Page 3,554«..1020..3,5533,5543,5553,556..3,5603,570..»

Congress introduces EARN IT Act, which would end encryption programs but violates the Constitution – NationofChange

Sen. Lindsey Graham, along with Richard Blumenthal (D-Conn.), Sen. Josh Hawley (R-Missouri) and Sen. Dianne Feinstein (D-Calif.) introduced a bill that would break encryption communications. The Eliminating Abusive and Rampant Neglect of Interactive Technologies Act (EARN IT Act) would force technology companies to kill encryption programs that prevent hackers, law enforcement officers and many others from accessing private online communication systems.

Authored by Sen. Graham, EARN IT Act is said to be legislation to protect children from online exploitation, but Fight for the Future called the new legislation a thinly-veiled excuse to destroy privacy protections for everyday people.

They have routinely lied and misled the public about their activities and their intentions, Fight for the Future said in a petition. Now they want us to earn our right to privacy and our right free speech online. But these rights dont need to be earned; they are protected by the Constitution.

If passed, the act will create a National Commission on Online Child Exploitation Prevention (NCOCEP), which will construct rules that internet companies must follow in order to continue being eligible for protections under Section 230 of the Communications Decency Act at the hands of Attorney General William Barr, Privacy News Online reported. Under Section 230 passed in 1996, online platforms (providers of interactive computer services) mostly cant be held liable for the things their users say and do on the platform, Riana Pfefferkorn from The Center for Internet and Society at Stanford University, explained.

Since theres already an existing federal statutory scheme criminalizing child sex abuse material (CSAM) and imposing duties on providers, and it already allows providers to be held accountable for CSAM on their services, there is no need to amend Section 230, Pfefferkorn said.

But the EARN IT Act would force tech companies like Facebook to build backdoors into their encryption, Privacy News Online reported, becoming a gateway for the bad guys as well as the good guys.

Encryption is inexorably tied to our national interests, Senator Ron Wyden (DOR) said. You cant only build a backdoor for the good guys Once you weaken encryption with a backdoor, you make it far easier for criminals and hackers and predators to get into your digital life.

Human rights advocates call to put an end to the EARN IT Act because it violates the First and Fourth Amendments and puts Americans at risk of surveillance, censorship and human rights abuses.

This bill is trying to convert your anger at Big Tech into law enforcements long-desired dream of banning strong encryption, Pfefferkorn said. It is a bait-and-switch. Dont fall for it.

Outlined in the Fight for the Futures petition, encryption protects secure systems from hackers, protects the public from invasive surveillance, allows for freedom of speech and the right to privacy.

The bills ultimate intent is to penalize those companies for protecting your privacy and data security, Pfefferkorn said. Thats something that tech companies have been legally allowed to do for a quarter-century, and we cant afford to stop them from doing it. Encryption should be encouraged, not punished.

FALL FUNDRAISER

If you liked this article, please donate $5 to keep NationofChange online through November.

The rest is here:
Congress introduces EARN IT Act, which would end encryption programs but violates the Constitution - NationofChange

Read More..

IBM kit wants to keep your data encrypted while in use – ITProPortal

IBM is moving forward with its homomorphic encryption (FHE) solution, providing encryption for in-use and shared data for Apples computing platforms. It recently released a toolkit on GitHub, allowing Apple devices (iOS and macOS) to implement its newest technology.

Homomorphic encryption allows users to share data with third parties (e.g. public clouds), all the while keeping it encrypted. IBM sees many use cases for the technology, mostly in highly regulated industries that depend heavily on keeping data secure healthcare and finance, for example.

Announcing the news in a company blog post, Senior Research Scientist Flavio Bergamaschi wrote: FHE is particularly suited to industries which are regulated and make use of private, confidential and 'crown jewel' data, such as finance and healthcare, since the technology can make it possible to share financial information or patient health records broadly while restricting access to all but the necessary data.

For the time being, the technology is limited to Apples devices, although Android and Linux versions are in the works and expected in a few weeks.

IBM was careful to note that the solutions shared on GitHub are not perfect or final and that early adopters may experience hiccups.

More here:
IBM kit wants to keep your data encrypted while in use - ITProPortal

Read More..

