Page 4,089«..1020..4,0884,0894,0904,091..4,1004,110..»

‘Tool of repression’: Iran and regimes from Ethiopia to Venezuela limit Internet, go dark online – USA TODAY

Iranian women pass a branch of the Iranian Melat Bank that was burned during the protests over increasing fuel prices in the city of Shahriar, Iran, on Nov. 20, 2019.(Photo: EPA-EFE)

Nearly a week after Iran's government imposed a near-total Internet and mobile data blackout amid protests over a rise in gas prices, its connectivity to the rest of the world remains extremely limited and reflects what researchers and activists claim, disputed by Iran, is a"toolof repression" used by regimesfrom Ethiopia to Venezuela.

But the shutdown in Iran, which began Nov. 17and remains at about 15% of normal levels, according to NetBlocks,a firm that tracks cybersecurity, has not only allowed officials in Tehran to exert control over information about the unrest.

It has also cut off Iranians from their friends and family abroad, seemingly strengthenedthe Trump administration's perception that its "maximum pressure" policy on Iran is workingafter Washington exited the nuclear deal with Iran and reimposed sanctions, and further obscuredwhat's happening and who's to blame in a Middle Eastern nation whose politicaland economicisolation has fluctuatedin the four decades since its 1979 revolution that usheredin its now entrenched Islamic Republic.

Inside Iran: Americas contentious history in Iran leads to mix of anger, weariness

Marcin deKaminski, a technology and human rights expert at Civil Rights Defenders, a Sweden-based rights watchdog, said Internet blackouts arepart of agrowing trend of governments tryingto shut theircitizens off from the world during fraughtmoments.

"They use itto limit freedom of expression orfreedom of assembly and quite often it's connected to elections or conflict or to different forms of civil unrest. This is happening in many different contexts from Uganda to Burma (also known as Myanmar)," he said.

Ethiopia has been intermittently shutting down Internet access since a failed coup in June.Venezuelaperiodically blocks access to Twitter, YouTube, Facebook and other services that require Internet or mobile data accessas part of anongoing effort to stymie political opposition groups and prevent the efficacy of mass protests. India shut offKashmir's Internet access more than three months ago amid political upheaval.

Different causes and aims:Mass protests from Iran to Hong Kong accelerate

The protests in Iran accelerated after the government increased gas prices by 50% at a time when the sanctions reinstated by President Donald Trump have contributedto soaring inflation and stagnating salaries. The World Bank forecasts that Iran's economy will shrink by 8.7% this year, a consequence of plummeting revenues from blocked oil exports and restrictions on itspetrochemicals, metals, mining and maritime sectors. Key consumer goods and some essential medicines and supplies can be hard to get.

"When I was in Iran in March there were people standing in lines to buy government rations and subsidized meat," said Hoda Katebi, a Chicago-based Iranian American writer and community organizer who has published a book about Iran's underground fashion industry. "Nothing's coming in. The currency is worthless."

Iran'scurrency has lost more than half of its value against the dollar since the Trump administration reimposed sanctions following its withdrawal from the 2015 nuclear deal.

Katebi spoke to USA TODAY on the sidelines of VOICES,an annual gathering for global fashion industryleaders and trailblazers that takes place near Oxford, England. At the event, Katebiappeared on a panel with Shirin and Shiva Vaqar Iranian sisters who had traveled to England from Tehranto talk about their eponymous fashion label.

"It's very hard for us, not just as emerging designers but as Iranians,"said Shiva Vaqar. "We face lots of sanctions and restrictions. Sourcing fabrics, finding production houses, convincing them to make our pieces . ... We have problems sending our products outside Iran. (We don't have)FedEx, (the) banking (system)is on lockdown."

Still, she said,"We try to make it."

Katebi and theVaqar sisters, who are longtimefriends, had not been able to communicate with each other ahead of the event because of Iran's Internet crackdown.Katebi said she has not been able to reach her family in Iran.

Iran student leader: I regret1979 attack on U.S. Embassy in Tehran

Amir Rashidi, an Internet security and digital rights specialist, said Iran has previously weighed the idea of creating different levels of access to the Internet. He pointed to a Nov. 1interview withHamid Fatahi, a senior official in Iran's ministry of information and communications technology, in which Fatahi discusses the possibility of partitioning access based on "social class" or the "occupational needs of users."

It wasnot immediately clear if Iran is still considering such an initiative, which could be used to suppressdissenting voices. China and Russia have either taken steps or are experimenting with ways toroute Internet traffic through state-controlled channels. Iran's domestic banks, hospitals, government agencies and other major state infrastructure and servicessuch as the police have remained connected to the Internetduring the blackout, according to digital security experts and Iranians contacted by USA TODAY.

Over the last week, demonstrators in Iran set fire to banks and police stations and ransacked public office buildings and blocked roads, according to rights groups. Amnesty International has said that at least 100 Iranians have been killed in the protests as security services have sought to disperse crowds by firing live ammunition.

Some Iranians have found workarounds for limited Internet access. Photos and video footage that havetrickled out of Iran haveappeared to corroborate the claims of violence, but Iran has dismissed Amnesty's death figures as propaganda.

"Amnesty's report is based on anti-Iranian sources and those sources are not reliable," Mohammad Farahani, the editor-in-chief of the Mizan News Agency, an official news site that covers Iran's judiciary, told USA TODAY in a direct message via social media.

"People (in Iran) have the right to protest just like anywhere elsebut those who burn banks and stores are not protesters (they are rioters)," he said.

Iranian authorities have sought to partly blame the unrest on dual-national agitators with ties to foreign governments. Iran's semi-official Fars New Agency reported Wednesday that "thugs arrested during the recent riots confessed they received $60 for each place set on fire." The Fars report did not say who may have been behind the payments.

But Sina Toossi, a research associate at the National Iranian American Council, a Washington-D.C.-basedorganization that seeks to promote links between Americans and Iranians, said that the "the Iranian government does not tolerate peaceful assembly for ordinary people to air their grievances ...If the Iranian government is sincere about making a distinction between protests and rioters, it should at the minimum facilitate this first step in allowing people to air their grievances publicly."

Toossi said that his WhatsApp groups with family and friends in Iran that were always a "feed of pictures and messages" have,since Nov. 17, "fallen ominously silent."

A senior Iranian diplomat in Europe who insisted on anonymity because he was not authorized to speak publicly about the issuesaid thatthe Internet was disconnected to ensure that Iranians weren't "misinformed and bombarded with fake news."

Whither the nuke deal?: Iran starts injecting uranium gas into centrifuges

Included in this"fake news," according to Iranian officialsbut also many Iranians who would like closerrelations with the West and don't necessarilysympathize with their government or itsheavy-handed tactics, but who nevertheless object to interventions by officials in the Trump administration, including the president himself, is an effort to frame every protest in Iran as a sign that the regime is about to be toppled in a popular uprising.

"There's just so much more to it," saidMasoud Golsorkhi, a London-based Iranian-born magazine editor who was at the VOICES event in Oxford this week.

Still, late Thursday Trump tweeted that"Iran has become so unstable that the regime has shut down their entire Internet System," adding "They want ZERO transparency, thinking the world will not find out the death and tragedy that the Iranian Regime is causing!"

