Page 4,296«..1020..4,2954,2964,2974,298..4,3104,320..»

Huawei to Expand Its Server Product Portfolio to Deliver Hybrid Cloud Solution for Microsoft Azure Stack – PR Newswire (press release)

The jointly-engineered solution based on Huawei's latest-generation FusionServer and CloudEngine switches uniquely offers built-in integration between Huawei's eSight management software and Azure Stack, enabling customers to implement 360-degree management on hardware devices.

Azure Stack is an extension of Azure, providing the same application model, self-service portal, and APIs. This enables the modernization of applications across hybrid cloud environments, balancing flexibility and control.

The Huawei and Microsoft jointly-engineered solution also shares the same architecture and user interface as Azure, allowing users to seamlessly deploy, manage and migrate applications across clouds. As a result, enterprises can transform their businesses through automated IT services, maintain critical data on-premise, and deploy new services and cloud-native applications faster with fewer costs.

Huawei's hybrid cloud infrastructure features FusionServer, which delivers integrated high-density architecture, large storage capacity, and highly reliable management. It is an ideal choice for cloud computing, big data, and HPC applications. Huawei CloudEngine switch provides high-density 10G access and up to 100G interconnect, enabling networks of high performance and reliability, large cache, and low latency. At the end of 2016, Huawei had delivered over two million virtual machines and 420 cloud data centers to customers in 130 countries in a number of sectors, including government, public utilities, carrier, energy and finance.

"Combining Huawei's competitive strength in server hardware with Microsoft's cloud expertise, the groundbreaking Huawei Hybrid Cloud for Microsoft Azure Stack is an ideal option for enterprises moving to hybrid cloud," said Qiu Long, president of Huawei IT Server Product Line. "The jointly-engineered solution epitomizes the successful and symbiotic relationship between the two companies."

Mike Neil, corporate vice president, Enterprise Cloud, Microsoft Corporation said, "We are pleased to work with Huawei on the launch of their new solution, Huawei Hybrid Cloud for Microsoft Azure Stack. "Huawei has a strong market position and rich product portfolio, and will help to accelerate the adoption of hybrid cloud platforms with existing and new customers, and expand the strategy to new markets."

About HuaweiHuawei is a leading global information and communications technology (ICT) solutions provider. Our aim is to enrich life and improve efficiency through a better connected world, acting as a responsible corporate citizen, innovative enabler for the information society, and collaborative contributor to the industry. Driven by customer-centric innovation and open partnerships, Huawei has established an end-to-end ICT solutions portfolio that gives customers competitive advantages in telecom and enterprise networks, devices and cloud computing. Huawei's 170,000 employees worldwide are committed to creating maximum value for telecom operators, enterprises and consumers. Our innovative ICT solutions, products and services are used in more than 170 countries and regions, serving over one-third of the world's population. Founded in 1987, Huawei is a private company fully owned by its employees.

For more information, please visit Huawei online at http://www.huawei.com or follow us on: http://www.linkedin.com/company/Huawei http://www.twitter.com/Huawei http://www.facebook.com/Huawei http://www.google.com/+Huawei http://www.youtube.com/Huawei

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/huawei-to-expand-its-server-product-portfolio-to-deliver-hybrid-cloud-solution-for-microsoft-azure-stack-300471350.html

SOURCE Huawei

http://www.huawei.com

See the original post:
Huawei to Expand Its Server Product Portfolio to Deliver Hybrid Cloud Solution for Microsoft Azure Stack - PR Newswire (press release)

Read More..

Student Researchers Ask How Secure We Feel About Internet Security – Bucknell University

You've probably noticed how well your internet browser has gotten to know you.

Ever-advancing advertising algorithms serving up targeted ads, not to mention data breach after data breach, have made many internet users more attuned than ever to how little privacy we often have on the internet. But when it comes to information that we really want to protect, how many of us can say that we understand the steps that companies we interact with online are taking to safeguard our privacy?

That question is at the heart of a new study published by two Bucknell University undergraduates and two computer science professors that blends computing with psychology to examine how internet users feel about privacy-protecting tools.

