Page 457«..1020..456457458459..470480..»

How Xi’s Social Engineering Is Creating A New Chinese Nation OpEd – Eurasia Review

ByPatrik Meyer

What is the political philosophy of Chinese President Xi Jinpings administration, i.e., Xi Jinping Thought?

The overarchingpurposeof Xi Jinping Thought, or Xiism, is upholding and developing socialism with Chinese characteristics to realize socialist modernization and national rejuvenation. Xiism promotes 14 fundamental principles, which include a people-centered approach, law-based governance, upholding core socialist values, ensuring harmony between humans and nature, upholding absolute Party leadership over the peoples forces, and promoting the building of a community with a shared future for humanity amongst others.

While most of these principles seem worth pursuing, their implementation results in stringent restrictions on individual freedoms.

Western governments and media have extensively criticized President Xi and the Communist Party of China (CPC) for their forceful assimilation of ethnic Uyghurs, Tibetans and Mongolians into Chinas majority Han culture. In recent years, Beijing has indeed intensified the pressure on Chinese ethnic minorities not just to integrate, but to fully assimilate into the Han culture. Those who resist are forcefully assimilated using any means deemed necessary by the CPC.

The Wests central contention is that ethnic minorities should be granted the right to preserve their distinct cultural, religious and social identities. They should be also allowed to manage their own regions as real autonomies, with only limited intervention from the central government in Beijing. While these ethnic and political rights are enshrined in the Constitution of China, the fact is that Beijing has ignored them for the sake of engineering a newChinese nation.

What is less well-known in the in the West is that one central objective of Xiism is to assimilate the approximately 1.2 billion culturally eclectic ethnic Hans into a new Chinese national identity. The values, objectives and structure of this new nation are meticulously defined by Xiism and implemented in a country-wide social engineering program supervised of the CPC. By implementing this social engineering program, Beijing intends to strengthen the social cohesion of the 1.3 billion Chinese to ensure that the country will continue prospering as a nation-state. In turn, this prosperity should safeguard the legitimacy of the CPCs absolute leadership in the eyes of the Chinese people.

So far, the CPC leadership has been successful in turning a failed country into a prosperous one. As per the World Banksassessment, Since China began to open up and reform its economy in 1978, GDP growth has averaged almost 10 percent a year, and more than 800 million people have been lifted out of poverty. This growth continued under Xis tenure, which began in 2013. From 2013 until the beginning of the COVID-19 pandemic, Chinese economic growth averaged around7%.

Without question, Xis program hasrestrictednumerous individual and social rights, such as freedom of expression and assembly. Nevertheless, the CPCs success in providing a prosperous life for most of the 1.3 billion Chinese cannot be denied.

It is Xis belief that one of the cornerstones on which to build this success is Chinas social cohesion To achieve this, Beijing is implementing a social engineering program. Every society, in reality, is a construct. Still, the idea of socially engineering a society is not welcomed in Western societies. This is because of deep-rooted Western beliefs and values such as the assumption that each individual should be allowed to freely define his identity and choose his way of life. Still, much like any structure, every society has to be engineered.

Western societies are engineered, too. Otherwise, they would not be societies at all. An obvious fact showing that this is the case is the public education systems that for 15 years brainwash benignly or not our younger generations with homogeneous values, objectives and ways of thinking. Additionally, the fact that Western national or regional societies gravitate around common ideologies, values and objectives indicates that they have been engineered. So, the question is not whether it is necessary to social engineer a society, but how to do it to maximize its prosperity.

There are numerous problems with the current Western social engineering paradigm. Among them is the fact that Western political elites do not explicitly acknowledge the use of social engineering, making it difficult to engage in public and academic debates to analyze and improve it. Another problem results from some of the deeply rooted values and beliefs common in the West that grant almost unrestricted individual freedoms and the right to everyone to have a say in almost everything. Yet another problem is the common fallacy of attributing most of Western prosperity to freedom and democracy, rather than to scientific and technological development, discipline and commitment. These beliefs and values are not only weakening Western societies social cohesion and robustness, but are also masking the need for a fundamental change in the current social paradigm.

Guided by Xiism, the CPC is socially engineering a new Chinese national identity by forcefully assimilating ethnic minorities and homogenizing the eclectic Hans. This does not mean, of course, that the West should follow Chinas lead and attempt to stamp out ethnic diversity. What it does mean is that the West needs to be open about the need to be proactive in socially engineering its own societies based on values and objectives that are not always popular.