That same day the U.S.'stop diplomat, Secretary of State Mike Pompeo, said that he had"asked the Iranian protestors to send us their videos, photos and information documenting the regimes crackdown on protestors. The U.S. will expose and sanction the abuses."

And on Friday, theU.S. imposed sanctions on Irans information minister,Mohammad Javad Azari-Jahromi, forhis role in "wide-scale Internet censorship."

Yet Toossi cautioned that "U.S. officials shouldn't conflate Iranians'expression of their legitimate grievances and anger with their own government as a welcoming of new U.S. interference in Irans internal affairs," the high-water mark of which was a 1953 CIA-orchestrated coup that unseated Iran's democratically elected prime minister.

"U.S. intervention in Iran's domestic affairshas a long, ugly history and has only made matters worse for the Iranian people and regional stability," he said.

Autoplay

Show Thumbnails

Show Captions

Read or Share this story: https://www.usatoday.com/story/news/world/2019/11/23/irans-internet-blackout/4268948002/

Read this article:
'Tool of repression': Iran and regimes from Ethiopia to Venezuela limit Internet, go dark online - USA TODAY

Read More..

Through Its YubiKey, Yubico Provides a Hardware Solution that Maximizes Online Security and Usability while Moving Beyond Passwords – CardRates.com

In a Nutshell: Anybody using a computer or mobile device has created a username or password at some point. For years, this has been the standard for online security and authentication, but experts say this approach is no longer sufficient. YubiKey, from Yubico, is a multifactor authentication product that boosts authentication security while maintaining convenience for its users. The YubiKey simply plugs into a USB port or uses near-field-communication technology for supported smartphones, and users can touch the key with their finger and gain access to hundreds of applications and sites. Google and Microsoft support YubiKey, and Google employees are even required to use it on the job.

If youre reading this, youre most likely using a computer or a mobile electronic device. And if youre using one of those things, then youve likely had to create a password or two in your day. Or 27, which is how many discrete login passwords the average person has, according to a 2016 Intel Security poll.

But, with the numerous high-profile security breaches in recent years and more sophisticated technology available to hackers, some are saying its time to log off from using passwords to protect our accounts.

Now, growing numbers of security experts feel that the password in its common form is too old and unsophisticated for the job, according to a Washington Post article titled The Secret Password IsObsolete from 1994.

Multifactor authentication in which a user must present two forms of identification, such as a password and a one-time, computer-generated code have become more commonly used in recent years. But even thats not a match for todays bad actors.

Most of us in the industry have known for a long time that just a username and password is not secure enough, said Hormazd Romer, Vice President of Product Marketing at the internet security company, Yubico. As attackers have gotten more sophisticated and more real-time in their attacks, theyre even able to circumvent a lot of traditional multifactor authentication methods.

So, if the 27 passwords you have written down on that tiny little piece of paper in your desk drawer are no longer adequate, and even the increased security of the more labor-intensive multifactor authentication is not enough, how can our online accounts stay secure?

With the YubiKey, according to Romer. The flagship product of Yubico, the YubiKey is a piece of hardware that can be plugged into computers and other devices to log in to email, online services, apps, computers, and even physical spaces.

We recently spoke with Romer to learn more about the YubiKey, the technology behind it, and what makes it a superior authentication method.

Yubico was founded in Sweden in 2007 with the mission to make secure login easy and accessible to everyone, with one single authentication key that would work across multiple services.

YubiKey is the realization of this vision.

YubiKey is a physical device that plugs into the USB port of your computer or electronic device. There are different models of YubiKeys available for devices that use USB-A, USB-C, Lightning, and near-field-communication (NFC) technology.

The keys name conjures the notion of ubiquity on purpose, and the Japanese word yubi means finger, which is how users confirm their presence to the YubiKey.

At a high level, one of the key benefits of YubiKey is that it fits into a regular USB port of a computer and doesnt require any additional software or hardware, Romer said. Past solutions have required external card readers or other things you had to hook up to your computer, or required installing software.

Romer said all major browsers and platforms support YubiKey.

So that means as soon as you put your YubiKey into the USB port, the platform itself detects it and the browser says, Oh, this is a security key, now I can use it, he said.

Romer said the company offers two different form factors users can choose from, based on their preference.

One is what we call a keychain model, which is the size of, or smaller than, a typical house key, he said. And it has a little key chip holder in it, and you carry it with you on your keychain. Its portable and goes from computer to computer, and you always have it on your person as long as you have your keys with you.

The other version is the nano form factor which is geared toward convenience, Romer said.

Its for when youre typically working from a single computer all day long, and you need to log in multiple times a day, he said. This is a tiny, tiny thing thats kind of just a little nub sticking out, once you put into the USB port out of your computer. And to log in, all you have to do is tap it.

Romer said most users prefer to have one of each type of YubiKey.

The devices can also be used with mobile phones that support NFC technology.

To use the YubiKey, users first must go to the security settings of their account and select two-factor authentication. Then, for computers, they insert the YubiKey into the USB port and touch the key to verify they are human and not a remote hacker.

For NFC-enabled phones, users just tap the YubiKey against the phone to complete authentication.

The YubiKey offers a variety of functions when it comes to security and authentication.

For example, it works with the FIDO U2F open authentication standard which enables strong two-factor authentication to hundreds of web-based applications, including Gmail, Salesforce, and Twitter. And the FIDO2 standard offers expanded authentication options like multifactor and passwordless authentication.

With YubiKey support for FIDO2, organizations can accelerate to the passwordless future without the need for any client software or drivers, according to the company website.

The YubiKey can also generate a one-time encrypted password for a single use.

YubiKeys technology also enables it to generate six- and eight-character passwords for logging into various services and provides support for offline validations as well. The YubiKey 5 Series also supports the same features found in smart cards that broker data exchanges.

The keys can also generate 38-character static passwords that are compatible for any application login. This is handy for legacy systems that are not able to use two-factor authentication.

The company details the features supported on each YubiKey model on its YubiKey comparison chart, available on the company website.

All of these functions, which exist within the tiny YubiKeys, directly support Yubicos mission of providing convenient ways to authenticate credentials and prevent sensitive information from being stolen.

The YubiKey works with hundreds of enterprise, developer and consumer applications, out of the box and with no client software, according to the company. Combined with leading password managers, social login and enterprise single sign-on systems the YubiKey enables secure access to millions of online services.

Romer said Yubico feels very good about all the support it has in the industry.

The crush- and water-resistant YubiKey has been successfully deployed by some of the largest tech, finance, and retail companies in the world, according to Yubico, and has millions of users in 160 countries.

Not only is YubiKey supported across Microsoft and Google applications, but the use of YubiKey is also mandatory for all Google employees.

Google began working with Yubico in 2009 when Google was increasingly the target of sophisticated cyberattacks that could circumvent traditional security measures.

We believe that by using this token weve raised the standard of security for our employees beyond what was commercially available, wrote Googles Director of Security Engineering Mayank Upadhyay on the Yubico website. The device works with Googles Web browser Chrome, and works very seamlessly for people in their day-to-day workflow here at Google.

