now browsing by tag


StoryCorps: In running, work and parenting, Fauci paces himself for the ‘marathon’ | #parenting | #parenting | #parenting | #kids

Source: National Cyber Security – Produced By Gregory Evans

Anthony Fauci and his wife, Christine Grady, spoke for a StoryCorps interview in Maryland on Nov. 17. He says he’ll miss seeing their daughters this Thanksgiving, but he’s proud of […]

The post StoryCorps: In running, work and parenting, Fauci paces himself for the 'marathon' | #parenting | #parenting | #parenting | #kids appeared first on National Cyber Security.

View full post on National Cyber Security

Lexington woman claims man stalked her, showed up to her work months after talking on dating app | #tinder | #pof | romancescams | #scams

LEXINGTON, Ky. (LEX 18) — Watch the full story on LEX 18 News at 6:00. Back in March, while staying “Safe at Home,” boredom began to set in for many […] View full post on National Cyber Security

Mindy Kaling Admits It Was ‘Challenging’ to Work With BJ Novak on the Show After They Broke Up | #facebookdating | #tinder | #pof | romancescams | #scams

Mindy Kaling and BJ Novak played love interests on The Office. Like Kelly and Ryan, Kaling and Novak had a very up-and-down real-life connection. Today, the actors/writers are close friends. […] View full post on National Cyber Security

#computersecurity | #comptia | Ageing devices biggest threat to cybersecurity as work from home becomes norm – | #cybersecurity | #informationsecurity

Source: National Cyber Security – Produced By Gregory Evans

The IT companies are contemplating over extending this arrangement even after COVID-19 infections reduce. But, most companies agree to cybersecurity threat being a sword hanging over their heads

Rukmini Rao        Last Updated: June 10, 2020  | 18:54 IST


  • In 2019, network infra assets of 47.9% businesses aged or turned obsolete
  • Ageing and obsolete devices in technology sector at 59.6%
  • Redirection of spend towards cloud services is resulting in decreased investment

Various sectors across the globe are slowing and in a staggered fashion opening up after nearly five months of lockdown, perhaps with the only exception of information technology sector, which adapted to a different working model to tide over the crisis. The IT companies are contemplating over extending this arrangement even after COVID-19 infections reduce. But, most companies agree to cybersecurity threat being a sword hanging over their heads. However, a recent report by NTT Ltd shows the root cause of cybersecurity threat having substantially increased is perhaps the obsolete or ageing devices.

“The assets of 47.9 per cent  organisations were ageing or turning obsolete as a weighted average, representing a significant surge from 2017, when this figure was just 13.1 per cent. Both connectivity and security are being compromised by enterprises leaving obsolete devices on the network,” the report  said. While the industry average in the use of obsolete and ageing devices is 47.9 per cent, public sector leads the way with 61.7 per cent, and surprisingly close second is the technology sector with 59.6 per cent of devices either ageing or turning obsolete. On an average, an obsolete device has twice as many vulnerabilities per device (42.2 per cent) compared to ageing (26.8 per cent) and current devices (19.4 per cent). Interestingly, the report says that around 2015-16,  businesses started investing and deploying new technology and spending on new devices peaked in 2017 when there were 86.9 per cent of organisations with current (latest) devices. Even as adoption of new wireless infrastructure is on the rise, with an average increase of over 13 per cent year-on-year, ageing and obsolete devices create security vulnerabilities and put businesses at risk of cyber attacks with people logging in from co-working spaces and remote work locations.

One of the biggest reasons behind the lower investment in  on-premises infrastructure, according to report, is the growth in cloud spend outpacing that in overall IT spend. This is what is leading to lower investments. Cloud adoption and spend were predicted to grow at a faster rate and in the region of 21-25 per cent CAGR until 2023. “The increase in on-premises, ageing and obsolete devices is partially due to a redirection of spend towards Software-as-a-Service (SaaS) and other cloud services, which results in a decrease in investment in on-premises infrastructure. However, we anticipate that there will be a significant increase in people working from home, even after pandemic reduction measures are lifted,” the report said.

Also Read: Coronavirus treatment cost: Tamil Nadu hospitals can’t charge above Rs 15,000 a day

Also Read: Vizag gas leak: Andhra govt forms committee to probe incident; seeks report by June 22

Source link


Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.

Posted in Computer Security, Hacking, Network Security, News Wire

Source link
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post #computersecurity | #comptia | Ageing devices biggest threat to cybersecurity as work from home becomes norm – | #cybersecurity | #informationsecurity appeared first on National Cyber Security.