It is time for the West to take a honest look at its current social engineering paradigm and fundamentally redesign it to build a society that will be in a strong position to overcome the challenges of this century and ensure the future prosperity of its peoples.

Read more from the original source:

How Xi's Social Engineering Is Creating A New Chinese Nation OpEd - Eurasia Review

Read More..

Engineering students at JALC can transfer seamlessly to U of I with the Engineering Pathways Program – The Southern

State Alabama Alaska Arizona Arkansas California Colorado Connecticut Delaware Florida Georgia Hawaii Idaho Illinois Indiana Iowa Kansas Kentucky Louisiana Maine Maryland Massachusetts Michigan Minnesota Mississippi Missouri Montana Nebraska Nevada New Hampshire New Jersey New Mexico New York North Carolina North Dakota Ohio Oklahoma Oregon Pennsylvania Rhode Island South Carolina South Dakota Tennessee Texas Utah Vermont Virginia Washington Washington D.C. West Virginia Wisconsin Wyoming Puerto Rico US Virgin Islands Armed Forces Americas Armed Forces Pacific Armed Forces Europe Northern Mariana Islands Marshall Islands American Samoa Federated States of Micronesia Guam Palau Alberta, Canada British Columbia, Canada Manitoba, Canada New Brunswick, Canada Newfoundland, Canada Nova Scotia, Canada Northwest Territories, Canada Nunavut, Canada Ontario, Canada Prince Edward Island, Canada Quebec, Canada Saskatchewan, Canada Yukon Territory, Canada