Commercial Encryption Software Market Growth Prospects, Revenue, Key Vendors, Growth Rate and Forecast To 2026 – Jewish Life News

Commercial Encryption Software Market Overview

The Commercial Encryption Software market report presents a detailed evaluation of the market. The report focuses on providing a holistic overview with a forecast period of the report extending from 2018 to 2026. The Commercial Encryption Software market report includes analysis in terms of both quantitative and qualitative data, taking into factors such as Product pricing, Product penetration, Country GDP, movement of parent market & child markets, End application industries, etc. The report is defined by bifurcating various parts of the market into segments which provide an understanding of different aspects of the market.

The overall report is divided into the following primary sections: segments, market outlook, competitive landscape and company profiles. The segments cover various aspects of the market, from the trends that are affecting the market to major market players, in turn providing a well-rounded assessment of the market. In terms of the market outlook section, the report provides a study of the major market dynamics that are playing a substantial role in the market. The market outlook section is further categorized into sections; drivers, restraints, opportunities and challenges. The drivers and restraints cover the internal factors of the market whereas opportunities and challenges are the external factors that are affecting the market. The market outlook section also comprises Porters Five Forces analysis (which explains buyers bargaining power, suppliers bargaining power, threat of new entrants, threat of substitutes, and degree of competition in the Commercial Encryption Software) in addition to the market dynamics.

Get Sample Copy with TOC of the Report to understand the structure of the complete report @ https://www.marketresearchintellect.com/download-sample/?rid=247525&utm_source=JLN&utm_medium=888

Leading Commercial Encryption Software manufacturers/companies operating at both regional and global levels:

Commercial Encryption Software Market Scope Of The Report

This report offers past, present as well as future analysis and estimates for the Commercial Encryption Software market. The market estimates that are provided in the report are calculated through an exhaustive research methodology. The research methodology that is adopted involves multiple channels of research, chiefly primary interviews, secondary research and subject matter expert advice. The market estimates are calculated on the basis of the degree of impact of the current market dynamics along with various economic, social and political factors on the Commercial Encryption Software market. Both positive as well as negative changes to the market are taken into consideration for the market estimates.

Commercial Encryption Software Market Competitive Landscape & Company Profiles

The competitive landscape and company profile chapters of the market report are dedicated to the major players in the Commercial Encryption Software market. An evaluation of these market players through their product benchmarking, key developments and financial statements sheds a light into the overall market evaluation. The company profile section also includes a SWOT analysis (top three companies) of these players. In addition, the companies that are provided in this section can be customized according to the clients requirements.

To get Incredible Discounts on this Premium Report, Click Here @ https://www.marketresearchintellect.com/ask-for-discount/?rid=247525&utm_source=JLN&utm_medium=888

Commercial Encryption Software Market Research Methodology

The research methodology adopted for the analysis of the market involves the consolidation of various research considerations such as subject matter expert advice, primary and secondary research. Primary research involves the extraction of information through various aspects such as numerous telephonic interviews, industry experts, questionnaires and in some cases face-to-face interactions. Primary interviews are usually carried out on a continuous basis with industry experts in order to acquire a topical understanding of the market as well as to be able to substantiate the existing analysis of the data.

Subject matter expertise involves the validation of the key research findings that were attained from primary and secondary research. The subject matter experts that are consulted have extensive experience in the market research industry and the specific requirements of the clients are reviewed by the experts to check for completion of the market study. Secondary research used for the Commercial Encryption Software market report includes sources such as press releases, company annual reports, and research papers that are related to the industry. Other sources can include government websites, industry magazines and associations for gathering more meticulous data. These multiple channels of research help to find as well as substantiate research findings.

Table of Content

1 Introduction of Commercial Encryption Software Market

1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Commercial Encryption Software Market Outlook

4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Commercial Encryption Software Market, By Deployment Model

5.1 Overview

6 Commercial Encryption Software Market, By Solution

6.1 Overview

7 Commercial Encryption Software Market, By Vertical

7.1 Overview

8 Commercial Encryption Software Market, By Geography

8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Commercial Encryption Software Market Competitive Landscape

9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix

11.1 Related Research

Customized Research Report Using Corporate Email Id @ https://www.marketresearchintellect.com/need-customization/?rid=247525&utm_source=JLN&utm_medium=888

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven Fernandes

Market Research Intellect

New Jersey ( USA )

Tel: +1-650-781-4080

Our Trending Reports

R-Glass Fiber Market Size, Growth Analysis, Opportunities, Business Outlook and Forecast to 2026

Rich Mineral Paper Market Size, Growth Analysis, Opportunities, Business Outlook and Forecast to 2026

Rigid Bulk Packaging Market Size, Growth Analysis, Opportunities, Business Outlook and Forecast to 2026

See more here:
Commercial Encryption Software Market Growth Prospects, Revenue, Key Vendors, Growth Rate and Forecast To 2026 - Jewish Life News

Read More..