View full post on National Cyber Security

High-Stakes Security Setups Are Making Remote Work Impossible

Source: National Cyber Security – Produced By Gregory Evans

It’s a rule of thumb in cybersecurity that the more sensitive your system, the less you want it to touch the internet. But as the US hunkers down to limit the spread of Covid-19, cybersecurity measures presents a difficult technical challenge to working remotely for employees at critical infrastructure, intelligence agencies, and anywhere else with high-security networks. In some cases, working from home isn’t an option at all.

Companies with especially sensitive data or operations often limit remote connections, segment networks to limit a hacker’s access if they do get in, and sometimes even disconnect their most important machines from the internet altogether. Late last week, the US government’s Cybersecurity and Infrastructure Security Agency issued an advisory to critical infrastructure companies to prepare for remote work scenarios as Covid-19 spreads. That means checking that their virtual private networks are patched, implementing multi-factor authentication, and testing out remote access scenarios.

But cybersecurity consultants who actually work with those high-stakes clients—including electric utilities, oil and gas firms, and manufacturing companies—say that it’s not always so simple. For many of their most critical customers, and even more so for intelligence agencies, remote work and security don’t mix.

“Organizations are realizing that work-from-home would be very difficult to execute,” says Joe Slowik, who previously led the computer emergency response team at the Department of Energy before joining the critical-infrastructure-focused security firm Dragos. “This should be a fairly good wake-up call. You need to figure out a way that if individuals cannot physically access the control system environment for a service that cannot stop, like electricity, water, and wastewater or similar services, you ensure continuous operation—even in the face of an environment where you might be risking your employees’ lives if they continue to commute into the office.”

For many industrial networks, the highest standard of security is an “air gap,” a physical disconnect between the inner sanctum of software connected to physical equipment and the less sensitive, internet-connected IT systems. But very few private-sector firms, with the exception of highly regulated nuclear power utilities, have implemented actual air gaps. Many companies have instead attempted to restrict the connections between their IT networks and their so-called OT or operational technology networks—the industrial control systems where the compromise of digital computers could have dangerous effects, such as giving hackers access to an electric utility’s circuit breakers or a manufacturing floor’s robots.

Those restricted connections create chokepoints for hackers, but also for remote workers. Rendition InfoSec founder and security consultant Jake Williams describes one manufacturing client that carefully separated its IT and OT systems. Only “jump boxes,” servers that bridge the divide between sensitive manufacturing control systems and non-sensitive IT systems, connected them. Those jump boxes run very limited software to prevent them from serving as in-roads for hackers. But they also only support one connection at a time, which means the company’s IT administrators have found themselves vying for access.

“Administrators are bumping each other off as they try to work and log in,” says Williams. “These jump boxes that were built to facilitate secure remote access in emergency situations weren’t built to support this situation where everyone is performing routine maintenance and operations remotely.”

For the most critical of critical infrastructure, however, like power plants and oil refineries, remote work isn’t just leading to technical snafus. It’s often impossible for many staffers, says Chris Sistrunk, a security consultant for FireEye who formerly worked as an electrical engineer for power utility Entergy. “There’s no way to fully remotely run some of those plants,” Sistrunk says. “You don’t work from home. Essential engineers and operators will always be there 24/7.”

In those scenarios, Dragos’ Slowik says, companies have to instead try to limit the biological exposure of their most critical operations teams to prevent them from being quarantined—which is often easier said than done, given that they’re free to mingle with potentially infected people during their off-hours. “It’s a real touchy subject,” says Slowik. “You need them available at the office, and you can only restrict them to a certain extent—because we’re not China–so how does that balance out?”

The Original Source For This Story: Source link

The post High-Stakes Security Setups Are Making Remote Work Impossible appeared first on National Cyber Security.

View full post on National Cyber Security

#nationalcybersecuritymonth | NSA General Counsel Glenn Gerstell Moves Cyber Work to Think Tank

Source: National Cyber Security – Produced By Gregory Evans

Glenn Gerstell, former general counsel of the NSA

Glenn Gerstell, who spent much of the last five years pounding a steady drumbeat warning of a global cyber pandemic, has left his job as general counsel at the U.S. National Security Agency. His last day was Jan. 31.

Gerstell will be a senior adviser at the Center for Strategic & International Studies in Washington, D.C., beginning this month. The center, a nonpartisan think tank on global challenges, was not immediately able to provide a start date.