Zip Code

Country United States of America US Virgin Islands United States Minor Outlying Islands Canada Mexico, United Mexican States Bahamas, Commonwealth of the Cuba, Republic of Dominican Republic Haiti, Republic of Jamaica Afghanistan Albania, People's Socialist Republic of Algeria, People's Democratic Republic of American Samoa Andorra, Principality of Angola, Republic of Anguilla Antarctica (the territory South of 60 deg S) Antigua and Barbuda Argentina, Argentine Republic Armenia Aruba Australia, Commonwealth of Austria, Republic of Azerbaijan, Republic of Bahrain, Kingdom of Bangladesh, People's Republic of Barbados Belarus Belgium, Kingdom of Belize Benin, People's Republic of Bermuda Bhutan, Kingdom of Bolivia, Republic of Bosnia and Herzegovina Botswana, Republic of Bouvet Island (Bouvetoya) Brazil, Federative Republic of British Indian Ocean Territory (Chagos Archipelago) British Virgin Islands Brunei Darussalam Bulgaria, People's Republic of Burkina Faso Burundi, Republic of Cambodia, Kingdom of Cameroon, United Republic of Cape Verde, Republic of Cayman Islands Central African Republic Chad, Republic of Chile, Republic of China, People's Republic of Christmas Island Cocos (Keeling) Islands Colombia, Republic of Comoros, Union of the Congo, Democratic Republic of Congo, People's Republic of Cook Islands Costa Rica, Republic of Cote D'Ivoire, Ivory Coast, Republic of the Cyprus, Republic of Czech Republic Denmark, Kingdom of Djibouti, Republic of Dominica, Commonwealth of Ecuador, Republic of Egypt, Arab Republic of El Salvador, Republic of Equatorial Guinea, Republic of Eritrea Estonia Ethiopia Faeroe Islands Falkland Islands (Malvinas) Fiji, Republic of the Fiji Islands Finland, Republic of France, French Republic French Guiana French Polynesia French Southern Territories Gabon, Gabonese Republic Gambia, Republic of the Georgia Germany Ghana, Republic of Gibraltar Greece, Hellenic Republic Greenland Grenada Guadaloupe Guam Guatemala, Republic of Guinea, Revolutionary People's Rep'c of Guinea-Bissau, Republic of Guyana, Republic of Heard and McDonald Islands Holy See (Vatican City State) Honduras, Republic of Hong Kong, Special Administrative Region of China Hrvatska (Croatia) Hungary, Hungarian People's Republic Iceland, Republic of India, Republic of Indonesia, Republic of Iran, Islamic Republic of Iraq, Republic of Ireland Israel, State of Italy, Italian Republic Japan Jordan, Hashemite Kingdom of Kazakhstan, Republic of Kenya, Republic of Kiribati, Republic of Korea, Democratic People's Republic of Korea, Republic of Kuwait, State of Kyrgyz Republic Lao People's Democratic Republic Latvia Lebanon, Lebanese Republic Lesotho, Kingdom of Liberia, Republic of Libyan Arab Jamahiriya Liechtenstein, Principality of Lithuania Luxembourg, Grand Duchy of Macao, Special Administrative Region of China Macedonia, the former Yugoslav Republic of Madagascar, Republic of Malawi, Republic of Malaysia Maldives, Republic of Mali, Republic of Malta, Republic of Marshall Islands Martinique Mauritania, Islamic Republic of Mauritius Mayotte Micronesia, Federated States of Moldova, Republic of Monaco, Principality of Mongolia, Mongolian People's Republic Montserrat Morocco, Kingdom of Mozambique, People's Republic of Myanmar Namibia Nauru, Republic of Nepal, Kingdom of Netherlands Antilles Netherlands, Kingdom of the New Caledonia New Zealand Nicaragua, Republic of Niger, Republic of the Nigeria, Federal Republic of Niue, Republic of Norfolk Island Northern Mariana Islands Norway, Kingdom of Oman, Sultanate of Pakistan, Islamic Republic of Palau Palestinian Territory, Occupied Panama, Republic of Papua New Guinea Paraguay, Republic of Peru, Republic of Philippines, Republic of the Pitcairn Island Poland, Polish People's Republic Portugal, Portuguese Republic Puerto Rico Qatar, State of Reunion Romania, Socialist Republic of Russian Federation Rwanda, Rwandese Republic Samoa, Independent State of San Marino, Republic of Sao Tome and Principe, Democratic Republic of Saudi Arabia, Kingdom of Senegal, Republic of Serbia and Montenegro Seychelles, Republic of Sierra Leone, Republic of Singapore, Republic of Slovakia (Slovak Republic) Slovenia Solomon Islands Somalia, Somali Republic South Africa, Republic of South Georgia and the South Sandwich Islands Spain, Spanish State Sri Lanka, Democratic Socialist Republic of St. Helena St. Kitts and Nevis St. Lucia St. Pierre and Miquelon St. Vincent and the Grenadines Sudan, Democratic Republic of the Suriname, Republic of Svalbard & Jan Mayen Islands Swaziland, Kingdom of Sweden, Kingdom of Switzerland, Swiss Confederation Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand, Kingdom of Timor-Leste, Democratic Republic of Togo, Togolese Republic Tokelau (Tokelau Islands) Tonga, Kingdom of Trinidad and Tobago, Republic of Tunisia, Republic of Turkey, Republic of Turkmenistan Turks and Caicos Islands Tuvalu Uganda, Republic of Ukraine United Arab Emirates United Kingdom of Great Britain & N. Ireland Uruguay, Eastern Republic of Uzbekistan Vanuatu Venezuela, Bolivarian Republic of Viet Nam, Socialist Republic of Wallis and Futuna Islands Western Sahara Yemen Zambia, Republic of Zimbabwe

See the original post here:

Engineering students at JALC can transfer seamlessly to U of I with the Engineering Pathways Program - The Southern

Read More..

Got geometry problems? Google DeepMind new AI model can solve them for you – CoinGeek

Google DeepMind hasannouncedthe design of a newartificial intelligence(AI) model, designed to solve geometry problems with the same capabilities as a human Olympiad gold medalist.

The new AI model, AlphaGeometry, solves complex geometry challenges with a test of 30 Olympiad problems. Drawing inspiration from ancient Greece, the International Mathematical Olympiad features talented high school mathematicians solving math problems within a time limit.

Google (NASDAQ: GOOGL) DeepMinds model solved 25 out of 30 problems to surpass the previous AI attempt. Before AlphaGeometry, previous models only managed to solve 10 challenges, underscoring the difficulty of AI systems in demonstrating proficiency at solving geometry problems.

AI systems typically struggle with geometry due to the absence of training data and an inherent deficiency of logical and reasoning skills. To solve the gaping challenge,Google DeepMindturned to a neural language model and a deduction engine to improve the problem-solving skills of its models, supplemented by 100 million synthetic data examples.

The end result is a system capable of training itself to solve complex problems in a split strategy. The neural language model offers fast ideas that may be incorrect, but including a deduction engine provides a rational pathway to arriving at solutions.

