Agregátor RSS
Update on NIST\'s Post-Quantum Cryptography Program
Rozluštil jsem nejtajemn?jší text sv?ta, tvrdí v?dec. Vojni??v rukopis je prý ženskou p?íru?kou pro královnu
Policie zatkla cizince, do bankomatu montovali ?te?ku karet
Jak tvo?it a pamatovat si hesla (2019)
P?ehled kvalitních bezplatných bezpe?nostních program?
P?ehled bezplatných silných antivirových a dalších bezpe?nostních program?, které vám mohou pomoci udržet vaše citlivé informace v bezpe?í.
How to encrypt email (Gmail, Outlook iOS, OSX, Android, Webmail)
So you want to start encrypting your email? Well, let’s start by saying that setting up email encryption yourself is not the most convenient process. You don’t need a degree in cryptography or anything, but it will take a dash of tech savvy. We’ll walk you through the process later on in this article.
Alternatively, you can use an off-the-shelf encrypted email client. Tutanota is one such secure email service, with apps for mobile and a web mail client. It even encrypts your attachments and contact lists. Tutanota is open-source, so it can be audited by third parties to ensure it’s safe. All encryption takes place in the background. While we can vouch for Tutanota, it’s worth mentioning that there are a lot of email apps out there that claim to offer end-to-end encryption, but many contain security vulnerabilities and other shortcomings. Do your research before choosing an off-the-shelf secure email app.
If you’d prefer to configure your own email encryption, keep reading.
Google: Security Keys Neutralized Employee Phishing
Security Keys are inexpensive USB-based devices that offer an alternative approach to two-factor authentication (2FA), which requires the user to log in to a Web site using something they know (the password) and something they have (e.g., a mobile device).
Crypto gripes, election security, and mandatory cybersec school: Uncle Sam´s cyber task force emits todo list for govt
The report [PDF], compiled by 34 people from six different government agencies, examines the challenges facing Uncle Sam´s agencies in enforcing the law and protecting the public from hackers. It also lays out what the government needs to do to thwart looming threats to its computer networks.
Let´s (not) Encrypt
If you´ve been following the news for the last few years it will come as no surprise that the Justice Department is not a fan of the common man having access to encryption.
The report bemoans the current state of encryption and its ability to keep the government from gathering and analyzing traffic for criminal investigations. The word ´encryption´ comes up 17 times in the report, not once in a favorable light.
In the past several years, the Department has seen the proliferation of default encryption where the only person who can access the unencrypted information is the end user, the report reads.
The advent of such widespread and increasingly sophisticated encryption technologies that prevent lawful access poses a significant impediment to the investigation of most types of criminal activity.
Quantum computing revenue to hit $15 billion in 2028 due to AI, R&D, cybersecurity
Cracking the Crypto War
Zimmerman and friends: ´Are you listening? PGP is not broken´
However, PGP´s creator Phil Zimmerman, Protonmail´s Any Yenn, Enigmail´s Patrick Brunschwig, and Mailvelope´s Thomas Oberndörfer are still concerned that misinformation about the bug remains in the wild.
Yenn tried to refute the EFAIL “don´t use PGP” on May 25, and the four have followed up with this joint post.
Personal encryption usage is increasing
Wah, encryption makes policing hard, cries UK´s National Crime Agency
Since 2010, communication service providers have migrated to encrypted services ´by default´, a process that accelerated following the Snowden disclosures, said the National Strategic Assessment of Serious and Organised Crime 2018
New law would stop Feds from demanding encryption backdoor
Technology Over the Long Run: Zoom Out to See How Dramatically the World Can Change Within a Lifetime
Technology can change the world in ways that are unimaginable, until they happen. Switching on an electric light would have been unimaginable for our medieval ancestors. In their childhood, our grandparents would have struggled to imagine a world connected by smartphones and the internet.
Similarly, it is hard for us to imagine the arrival of all those technologies that will fundamentally change the world we are used to.
We can remind ourselves that our own future might look very different from the world today by looking back at how rapidly technology has changed our world in the past. That’s what this article is about.
One insight I take away from this long-term perspective is how unusual our time is. Technological change was extremely slow in the past—the technologies that our ancestors got used to in their childhood were still central to their lives in their old age. In stark contrast to those days, we live in a time of extraordinarily fast technological change. For recent generations, it was common for technologies that were unimaginable in their youth to become common later in life.