Gerstell took the National Security Agency’s general counsel job in 2015 after working 40 years at Milbank, Tweed, Hadley & McCloy, where he served as managing partner of the firm’s Washington, D.C., Singapore and Hong Kong offices.

At the spy agency, he oversaw about 100 attorneys who “functioned in a manner comparable to corporate in-house counsel,” according to an online description of his office structure. He reported to the U.S. Department of Defense general counsel.

Asked for comment, the agency Monday referred Corporate Counsel to a speech Gerstell made Jan. 15 to an American Bar Association committee. In the speech, he said, “It is almost impossible to overstate the gap between the rate at which the cybersecurity threat is getting worse relative to our ability to effectively address it. The simple fact of the matter is that no nation has yet found an effective solution to stop foreign malevolent cyberactivity.”

The speech discussed three key points that challenge national security:

  • Technology is less susceptible to or contained by national boundaries, with other countries, especially China, having the potential to surpass U.S. advances.
  • Cross-border cyberactivity makes “it harder to hold a foreign nation-state accountable for domestic damage. All of this introduces extraordinary complexity into international relations and national security arrangements.”
  • The balance between the federal government and the private sector in the area of technology is undergoing rapid, significant change, with the private sector in the lead. “The extent to which this puts effective power in the hands of the private sector and the extent to which the private sector is permitted or required to share that information with the government will be a defining public policy question of the next decade.”

Citing his upcoming departure, Gerstell concluded his speech by praising the men and women at the spy agency.

“Having had the privilege of assisting on the front lines in national security efforts,” he said, “I am confident that we have intellectual ability, moral integrity, skills and dedicated professionals across the intelligence community and defense establishments. In short, I have no doubt that we are capable of addressing these challenges. But it will require a broad and integrated effort to do so, and I know that the lawyers in the national security sector… can and should be in the vanguard in addressing these challenges.”

The speech was a calmer version of a lengthy opinion article Gerstell wrote for the New York Times last September in which he warned that “the unprecedented scale and pace of technological change will outstrip our ability to effectively adapt to it.”

He went on to write, “The digital revolution has urgent and profound implications for our federal national security agencies. It is almost impossible to overstate the challenges … The short period of time our nation has to prepare for the effects of this revolution is already upon us, and it could not come at a more perilous and complicated time.”

The article cited the “extraordinary economic and political power” that technology puts in the hands of the private sector, and its “potential for a pernicious effect on the very legitimacy and thus stability of our governmental and societal structures.”

Gerstell served on the President’s National Infrastructure Advisory Council, which reports to the president and the secretary of Homeland Security on security threats to the nation’s infrastructure, as well as on the District of Columbia Homeland Security Commission.

A graduate of New York University and Columbia University School of Law, he previously served as an adjunct law professor at the Georgetown University School of Law and New York Law School.

When he retired from Milbank in 2015, Gerstell said of his new national security job, “There is a tremendous level of technical expertise here. At this agency, everyone is mission-driven; they truly want to be here. They probably could be making lots more money working at Facebook or Microsoft, but they’re here because they believe they are doing something important—and they are.”

Source link

The post #nationalcybersecuritymonth | NSA General Counsel Glenn Gerstell Moves Cyber Work to Think Tank appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Milestone Boulevard Is Closed At Nine Mile. Here’s A Look At The Work. :

Source: National Cyber Security – Produced By Gregory Evans Milestone Boulevard is closed at Nine Mile Road for drainage work that is part of the Nine Mile widening project. Crews have demolished a section of the roadway. After digging a trench that is about 4-feet deep, 30-inch pipes will be put in place. The roadway […] View full post on

#deepweb | Microsoft Access can change the way you work with data. Master it for $30

Source: National Cyber Security – Produced By Gregory Evans

TLDR: The Ultimate Microsoft Access Mastery Bundle collects the best training in the world’s top database management tool for only $29.99.

What’s the most popular Microsoft Office app? While it’s tough to make that call with certainty, it’s hard to imagine Microsoft Word doesn’t lead that pack. Ask for other Office features that get lots of use and you’ll likely hear plenty of votes cast for Excel, Outlook, or PowerPoint. 

One app you don’t hear cited nearly as often is Microsoft Access. But in an age where data is king, you may be shocked at the everyday utility of the industry-leading information management tool.