AlphaGeometrys language model guides its symbolic deduction engine towards likely solutions to geometry problems, according to the tech giant. These clues help fill in the gaps and allow the symbolic engine to make further deductions about the diagram and close in on the solution.

In the end, experts say the combination of two systems has yielded impressive results, going on to provide human-readable output rather than relying on tedious algebra calculations.

AlphaGeometrys output is impressive because its both verifiable and clean, said former Olympiad gold-medalist Evan Chen. It uses classical geometry rules with angles and similar triangles just as students do.

DeepMind goes down the AI rabbit hole

Google DeepMind has thrown its weight behindAI and innovationwith emerging technologies, unveiling a streak of models with impressive capabilities. In late 2023, the team launched an AI model capable ofgeneratingmillions of new materials by predicting their structures.

In another study, the team proposed a new method toimprovethe capabilities of large language models (LLMs) by linking them with existing models, using its new Composition to Augment Language Model (CALM).

Other projects include the race to roll out invisible watermarks for AI-generated images, a weather prediction model, and studies mimicking the human ability to learn new skill sets.

In order for artificial intelligence (AI) to work right within the law and thrive in the face of growing challenges, it needs to integrate an enterprise blockchain system that ensures data input quality and ownershipallowing it to keep data safe while also guaranteeing the immutability of data. Check out CoinGeeks coverage on this emerging tech to learn more why Enterprise blockchain will be the backbone of AI.

Watch: Turning AI into ROI

New to blockchain? Check out CoinGeeks Blockchain for Beginners section, the ultimate resource guide to learn more about blockchain technology.

Continued here:
Got geometry problems? Google DeepMind new AI model can solve them for you - CoinGeek

Read More..

New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol – NIST

The Transport Layer Security (TLS) protocol allows us to send data over the internet securely, protecting passwords and credit card numbers when we provide them to a site. A new practice guide will help industries perform required monitoring of incoming data for malware while using TLS 1.3, the protocols latest version.

Credit: N. Hanacek/NIST

Companies in major industries such as finance and health care must follow best practices for monitoring incoming data for cyberattacks. The latest internet security protocol, known as TLS 1.3, provides state-of-the-art protection, but complicates the performance of these required data audits. The National Institute of Standards and Technology (NIST) has released a practice guide describing methods that are intended to help these industries implement TLS 1.3 and accomplish the required network monitoring and auditing in a safe, secure and effective fashion.

The new draft practice guide, Addressing Visibility Challenges with TLS 1.3 within the Enterprise (NIST Special Publication (SP) 1800-37), was developed over the past several years at the NIST National Cybersecurity Center of Excellence (NCCoE) with the extensive involvement of technology vendors, industry organizations and other stakeholders who participate in the Internet Engineering Task Force (IETF). The guidance offers technical methods to help businesses comply with the most up-to-date ways of securing data that travels over the public internet to their internal servers, while simultaneously adhering to financial industry and other regulations that require continuous monitoring and auditing of this data for evidence of malware and other cyberattacks.

TLS 1.3 is an important encryption tool that brings increased security and will be able to support post-quantum cryptography, said Cherilyn Pascoe, director of the NCCoE. This collaborative project focuses on ensuring that organizations can use TLS 1.3 to protect their data while meeting requirements for auditing and cybersecurity.

NIST is requesting public comments on the draft practice guide by April 1, 2024.

The TLS protocol, developed by the IETF in 1996, is an essential component of internet security: In a web link, whenever you see the s at the end of https indicating the website is secure, it means TLS is doing its job. TLS allows us to send data over the vast collection of publicly visible networks we call the internet with the confidence that no one can see our private information, such as a password or credit card number, when we provide it to a site.

TLS maintains web security by protecting the cryptographic keys that allow authorized users to encrypt and decrypt this private information for secure exchanges, all while preventing unauthorized individuals from using the keys. TLS has been highly successful at maintaining internet security, and its previous updates up through TLS 1.2 enabled organizations to keep these keys on hand long enough to support auditing incoming web traffic for malware and other attempted cyberattacks.

However, the most recent iteration TLS 1.3, released in 2018 has challenged the subset of businesses that are required by law to perform these audits, because the 1.3 update does not support the tools the organizations use to access the keys for monitoring and audit purposes. Consequently, businesses have raised questions about how to meet enterprise security, operational, and regulatory requirements for critical services while using TLS 1.3. Thats where NISTs new practice guide comes in.