Romer said these kinds of enterprise uses of YubiKey are very valuable to companies because there is so much at stake if a data breach occurs. Companies not only risk losing millions of dollars if infiltrated, but sensitive customer data can be accessed, and a companys reputation can be severely damaged.

Although YubiKey does not work with every single website or service, Romer said Yubico is continually working to increase its level of support. In the meantime, the company encourages potential users to search its online catalog to see if the service they want to use is currently supported.

Romer added that Yubico does not currently have any banks listed in its catalog, and the company encourages users to express their desire to use a YubiKey with their financial institutions.

Yubico is regularly engaged with service providers to broaden the YubiKey ecosystem, but we often hear that its the customer preference that is most influential, he said. Most product features and road maps are prioritized based on popular customer demands.

Romer said there is a lot of exciting work going into making convenient and secure passwordless authentication a reality.

Theres going to be even more innovation in that area, he said. I think that is the future. Everybody hates usernames and passwords. IT people hate passwords. Hackers love passwords, but everybody else hates them.

Romer said he believes the whole tech industry will be moving toward a world where users wont have to create a new password every time they create an account or sign up for a new service online.

Originally posted here:
Through Its YubiKey, Yubico Provides a Hardware Solution that Maximizes Online Security and Usability while Moving Beyond Passwords - CardRates.com

Read More..

110 Nursing Homes Cut Off from Health Records in Ransomware Attack – Krebs on Security

A ransomware outbreak has besieged a Wisconsin based IT company that provides cloud data hosting, security and access management to more than 100 nursing homes across the United States. The ongoing attack is preventing these care centers from accessing crucial patient medical records, and the IT companys owner says she fears this incident could soon lead not only to the closure of her business, but also to the untimely demise of some patients.

Milwaukee, Wisc. based Virtual Care Provider Inc. (VCPI)provides IT consulting, Internet access, data storage and security services to some 110 nursing homes and acute-care facilities in 45 states. All told, VCPI is responsible for maintaining approximately 80,000 computers and servers that assist those facilities.

At around 1:30 a.m. CT on Nov. 17, unknown attackers launched a ransomware strain known as Ryuk inside VCPIs networks, encrypting all data the company hosts for its clients and demanding a whopping $14 million ransom in exchange for a digital key needed to unlock access to the files.Ryuk has made a name for itself targeting businesses that supply services to other companies particularly cloud-data firms with the ransom demands set according to the victims perceived ability to pay.

In an interview with KrebsOnSecurity today, VCPI chief executive and owner Karen Christianson said the attack had affected virtually all of their core offerings, including Internet service and email, access to patient records, client billing and phone systems, and even VCPIs own payroll operations that serve nearly 150 company employees.

The care facilities that VCPI serves access their records and other systems outsourced to VCPI by using a Citrix-based virtual private networking (VPN) platform, and Christianson said restoring customer access to this functionality is the companys top priority right now.

We have employees asking when were going to make payroll, Christianson said. But right now all were dealing with is getting electronic medical records back up and life-threatening situations handled first.

Christianson said her firm cannot afford to pay the ransom amount being demanded roughly $14 million worth of Bitcoin and said some clients will soon be in danger of having to shut their doors if VCPI cant recover from the attack.

Weve got some facilities where the nurses cant get the drugs updated and the order put in so the drugs can arrive on time, she said. In another case, we have this one small assisted living place that is just a single unit that connects to billing. And if they dont get their billing into Medicaid by December 5, they close their doors. Seniors that dont have family to go to are then done. We have a lot of [clients] right now who are like, Just give me my data, but we cant.

The ongoing incident at VCPI is just the latest in a string of ransomware attacks against healthcare organizations, which typically operate on razor thin profit margins and have comparatively little funds to invest in maintaining and securing their IT systems.

Earlier this week, a 1,300-bed hospital in France was hit by ransomware that knocked its computer systems offline, causing very long delays in care and forcing staff to resort to pen and paper.

On Nov. 20, Cape Girardeau, Mo.-based Saint Francis Healthcare System began notifying patients about a ransomware attack that left physicians unable to access medical records prior to Jan. 1.

Tragically, there is evidence to suggest that patient outcomes can suffer even after the dust settles from a ransomware infestation at a healthcare provider. New research indicates hospitals and other care facilities that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among certain patients in the following months or years because of cybersecurity remediation efforts.

Researchers at Vanderbilt Universitys Owen Graduate School of Management took the Department of Health and Human Services (HHS) list of healthcare data breaches and used it to drill down on data about patient mortality rates at more than 3,000 Medicare-certified hospitals, about 10 percent of which had experienced a data breach.

Their findings suggest that after data breaches as many as 36 additional deaths per 10,000 heart attacks occurred annually at the hundreds of hospitals examined. The researchers concluded that for care centers that experienced a breach, it took an additional 2.7 minutes for suspected heart attack patients to receive an electrocardiogram.

Companies hit by the Ryuk ransomware all too often are compromised for months or even years before the intruders get around to mapping out the targets internal networks and compromising key resources and data backup systems. Typically, the initial infection stems from a booby-trapped email attachment that is used to download additional malware such as Trickbot and Emotet.

This graphic from US-CERT depicts how the Emotet malware is typically used to lay the groundwork for a full-fledged ransomware infestation.

In this case, there is evidence to suggest that VCPI was compromised by one (or both) of these malware strains on multiple occasions over the past year.Alex Holden, founder of Milwaukee-based cyber intelligence firmHold Security, showed KrebsOnSecurity information obtained from monitoring dark web communications which suggested the initial intrusion may have begun as far back as September 2018.

Holden said the attack was preventable up until the very end when the ransomware was deployed, and that this attack once again shows that even after the initial Trickbot or Emotet infection, companies can still prevent a ransomware attack. That is, of course, assuming theyre in the habit of regularly looking for signs of an intrusion.

While it is clear that the initial breach occurred 14 months ago, the escalation of the compromise didnt start until around November 15th of this year, Holden said. When we looked at this in retrospect, during these three days the cybercriminals slowly compromised the entire network, disabling antivirus, running customized scripts, and deploying ransomware. They didnt even succeed at first, but they kept trying.

VCPIs CEO said her organization plans to publicly document everything that has happened so far when (and if) this attack is brought under control, but for now the company is fully focused on rebuilding systems and restoring operations, and on keeping clients informed at every step of the way.

Were going to make it part of our strategy to share everything were going through, Christianson said, adding that when the company initially tried several efforts to sidestep the intruders their phone systems came under concerted assault. But were still under attack, and as soon as we can open, were going to document everything.

Tags: alex holden, Hold Security, Karen Christianson, VCPI

This entry was posted on Saturday, November 23rd, 2019 at 12:02 amand is filed under Ransomware, The Coming Storm.You can follow any comments to this entry through the RSS 2.0 feed.You can skip to the end and leave a comment. Pinging is currently not allowed.

More:
110 Nursing Homes Cut Off from Health Records in Ransomware Attack - Krebs on Security

Read More..

Organisations Join Forces To Fight Off Stalkerware And Domestic Violence – Women Love Tech

A group of organisations who work against domestic violence have joined forces with IT security companies to launch Coalition Against Stalkerware with the aim of combatting occurrences of domestic violence.