"A big issue with data privacy is that nobody really understands or has a very clear grasp of what a private context online really means," said Stephanie Garboski '18, one of the student researchers. "Our research is about trying to make people comfortable with the protocols involved."

In May, Garboski and co-researcher Brooke Bullek '18 presented and published their study at the most prestigious international conference in the field of human-computer interaction, ACM-CHI, where they were among only a handful of undergraduates presenting alongside university faculty and researchers for companies like Microsoft and IBM. Bullek was also awarded an $8,000 Scholarship for Women Studying Information Security from the Computing Research Association due in large part to the project.

Another Bucknell student, Jordan Sechler '19, presented a poster at the same conference in Denver.

The study Bullek and Garboski undertook with professors Evan Peck and Darakhshan Mir, computer science, was an experiment to see how comfortable users were sharing their data using one of the better tools out there for ensuring data privacy. Called differential privacy, it involves adding inaccurate information, or "mathematical noise," to data collected from users. That noise can be accounted for with statistical analysis to reveal accurate trends in aggregate data, but adding it means that information can't be traced back to a user with certainty.

Peck likens the tool to asking a classroom of students to answer the question "Did you cheat on your exam?" by flipping a coin. The students who flip heads must answer yes, regardless of the truth, while those who answer no must answer truthfully.

"The instructor can figure out what percentage of people in the classroom probably cheated by using probability, but it protects people individually," Peck said. "It lets you understand statistics not on a per-person basis but on a population level. That's why big companies like Apple are really interested in this, because they're trying to get population-level statistics without compromising individual privacy."

In their own study, Bullek and Garboski asked more than 200 respondents recruited online to answer a dozen highly personal and potentially embarrassing questions, including "Have you ever cheated on a college exam?" and "Have you used recreational drugs in the last six months?" Respondents were told they were testing an experimental Facebook feature that would post their answers to their Facebook wall in order to "invite them to think about more open, vulnerable contexts," Bullek explained.

Before answering each question, participants were made to spin a wheel that instructed them to either answer the question truthfully or to answer with either yes or no, regardless of the truth. Three different spinners were used, one compelling participants to answer a question truthfully only 40 percent of the time, another 60 percent of the time, and the third 80 percent of the time. || Click here to spin the wheel.

Afterwards, Bullek and Garboski asked the participants which spinner they felt most comfortable using. While the results confirmed what the researchers predicted, that most participants would choose the spinner requiring them to tell the truth 40 percent of the time because it offered the most privacy, they also found that a significant subset of respondents chose the 80-percent spinner, which required them to tell the truth most often. The reason: they didn't feel comfortable lying.

"The word lying or lie came up a lot," Bullek said. "People were equating this mathematical noise that they're adding, which is supposed to protect them, with being deceptive. It revealed that some people may have a fundamental misunderstanding of how differential privacy and its variants work.

"That's why we became interested in this whole investigation," she continued. "We thought that people might not understand how adding mathematical noise isn't a bad thing that it's actually a good way to mitigate risk while still providing beneficial information to the researchers and companies collecting information."

Understanding which tools companies use to protect user privacy is important because not all privacy tools are created equal. For some companies, anonymizing data involves simply removing the names of users from the data they collect, but that approach doesn't provide adequate privacy, the researchers noted. Bullek pointed to a study by data-researcher Latanya Sweeney, which was able to identify individuals with around 90 percent certainty using three pieces of information: gender, date of birth and ZIP code.

"They're the kind of things that you wouldn't think twice about giving up while online shopping," Bullek said. "But they're very unique when you put them together."

The Bucknell researchers hope their study is a first step toward encouraging companies to be more forthcoming in explaining the steps they take to protect user data, rather than burying that explanation in submenus and user-service agreements. If they do, the researchers believe many internet users might feel less anxious about sharing information when they know the right tools are being used for their protection.

