for data preprocessing tasks such as handling missing values, encoding category variables, and scaling numerical features. Feature-Engines transformers can be easily integrated into scikit-learn pipelines, making it a a convenient tool for building data preprocessing workflows. It is designed to be fast, flexible, and easy to use, making it suitable for both beginners and experienced data scientists.

Dora is a Python library for data preprocessing and supports exploratory data analysis (EDA). It provides a set of functions and utilities for visualizing and understanding datasets, identifying patterns and trends, and preparing data for analysis. Doras features include data cleaning, transformation, and visualization, making it a versatile tool for data preprocessing. It is developed on top of Pandas and offers an easy-to-use interface for data exploration and manipulation.

Pyjanitor is a Python library for data cleaning and preparation, inspired by the R packagejanitor. It includes a suite of functions and utilities for cleaning messy datasets, handling missing values, and reshaping data. Pyjanitor provides functions for renaming columns, deleting duplicates,converting data types, and performing group-wise operations. It is designed to be simple, expressive, and easy to use, making it a useful tool for data cleaning and preprocessing tasks.

Featuretools is a Python library for automatedfeature engineering and feature selection. IIt provides tools for creating new features from existing data, identifying relevant features for machine learning tasks, and building feature sets for predictive modeling. Featuretools automated featureengineering capabilities can considerably minimize the time and effort needed for data preprocessing tasks. It is particularly useful for handling complex datasets with multiple tables and relationships.

Dask is a flexible parallel computing library for Python that provides scalable data processing capabilities. It enables users to parallelize data processing tasks across numerous cores and nodes, making it ideal for handling enormous datasets that cannot be stored in memory. Dasks DataFrame and Array data structures are compatible with Pandas and NumPy, allowing users to leverage their familiar APIs for data preprocessing tasks. It is particularly useful for distributed data preprocessing tasks in cloud computing environments.

These ten Python libraries provide powerful tools and utilities for data cleaning and preprocessing, allowing data scientists to streamline their data analysis workflow and prepare datasets for machine learning tasks.Data scientists can use these libraries to efficiently manage data cleaning, transformation, and exploration tasks, enabling them to focus on building and deploying predictive models and extracting valuable insights from their data.

Join our WhatsApp and Telegram Community to Get Regular Top Tech Updates

The rest is here:

10 Python Libraries for Data Cleaning and Preprocessing - Analytics Insight

Read More..

Who is Satoshi Nakamoto, the creator of Bitcoin? It’s not Craig Wright according to a UK judge – PC Gamer

The identity of Satoshi Nakamoto, the pseudonymous creator of Bitcoin, is the biggest mystery in the crypto world. There's been a lot of speculation as to who the person or persons behind the first and most valuable crypto really areand there are a few claimants too. The most publicized of whom is Australian academic Dr Craig Wright. However, after years of litigation, a UK high court judge has ruled that Wright is not Satoshi Nakamoto.

The lawsuit was brought by a conglomerate of cryptocurrency companies called the Crypto Open Patent Alliance (COPA). It sought a judgment preventing Wright from continuing to claim he was Satoshi Nakamoto, and using this recognition to expand his influence over the sector.

Reporting from The Guardian includes quotes from Jonathan Hough KC, a lawyer representing COPA. He argued that Wrights claim that he created Bitcoin and wrote its whitepaper was a brazen lie and elaborate false narrative supported by forgery on an industrial scale. He also added there are elements of Dr Wrights conduct that stray into farce.

The group argued Wright's supporting evidence included provably forged documents, backdated edits and even traces of ChatGPT usage, even though ChatGPT was not released until years later.

The judge overwhelmingly agreed, unusually issuing a verdict immediately after the conclusion of the case. According to court reports, Justice Mellor said Im prepared to say this: Dr Wright is not the inventor of bitcoin" and "Dr Wright is not the author of the bitcoin white paper and he is not the person who adopted the name Satoshi Nakamoto.

Wright has spent years claiming he invented Bitcoin, fighting lawsuits across different jurisdictions. One of the well-known examples involved defending against a fraud lawsuit filed in 2018 by the estate of Dave Kleiman, a US computer scientist. Kleiman died in 2013 and some even suggest he could be Nakamoto himself. Wright lost the lawsuit and was ordered to pay $100 million in damages.

Well over a decade has passed since Satoshi Nakamoto's last publicly known message was posted to the Bitcointalk forums. The message gave no hint that he would be going anywhere. Did he die? Did he wish to step away in order to promote decentralization? Or was "Satoshi Nakamoto" a group that subsequently disbanded?

Sign up to get the best content of the week, and great gaming deals, as picked by the editors.