In this internet age, it seems that privacy is becoming more and more of a concept rather than a reality. In the cloud, everything is accessible, whether you like to admit or not. Although it is extremely difficult the content in our personal clouds, some people have been using Stalkerware in order to access the the most private aspects of peoples lives.

Stalkerware are programs that present users the opportunity to intrude into peoples photos, messages, social media, location, and more; which are currently and frequently being used as a means of instigating domestic abuse and stalking.

The IT security industry gives its input by improving detection of stalkerware and better notifying users of this threat to their privacy. Meanwhile service and advocacy organisations directly work with victims of domestic violence, know their pain points and requests, and can guide our work said David Ruiz, Online Privacy Writer for Malwarebytes Labs

According to Kaspersky, the internet security company, the issue is only worsening; with the amount of users facing these intrusive programs rising by 35% since last year. On top of that, there are more variants of Stalkerware available than ever before.

As part of the coalitions action, the website http://www.stopstalkerware.org has been launched with the goal to provide helpful online resources for victims. On the website youll find information on what Stalkerware is, what it does, how to protect yourself, and what steps to take, and what steps to avoid.

Ten organisations in total have committed to working together to do everything in their power to overcome the harmful effects of Stalkerware.

In order to counter this issue, it is important for cybersecurity vendors and advocacy organizations to work together said Vyacheslav Zakorzhevsky, Head of Anti-Malware Research at Kaspersky.

To find out more about the Coalition Against Stalkerware please visit the official websitewww.stopstalkerware.org

Read this article:
Organisations Join Forces To Fight Off Stalkerware And Domestic Violence - Women Love Tech

Read More..

Japan plots 20-year race to quantum computers, chasing US and China – Nikkei Asian Review

TOKYO -- Japan will aimto develop full-fledged quantum computers for a broadrange of uses by around 2039,Nikkei has learned, part of Tokyo's first strategy for catching upwith the U.S. and China in the race to achieve ultrafast processing.

Industry, academia and government are expected to join forces on the effort, which promises to yield innovations in fields like manufacturing and financial services.

The proposed road map, to be discussed at an expert panel meeting Wednesday,calls forbuilding at least five quantum innovation centers over the next five years.

China, the U.S. and some European countries are investing strategically in quantum technology at the national and corporate levels.

Google recently claimed a breakthrough in quantum computing, in which a processor using quantum bits, or qubits, solved a problem that existing computers cannot complete in a practical amount of time. Both Google and IBM have produced prototype quantum computers with processors in the range of 50 qubits.

Under the government road map, Japan will aim to produce a 100-qubit machine in about 10 years, followed by a more powerful, full-fledged quantum computer by around 2039.

Japan sees quantum computing as a priority area for research and development alongside artificial intelligence and biotechnology.

The road map also covers related areas such as sensors, communications and encryption, as well as materials. With quantum computing expected to transformfields like telecommunications, drug manufacturing, finance and logistics, Japan aims to applythe technology to the country's existing strengths such as the development of materials.

The government will seek about 30 billion yen ($276 million) in funding forquantum research for the budget year beginning April 2020,roughly double the year-earlier request.The technology also will be one focus of a "moonshot" R&D program in which the government will invest a total of 100 billion yen.

Read more:
Japan plots 20-year race to quantum computers, chasing US and China - Nikkei Asian Review

Read More..

A super cover illustration highlights superconductivity research – The Mix

Ilias Perakis commissioned an image to convey his terahertz-driven superconductivity.

Used with permission of Springer Nature.For his fifth paper published in a Nature Research journal since 2015, Ilias Perakis, Ph.D., had a bonus that many researchers yearn for. The front cover of Nature Photonics featured his illustration of terahertz-driven superconductivity, the topic of his research paper inside.

The image shows a wavy orange-red line a laser pulse with a frequency of a thousand-billion cycles per second hitting a target material made of niobium and tin. Inside the material, the shape is distorted and breaks the symmetry by accelerating the electrons in the preferred direction of the electric field. With this comes an amazing change momentary superconductivity with a disappearing quantum energy gap.

Normally, every electron in a material behaves independently of each other, said Perakis, professor and chair of the University of Alabama at Birmingham Department of Physics, in the UAB College of Arts and Sciences. Our applied pulse accelerates the electrons in one direction, into a new superconducting state with zero resistivity, where the electrons behave as a whole.

The cover image shows the content of the study, Lightwave-driven gapless superconductivity and forbidden quantum beats by terahertz symmetry breaking. Perakis provided the physics theory that underlies experiments done by colleagues at Iowa State University, the United States Department of Energys Ames Laboratory and the University of Wisconsin-Madison. Corresponding author is Jigang Wang, Ph.D., Iowa State University.

This group was the first to show this technique as a tool to tune the quantum mechanical state of a material. Those terahertz pulses of laser light can both control the quantum state and sense the change in the quantum state.

Why an interest in such research? The dream of quantum computing, new machines that can operate at speeds vastly faster than supercomputers. Making such devices is a challenge.

A quantum computer needs three things, Perakis said. Good material, good sensors of the quantum state and a good tool to manipulate the quantum state. We need to be able to change the quantum state in a controlled way.

Ilias Perakis, Ph.D.For the Nature Photonics cover, Perakis commissioned the Ella Maru Studio of South Carolina. We want to combine the arts with the science, Perakis said, so that we can understand the concept. Reasoning in the quantum world requires imagination, and art helps you with that. Ella Maru specializes in scientific design and animation.

Perakis was named chair of UAB Physics in 2015. He says the departments five undergraduate major concentrations place an emphasis on excellence and on using critical thinking and systematic analysis to understand complex phenomena and solve todays interdisciplinary scientific problems.

We personalize education to graduate a diverse group of students with well-developed complex skills and hands-on research experiences, who are well-connected to industry and well-prepared to serve a fast-changing and technology-driven global society, Perakis said.

Continued here:
A super cover illustration highlights superconductivity research - The Mix

Read More..

The future that graphene built – Knowable Magazine

The wonder material graphene an array of interlinked carbon atoms arranged in a sheet just one atom thick promised a world of applications, including super-fast electronics, ultra-sensitive sensors and incredibly durable materials. After a few false starts, that promise is close to realization. And a suite of other extremely thin substances is following in its wake.

Graphene got its beginnings in 2003, when scientists at the University of Manchester found they could peel off a gossamer film of the material just by touching a piece of ordinary sticky tape to a block of purified graphite the solid form of carbon thats mixed with clay and used as the lead in most pencils. Graphene proved stronger than steel but extremely flexible, and electrons could zip through it at high speeds. It earned its discoverers the Nobel Prize in 2010, but researchers spent years struggling to manufacture it on larger scales and figuring out how its remarkable properties could best be used.

They didnt get it right straight out of the gate, says Todd Krauss, a chemist at the University of Rochester. Scientists are pretty bad at predicting whats going to be useful in applications, he says.

With its atom-thin sheets layered into tiny particles known as quantum dots, graphene was tried as a microscopic medical sensor, but it didnt perform as desired, Krauss says. With its sheets rolled up into straw-like nanotubes, graphene was built into items like hockey sticks and baseball bats in the hopes that its strength and durability could better existing carbon fiber. But Krauss notes that there has since been a trend away from using nanotubes in consumer products. (Some also worry that long carbon nanotubes could harm the lungs since they have been shown to have some chemical resemblance to asbestos.)