"Some companies do try to help you protect your privacy, but it happens through a black box, using these kind of magic words that no one understands," Peck said. "As users, we're forced to make a decision about whether to use these privacy tools or not, and we have no idea what it means. We're trying to give people an example of what's going on and get a sense of how they feel about it."

See the rest here:
Student Researchers Ask How Secure We Feel About Internet Security - Bucknell University

Read More..

WWE Holds Backstage Meeting About Internet Security Due To … – Still Real To Us (blog)

Its an unpredictable time to be a WWE superstar or a celebrity in general. The recent wave of hacking and leaked nude photos have seemingly put everyone onedge. PW Insider reports WWE has recently taken steps to make sure this doesnt happen anymore.

In the past year people like Seth Rollins, Charlotte Flair, Paige, Xavier Woods and other former WWE talents have been hacked and had nude pictures and/or videos released online. But to be fair, Seth Rollins leak had little to do with hacking and more to do with a vengeful ex-girlfriend.

This was a mandatory meeting everyone had to attend and provided many tips on how to protect themselves from cyber attacks. Talents were also given new amendments to their social media contract that they had to sign as well. There is no word on exactly what these new amendments encompassed, but we can only imagine WWE is tightening up their superstars social media and internet activity. After all, WWE is a publically traded company and doesnt want any repeats of similar events of hacking and leaks.

WWE reportedly had these meetings before Raw and SmackDown Live this week to give a class on internet security. WWE cant put the toothpaste back in the tube when it comes to the leaks that have already happened, but they certainly want to do their best to make sure any further leaks are as much of an impossibility as they can.

One of the methods hackers use to gain access to email accounts is by USB drives given as gifts. WWE talents were told to be aware of this tactic so they dont get tricked again. Another common way hackers attain passwords is by sending out emails from fake addresses. This tactic seems to be a way hackers are gaining access to iCloud accounts.

WWE obviously means business by bringing in a cyber security firm to give a class to their superstars. Lets hope the WWE superstars take this advice seriously so there arent any more leaks.

Read the original post:
WWE Holds Backstage Meeting About Internet Security Due To ... - Still Real To Us (blog)

Read More..

The internet is obsessed with Justin Bieber’s hot security guard – HelloGiggles

oh em gee

Heres the thing we love Justin Bieber and think hes incredibly good looking. And with that on the table, we must saythat Justin Biebers security guard is alsoincredibly good looking.ABelieber at last weekends Pinkpop music festival in the Netherlands caught a glimpse of the godlike guard, shared her discovery with the world, and the internet has since lost its mind.

A general wave of who is he??? swept across the world. Thank goodness the question wasnt left hanging in the air for long. We quickly found out that his name isBoy Roeles and hes from Heerenveen in the Netherlands.

Before his stint at Pinkpop, Roeles worked the Purpose Tour inArnhem, where Twitter user @biebsdemon also took note of him.

A post shared by boy (@boyroeles) on May 29, 2017 at 3:25am PDT

Unfortunately, according to BuzzFeed, @biebsdemon (and the rest of us) shouldnt get our hopes up about winning Roeles heart. Hes taken, ladies.

Since being discovered as the cutest guy on the face of the Earth, Roeles felt it necessary to sign up for Twitter to respond to all the love. Hes not sure what to make of his newfound fame, but hes trying his best to keep on top of it.

Read the original post:
The internet is obsessed with Justin Bieber's hot security guard - HelloGiggles

Read More..

ConCourt rules against e.tv in digital encryption case – Eyewitness News

e.tv had challenged the government, saying an unencrypted system would hurt its ability to compete as encryption would allow government to offer better services to the public.

The Constitutional Court. Picture: Gia Nicolaides/EWN.

JOHANNESBURG The Constitutional Court has ruled that government did not behave unconstitutionally when it decided that it would implement a policy of unencrypted digital terrestrial television.

e.tv had challenged the decision, saying that an unencrypted system would hurt its ability to compete and that encryption would allow government to offer better services to the public.government to offer better services to the public.

The court ruled by five judges to four that government can continue to use an unencrypted system for digital terrestrial television and that e.tv's legal bid to stop the system must fail.