Nearly 500,000 say Congress shouldnt kill encryption with the EARN IT Act – The Daily Dot

A petition calling on members of Congress to reject the controversial EARN IT Act because it could kill encryption has garnered nearly 500,000 signatures.

The bill, which was unveiled by a bipartisan group of senators in early March, would force websites to adhere to a set of best practices for removing child exploitation content or risk having Section 230 of the Communications Decency Act immunity be taken away.

The bill has been fiercely criticized by internet rights advocates because of the influence the Justice Department and the attorney general would have on the commission that would create those best practices. Given the departments long-standing desire to create back doors into encryption, advocates have argued its not a stretch to thinkand perhaps is likelysuch a back door would be added as a best practice.

Section 230 has been hailed as an essential building block for the internet, as it protects websites from being liable for what is posted on them by third parties. The section has seen a string of attacks and criticism from the Justice Department, former Vice President Joe Biden, and most recently, President Donald Trump.

Not all lawmakers have expressed support for the EARN IT Act, with Sen. Ron Wyden (D-Ore.) calling it a Trojan horse that would give Attorney General [William] Barr and Donald Trump the power to control online speech and require government access to every aspect of Americans lives.

It appears that many other people feel the same way.

A petition from internet rights group Fight for the Future has collected around 480,000 signatures as of Monday morning. The petition asks for members of Congress to reject the dangerous EARN IT Act.

The website for the petition also has a phone number people can call that will connect them to members of Congress.

Evan Greer, the deputy director of Fight for the Future, told the Daily Dot the petition went viral over the past week as people are more aware than ever that encryption is an essential tool to keep people safe from police and government surveillance.

The EARN IT act is a perfect storm of bad ideas. It threatens to enable mass surveillance and monitoring of our internet activity and communications, while also posing an existential threat to online freedom of expression, Greer said. Lawmakers need to stop using Section 230 of the Communications Decency Act as a political football. Its dangerous and just plain silly. We can and should take steps to make the internet safer for everyone. The EARN IT act does the opposite of that.

In April, the popular encrypted messaging app Signal warned that if the EARN IT Act was passed, it would make it impossible for companies like it to operate in the United States.

Joshua Lund, a developer at Signal, said if a back door into encryption was a best practice in the billtherefore dangling Section 230it would open up Signal, which uses end-to-end encryption so only the sender and receiver can see messages, to liability.

Some large tech behemoths could hypothetically shoulder the enormous financial burden of handling hundreds of new lawsuits if they suddenly became responsible for the random things their users say, but it would not be possible for a small nonprofit like Signal to continue to operate within the United States, Lund wrote in a blog post.

READ MORE:

*First Published: Jun 8, 2020, 10:11 am

Andrew Wyrich is a politics and technology staff writer for the Daily Dot. Andrew has written for USA Today, NorthJersey.com, and other newspapers and websites. His work has been recognized by the Society of the Silurians, Investigative Reporters & Editors (IRE), and the Society of Professional Journalists (SPJ).

See the article here:
Nearly 500,000 say Congress shouldnt kill encryption with the EARN IT Act - The Daily Dot

Read More..

COVID-19, Security and WFH: Myths and Misconceptions – Security Boulevard

With COVID-19 stay-at-home orders still in place in many states, working from home (WFH) has become what is sure to be the new normal in the post-pandemic world. Given this, remote security should be at the top of every organizations priority list.

Yet, there remains a long list of common myths and misconceptions about remote worker security. And its easy to see how and why this can happen, especially in a world where staff went from working onsite to working from home practically overnight. But it is critical that businesses make themselves aware of what these myths and misconceptions are and address them with the urgency they require.

The list is long, so below are the five most pressing.