Today graphene is finding its way into different types of products. Graphene is here, says Mark Hersam of Northwestern University. Layered over zinc, graphene oxide is actively being developed as a replacement, with higher storage capacity, for the sometimes unreliable graphite now used in battery anodes. And nanotubes were recently used as transistors to build a microprocessor, replacing silicon (unlike flat graphene, nanotubes can be coaxed into acting like a semiconductor). Though the microprocessor was primitive by modern computing standards, akin to the processing level of a Sega Genesis, materials scientists think it could ultimately pave the way for more efficient, faster and smaller carbon components for computer processors.

At the same time, a new generation of two-dimensional materials is emerging. The success of graphene further fueled the ongoing effort to find useful atomically thin materials, working with a range of different chemicals, so as to exploit the physical properties that emerge in such super-thin substances. The newcomers include an insulator more efficient than conventional ones at stopping the movement of electrons, and another that allows electrons to glide across it at a good percent of the speed of light, with little friction. Researchers think some of these may one day replace silicon in computer chips, among other potential uses.

Other materials now in development have even higher aspirations, such as advancing scientists toward one of the most tantalizing goals in chemistry the creation of high-temperature superconductors.

In graphene, carbon atoms link up in an orderly honeycomb pattern, each atom sharing electrons with three neighboring carbon atoms. That structure allows any added electrons to move speedily across its surface. Ordinarily, a single electron might move through a conducting metal like copper at 1.2 inches per minute (given a 12-gauge wire with 10 amps of electricity). But in early experiments on graphene, electrons zipped along at 2.34 billion inches per minute which could make for electronics that charge in just a few minutes and eventually in a matter of seconds.

Graphenes physical properties have inspired many potential applications, including in medicine. A variant of graphene, graphene oxide, is being studied as an experimental drug delivery vehicle. Seen here through a microscope, this chunk of graphene oxide is about 80 nanometers high. A single sheet of graphene is just 0.34 nanometers thick.

CREDIT: SCIENCE SOURCE

Graphene conducts heat just as well as it conducts electricity. Its also one of the strongest materials ever studied stronger than steel, it can stop a bullet but oddly stretchy too, meaning its both flexible and tough.

Other 2D materials under exploration may have similar attributes as well as novel qualities all their own, but chemical impurities have until recently kept them hidden, says Angela Hight Walker, a project leader at the National Institute of Standards and Technology in Gaithersburg, Maryland. Were now getting to the point where we can see the new physics thats been covered up by poor sample quality, she says.

One of the newcomers is black phosphorus, explored by Hersam and his coauthor Vinod Sangwan in the 2018 Annual Review of Physical Chemistry. When white phosphorus a caustic, highly reactive chemical is super-heated under high pressure, it becomes a flaky, conductive material with graphite-like behavior. Peeling off an atom-thin layer of this black phosphorus with sticky tape produces a material called phosphorene. First fabricated in 2014, phosphorene rivals graphene in terms of strength and ability to efficiently move electrons. But at the atomic level, it isnt as perfectly flat as graphene and that has intriguing consequences.

Phosphorene interacts with electrons and photons in quirky ways, pointing to potential uses in future computer chips and fiber optics.

In graphene, carbon atoms lie side by side, hence its flatness. But phosphorenes 2D configuration looks a bit like a pleat, with two atoms at a lower level connected to two at a higher level, forming whats called a bandgap. This wavy structure, in turn, affects the flow of electrons in a way that makes phosphorene a semiconductor, meaning that its very easy to switch the flow of electrons on or off. Phosphorene, like silicon, could find application in computer chips, where the toggled electrons represent 1s or 0s.

Phosphorene also is especially good at emitting or absorbing photons at infrared wavelengths. This optical trick gives phosphorene huge potential for use in fiber-optic communication, Hersam says, because the bandgap matches the energy of infrared light near-exactly. It could also prove very useful in solar cells.

Working with phosphorene is not easy, however. It is highly unstable and rapidly oxidizes unless stored correctly. Literally, it will decompose if it is sitting out in the room, Hight Walker says, typically in less than a minute. Layering it with other 2D materials could help protect the fragile chemical.

Boron would seem an odd fit for electronic applications. Its better known as a fertilizer, an ingredient in fiberglass or (combined with salt) a laundry-detergent additive. But make it very thin and very flat, and boron begins to act more like a metal, conducting electricity easily. Two-dimensional boron, called borophene, is also ultra-flexible and transparent. Combined with its conductive properties, borophenes flexibility and transparency could eventually make it a go-to material for new gadgets, including ultra-thin, foldable touch screens.

Like graphene, borophenes structure allows electrons to fly through it. Its such a good conductor that its now being studied as a way to boost energy storage in lithium-ion batteries. Some researchers even think it might be coaxed into superconducting states at relatively high temperatures though thats still very cold (initial tests show the effect between minus-415 to minus-425 degrees Fahrenheit). Most current superconductors work close to absolute zero, or nearly minus -460 degrees F. A superconducting material allows electrons to move through it without any resistance, creating the potential for a device that accomplishes robust electronic feats while using only a small amount of power.

Emerging 2D materials phosphorene, borophene and boron nitride form thin films. Their atomic arrangements are viewed here from above and in profile.

CREDIT: MODIFIED FROM V.K. SANGWAN AND M.C. HERSAM / AR PHYSICAL CHEMISTRY 2018

In the form of borophene, boron can conduct electrons like a metal. Yet, as part of a 2D-film of boron nitride, it can block the flow of electrons quite effectively. In other words, 2D boron and [2D] boron nitride are on opposite ends of the electrical conductivity spectrum, Hersam says.

Boron nitrides insulative property has come in handy for research on other 2D materials. Take that ephemeral black phosphorus: One way scientists have managed to keep it stable enough to study is by sandwiching it between two sheets of boron nitride.

Even as it is blocking electrons, however, boron nitride will allow photons to pass, says physicist Milos Toth of the University of Technology Sydney, who coauthored an article about the potential of boron nitride, and other 2D materials, in the 2019 Annual Review of Physical Chemistry. Thats ideal for creating things called single-photon sources, which can emit a single particle of light at a time and are used in quantum computing, quantum information processing and physics experiments.

Another atomically thin material creating quite a buzz in materials science circles is a compound of chromium and iodine called chromium triiodide. Its the first 2D material that naturally generates a magnetic field. Scientists working on chromium triiodide propose the material could eventually find uses in computer memory and storage, as well as in more research-focused purposes such as controlling how an electron spins.

Theres a hitch, Hersam says: This material is extremely hard to work with, because it is both tough to synthesize and unstable once its made. Right now the only way to work with it is at extremely low temperatures, at minus-375 degrees Fahrenheit and below. But boron nitride might again come to the rescue: Some chromium triiodide samples have been preserved for months on end inside boron nitride sandwiches.

Because of its finicky properties, chromium triiodide may not itself end up built into devices, Hight Walker says. But when we understand the physics of whats happening, we can go look for this 2D magnetic behavior in other materials. A number of 2D magnetic materials are now being explored single-layer manganese crystals woven into an insulating material is one possibility.