But judges have also criticised former communications minister Faith Muthambi for her conduct in refusing to name who she spoke to when she changed her mind from using an encrypted system to using an unencrypted system.

e.tv had said that using the unencrypted system would make it impossible for it to compete against other players over the longer term.

Writing for the majority, Chief Justice Mogoeng Mogoeng opened his ruling with the statement: Ours is a constitutional democracy - not a judiciocracy.

He then said this means that government - as the executive - must have the power to make policy, before saying that government did, in fact, conduct a proper process of consultation before deciding to use the unencrypted system.

But Mogoeng says this is not because of then Communications Minister Faith Muthambi, but because of the actions of the previous Minister Yunus Carrim.

He said that while Muthambi did not properly consult with e.tv when making her decision to use the unencrypted system, previous communications minister Carrim had fulfilled the legal obligations of the department when he had consulted with e.tv in a previous process.

Both Mogoeng's judgment and the dissenting judgement agreed that Muthambi was wrong to not explain who she spoke to when she changed her mind on this issue.

Mogoeng also castigated e.tv, saying it first argued strongly for an unencrypted system and then argued against it.

Mogoeng also said the effect of Muthambi's decision was to virtually maintain the status quo in terms of the relationships and obligations the various broadcasters have.

In their judgment, four other judges said they would have come to a different decision and that Muthambi had not explained why her conduct did not open the door to secret lobbying and influenced peddling.

(Edited by Zinhle Nkosi)

Visit link:
ConCourt rules against e.tv in digital encryption case - Eyewitness News

Read More..

Islamic State supporters shun Tails and Tor encryption for Telegram – ComputerWeekly.com

Supporters of the terrorist group Islamic State (Isis) are shunning sophisticated security and encryption software, including the Tails operating system and the Tor network, which could be used to cover their tracks when viewingterrorist propaganda online, communications between jihadi sympathisers have revealed.

The 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

The disclosures come as the UK government prepares to introduce new restrictions on encryption following the terrorist attacks that killed more than 20 people, including children, at a concert in Manchester, and killed eight andinjured 47 at London Bridge.

Isis has claimed responsibility for the Manchester and London attacks and has also been linked to atrocities in Paris, Germany and Brussels.

Confidential messages show that Isis supporters had little interest in encryption techniques to hide their web browsing activities, or to createa secureversion of propaganda websites that would be difficult for law enforcement to censor or take down.

The messages between supporters recovered by police and the FBI investigating an internet terrorist reveal that Isis supporters preferred method of communication is mobile phone apps Telegram Threema, ChatSecure and Signal, which are designed for people with little or no technical knowledge.

Internet terrorist Samata Ullah communicated with Isis supporters on a Telegram discussion group known as the Khayr group. Police also retrieved a guide to ChatSecure, another mobile phone chat app, from Ullahs computer.

Ullah, who was jailed for eight years in May 2017 after posting encryption training videos on an Islamist blogsite, sent messages to an unidentified Isis supporter raising concerns that the terror groups supporters were not using more secure communications tools.

I dont know Akhi [brother], he wrote. It seems they have some bad info. They refuse to use Wikr [a mobile phone messaging system] and tails. They say threema is the best, then signal, and in extreme case chat secure [sic].

Ullahs Isis contact replied: And they say telegram with virtual sim or open vpn is enough protection.

Another message reads: Dawla [Isis] security groups seem to be very stubborn and not very flexible.

It was only when one of Ullahscontacts inKenya was arrested on 29 April 2016 that attempts were made to persuade fellow Isis supporters to adopt stronger forms of encryption.

The Kenyan said in a letter smuggled out of prison: Tell all KN [Khalifa News] and CCA [Cyber Caliphate Army] teams to be very careful online. It is very much advisable that phones be avoided & instead use PCs with TOR and TAILS.

Many Isis supporters, who often refer to themselves as fanboys, have little technical knowledge and it is difficult to convince them to use encryption software, one counter-terrorism organisation told Computer Weekly.