Satoshi Nakamoto leaves behind dormant wallets estimated to contain as many as 1.1 million Bitcoins. That amounts to some $75 billion at Bitcoin's current price. If Wright was Satoshi Nakamoto, accessing those early coins would have strengthened his case immensely. He never did.

We may never know who the real person or persons behind Bitcoin are, but if Justice Mellor's judgment is the final word, the saga of "Faketoshi" is done and dusted.

Read more:

Who is Satoshi Nakamoto, the creator of Bitcoin? It's not Craig Wright according to a UK judge - PC Gamer

Read More..

Consensus Adoption of U.S.-Led Resolution on Artificial Intelligence by the United Nations General Assembly – United … – Department of State

With todays adoption in the UN General Assembly of the U.S.-led resolution on Artificial Intelligence (AI), UN Member States have spoken with one voice to define a global consensus on safe, secure, and trustworthy AI systems for advancing sustainable development. This consensus resolution, developed with direct input from more than 120 countries and cosponsored by more than 120 Member States from every region, is a landmark effort and a first-of-its-kind global approach to the development and use of this powerful emerging technology.

Artificial intelligence has enormous potential to advance sustainable development and the Sustainable Development Goals (SDGs). This resolution helps ensure that the benefits of AI reach countries from all regions and at all levels of development and focuses on capacity building and bridging digital divides, especially for developing countries. It underscores the consensus that AI systems can respect human rights and fundamental freedoms, while delivering on aspirations for sustainable development, as these are fundamentally compatible goals.

Governments must work withthe private sector, civil society, international and regional organizations, academia and research institutions and technical communities, and all other stakeholders to build this approach.Importantly, this resolution will serve as a foundation for multilateral AI efforts and existing and future UN initiatives.

The United States will continue to work with governments and other partners to ensure the design, development, deployment, and use of emerging technologies, including AI, are safe, secure, and trustworthy and are directed to achieving our common goals and solving our most pressing challenges.

View original post here:
Consensus Adoption of U.S.-Led Resolution on Artificial Intelligence by the United Nations General Assembly - United ... - Department of State

Read More..

The UN adopts a resolution backing efforts to ensure artificial intelligence is safe – KeysNews.com

State Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York North Carolina North Dakota Ohio Oklahoma Oregon Pennsylvania Rhode Island South Carolina South Dakota Tennessee Texas Utah Vermont Virginia Washington Washington D.C. West Virginia Wisconsin Wyoming Puerto Rico US Virgin Islands Armed Forces Americas Armed Forces Pacific Armed Forces Europe Northern Mariana Islands Marshall Islands American Samoa Federated States of Micronesia Guam Palau Alberta, Canada British Columbia, Canada Manitoba, Canada New Brunswick, Canada Newfoundland, Canada Nova Scotia, Canada Northwest Territories, Canada Nunavut, Canada Ontario, Canada Prince Edward Island, Canada Quebec, Canada Saskatchewan, Canada Yukon Territory, Canada