Wrangling any of these thin layers into something usable may ultimately depend literally on how they stack up. Different super-thin materials would be layered together so that the properties inherent in each material can complement one another. We have insulators, semiconductors, metals and now magnets, Hight Walker says. Those are the pieces that you need to make almost anything you want.

One potential application especially exciting to Hight Walker is in quantum computing. Unlike traditional computing, in which bits of information are either ones or zeroes, quantum computing allows each qubit of information to be both one and zero at once. In principle, this would allow quantum computers to quickly solve problems that would take an impossibly long time with conventional machines.

Right now, though, most qubits are made of superconductors that have to be kept freezing cold, limiting their real-world use and motivating the search for new types of superconducting materials. For this reason, researchers are eager to explore borophenes ability to superconduct. (Graphene, layered a certain way, also has shown potential superconducting properties.)

But a stacked material involving several superconducting layers separated by strong insulators could enable smaller, more stable qubits that dont require quite as low temperatures which could reduce the overall size of quantum computers. Right now, these are room-sized affairs, much like early computers were. Reducing their size is going to require novel approaches and, possibly, very thin materials layered sheet by little sheet.

View post:
The future that graphene built - Knowable Magazine

Read More..

New Berlin foundation turns AI into immersive art – Art Newspaper

Refik Anadol's Latent Being (2019) at LAS, Kraftwerk Berlin Refik Anadol Studio, Photography Camille Blake

A new non-profit art foundation has launched in Berlin to create exhibitions exploring scientific innovation in art, including the use of artificial intelligence (AI), virtual reality and quantum computing.

Known as LAS Light Art Space, the foundation is backed by Jan Fischer, a German transport entrepreneur and activist. It opens its first exhibition on 23 November at the repurposed 1960s power plant Kraftwerk Berlin. The show includes immersive installations by the Istanbul-born media artist Refik Anadol that combine AI, LED displays, sound, performers and lasers.

Visitors can directly experience how the computer perceives us and its environment, develops consciousness, and even starts to dream, says Bettina Kames, an art historian who co-founded LAS Light Art Space together with Fischer. Our aim is to awaken interest in AI and draw people who wouldnt normally go to museums. The foundation is co-operating with schools and the local community, she says.

LAS Light Art Space has a staff of eight, including Kristina Leipold, a former head of finance and development at Berlins Martin Gropius Bau museum, and Agnes Gryczkowska, a former assistant curator at the Serpentine Galleries in London. The foundation will organise experimental events with different artists and venues while it seeks a permanent space in Berlin, Kames says. Satellite projects with artists located in remote parts of the world are also planned, including one in a nature reserve in Israel.

Each project will be accompanied by events aimed at promoting interdisciplinary discourse between artists, scientists, writers, musicians and technology experts. Artists scheduled to show works in 2020 and 2021 include the US filmmaker Laurie Anderson and the Light and Space artist Robert Irwin. The foundation also plans to collaborate with museums including the ZKM in Karlsruhe and the Martin Gropius Bau, Kames says.

More here:
New Berlin foundation turns AI into immersive art - Art Newspaper

Read More..

Maryanna Saenko and Steve Jurvetson of Future Ventures talk SpaceX, the Boring Co. and . . . ayahuasca – TechCrunch

Last week, at a StrictlyVC event in San Francisco, we sat down with Maryanna Saenko and Steve Jurvetson, investors who came together to create the investment outfit Future Ventures roughly one year ago. It was their first public appearance together since announcing their $200 million fund, and we started by asking Jurvetson about his high-profile split from his old firm DFJ. (He said of the experience that sometimes life forces a dislocation in what youre doing, and it got me to become an entrepreneur for the first time in a long time.)

We also talked about how the two came together and where theyre shopping, as they have fewer constraints than most firms. It was a wide-ranging chat that covered SpaceX and to a lesser extent Tesla, whose boards of directors Jurvetson sits on. We also talked about The Boring Company, in which Future Ventures has a stake, the profound dangers of the AI race between companies (and countries), and whether the powerful psychedelic ayahuasca or something like it might represent an investment opportunity. Included in the mix was what Jurvetson described as potentially the biggest money-making opportunity he has ever seen.

Read on to learn more. Our conversation has been edited lightly for length.

Youve come together to build this new fund that has a 15-year investing horizon. Your interests overlap quite a bit. Maryanna, youre a robotics expert with degrees from Carnegie Mellon; you were with Airbus Ventures before joining DFJ then heading later to Khosla Ventures. Who is better at what?

SJ: Shes better at everything, is the answer, but I think were better as a pair. The beauty of small team is youre better than you would be on your own. I knew when I set off that I didnt want to do it alone. I know that the people Ive worked with over the last 20 years have made me better. The best investments I did at DFJ I largely attribute to the junior partner I was working with at the time, and I might not have done those best deals if I was on my own.

Theres something about the dialectic, the discussion, the debates with someone you respect whose opinion is valuable, so rather than thinking, You handle this, Ill handle that and partitioning it, its more of a [back and forth]. So we have partner meetings all the time, just not any scheduled meetings.

Certainly, Maryannas deep background in robotics is a vein of interest, as is all the aerospace stuff. But just a reminder, when I first interviewed her [Jurvetson originally hired her at DFJ], I was blown away that she had already invested in several of the quirky sectors from quantum computer to phasor antennas for satellites to [inaudible but relating to space].

Of course you would be investing [in this thing Ive never heard of before].

MS: Its going to become relevant, I promise.

Speaking of aerospace, you two have invested in SpaceX, a company that DFJ had also backed. Is this company ever going to go public?

SJ: I think the official last tweet on this matter was that the company will go public after there are regularly scheduled flights to Mars.

Which is when?

SJ: It might not be that far off. Probably within the 15-year [investing] cycle that we have now. Clearly the business is much more dramatic than just that. Thats the big storm on the horizon [that captures a lot of interest] but in the near term, there are multiple billions of dollars in revenue. Theyre a profitable business. And frankly, theyre about to launch what may be the biggest money-making opportunity Ive ever seen in my life, which is the broadband satellite data business [Starlink, which is a constellation being constructed by SpaceX to provide satellite Internet access].

So theres plenty of good stuff happening before we get to Mars. That was just a way to put all the investment bankers off. Theyre continuously hounding the company, When are you going public? When are you going public?

It is 17 years old. Have you made money off it [as an investor] thus far?

SJ: Oh, yeah, at our prior firm, theyve [enjoyed] well over $1 billion in profit [through secondary sales].

What do you think of scientists concerns that these satellites going to ruin astronomy because theyre so bright? I know SpaceX has tried to paint them. I also know SpaceX isnt alone and that Amazon is also trying to put up a constellation, for example. But youre a mission-driven firm. Should we be worried that were littering the sky with these things?

MS: One of the fundamental questions when you invest in technology is what are the second-order effects that were aware of and what are the second-order effects that were not clever enough to foresee ahead of time [and] to look holistically at these problems.