They have experimented a couple of times with ZeroNet and Onion [Tor] sites on occasions, but those sites are usually very short-lived, a spokesman said, speaking on condition of anonymity. While there are some tech savvy supporters, the majority of their fan base is not very tech savvy and trying to get a newbie to not only understand ZeroNet and Tor but to actually use them consistently is a challenge.

Isiss policy is to saturate the internet with ideas and jihadi content, through social media platforms such as Twitter, according to a report by counter-terrorism think-tank Quilliam.

The terror group distributes daily videos and photographs, which are circulated as widely as possible through self-appointed distributors, often with no official connection to the organisation.

Islamic State has revolutionised jihadist messaging by jettisoning operational security in the pursuit of dynamism, Quilliam reports in a study, The Virtual Caliphate: Understanding Islamic States Propaganda Strategy.

Ullah proposed using ZeroNet which uses BitTorrent peer-to-peer networking and integrates with the Tor secure internet network to create a secure version of a pro-Islamic blogsite, Ansar al Khilafah (Supporters of the Caliphate).

The WordPress propaganda blogsite had attracted interest from the UKs media arm of Isis, according to messages recovered by investigators.

The head of English Islamic State media wants to have the right to proofread all content before it is published on the wordpress in future, one Isis supporter told Ullah. If you would agree to it, they would promote the wordpress.

Ullah replied: Sure. thats good.

But in a series of exchanges, it becomes clear that Isis had no interest in using ZeroNet to create a version of the blog that would be difficult for law enforcement to censor or take down.

An Isis supporter told Ullah: First thing is, the brother almost completely dismissed the idea of zero net. So you will either have to give up the idea or try and convince them.

David Wells, a former GCHQ intelligence officer, told Computer Weekly that mobile phone apps offered a more practical alternative to ZeroNet, Tails and Tor for Isis supporters that may not have technical expertise.

More secure technologies are rarely easy to use, and pragmatically any terrorist group would rather their networks were using something pretty secure than not communicating [at all] when needed or doing something stupid like [sending an] SMS, he said.

A forensic report revealed that Ullahs ZeroNet version of the Answar al Khilafah blog did not work in practice.

ZeroNet would have been cumbersome to use for Isis supporters who were used to exchanging news on social media. It required each user to download the blogs contents, including the Isis magazine Dabiq, onto their own computer, putting them at risk of possession of terrorist materials.

Correspondence recovered from Ullahs computer equipment revealed that he had struggled to find a way to update the ZeroNet version of the site without writing code for each update, and to find ways of displaying videos and other feature-rich content.

Isis favours the mobile app Telegram as a platform for sharing propaganda and for group discussions because it has the ability to create public channels that unlimited numbers of people can view, according to the counter-terrorism specialist.

Isis members begin by creating a private distribution channel on Telegram which is restricted to a few people. These members are responsible forcopying messages from the private channels to publicly advertised open channels, where teams of people then share them through disposable Twitter and social media accounts.

The public channels usually have multiple backups to keep the data flowing if one of them gets suspended by Telegram administrators, said the specialist. Since the private channels have no links to join, they are considered private by Telegram and therefore wont be shut down.

Telegram is said to take down an average of 100 to 200 public Isis channels a day, but Isis creates multiple back-ups of each channel to keep data flowing.

However, the messaging service does not take down private discussion groups between Isis supporters because they are not publicly accessible, said the counter-terrorism specialist.

Encrypted communications is pretty much all they [Isis] do. Id say if theyre not using a walkie-talkie or a cell phone, theyre on one of the encrypted [mobile] apps.

If Isis had taken up ZeroNet, it may have drawn the intelligence services attention to its activities, Wells told Computer Weekly.

If a terrorist group chooses a bespoke or unusual communications provider or service, then this has huge challenges for the intelligence services but it also allows them to focus their efforts, he said.

Experimenting with unproven systems is likely be a low priority for Isis commanders in Syria, who have to deal with the day-to-day realities of civil war with the Assad regime and US drone strikes, said Ross Anderson, professor of computer security at Cambridge University.