Zip Code

Country United States of America US Virgin Islands United States Minor Outlying Islands Canada Mexico, United Mexican States Bahamas, Commonwealth of the Cuba, Republic of Dominican Republic Haiti, Republic of Jamaica Afghanistan Albania, People's Socialist Republic of Algeria, People's Democratic Republic of American Samoa Andorra, Principality of Angola, Republic of Anguilla Antarctica (the territory South of 60 deg S) Antigua and Barbuda Argentina, Argentine Republic Armenia Aruba Australia, Commonwealth of Austria, Republic of Azerbaijan, Republic of Bahrain, Kingdom of Bangladesh, People's Republic of Barbados Belarus Belgium, Kingdom of Belize Benin, People's Republic of Bermuda Bhutan, Kingdom of Bolivia, Republic of Bosnia and Herzegovina Botswana, Republic of Bouvet Island (Bouvetoya) Brazil, Federative Republic of British Indian Ocean Territory (Chagos Archipelago) British Virgin Islands Brunei Darussalam Bulgaria, People's Republic of Burkina Faso Burundi, Republic of Cambodia, Kingdom of Cameroon, United Republic of Cape Verde, Republic of Cayman Islands Central African Republic Chad, Republic of Chile, Republic of China, People's Republic of Christmas Island Cocos (Keeling) Islands Colombia, Republic of Comoros, Union of the Congo, Democratic Republic of Congo, People's Republic of Cook Islands Costa Rica, Republic of Cote D'Ivoire, Ivory Coast, Republic of the Cyprus, Republic of Czech Republic Denmark, Kingdom of Djibouti, Republic of Dominica, Commonwealth of Ecuador, Republic of Egypt, Arab Republic of El Salvador, Republic of Equatorial Guinea, Republic of Eritrea Estonia Ethiopia Faeroe Islands Falkland Islands (Malvinas) Fiji, Republic of the Fiji Islands Finland, Republic of France, French Republic French Guiana French Polynesia French Southern Territories Gabon, Gabonese Republic Gambia, Republic of the Georgia Germany Ghana, Republic of Gibraltar Greece, Hellenic Republic Greenland Grenada Guadaloupe Guam Guatemala, Republic of Guinea, Revolutionary People's Rep'c of Guinea-Bissau, Republic of Guyana, Republic of Heard and McDonald Islands Holy See (Vatican City State) Honduras, Republic of Hong Kong, Special Administrative Region of China Hrvatska (Croatia) Hungary, Hungarian People's Republic Iceland, Republic of India, Republic of Indonesia, Republic of Iran, Islamic Republic of Iraq, Republic of Ireland Israel, State of Italy, Italian Republic Japan Jordan, Hashemite Kingdom of Kazakhstan, Republic of Kenya, Republic of Kiribati, Republic of Korea, Democratic People's Republic of Korea, Republic of Kuwait, State of Kyrgyz Republic Lao People's Democratic Republic Latvia Lebanon, Lebanese Republic Lesotho, Kingdom of Liberia, Republic of Libyan Arab Jamahiriya Liechtenstein, Principality of Lithuania Luxembourg, Grand Duchy of Macao, Special Administrative Region of China Macedonia, the former Yugoslav Republic of Madagascar, Republic of Malawi, Republic of Malaysia Maldives, Republic of Mali, Republic of Malta, Republic of Marshall Islands Martinique Mauritania, Islamic Republic of Mauritius Mayotte Micronesia, Federated States of Moldova, Republic of Monaco, Principality of Mongolia, Mongolian People's Republic Montserrat Morocco, Kingdom of Mozambique, People's Republic of Myanmar Namibia Nauru, Republic of Nepal, Kingdom of Netherlands Antilles Netherlands, Kingdom of the New Caledonia New Zealand Nicaragua, Republic of Niger, Republic of the Nigeria, Federal Republic of Niue, Republic of Norfolk Island Northern Mariana Islands Norway, Kingdom of Oman, Sultanate of Pakistan, Islamic Republic of Palau Palestinian Territory, Occupied Panama, Republic of Papua New Guinea Paraguay, Republic of Peru, Republic of Philippines, Republic of the Pitcairn Island Poland, Polish People's Republic Portugal, Portuguese Republic Puerto Rico Qatar, State of Reunion Romania, Socialist Republic of Russian Federation Rwanda, Rwandese Republic Samoa, Independent State of San Marino, Republic of Sao Tome and Principe, Democratic Republic of Saudi Arabia, Kingdom of Senegal, Republic of Serbia and Montenegro Seychelles, Republic of Sierra Leone, Republic of Singapore, Republic of Slovakia (Slovak Republic) Slovenia Solomon Islands Somalia, Somali Republic South Africa, Republic of South Georgia and the South Sandwich Islands Spain, Spanish State Sri Lanka, Democratic Socialist Republic of St. Helena St. Kitts and Nevis St. Lucia St. Pierre and Miquelon St. Vincent and the Grenadines Sudan, Democratic Republic of the Suriname, Republic of Svalbard & Jan Mayen Islands Swaziland, Kingdom of Sweden, Kingdom of Switzerland, Swiss Confederation Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand, Kingdom of Timor-Leste, Democratic Republic of Togo, Togolese Republic Tokelau (Tokelau Islands) Tonga, Kingdom of Trinidad and Tobago, Republic of Tunisia, Republic of Turkey, Republic of Turkmenistan Turks and Caicos Islands Tuvalu Uganda, Republic of Ukraine United Arab Emirates United Kingdom of Great Britain & N. Ireland Uruguay, Eastern Republic of Uzbekistan Vanuatu Venezuela, Bolivarian Republic of Viet Nam, Socialist Republic of Wallis and Futuna Islands Western Sahara Yemen Zambia, Republic of Zimbabwe

More:
The UN adopts a resolution backing efforts to ensure artificial intelligence is safe - KeysNews.com

Read More..

Committee Approves Amended Artificial Intelligence Bill CBIA – CBIA

The state legislatures General Law Committee unanimously approved amended legislation targeting the use and growth of artificial intelligence.

SB 2, championed by committee co-chair Sen. James Maroney, contains many, but not all, consensus items recommended by the AI Working Group earlier this year.

That group was established last year and tasked with making recommendations concerning the ethical and equitable use of AI in state government and regulation of its use in the private sector based on the White Houses Blueprint for an AI Bill of Rights and other similar materials.

The bill favorably reported last week made a number of changes to both the workforce development and regulatory sections originally drafted.