So first and foremost, right, its not just Space X. Many companies these days are trying to put up a constellation whether in [Low Earth Orbit] or [Medium Earth Orbit] or increasingly in [Geostationary Orbit]. We need to think mindfully and work with the scientific communities and say, What are the needs? Because the reality is that the communication is going to go up, and if its not from U.S. companies, itll be from European or from Asian companies. So I think the scientific community needs to wake up, unfortunately, to the reality that the Luddite form of saying, Technology isnt going up to space . . . and they should say say, Heres a set of metrics that wed like to continue moving forward with.

Ideally we can design to those specs. Beyond that, I fundamentally believe well find ways to shine brighter lights and move further [out]. Honestly, most of the interesting imaging happens well past [Low Earth Orbit] and I think when we start building a lunar base, well solve a lot of these problems.

At StrictlyVCs last event, we played host to a supersonic jet company called Boom. There are a handful of companies with which it competes, too

MS: Oh, more than [a handful]. If you count just pure electric aircraft companies, Ive met with 55 of, I would guess, around 200 or 300. Within that, supersonic is smaller, but its still in the dozens.

Whoa, that many? Does the world need supersonic jets again?

MS: [As a] recovering engineer and scientist, the way that I look at the space is does the business model fundamentally [make more sense] than when we tried this the last time in the 80s. If the answer is, This time, were a bunch of clever software kids building an aerospace device and dont worry about it, well figure out how to build an aircraft, Im going to tell you all the reasons that isnt necessarily going to work.

I think on the electric aircraft side, we have a bunch of questions to answer about what is the timeline of battery density versus what is a mission profile for these flights that actually makes sense. On the long-range side, we can look at what SpaceX might do with point-to-point capsules. [At the intermediate stage, hypersonic fight],I have not yet seen an engineering trajectory matched with a business model that I think closes in this space, at all, so Im not sure what the bankers are doing,

SJ: Also, the FAA regulatory cycle is very long. But [in addition to these reasons], our life becomes very simple the moment we know there are 55 to maybe 200 companies in a sector, and this is true for small sat launch or eVTOL aircraft huge swaths of the landscape. Whenever theres more than one or two [companies in a space], we dont even want to meet unless were just trying to understand whats going on. Why would anyone invest in the 130th small sat launch company? We try to look for companies that are unlike anything thats been seen before at the time.

On that note, theres only one new company that I know of thats digging a tunnel-based transportation system, Boring Company. Its another investment of Future Ventures . Did it come with a board seat?

SJ: No. Were in the first round of investment.

Is this a real company? Ive read it takes $1 billion to tunnel through a mile.

SJ: It depends where youre digging. Thats the worst case, but it can be up there, like when Boring Company won this contract in Las Vegas for a very short segment, the competition was bidding like $400 million for just a mile. It was like, really?

If you think about the pattern across aerospace with SpaceX, [the motor] issue with Tesla, and now potentially in construction, fintech, and agriculture, there are industries that havent [seen major innovation] in a long time. So the top four companies in America that are digging tunnels all started in the 1800s. Thats an especially long time ago. And the whole point, too, with Boring is switching diesel to electric, to do continuous digging, to reengineer the entire thing with a software and simulation mindset, to dramatically increase the speed and lower the cost. Think two orders of magnitude cheaper at least.

Steve, youd said once before that in most of the deals youve funded across your career, yours was the only check, that there just wasnt any competition. But more people are focused on the future as an investment theme now. Is it harder to find those outliers?

SJ: Its a little harder. We usually use that as a signal to look to a new market whenever there are multiple checks, When its a category, when there are conferences about it, when other venture firms are talking about it, thats usually a sure-enough sign that we already should have moved on to something else.

MS: The simple reality, too, is the industry is focused on a handful of sectors enterprise software, consumer internet, and the like and often there are fantastic funds with one or two edge-case investments, and thats great, because we love those funds and we want to work with them. But there are very few funds where that trajectory is the straight and narrow of their fundamental thesis.

You raised $200 million for this fund from tech CEOs and hedge funds and VCs; do you have the same constraints that other firms have?

MS: I dont think we have particularly fine constraints on anything, but we do have the constraint of our own conviction, our word and the quality of our characters, so one of the theses when we raised the fund was that we dont prey on human frailty, so no addictive substances, no [social media influencers] and not just because were bad at being cool hunters. But thats not our intention; thats not what were trying to create in the world.

I know youre interested in AI. What does that mean? Are you funding drug development?

SJ: What have you heard? Thats a really good guess.

There are so many companies hundreds of them using AI to try and uncover drug candidates, but they dont seem to be getting very far or maybe theyre arent getting far enough along as fast as Id expected.

SJ: [We have a related deal in process]. Interestingly, weve done ten deals that have closed; we have three more that are in the process, two in the signed term sheet phase. Four are in the area of edge intelligence . . .

MS: Ill often come at things from how would I build this robot in the world to do some critical task and Steve often looks at it more from the chip and power and processing and how you lay the algorithm onto the silicon. And between those two, we arrive at a really interesting thesis up and down the stack. So weve done Mythic, an edge intelligence chip company, but weve also looked at this idea that were going to send out these AIs into the world but we basically bake them into these edge devices that are terrible [because they dont work well].

The real issue is an AI thats getting trained somewhere in some cloud then getting pushed to your edge device and then, good luck. But increasingly [were thinking] about continuous improvement of those AIs as theyre running in real time and mindful of how we shuttle the data back to the mother ship data centers. [Were looking to] enable continuous improvement and acceleration of that learning. We have a number of portfolio companies up and down that stack that Im incredibly excited about.

That all sounds comfortably pedestrian compared to the very big picture, wherein a small group of companies is amassing all the richest data to train AI and are growing more powerful by the day. Steve, youve talked about this before, about your concerns that one day there could be very few companies, which would exacerbate income inequality. You said this could be a bigger threat to society than climate change. Do you think these companies Facebook, Amazon, Google should be broken up?

SJ: No, I dont think they should be broken up, but I do think its an inexorable trend in the the technology business that there are power laws within firms and between firms . . . If you want to maintain capitalism and democracy, its not self-rectifying and its only going to get worse. Compared to when we last spoke about this [in 2015], its gotten a lot worse. The data concentration, the usage of it.

Think, for example, of SenseTime in China . . . it recognizes faces better than any other algorithm on earth right now . . . So you have the U.S. power laws and power laws between countries as well. Thats just one new pejoration as AI and quantum computing escalates.

So everyone in technology and who invests in it should be thoughtful about what this means and think about entrepreneurial paths to the future we want to live in . . . how we get from here to there is not obvious. The markets [will handle some but not all of these things]. So its very worrisome and when I said its worse than climate change, I meant it will have more impact on whether humanity makes it through the next 20 years. Climate change [may do us in] 200 years from now but theres some serious pressing issues over the next 20 years.

And breaking up these companies isnt part of the solution.

Its almost like this notion of controlling an AI thats greater than human intelligence. How would you ever imagine you would control such a thing? How would you even imagine understanding its inner workings? So the notion that through regulation you could break up a natural monopoly when everything that fixes the industry creates a natural monopoly, itd be like whack-a-mole.

Whats the answer? Looking around the corner, what are you funding thats going to blow peoples minds? Ayahuasca? Is there a market for that? I know its everywhere.

SJ: [Looking shocked.] There are two companies, one we wired funds earlier today and the other is a signed term sheet and they relate to your questions.