The Long-Run Perspective on Technological ChangeThe big visualization offers a long-term perspective on the history of technology.1
The timeline begins at the center of the spiral. The first use of stone tools, 3.4 million years ago, marks the beginning of this history of technology.2 Each turn of the spiral then represents 200,000 years of history. It took 2.4 million years—12 turns of the spiral—for our ancestors to control fire and use it for cooking.3
To be able to visualize the inventions in the more recent past—the last 12,000 years—I had to unroll the spiral. I needed more space to be able to show when agriculture, writing, and the wheel were invented. During this period, technological change was faster, but it was still relatively slow: several thousand years passed between each of these three inventions.
From 1800 onwards, I stretched out the timeline even further to show the many major inventions that rapidly followed one after the other.
The long-term perspective that this chart provides makes it clear just how unusually fast technological change is in our time.
You can use this visualization to see how technology developed in particular domains. Follow, for example, the history of communication: from writing, to paper, to the printing press, to the telegraph, the telephone, the radio, all the way to the internet and smartphones.
Or follow the rapid development of human flight. In 1903, the Wright brothers took the first flight in human history (they were in the air for less than a minute), and just 66 years later, we landed on the moon. Many people saw both within their lifetimes: the first plane and the moon landing.
This large visualization also highlights the wide range of technology’s impact on our lives. It includes extraordinarily beneficial innovations, such as the vaccine that allowed humanity to eradicate smallpox, and it includes terrible innovations, like the nuclear bombs that endanger the lives of all of us.
What will the next decades bring?
The red timeline reaches up to the present and then continues in green into the future. Many children born today, even without any further increases in life expectancy, will live well into the 22nd century.
New vaccines, progress in clean, low-carbon energy, better cancer treatments—a range of future innovations could very much improve our living conditions and the environment around us. But, as I argue in a series of articles, there is one technology that could even more profoundly change our world: artificial intelligence.
One reason why artificial intelligence is such an important innovation is that intelligence is the main driver of innovation itself. This fast-paced technological change could speed up even more if it’s not only driven by humanity’s intelligence, but artificial intelligence too. If this happens, the change that is currently stretched out over the course of decades might happen within very brief time spans of just a year. Possibly even faster.4
I think AI technology could have a fundamentally transformative impact on our world. In many ways it is already changing our world, as I documented in this companion article. As this technology is becoming more capable in the years and decades to come, it can give immense power to those who control it (and it poses the risk that it could escape our control entirely).
Such systems might seem hard to imagine today, but AI technology is advancing very fast. Many AI experts believe that there is a very real chance that human-level artificial intelligence will be developed within the next decades, as I documented in this article.
Technology Will Continue to Change the World—We Should All Make Sure That It Changes It for the BetterWhat is familiar to us today—photography, the radio, antibiotics, the internet, or the International Space Station circling our planet—was unimaginable to our ancestors just a few generations ago. If your great-great-great grandparents could spend a week with you they would be blown away by your everyday life.
What I take away from this history is that I will likely see technologies in my lifetime that appear unimaginable to me today.
In addition to this trend towards increasingly rapid innovation, there is a second long-run trend. Technology has become increasingly powerful. While our ancestors wielded stone tools, we are building globe-spanning AI systems and technologies that can edit our genes.
Because of the immense power that technology gives those who control it, there is little that is as important as the question of which technologies get developed during our lifetimes. Therefore I think it is a mistake to leave the question about the future of technology to the technologists. Which technologies are controlled by whom is one of the most important political questions of our time, because of the enormous power that these technologies convey to those who control them.
We all should strive to gain the knowledge we need to contribute to an intelligent debate about the world we want to live in. To a large part this means gaining the knowledge, and wisdom, on the question of which technologies we want.
Acknowledgements: I would like to thank my colleagues Hannah Ritchie, Bastian Herre, Natasha Ahuja, Edouard Mathieu, Daniel Bachler, Charlie Giattino, and Pablo Rosado for their helpful comments to drafts of this essay and the visualization. Thanks also to Lizka Vaintrob and Ben Clifford for a conversation that initiated this visualization.
This article was originally published on Our World in Data and has been republished here under a Creative Commons license. Read the original article.
Android 14 nedovolí instalaci starých aplikací. Bude to jeden ze způsobů, jak se lépe bránit proti malwaru
Android 14 nedovolí instalaci starých aplikací. Bude to jeden ze způsobů, jak se lépe bránit proti malwaru
Jak levně a rychle zvrátit klimatickou změnu. „Stačí do oceánů nasypat železný prach,“ říká podnikatel. Vědci před postupem varují
@insideBIGDATApodcast: ChatGPT – The Human AI Partnership – insideBIGDATA
We bring you compelling topics including: big data, data science, machine learning, AI, and deep learning. Enjoy!
Link to Full Article: Read Here
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- …
- následující ›
- poslední »