Video chat has exploded in to peoples lives over the last couple of months. What was until very recently used mainly as a meeting tool (with a video function that people often tried to avoid) has suddenly become an essential part of our everyday lives in the WFH environmentboth for work and recreation.

And the video app of choice has turned out to be Zoom. But many people are still operating under the misconception that Zoom chats are end-to-end encrypted when they are not. In fact, a number of privacy issues have come to light, such as Zooms iOS app sending data to Facebook without explicit user consent. While this issue has since been rectified, people are still operating under the encryption misconception when it comes to Zoom and other video conferencing apps, some of which are end-to-end encrypted and some of which are not.

Another common misconception that WFH employees are operating under is that VPN connections will work and that there will be sufficient bandwidth and licenses for VPN solutions. This may not be the case because VPN has always been somewhat of an afterthought.

Until COVID-19 took over our everyday lives, VPN was generally used only in special scenarios in which someone needed to work remotely or outside their usual working hours. Because of this, housekeeping, maintenance, management and administration of VPN are not very effective. Organizations dont have dedicated people to handle those things. VPN requires a lot of bandwidth and adequate licenses, and suddenly, with millions of us working from home amid the pandemic, everybody is trying to use VPN, which means issues with bandwidth and licensing that we just hadnt thought of.

VPN solutions also lend themselves to a common WFH security myththat VPN solutions are fully secure. They arent. Generally speaking, we dont see day-to-day housekeeping of VPN servers, such as patching. Compounding this, organizations are often not on the latest versions of their VPN.

This can mean a remote, unauthenticated user may be able to compromise a vulnerable VPN server and gain access to all active users and their plain-text credentials. An attacker also may be able to execute arbitrary commands on each VPN client as it successfully connects to the VPN server.

Given this, and now that VPN has suddenly become so popularand is likely to stay that way in the post-pandemic worldwe need to make sure that VPN solutions are up to date and patched so that hackers dont see VPN as an easy vehicle through which to conduct an attack.

In some ways, it seems so obvious that personal device security is often a far cry from company device security, yet so many organizations allow personal devices to be used for company business without a second thought for security.

Its obviously a challenge even during normal times for remote security to be implemented on any personal device that might be used for company business. But during these extraordinary times, when companies had to set staff up to work from home literally overnight in many cases, its an understandable oversight.

Still, it can have catastrophic consequences if not addressed in the WFH environment. Firms must implement two-factor authentication, content filtering, identity and access management, encryption, auto backups, authentication and security monitoring to any personal device being used for company business.

These are some of the things that youd see in a typical corporate network, but we dont see on personal devices; its a long and dangerous list of disparities creating a myth of security that isnt there.

They dont, and this is particularly problematic in the current situation, given the massive rise in phishing and spam emails since the COVID-19 situation took hold.

And with the majority of organizations currently running their staff remotely, this problem is only magnified. The pandemic is giving rise to a huge amount of fear, uncertainty, anxiety, sympathy, greed and disorder, meaning clarity is easily taken advantage of.

This makes phishing emails even more effective because our defenses are down and we are sitting alone at home with no one to bounce ideas off, ask immediate questions of or get opinions from. We are vulnerable right now and hackers know it.

Its exceptionally important that companies stay on top of these latest and advanced emerging phishing attacks and stop operating under the myth that their remote teams are going to be able to spot a suspect email every time. They probably wont.

Read the rest here:
COVID-19, Security and WFH: Myths and Misconceptions - Security Boulevard

Read More..

Privacy News Online | Weekly Review: June 12th, 2020 – Privacy News Online

Video conferencing company Zoom will not offer end-to-end encryption functionality for free users. Earlier this year, Zoom had falsely advertised that they were providing end-to-end encryption on all of their calls even those with free users. Now that they are going about actually implementing real end-to-end encryption, more caveats have emerged. On their Q1 earnings call, Zoom CEO Eric Yuan commented:

We want to give [end-to-end encryption] to at least the enterprise customer or business customer. Free users, for sure, we dont want to give that. Because we also want to work together, say, with FBI, with local law enforcement in case some people that use Zoom for a bad purpose, right?

In a statement, Zoom clarified that they will still offer end-to-end encryption to organizations such as schools that are technically free users but still count as enterprise customers.