If I was running Daeshs technology and some foot soldier says why dont we use ZeroNet, I would say get lost, I have far more interesting and important things to do, said Anderson. Why should I spend weeks investigating this stuff and seeing if it works?

Isis may be avoiding Tor and Tails for similar reasons. The US National Security Agency (NSA) and the UKs GCHQ could narrow down the search for Isis supporters if the terror group started using specialist applications such as Tails and Tor.

Anderson said: They could just harvest all the Tails users in the observable universe and de-dupe them against lists of known users, look for all the new ones and go searching for those.

Isis has used a variety of techniques to avoid detection. During the attack on the Bataclan theatre in Paris in November 2015, terrorist teams used multiple pre-paid burner phones, which they instantly discarded.

Investigators found a crates worth of disposable phones, an investigation by the New York Times has revealed. They used only new phones that they would then discard, including several activated minutes before the attacks, or phones seized from their victims, it said.

Although investigators concluded that the attackers were likely to have used encryption software, no evidence of it was found.

Read more:
Islamic State supporters shun Tails and Tor encryption for Telegram - ComputerWeekly.com

Read More..

Is bitcoin in a bubble? This metric suggests there’s more room to grow – MarketWatch

One of the biggest financial stories of 2017 has been the seemingly unstoppable rise of bitcoin, which has more than tripled this year and seems to make new records by the day.

Such a rally has inevitably raised questions over whether there is a bubble in the digital currency, or in the broader space of cryptocurrencies, which earlier this week topped $100 billion in combined market capitalization. Breaking that milestone was largely due to bitcoin BTCUSD, +3.83% which by itself accounts for nearly half the value of the still-nascent sector. However, a new measure of bitcoin valuation, one based roughly on the price-to-earnings ratio applied to stock valuation, suggests that rally still has room to grow.

Read: 3 reasons why bitcoins surge may not be a bubble

Opinion: Three reasons to fear the coming crash in bitcoins

Gauging whether bitcoin is overvalued is tricky, as it is divorced from many of the standard attributes that can measure a securitys fundamentals. Unlike a stock, bitcoin has neither traditional revenue nor profits behind it, ruling out such equity statistics as price to sales or earnings before interest, tax, depreciation and amortization.

And because it isnt backed by a central bank or government, viewing it in the way one might a currency isnt an apples-to-apples comparison. A commodity like oil can be measured based on the principles of supply and demand; bitcoin has no equivalent underlying asset. (The Internal Revenue Service classifies bitcoin as property rather than a currency, while the U.S. Commodity Futures Trading Commission classifies it as a commodity.)

However, some analysts have developed what could be considered a price-to-earnings ratio for bitcoin, one that suggests the recent surge may not have taken it to bubble territory.

Bitcoins P/E ratio looks at the digital currencys network valuethe number of outstanding bitcoins multiplied by price; this figure is currently $44.69 billionagainst its daily transaction volume.

The reason I call it a P/E ratio is because when I think about what a P/E signifies for equities, it is basically the function of market cap and earnings. The earnings are the underlying utilitythe cash flow of the company, explained Chris Burniske, a blockchain analyst at ARK Invest, who has helped to develop this metric.

Bitcoin P/E is composed of similar concepts. Instead of market cap, you have network value. Thats then divided by the underlying utility of bitcoin, which is its ability to move money. Thats bitcoins core utility, same as a companys core utility is earnings.

This metric currently gives bitcoin a ratio of roughly 50, which is under its long-term average and well below past peaks, which have been above 200, and one time spiked to nearly 450.

On a stock, a P/E ratio of 50 would be pricey, Burniske noted, but I dont know if it should be considered pricey for bitcoin. It looks to be in a comfortable range, it isnt an outlier and right now the broad takeaway I have is that it doesnt look like were due for a mean revision.

He added that over time, cryptocurrencies would find a base range for valuation on this metric, one that lets investors know what would be reasonable to pay based on the cryptos daily utility.