MS: We should check if the office is bugged [laughs].

SJ: Theres a lot going on. Curing mental illness. Alternative modalities.

MS: The largest rising global epidemic is depression. Adolescent suicide rates are up 300 percent in the U.S. in the last 10 years. And we dont have the resources, the skills, the technologies and the licensed therapists available. We know there are medicinal compounds, often from plant vines, that have shown incredible value in addressing treatment-resistant depressions and addiction and abusive substances. And often participation in those things is a privilege of particular groups in society and so how do we democratize access to mental health.

Wait, I cant believe I guessed it. Youre investing in an ayahuasca-related startup!?

SJ: Its close, not exactly. [Laughs.]

Go here to read the rest:
Maryanna Saenko and Steve Jurvetson of Future Ventures talk SpaceX, the Boring Co. and . . . ayahuasca - TechCrunch

Read More..

What Is End-to-End Encryption? Another Bulls-Eye on Big Tech – The New York Times

SAN FRANCISCO A Justice Department official hinted on Monday that a yearslong fight over encrypted communications could become part of a sweeping investigation of big tech companies.

While a department spokesman declined to discuss specifics, a speech Monday by the deputy attorney general, Jeffrey A. Rosen, pointed toward heightened interest in technology called end-to-end encryption, which makes it nearly impossible for law enforcement and spy agencies to get access to peoples digital communications.

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apples chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.

Attorney General William P. Barr, joined by his British and Australian counterparts, recently pressed Facebooks chief executive, Mark Zuckerberg, to abandon plans to embed end-to-end encryption in services like Messenger and Instagram. WhatsApp, which is owned by Facebook, already provides that tougher encryption.

Companies should not deliberately design their systems to preclude any form of access to content even for preventing or investigating the most serious crimes, Mr. Barr wrote in a letter last month.

Here is an explanation of the technology and the stakes.

End-to-end encryption scrambles messages in such a way that they can be deciphered only by the sender and the intended recipient. As the label implies, end-to-end encryption takes place on either end of a communication. A message is encrypted on a senders device, sent to the recipients device in an unreadable format, then decoded for the recipient.

There are several ways to do this, but the most popular works like this: A program on your device mathematically generates two cryptographic keys a public key and a private key.

The public key can be shared with anyone who wants to encrypt a message to you. The private key, or secret key, decrypts messages sent to you and never leaves your device. Think of it as a locked mailbox. Anyone with a public key can put something in your box and lock it, but only you have the private key to unlock it.

A more common form of encryption, known as transport layer encryption, relies on a third party, like a tech company, to encrypt messages as they move across the web.

With this type of encryption, law enforcement and intelligence agencies can get access to encrypted messages by presenting technology companies with a warrant or national security letter. The sender and recipient would not have to know about it.

End-to-end encryption ensures that no one can eavesdrop on the contents of a message while it is in transit. It forces spies or snoops to go directly to the sender or recipient to read the content of the encrypted message. Or they must hack directly into the senders or recipients device, something that can be harder to do at scale and makes mass surveillance much more difficult.

Privacy activists, libertarians, security experts and human rights activists argue that end-to-end encryption steers governments away from mass surveillance and toward a more targeted, constitutional form of intelligence gathering. But intelligence and law enforcement agencies argue that end-to-end encryption makes it much harder to track terrorists, pedophiles and human traffickers.

When Mr. Zuckerberg announced in March that Facebook would move all three of its messaging services to end-to-end encryption, he acknowledged the risk it presented for truly terrible things like child exploitation.

Encryption is a powerful tool for privacy, but that includes the privacy of people doing bad things, he said.

The debate over end-to-end encryption has had several iterations, beginning in the 1990s with the spread of Pretty Good Privacy, or PGP, software, an end-to-end encryption scheme designed by a programmer named Phil Zimmermann. As a result, the Clinton administration proposed a Clipper Chip, a back door for law enforcement and security agencies.

But the Clipper Chip provoked a backlash from a coalition of unlikely bedfellows, including the American Civil Liberties Union; the televangelist Pat Robertson; and Senators John Kerry, the Massachusetts Democrat, and John Ashcroft, the Missouri Republican. The White House backed down in 1996.

End-to-end encryption gained more traction in 2013, after data leaked by the former National Security Agency contractor Edward J. Snowden appeared to show the extent to which the N.S.A. and other intelligence and law enforcement agencies were gaining access to users communications through companies like Yahoo, Microsoft, Google and Facebook without their knowledge.

Encrypted messaging apps like Signal and Wicker gained in popularity, and tech giants like Apple and Facebook started wrapping user data in end-to-end encryption.

Google, which pledged to add an end-to-end encryption option for Gmail users several years ago, has not made this the default option for email. But the company does offer a video-calling app, Duo, that is end-to-end encrypted.

As more communications moved to these end-to-end encrypted services, law enforcement and intelligence services around the world started to complain about datas going dark.

Government agencies have tried to force technology companies to roll back end-to-end encryption, or build back doors, like the Clipper Chip of the 1990s, into their encrypted products to facilitate government surveillance.

In the most aggressive of these efforts, the F.B.I. tried in 2016 to compel Apple in federal court to unlock the iPhone of one of the attackers in the 2015 mass shooting in San Bernardino, Calif.

Mr. Cook of Apple called the F.B.I.s effort the software equivalent of cancer. He said complying with the request would open the door to more invasive government interception down the road.

Maybe its an operating system for surveillance, maybe the ability for the law enforcement to turn on the camera, Mr. Cook told ABC News. I dont know where it stops.

Privacy activists and security experts noted that any back door created for United States law enforcement agencies would inevitably become a target for foreign adversaries, cybercriminals and terrorists.

Alex Stamos, the chief security officer of Yahoo at the time, likened the creation of an encryption back door to drilling a hole in the windshield. By trying to provide an entry point for one government, you end up cracking the structural integrity of the entire encryption shield.

The F.B.I. eventually backed down. Instead of forcing Apple to create a back door, the agency said it had paid an outside party to hack into the phone of the San Bernardino gunman.

Governments have stepped up their calls for an encryption back door.

Last year, Australian lawmakers passed a bill requiring technology companies to provide law enforcement and security agencies with access to encrypted communications. The bill gave the government the ability to get a court order allowing it to secretly order technology companies and technologists to re-engineer software and hardware so that it can be used to spy on users.

Australias law is based on Britains 2016 Investigatory Powers Act, which compels British companies to hand over the keys to unscramble encrypted data to law enforcement agencies. The Australian law could apply to overseas companies like Facebook and Apple.

Australias new law applies to network administrators, developers and other tech employees, forcing them to comply with secret government demands without notifying their employers.

Other governments are also considering new encryption laws. In India, Facebooks biggest market, officials told the countrys Supreme Court in October that Indian law requires Facebook to decrypt messages and supply them to law enforcement upon request.

They cant come into the country and say, We will establish a non-decryptable system, Indias attorney general, K.K. Venugopal, told the court, referring to Facebook and other big tech platforms. Indias Supreme Court has said it will reconvene on the issue in January.

See the rest here:
What Is End-to-End Encryption? Another Bulls-Eye on Big Tech - The New York Times

Read More..