The Drug Enforcement Agency (DEA) has been granted a two week expansion of scope so that they can conduct surveillance on the growing protests across the country. The DOJ approved the request from the DEA last week and the full surveillance force of the DEA will come to bear against protestors in cities around America. This news was revealed by BuzzFeedNews, which released the memorandum that the DOJ used to grant the DEA this power. Protests are protected as First Amendment speech by the US Constitution and the use of an unrelated federal agency to surveill such activities is a gross overstep of federal power that has received pushback even from within the DEA.

US Customs and Border Protection (CBP) flew a Predator Drone over the city of Minneapolis during the ongoing George Floyd protests on May 29th. The use of a surveillance drone normally reserved for active war zones on a domestic target was noticed by journalist Jason Paladino through the use of public aircraft tracking data put out on the ADS-B Exchange. NOther news outlets have used similar aircraft tracking data to verify that military aircraft has been used to conduct surveillance on at least five other protests in the last week. The US House of Representatives Committee on Oversight Reform has opened an inquiry into the matter while the CBP wont say which federal agency requested the surveillance.

A research paper by Two Six Labs published at IEEE 41 has analyzed the risks of a Cambridge Analytica type information leak using Google API data. The G Suite Marketplace of apps allows third party apps to request Google API data from users. While apps in this marketplace are supposed to undergo code review by the Google team to make sure data is properly used and maintained, the researchers found that unverified apps were allowed on the marketplace. Google API data includes calendar, contact, and email information that could lead to an even worse data leak than Cambridge Analytica caused using the Facebook API.

Boies Schiller Flexner LLP has filed a 5 billion USD class action lawsuit against Google for violating privacy and wiretapping laws. The lawsuit alleges that Google continues to track users private internet use even after a user has indicated to Google that they do not wish to be tracked by using the Chrome browsers incognito mode. When someone is in incognito mode, their internet activity is still tracked and stored by Google on the visited websites end via Javascript code (Google Analytics). Google will fight the claim and has stated that they are eager to clarify why their actions arent illegal in court.

Federated analytics is the latest privacy preserving way to do data science without data collection which has traditionally led to databases full of supposedly anonymous data that has proven time and time again to be de-anonymize-able. Federated analytics is borne of federated learning, a method for machine learning that uses and keeps the data in question on the users device. Google has started using federated analytics in their machine learning and AI efforts. For instance, federated analytics is used in the Playing Now functionality that lets a Google user identify what song is playing without having to send an audio recording back to Google servers.

Brazils Senate is rushing through a new law called the Fake News Law which is supposed to protect the country from fake news but will instead impose requirements on messaging and social media platforms that would do away with privacy and freedom of expression. The laws would mandate platforms and apps to verify users identities with identification documents and even to store information on how a chain message is shared. Of course, to be able to track the development of a potentially fake news chain message, apps would have to do away with end-to-end encryption and continuously monitor their users. Apps that dont comply will be suspended. The EFF is speaking up against this poorly thought out law.

Privacy News Online is brought to you by Private Internet Access, the worlds most trusted VPN service. Sign up now!

Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization. Caleb holds a Master's in Digital Currency from the University of Nicosia as well as a Bachelor's from the University of Virginia. He feels that the world is moving towards a better tomorrow, bit by bit by Bitcoin.

Read the original post:
Privacy News Online | Weekly Review: June 12th, 2020 - Privacy News Online

Read More..

Global Optical encryption Market Insights and Forecast 2020 to 2025 – Jewish Life News

Optical encryptionMarket Size Covers Global Industry Analysis, Size, Share, CAGR, Trends, Forecast and Business Opportunity.

Download Premium Sample of the Report:https://brandessenceresearch.biz/Request/Sample?ResearchPostId=158&RequestType=Sample

Global Optical encryption Market to reach USD XXX billion by 2025.

Global Optical encryption Market valued approximately USD XXX billion in 2016 is anticipated to grow with a healthy growth rate of more than XX% over the forecast period 2017-2025. Key factors which gives growth to the Optical encryption market are emerging requirement of regulatory compliances, growing concern over data security and privacy due to cyberattacks, and rising data center deployments and advantages such as reduced cost, lower latency, high bandwidth efficiency, improved performance, and high availability, offered by Layer 1 encryption.The objective of the study is to define market sizes of different segments & countries in recent years and to forecast the values to the coming eight years. The report is designed to incorporate both qualitative and quantitative aspects of the industry within each of the regions and countries involved in the study. Furthermore, the report also caters the detailed information about the crucial aspects such as driving factors & challenges which will define the future growth of the market. Additionally, the report shall also incorporate available opportunities in micro markets for stakeholders to invest along with the detailed analysis of competitive landscape and product offerings of key players. The detailed segments and sub-segment of the market are explained below:

By Encryption layer:

oOTN or layer 1oMACsec or layer 2oIPsec or layer 3

By Data rate:

o10Go40Go100G

By Vertical:

oBFSIoGovernment oHealthcare oData centre & cloud oEnergy & utilities

By Regions:oNorth AmericaoU.S.oCanadaoEuropeoUKoGermanyoAsia PacificoChinaoIndiaoJapanoLatin AmericaoBraziloMexicooRest of the World

Furthermore, years considered for the study are as follows:

Historical year 2015Base year 2016Forecast period 2017 to 2025

Some of the key manufacturers involved in the market ciena, adva, nokia, ECI telecom, cisco, huawei, microsemi, infinera, arista networks, Broadcom, juniper networks, centurylink, nucrypt. Acquisitions and effective mergers are some of the strategies adopted by the key manufacturers. New product launches and continuous technological innovations are the key strategies adopted by the major players.

Target Audience of the Global Optical encryption Market in Market Study:

oKey Consulting Companies & AdvisorsoLarge, medium-sized, and small enterprisesoVenture capitalistsoValue-Added Resellers (VARs)oThird-party knowledge providersoInvestment bankersoInvestors

Key factors influencing market growth:

Request Customization of the Report: https://brandessenceresearch.biz/Request/Sample?ResearchPostId=158&RequestType=Methodology

Customization of the Report:

Brandessence Market Research also provides customization options to tailor the reports as per client requirements. This report can be personalized to cater to your research needs. Feel free to get in touch with our sales team, who will ensure that you get a report as per your needs.

Thank you for reading this article. You can also get chapter-wise sections or region-wise report coverage for North America, Europe, Asia Pacific, Latin America, and Middle East & Africa.

To summarize, the Optical encryption market report studies the contemporary market to forecast the growth prospects, challenges, opportunities, risks, threats, and the trends observed in the market that can either propel or curtail the growth rate of the industry. The market factors impacting the global sector also include provincial trade policies, international trade disputes, entry barriers, and other regulatory restrictions.

About Us:

We publish market research reports & business insights produced by highly qualified and experienced industry analysts. Our research reports are available in a wide range of industry verticals including aviation, food & beverage, healthcare, ICT, Construction, Chemicals and lot more. Brand Essence Market Research report will be best fit for senior executives, business development managers, marketing managers, consultants, CEOs, CIOs, COOs, and Directors, governments, agencies, organizations and Ph.D. Students.

Read more here:
Global Optical encryption Market Insights and Forecast 2020 to 2025 - Jewish Life News

Read More..

Last Time This Key Statistic Hit All-Time High, Bitcoin Saw A 3900% Parabolic Rally – Forbes

PARIS, FRANCE - FEBRUARY 12: In this photo illustration, a visual representation of the digital ... [+] Cryptocurrency, Bitcoin is displayed in front of the Bitcoin course's graph on February 12, 2020 in Paris, France. The price of Bitcoin is rising and has once again passed above the very symbolic bar of 10,000 US dollars. (Photo by Chesnot/Getty Images)

The number of long-term Bitcoin holders has been increasing rapidly since October 2019. The last time the level of HODLing rose this high, the price of BTC surged from $500 to $20,000.

The term HODLing refers to investing in Bitcoin with less intent of selling it in the near-term.

Investors who hold BTC for long periods of time mainly believe that Bitcoin could evolve into an established store of value over the next decade like gold.

The level of HODLing increased in the last two months to figures unseen since 2015 to 2016, when the price of Bitcoin was ranging in between merely $200 to $500.

Alistair Milne, chief investment officer at Altana Digital Currency Fund, said:

What if I told you that the amount of Bitcoin held without moving for >12 months is on course to make new ATHs (>61%) and barely changed in the March COVID panic ... These levels of HODL'ing were last seen when the price was $200-500 back in 2015/16.

The number of long-term Bitcoin holders has been increasing since late 2019.

There are two possible reasons investors are increasingly investing in Bitcoin with a strong long-term outlook: the activation of the third block reward halving and improving mainstream perception of cryptocurrencies.