The substitute bill adds both the Department of Consumer Protection and Commission on Human Rights and Opportunities as agencies to enforce the regulatory and reporting requirements imposed on developers and deployers of AI.

The bill originally vested the sole enforcement authority to the Office of the Attorney General.

For example, under Section 11 of the substitute bill, if a business fails to use reasonable care to protect any consumer from any known or reasonably foreseeable risk of algorithmic discrimination, it is a discriminatory practice subject to investigation and enforcement by CHRO.

If a deployer fails to cure a violation within 60 days, CHRO may bring an enforcement action.

Similar to the enforcement measures required by the OAG and DCP, CHRO must issue a notice of violation to the deployer if the commission determined that it is possible to cure such violation.

If the deployer fails to cure the violation within 60 days, CHRO may bring an enforcement action.

Once the action is commenced, Section 11 stipulates that the deployer can assert an affirmative defense that it used reasonable care if they can prove compliance with the reporting and notification requirements laid out in Section 3 of the bill.

Those requirements include (1) creating and continually updating an impact assessment; (2) developing a risk management policy that specifies principles, processes and personnel that the employer will use to maintain the program to identify, document and eliminate any known or reasonably foreseeable risks for discrimination; and (3) notifying consumers and state enforcement agencies when discrimination is discovered.

Sections 6 and 7 also add new requirements for developers and deployers that utilize AI systems that produce synthetic content.

On the developer side, Section 6 requires developers to (1) ensure that the outputs of the AI system are marked in a machine-readable format and detectable as synthetic digital content and such outputs are market and distinguishable; and (2) ensure that technical solutions are effective and interoperable.

The bill adds new requirements for developers and deployers that utilize AI systems that produce synthetic content.

On the deployer side, Section 7 requires deployers to disclose to consumers that the synthetic digital content has been artificially generated and/or manipulated.

No disclosure is necessary if the synthetic content is in the form of text published to inform the public on any matter of public interest.

To meet this exemption, two conditions must be satisfied: (1) the synthetic content has undergone a process of human review or editorial control; and (2) a person holds editorial responsibility for the publication of such synthetic digital content.

Section 26 creates a new competitive grant program housed within the Department of Economic and Community Development to fund pilot studies conducted for the purpose of using AI to reduce health inequities in the state.

Section 30 requires the Department of Public Health to conduct a study of, and make recommendations regarding the adoption of, governance standards concerning the use of AI by healthcare providers.

The study includes an assessment of the extent to which health care providers currently use AI, any means available to increase such use, any risks stemming from such use and any means available to monitor the outcomes produced by AI to ensure that such outcomes are having the desired effect on patient outcomes.

The bill keeps in place the following workforce development initiatives that CBIA supported at the public hearing earlier this month:

The bill awaits action in the Senate.

For more information, contact CBIAsWyatt Bosworth(860.244.1155) |@WyattBosworthCT.

See the article here:
Committee Approves Amended Artificial Intelligence Bill CBIA - CBIA

Read More..

Which Role for Artificial Intelligence in Electoral Processes? – International IDEA

The International Institute for Democracy and Electoral Assistance (International IDEA) and the Rule of Law Centre of Finland (RoL Centre), in partnership with the Central Election Commission of Bosnia and Herzegovina, will host the regional conference Which Role for Artificial Intelligence in Electoral Processes?, taking place in Sarajevo, Bosnia and Herzegovina on 16 April 2024.

In recent years, the use of Artificial Intelligence (AI) tools, is rapidly expanding amid public enthusiasm, curiosity and concern on their impact on democracy around the globe. While the introduction of AI in democratic processes seems unstoppable in the foreseeable future, institutions and societies are called to reflect and act early on to make it a success for humanitys progress. Elections, in particular, will be impacted by the rapid spread of AI tools. But how should AI be understood within the electoral process and how does it differ from other technologies already used in elections? How can it be deployed by Election Management Bodies (EMBs) preserving, and possibly boosting, the integrity and public trust in elections?

The event seeks to encourage a shared understanding of AI among election stakeholders, notably by analysing global experience with AI tools, and the presence of potential AI elements in digitalization of elections across the Western Balkans. Moreover, experts will explore the implications of potentially expanded use of AI tools for EMB mandates, their capacities and future regulation while they strive to uphold fundamental rights and public trust in elections. The discussions seek to facilitate cross-cutting exchanges among Election Management Bodies (EMBs) from the Western Balkans and EU Member States, alongside esteemed academics, and representatives from civil society organizations. The discussion will also dwell into how EMBs of the Western Balkans should approach AI developments under the prospect of EU accession and the EUs role as a regulator and standard setter in the field.

More here:
Which Role for Artificial Intelligence in Electoral Processes? - International IDEA

Read More..