The guide offers six techniques that offer organizations a method to access the keys while protecting the data from unauthorized access. TLS 1.3 eliminates keys used to protect internet exchanges as the data is received, but the practice guides approaches essentially allow an organization to retain the raw received data and the data in decrypted form long enough to perform security monitoring. This information is retained within a secure internal server for audit and forensics purposes and is destroyed when the security processing is completed.

While there are risks associated with storing the keys even in this contained environment, NIST developed the practice guide to demonstrate several secure alternatives to homegrown approaches that might heighten these risks.

NIST is not changing TLS 1.3. But if organizations are going to find a way to keep these keys, we want to provide them with safe methods, said NCCoEs Murugiah Souppaya, one of the guides authors. We are demonstrating to organizations who have this use case how to do it in a secure manner. We explain the risk of storing and reusing the keys, and show people how to use them safely, while still staying up to date with the latest protocol.

The NCCoE is developing what will eventually be a five-volume practice guide. Currently available are the first two volumes the executive summary (SP 1800-37A) and a description of the solutions implementation (SP 1800-37B). Of the three planned volumes, two (SP 1800-37C and D) will be geared toward IT professionals who need a how-to guide and demonstrations of the solution, while the third (SP 1800-37E) will focus on risk and compliance management, mapping components of the TLS 1.3 visibility architecture to security characteristics in well-known cybersecurity guidelines.

An FAQ is available to answer common questions. To submit comments on the draft or other questions, contact the practice guides authors at applied-crypto-visibility [at] nist.gov (applied-crypto-visibility[at]nist[dot]gov). Comments may be submitted until April 1, 2024.

Visit link:
New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol - NIST

Read More..

Our pick for the best antivirus software you can trust – Komando

With all the cybercriminals and digital threats, you shouldnt pinch pennies when protecting your devices. Using free antivirus software can actually put you at risk. You need smarter, more robust tools to combat increasingly sophisticated hackers and scammers.

When it comes to antivirus software, you get what you pay for. Invest in a security suite that protects your computer and smartphone from todays threats. Invest in our sponsor, TotalAV.

New hacks, malicious codes and clever ways to break into your system are coming out nearly daily. Free antivirus software cant keep up with the latest threats.

TotalAV protects you from threats you didnt even know were there. Its system will scan, locate, quarantine and eliminate viruses, trojans, adware, spyware and more. Most free programs dont offer impressive vulnerability scans like this that work.

Theres even a TotalAV Safe Site browser extension that analyzes and blocks any suspicious websites before they can cause you harm. Install it on Google Chrome or Firefox to clear your cookies with just one click, launch a private browsing window and delete your browsing history.

The days of worrying about protecting just one device are over. We all have multiple gadgets, including smartphones, laptops and tablets. As you know, these are vulnerable to attacks if they connect to the Internet.

It doesnt matter which format you use, either. Whether you use a PC, Mac, iPhone, or Android, TotalAV has you covered. It safeguards Windows, Mac, and Android gadgets while keeping your iPhone and iPad running at peak performance.

TotalAV keeps devices secure with its all-in-one, cross-platform security software. And it works at home, in the office or on the go.

TotalAV isnt just about antivirus protection. It has a range of integrated optimization tools at your disposal.

Here is a quick overview of why choosing TotalAV is the best thing you can do for your digital protection:

So, to answer the question, Is paying for antivirus software worth it? Wed have to go with a resounding yes. Dont wait until your device becomes infected. Turn to TotalAV today.

Go to ProtectWithKim.com to save 85% on total protection you cantrust. What are you waiting for?

Read more here:
Our pick for the best antivirus software you can trust - Komando

Read More..

Cloudflare Okta Breach Doesn’t Have A Big Impact, Company Says – Dataconomy

According to the company, the recent Cloudflare Okta breach has not caused any harm to any of the customers or users. However, the incident brought more questions about the Okta breach, which affects many different services and companies.

In todays digital world, online data security is constantly under threat, making news of cyberattacks almost routine. However, when a company like Cloudflarea leader in internet securityreports a breach, it grabs everyones attention, particularly when a nation-state is believed to be behind the attack. The Cloudflare Okta breach serves as a vivid reminder of the cyber dangers that loom in the shadows.