On May 11, 2020, the Bitcoin blockchain network saw its third halving in history.

Historically, halvings led the price of Bitcoin to see extended upsurges over a multi-year period.

The first and second halving of Bitcoin occurred in November 2012 and July 2016. At the time, Bitcoin was valued at $11 and $800 respectively.

The price of Bitcoin increased by around 6800% from 2012 to 2016 and 2000% from 2016 to 2020, over the next four years that followed the two halvings.

The historical significance of a Bitcoin halving coincides with a record high inflow of capital from institutional investors into the Bitcoin market in recent months.

In April 2020, the price of Bitcoin rebounded from $3,600 to over $9,000 within 45 days.

Subsequent to the recovery, Grayscale CEO Barry Silbert said the Grayscale Bitcoin Trusts assets under management surpassed $3 billion.

The Grayscale Bitcoin Trust is a popular investment vehicle among institutions to gain exposure to Bitcoin without directly holding BTC, as an alternative to an exchange-traded fund (ETF).

In the first quarter of 2020, Grayscale saw around 88% of its investments come from institutional investors.

Whether Bitcoin will see a similar rally as seen in 2012 or 2016 in the next four years remains uncertain. There are variables that may affect the trend of BTC in the short-term such as geopolitical risks and volatility in the equities market.

But, historical data dating back to 2012 suggests Bitcoins long-term trajectory remains highly optimistic and investors anticipate a strong performance over the next five to ten years.

More here:
Last Time This Key Statistic Hit All-Time High, Bitcoin Saw A 3900% Parabolic Rally - Forbes

Read More..

Bitcoin Price Drop to Key $9K Support Could Place the Uptrend in Peril – Cointelegraph

The price of Bitcoin (BTC) was unable to break through the resistance zone at $10,000 and corrected nearly 10% in a day. The drop down occurred on the same day that U.S. equity markets saw a substantial retracement.

These moves automatically made investors and traders fearful of further continuation of this correlation. However, is the fear that Bitcoin price will continue to drop if stocks correct further warranted, or was the BTC correction overdue after multiple rejections at $10,000?

Crypto market daily performance. Source: Coin360

BTC USD 1-day chart. Source: TradingView

The BTC-USD daily chart is showing a clear rejection at the $10,000 resistance, after which a substantial drop occurred.

However, the primary trend is still valid and it can be classified as an uptrend. The simple reasoning is that Bitcoin has been making higher lows since the heavy crash to $3,700 on March 12th.

Such an uptrend is signaled through higher lows and support/resistance flips. In this case, the most recent higher low is the level at $8,600. In order for the market to hold its essential to keep the upward momentum going through another higher low above $8,600.

In this scenario, the primary area to hold is the $9,050-$9,300 area as it has already provided support after the most recent drop.

This is significant because its a crucial area with many pivotal tests in the previous year. For example, the $9,050-$9,300 area provided support throughout the summer of 2019.

XBT USD 1-day chart. Source: TradingView

In that sense, the green zone between $9,050-$9,300 can be marked as crucial for direction. If Bitcoin price drops below the green zone and confirms it as resistance (through a bearish rejection), the market is likely in for a more protracted retracement towards the mid $7,000s.

However, if the price sustains this area as support, its likely to see bullish continuation.

BTC USD 4-hour chart. Source: TradingView

The 4-hour chart clearly shows what occurred during the previous drop. The price of Bitcoin was acting inside a very narrow range, through which such compression usually ends with volatility.

Typically, when the compression period ends a fake-out takes place before the real move occurs.

The 4-hour chart shows that Bitcoin tried to break above $9,850, but instantly got rejected at $10,000, which caused the price to drop.

The price dropped below $9,850 and more importantly, the recent support at $9,700. Long traders had positioned their stop-loss below the previous support and as the stops were hit the downwards move started to accelerate through a chain reaction in which only the first major support level can only stop the price from falling as this is the level traders are watching to step back in.

In the case of this downward fall, the area around $9,050-9,150 was the primary zone to hold.

Total market capitalization cryptocurrency 1-day chart. Source: TradingView

The crypto total market capitalization is still acting inside an uptrend and more importantly, moving above the 100 and 200-day moving average.