While high P/E ratios are often seen as sell signals for stocks, Burniske suggested that any kind of extreme reading on this metric could signal a bitcoin selloff.

This ratio drops when bitcoin is in the late stages of rallies, because investors would take profits or move their money between exchanges out of nervousness. That leads to a lot of transaction value, which makes the denominator higher. Thats why its important to me, from a valuation standpoint, that it isnt high or low.

Read the original here:
Is bitcoin in a bubble? This metric suggests there's more room to grow - MarketWatch

Read More..

What Happens to Bitcoin After All 21 Million are Mined? | Investopedia – Investopedia

Bitcoin is like gold in many ways. Like gold, Bitcoin cannot simply be created arbitrarily. Gold must be mined out of the ground, and Bitcoin must be mined via digital means. Linked with this process is the stipulation set forth by the founders of Bitcoin that, like gold, it have a limited and finite supply. In fact, there are only 21 million Bitcoins that can be mined in total. Once miners have unlocked this many Bitcoins, the planet's supply will essentially be tapped out, unless Bitcoin's protocol is changed to allow for a larger supply. Supporters of Bitcoin say that, like gold, the fixed supply of the currency means that banks are kept in check and not allowed to arbitrarily issue fiduciary media. But what will happen when the global supply of Bitcoin reaches its limit?

It may seem that the group of individuals most directly effected by the limit of the Bitcoin supply will be the Bitcoin miners themselves. On one hand, there are detractors of the Bitcoin limitation who that say that miners will be forced away from the block rewards they receive for their work once the Bitcoin supply has reached 21 million in circulation. In this case, these miners may need to rely on transaction fees in order to maintain operations. Bitcoin.com points to an argument that miners will then find the process unaffordable, leading to a reduction in the number of miners, a centralization process of the Bitcoin network, and numerous negative effects on the Bitcoin system.

This argument assumes that transaction fees alone will be insufficient to keep Bitcoin miners financially solvent once the mining process has been completed. On the other hand, there are reasons to believe that transaction fees and mining costs will even out in the future. Looking ahead by several decades, it is not difficult to imagine that mining chips will become small and highly efficient. This would reduce the burden placed on miners and would allow mining to become an activity with a lower threshold of initial cost. Further, transaction fees may increase, and this could help to keep miners afloat as well.

Bitcoin has already seen massive hikes in price in just the past few months. While no one is entirely sure how Bitcoin will continue to spread to the larger financial world, it seems likely that a limited supply of the currency may cause prices to continue to increase. There are also stockpiles of inactive coins that are held around the world, the largest supply of which belongs to the person or group who founded Bitcoin, Satoshi Nakamoto. Perhaps this supply, consisting of roughly one million Bitcoins, is intentionally being saved for a time when the global supply is facing increased levels of demand.

Read the original post:
What Happens to Bitcoin After All 21 Million are Mined? | Investopedia - Investopedia

Read More..

Bolenum’s Project to Widen Cryptocurrency Adoption – The Merkle

It is always nice to see projects attempting to better the world they live in. This is especially nice because of the low adoption rate of cryptocurrencies and Blockchain technologies on a global scale. A recent CryptoCoinNews interview went over the lack of Blockchain adoption in Africa, while pointing out the massive opportunities that reside on the continent because of that fact. One new project, Bolenum, is looking to start off there.

Though Bolenum has sights on an intercontinental project, the majority of their initial efforts appear to be in Africa. Their Whitepaper outlines the two main issues they feel have caused cryptocurrencies to see lower scale adoption than other parts of the world.

The first obstacle is one known all too well by all cryptocurrencies: lack of public awareness. Many just do not know about cryptocurrency, the Blockchain, or what it can provide. This could be because of a lack of cryptocurrency and blockchain evangelists, but also can be blamed on the lack of readily translated literature into local dialects.

The second problem is one that many in the western world have not really had to deal with: convertibility of funds. While every exchange takes Euros, United States Dollars, and Chinese Yuan, it is way less likely that these exchanges will take the Egyptian Pound, the Nigerian Naira, or the Moroccan Dirham. Without access to fiat exchanges to convert to more readily accepted currencies for crypto, individuals may be out of luck.