On November 14, Cloudflare found itself under attack. The intruders, suspected to be supported by a nation-state, targeted Cloudflares internal Atlassian server, aiming for critical systems, including the Confluence wiki, Jira bug database, and Bitbucket source code management.

This initial intrusion set the stage for a more aggressive attack on November 22, where the attackers established a strong presence on Cloudflares server, accessed the source code, and even attempted to infiltrate a console server tied to an undeveloped data center in So Paulo, Brazil.

The method of entry for the attackers was particularly concerning. They used credentials that were previously compromised during an Okta breach in October 2023, highlighting a critical oversight by Cloudflare in not rotating these credentials among the thousands affected, says Bleeping Computer.

Cloudflare CEO Matthew Prince, CTO John Graham-Cumming, and CISO Grant Bourzikas, said: They then returned on November 22 and established persistent access to our Atlassian server using ScriptRunner for Jira, gained access to our source code management system (which uses Atlassian Bitbucket), and tried, unsuccessfully, to access a console server that had access to the data center that Cloudflare had not yet put into production in So Paulo, Brazil. You can take a look at the full statement here.

1Password Okta breach unveiled by authorities

The companys response to the Cloudflare Okta breach was swift and comprehensive. Detecting the intrusion by November 23, they had cut off the attackers access by the following morning. A deep-dive investigation began three days later, leading to a robust response plan. Cloudflare rotated over 5,000 production credentials, isolated its test and staging systems, and conducted a forensic examination of nearly 5,000 systems. Every affected system, including all Atlassian servers and those accessed by the attacker, was refreshed.

According to CRN, despite the attackers attempts to breach the So Paulo data center, they were unsuccessful, and Cloudflare ensured the centers security by returning all equipment to manufacturers for a thorough check.

The remediation efforts concluded on January 5, yet Cloudflare continues to prioritize software hardening, credential management, and vulnerability management, showcasing their commitment to security.

Cloudflare has been transparent about the breachs limited operational impact, reassuring customers that their data and systems were not compromised. While serious, this incident did not affect Cloudflares services, network, or configurations. It serves as a testament to the companys quick response and the effectiveness of its security measures.

However, the breach revealed potential targets of interest to the attackers, including Cloudflares network architecture, security, and management systems. This insight into the attackers motives underscores the importance of continued vigilance and security enhancements.

Customer support users lose their data after the Okta hack

Cloudflares experience also sheds light on a previous security incident involving Okta, which affected Cloudflare among other customers. Despite these challenges, Cloudflares proactive and transparent approach to managing and mitigating the impact of these breaches stands as a model for the industry.

The recent security breaches at Cloudflare and Okta are powerful reminders that cyber threats are always evolving and can impact anyone. These events teach us valuable lessons on how to strengthen our defenses against cyberattacks. Heres a simpler breakdown of the main points and what actions we can take:

Cybersecurity needs constant attention. Keeping software and systems up to date helps close gaps that hackers might use to sneak in. The Cloudflare breach shows us why changing passwords and access keys regularly is important, especially after a security incident.

Extra layers of security, such as Multi-Factor Authentication (MFA), make it harder for hackers to get into your accounts. Using something you know (like a password) and something you have (like a code sent to your phone) can strengthen your security.

Everyone can accidentally open the door to hackers, often without realizing it. Regular training on spotting scams, like phishing emails, and following good security practices can make a big difference.

As cyber threats evolve, so must the strategies to combat them. Cloudflares response to this sophisticated breach exemplifies how companies can navigate the complexities of cyber security, ensuring resilience against the tactics of modern cyber adversaries.

Featured image credit: Cloudflare

Read the original here:
Cloudflare Okta Breach Doesn't Have A Big Impact, Company Says - Dataconomy

Read More..

Cryptocurrency: Top 3 Coins To Watch In February 2024 – Watcher Guru

The cryptocurrency market started off to a good start early this year with Bitcoin touching $48,000 in January. Ethereum reached close to $2,700 leading to believe that the cryptocurrency markets could ignite a rally. Additionally, the SEC approved the Bitcoin ETF making the cryptocurrency markets attract fresh investments from trillion dollars worth of financial institutions. Therefore, the cryptocurrency sector entered the year on its best foot making investors hopeful of a price jump.