Preferably, the green zone has to remain a support, however, a wick towards $240 billion is possible. As long as the $240-$245 billion zone remains support, further upside can be expected and the next resistance zone is targeted at $310-$325 billion.

If the $240 billion support is lost a crucial test of the $220-$225 billion area could occur. In that scenario, the lender of last resort would be to see the 100-day and 200-day MA serve as support.

BTC USD 4-hour bullish scenario. Source: TradingView

The 4-hour chart shows a clear structure for bullish momentum. The support at $9,050-$9,200 has to hold and even though a potential wick to $8,850-$8,900 could occur, a daily close above $9,050-$9,200 is preferred.

In that regard, a renewed test of the lows can occur to create bullish divergences or a double bottom. After that, reclaiming $9,300 is pivotal for further momentum.

Finally, a break of the $9,500-$9,550 area is the last crucial part. If the price of Bitcoin can break above that resistance its likely to start a renewed test of the $10,000-$10,500 zones.

This resistance has been tested many times and its even more likely to see continuation towards $12,000 once the resistance is broken.

BTC USD 4-hour bearish scenario. Source: TradingView

The bearish scenario is clean and straightforward. The primary pivot for this scenario is the $9,050-$9,300 area and losing that zone could indicate further downwards momentum.

However, what should traders look for in the bearish scenario? First of all, a rejection at the $9,600-$9,700 area could indicate a downwards test of the support zones at $9,050-$9,200.

The more often the support at $9,050-$9,200 is tested, the weaker it becomes as buyers become exhausted.

Through that, if the price of Bitcoin rejects at $9,600-$9,700 and loses $9,050-$9,200 as support, every bearish retest and rejection could be a signal for a potential short opportunity and further downwards momentum.

In that regard, losing $9,050-$9,200 could mark a more significant correction for the crypto markets in which the $7,500-$7,800 areas are the first massive support zones to be tested.

This does not mean that investors should expect continuation of the crypto bear market and we should remember that the price of Bitcoin has rallied massively since the March 12 crash.

A correction of 25-30 percent is healthy and not unnatural in a market that trends upward.

The views and opinions expressed here are solely those of the author and do not necessarily reflect the views of Cointelegraph. Every investment and trading move involves risk. You should conduct your own research when making a decision.

See the rest here:
Bitcoin Price Drop to Key $9K Support Could Place the Uptrend in Peril - Cointelegraph

Read More..

Bitcoin Realized Cap Hits $106B Record as Fear Returns to BTC Index – Cointelegraph

Bitcoin (BTC) set a new all-time high this week as bearish market sentiment failed to dent one metrics march to $106 billion.

Data from on-chain monitoring resource Coin Metrics shows that as of June 11, Bitcoins realized cap stands at a record $106.26 billion.

Realized cap is a different way of calculating Bitcoins value, an alternative to conventional market cap.

The number is computed by taking the price at which each Bitcoin last traded and the size of each trade, then multiplying them together.

Originally formulated by Coin Metrics, the indicator has grown in popularity among analysts and well-known cryptocurrency figures. Responding to the latest highs, the Bitcoin Twitter account describedthe progress as simply good for Bitcoin.

Realized cap fell just slightly following the March crash, shedding a maximum of around $1 billion before continuing its upward trajectory.

This highlights its structure in real terms, Bitcoin shed 60% of its price at the time, while overall, as Cointelegraph reported, more than 60% of the supply has not moved in over a year.

Bitcoin broke the $100 billion realized cap mark for the first time in August 2019.

Bitcoin realized cap historical chart. Source: Coin Metrics

Realized cap provides a noticeable contrast to the overall market mood this week. On Thursday, bearish signs culminated in a wave of exchange selling pressure thattook 8% off BTC/USD in hours.

The move took its toll on the crypto fear andgreed index, a dedicated measurement of trader attitudes.

Having lingered in neutral territory with a score of 53/100, the index suddenly fell 15 points to 38/100, marking a return to the fear zone.

Crypto fear andgreed index one-month chart. Source: Alternative.me

Theoretically, the closer the index moves to zero, the more it suggests that traders are disproportionately bearish.

Earlier this year saw a record seven consecutive weeks spent in the lowest extreme fear category.

See more here:
Bitcoin Realized Cap Hits $106B Record as Fear Returns to BTC Index - Cointelegraph

Read More..