They hope to provide solution to these issues at the first ethereum based token and exchange platform that aims to engender more participation in the cryptocurrency on the African continent.

The projects token, BLN, aims to serve as a secure payment method, and also be able to protect wealth. These are Ether based tokens so they benefit from the speed and security of the Ethereum Blockchain.

The main perk that may help the project accomplish its goal is the fact that they will also be opening an exchange that will allow for BLN tokens to be traded for local currencies. This means that someone will be able to not only withdraw the value of their tokens into local currencies, but could give better access to the cryptosphere as a whole. If someone buys BLN with a local currency, they should in theory be able to trade those BLNs on a different exchange for any other digital asset they were interested in. It not only is an asset by itself, but a gateway asset to others previously denied by fiat binding.

They will be holding an ICO for this project starting July 15, and it will span for 30 days. 10,000,000 BLN tokens will be made, with 50% of those being open to the public in an ICO with the other 50% behind held by the Bolenum team as capital to support their future exchange.

Disclaimer: This is a paid press release, the product / service mentioned is not endorsed by The Merkle, always do your own independent research. This is not investment or trading advice.

Go here to read the rest:
Bolenum's Project to Widen Cryptocurrency Adoption - The Merkle

Read More..

Linux malware enslaves Raspberry Pi to mine cryptocurrency – ZDNet

Older Raspberry Pi devices, such as this Raspberry Pi 2, may be more vulnerable to the malware if they haven't been updated in a while.

Someone has developed a simple Linux trojan designed to harness the meager power of Raspberry Pi devices to mine cryptocurrency.

Raspberry Pi users may need to consider applying a recent Raspbian OS update to their devices, particularly if they are currently configured to allow external SSH connections.

According to Russian security firm Dr Web, the malware Linux.MulDrop.14 exclusively targets Raspberry Pi devices to use their processing power to mine a cryptocurrency.

Dr Web discovered the Raspberry Pi mining malware after its Linux honeypot machine became infected with it. The malware uses a simple Bash script to attempt to connect to Raspberry Pi devices configured to accept external SSH connections. It targets Raspberry Pi boards with the default login and password, which are 'pi' and 'raspberry', respectively.

It then changes 'pi' to '$6$U1Nu9qCp$FhPuo8s5PsQlH6lwUdTwFcAUPNzmr0pWCdNJj.p6l4Mzi8S867YLmc7BspmEH95POvxPQ3PzP029yT1L3yi6K1'.

From there it installs the internet-scanning tool ZMap and the sshpass utility, and searches the network for other devices with an open port 22 to infect them.

Older Raspberry Pi devices may be more vulnerable to this malware if they haven't been updated in a while. The Raspberry Pi Foundation told ZDNet sister site TechRepublic that a Raspbian OS update released late last year turned off SSH by default and forced users to change the default password.

However, it warned that there could still be millions of Raspberry Pi boards that haven't been updated. Some 12.5 million of the single-board computers have been sold over the past five years, according to the official Raspberry Pi Magazine.

The malware doesn't try to mine for Bitcoin, whose 'difficulty level' is too high to mine cost-effectively, even for a massive network of PCs let alone Raspberry Pi devices.

However, there are numerous other cryptocurrencies that can be mined with less computational power. In 2014, malware writers experimented with Android malware to mine Dogecoins and Litecoins. Dr Web's virus analysts said the Raspberry Pi malware mines Monero, a lesser-known, but increasingly popular cryptocurrency for dark-web drug markets.

Researchers in May discovered that a network of several hundred thousand PCs infected with the Adylkuzz mining malware, which used the same Windows exploit behind the WannaCry ransomware epidemic, had been toiling away on Monero blocks. At the time, Adylkuzz had generated about $43,000 over several months of mining activity.

Read the original post:
Linux malware enslaves Raspberry Pi to mine cryptocurrency - ZDNet

Read More..