Also Read: Shiba Inu Unlikely To Hit $1

In this article, we will highlight if these developments could make the cryptocurrency markets enter a bull run in February 2024. Here are the top 3 cryptocurrencies you need to watch out for this month that might generate profits in February 2024.

The king cryptocurrency slipped from $48,000 to $42,000 but is holding on to its resistance level. Bitcoin fared better in the charts when the US stock market was on a slippery slope due to the Red Sea crisis in mid-January. BTC could have another leg-up when the financial institutions take another entry position in the cryptocurrency. It is advised to pull out your investments once Bitcoin climbs around the $45,000 level and book profits.

Also Read: Dogecoin: You Could Have Had $13 Million With Just $8k in DOGE

Ethereum moves in tandem with Bitcoin and could deliver equal returns to that of BTC. Historically, BTC and ETH have performed well in February, and 2024 could repeat the feat. The cryptocurrency market is firmly placed breaking new resistance levels each week. Therefore, ETH could spike in price this month and it is advised to initiate profit bookings when it climbs up the charts.

Also Read: US Stock Market: Tesla Will Crash To $23, Analyst Warns

The leading meme currency is currently trading with five zeroes and has more chances of deleting a zero this month. The Shibarium layer-2 network could burn a series of SHIB tokens that could propel its price in the indices. However, an upward trajectory might not last long as SHIB could head south after the burns. It is advised to sell the token when it reaches four zeroes and jump ship.

Link:
Cryptocurrency: Top 3 Coins To Watch In February 2024 - Watcher Guru

Read More..

Cryptocurrency thrives in China against odds, report says – Cointelegraph

Crypto enthusiasts in China are more willing to invest heavily in cryptocurrency than their counterparts in Vietnam, South Korea, Taiwan and Thailand.

This is according to a December 2023 report by Vietnamese venture capital firm Kyros Ventures, with the assistance of 10 media agencies from China, Thailand, Korea, Taiwan and Vietnam. In the 5,268-participant survey, more than 70% of participants said cryptocurrencies accounted for more than half of their asset portfolio.

However, 33.3% of Chinese investors hold a large amount of stablecoins, placing them in second place to Vietnam, with 58.6% of its investors holding stablecoins. Except for Vietnam and China, most investors in other countries have reduced their holdings in stablecoins, indicating that they are more risk-averse with investments in crypto assets.

China is officially one of the worlds most challenging jurisdictions for cryptocurrencies. Beijingbanned crypto trading in 2021, and authorities have detained, fined and jailed people working in the sector.

Despite the government agencies ban, the majority of investors in China choose to trade on centralized crypto exchanges (CEXs), according to the report. Thailand, in particular, has the lowest rate of stablecoin holders, at only 22%. However, China is set to amend its Anti-Money Laundering regulations to include cryptocurrency-related transactions.

According to the report, throughout 2023, self-research, crypto news, an community groups and key opinion leaders (KOLs) were the three main information channels preferred by many investors in the five countries. News media are preferred by more than 70% of Thai and Chinese investors.

Related: Chinas most valuable company pivoting to AI as gaming profits falter

By the end of 2023, the regulatory landscape for the cryptocurrency industry in Asia had seen significant developments with growing momentum. Hong Kong, in particular, has been at the forefront of efforts to establish itself as a hub for crypto and Web3 innovation. Hong Kong issued its first cryptocurrency exchange licenses in 2023.

South Korea passed new legislation last year to protect cryptocurrency users, increase transaction transparency, and promote market discipline. South Koreas National Pension Service has shown a positive outlook on the cryptocurrency industry by acquiring Coinbase shares valued at $19.9 million.

Meanwhile, Taiwans principal financial regulator, the Financial Supervisory Commission, considered allowing crypto exchange-traded fundsin the country but only after analyzing the products development in other markets worldwide.

Magazine: How to protect your crypto in a volatile market: Bitcoin OGs and experts weigh in

Visit link:
Cryptocurrency thrives in China against odds, report says - Cointelegraph

Read More..

Is Cryptocurrency Like Stocks and Bonds? Courts Move Closer to an Answer. – The New York Times

For more than a decade, the pioneers of the cryptocurrency industry envisioned digital coins as an alternate branch of finance, a renegade sector that would operate outside the reach of big banks and government regulators.

But as digital currencies like Bitcoin and Ether became more mainstream, the crypto industry collided with a 1946 Supreme Court decision that created what is known as the Howey Test, a legal analysis that determines when a financial product becomes subject to the same strict rules as stocks and bonds.

In recent years, regulators have seized on that legal precedent to argue that cryptocurrencies are just another security, like shares of Apple or General Motors. The crypto industry has fought back, leaving it in a legal gray zone with an uncertain future in the United States.

Now the long-running dispute is edging closer to a resolution, as federal judges begin weighing in on a series of lawsuits by the nations top securities regulator against some of the largest crypto firms. This month, judges held hearings in two of the most consequential cases, which could dictate whether the multitrillion-dollar crypto industry can continue growing in the United States.

The legal battles are an existential issue for crypto, said Hilary Allen, a professor at American University who specializes in financial regulation.

The court fights intensified over the last 18 months, as the Securities and Exchange Commission brought enforcement lawsuits claiming that crypto companies were operating as unregulated securities businesses. In response, the industry argued that laws governing Wall Street trading shouldnt apply to digital currencies. Both sides scored early court victories that left the matter unsettled.

We are having trouble retrieving the article content.

Please enable JavaScript in your browser settings.

Thank you for your patience while we verify access. If you are in Reader mode please exit andlog intoyour Times account, orsubscribefor all of The Times.

Thank you for your patience while we verify access.

Already a subscriber?Log in.

Want all of The Times?Subscribe.

See the original post here:
Is Cryptocurrency Like Stocks and Bonds? Courts Move Closer to an Answer. - The New York Times

Read More..

U.S. Energy Information Administration Announces It Will Require Cryptocurrency Mining Companies to Report Their … – Earthjustice

Washington, D.C.

Today the U.S. Energy Information Administration (EIA) announced that it is initiating a provisional survey of electricity consumption from cryptocurrency mining companies in the United States.

Cryptocurrency mining expanded rapidly in the U.S. following Chinas ban on cryptocurrency mining in 2021. By 2023, estimates indicate that nearly 38% of cryptocurrency mining in the world occurred in the U.S., making it the top country for cryptocurrency mining in the world. The growth of cryptocurrency mining threatens to keep polluting coal-and gas-fired power plants active, strains the grid, and can raise electricity rates for American families.

Mandy DeRoche, Deputy Managing Attorney of the Clean Energy Program at Earthjustice, issued the following statement:

Until now, proof-of-work cryptocurrency mining has been largely invisible to U.S. regulators with little-to-no reporting requirements.The massive energy consumption of cryptocurrency mining and its rapid growth in the United States threaten to undermine progress towards achieving climate goals, and threaten grids, communities, and ratepayers.

We are encouraged by the EIAs actions to collect information on this hugely energy-intensive industry, which has grown so substantially in the United States in just the past couple of years and for which there is so little publicly-available information. Many organizations and individuals have attempted to gather this information but have been unable to do so. Requiring cryptocurrency mining operations to report their energy use is a turning point for this industry that has thrived in the shadows. The data on cryptocurrencys energy use is crucial for grid operators, state and federal regulators and communities who host these problematic facilities. We look forward to next steps from the EIA after this provisional step.

In November and December 2022, Earthjustice, in partnership with many other organizations, submitted comments to the U.S. Energy Information Administration about the negative climate and environmental impacts of cryptocurrency mining requesting that the agencies collect data about cryptocurrencys energy consumption.

In September 2022, the White House Office of Science and Technology Policy released a report about the industrys climate threats and the need for regulation. Earthjustice and the Sierra Club released a guidebook, The Energy Bomb finding that in one year from mid-2021 to mid-2022, Bitcoin mining in the U.S. alone consumed as much electricity as four states combined, emitting 27.4 million tons of CO2 equivalent to the emissions of as much as 6 million cars annually.

The massive energy consumption of cryptocurrency mining threatens to undermine decades of progress toward achieving climate goals and reducing local pollution. In addition, cryptocurrency mining practices raise costs and risks for utilities and their ratepayers, can stress electric grids, and flood communities with noise.

Rather than investing in long-term energy infrastructure that benefits the grid, the cryptocurrency mining industry seeks the cheapest available energy that can serve its needs. In practice, that translates to mining cryptocurrency at and near coal and gas plants and tapping into power grids that are often fossil-fuel heavy.

Read the rest here:
U.S. Energy Information Administration Announces It Will Require Cryptocurrency Mining Companies to Report Their ... - Earthjustice

Read More..