The Ultimate Microsoft Access Mastery Bundle ($29.99, over 90 percent off from TNW Deals) can help open your eyes to the power of databases and what they can mean to your daily workflow as well as your professional future.

With 224 lectures covering over 50 hours of training, this bundle pulls together all the best recent Access 2019, 2016 and 2013 training, offering up a fully-rounded view of how to get the most out of this sneaky,  powerful software.

Filled with exercises and testing, this training delves into everything you need to know, from creating and maintaining Access databases; to using Access tables, relationships and keys; to task automation and customization; to producing advanced reports that dig deep into your data.

Regularly $594, this coursework can turn you an advanced Access user for just $29.99.

Software not included. Prices are subject to change.

You can’t beat free! Get $70+ worth of premium Mac apps for free today!

Source link

The post #deepweb | <p> Microsoft Access can change the way you work with data. Master it for $30 <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | 2020 election cybersecurity strategies | Cyber Work Podcast

Source: National Cyber Security – Produced By Gregory Evans

Bob Stevens, VP of Americas at Lookout, and Cyber Work podcast host Chris Sienko, discuss election cybersecurity strategies, tips and ramifications for 2020.

– View the transcript, additional episodes and promotional offers:

– Join us in the fight against cybercrime:

About the Cyber Work Podcast

Knowledge is your best defense against cybercrime. Each week on Cyber Work, host Chris Sienko sits down with a new industry thought leader to discuss the latest cybersecurity trends — and how those trends are affecting the work of infosec professionals. Together we’ll empower everyone with the knowledge to stay one step ahead of the bad guys.

Source link

The post #cybersecurity | #hackerspace |<p> 2020 election cybersecurity strategies | Cyber Work Podcast <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Joe Lubin Talks Trump, Blockchain’s ‘Frankenstein,’ And Willingness To Work With China

Source: National Cyber Security – Produced By Gregory Evans

Perhaps no one is more involved in turning Ethereum into a new way of doing business than Joe Lubin, an Ethereum cofounder along with Vitalik Buterin and others, and the founder of ConsenSys, a company that largely consists of interconnected startups building every aspect of what they call the Global Computer. After skyrocketing to a leadership position in 2015 in the blockchain world, thanks to the founding of ConsenSys and his willingness to see potential in far-fetched ideas, Lubin and his amorphously-governed company suffered a setback at the end of 2018 when he had to lay off more than 10% of his staff thanks in part to longer than expected time to build the technology, and slower than expected adoption.

Now Lubin says ConsenSys has returned to a state of equilibrium and is slowly starting to hire again. In a rare in-depth interview with Forbes Crypto & Blockchain Advisor, Lubin waxed poetic about his willingness to work with the Chinese government to teach them the benefits of a public blockchain, shared his thoughts on Facebook’s Libra, chatted about blockchain consortium Hyperledger’s largest project to date, and meticulously laid out his master plan for the next phase of Ethereum, which he and others working on the open-source project have dubbed Ethereum 2.0. Lubin’s work could end up laying the foundation for a new world order or prove to be a pipe dream.

Excerpted from Forbes CryptoAsset & Blockchain Advisor.

Forbes: How much of your work is focused on enterprises?

Joe Lubin: ConsenSys or my personal work? Well, my personal work is ConsenSys, so ConsenSys itself is probably 65% focused on public mainnet. But almost everything we do is applicable in private permission context. We really see the distinction falling away increasingly over time. We’ve been saying that for a long time, so that’s been the vision.

I spend a lot of time on the enterprise side in different nations, speaking to different businesses about business blockchain networks that we are standing up in ways that we can build on the public mainnet, or ways that we can link a business blockchain network into another business blockchain network. Such as Komgo—a group of companies using blockchain to streamline trade commodity finance and other applications—and some other network down into the base trust layer for collusion resistance or increased trust levels. I pay lots of attention to Ethereum 2.0. So, we’ve got a lot of people at ConsenSys, and are very close with many of the other groups around the world that are driving that effort.

Forbes: What is Ethereum 2.0?

Lubin: It is the natural extension of the Ethereum 1.0 platform. It will be realized as a separate network, but there will be a smooth evolution from Ethereum 1.0, both in terms of developer experience and in terms of how activity will flow from Ethereum 1.0 directly onto Ethereum 2.0 in the form of moving tokens and having smart contracts across the two systems that speak to one another. Pretty soon after phase zero of Ethereum 2.0 is stood up, the proof-of-stake mechanism for Ethereum 2.0—what we call the beacon chain—will be able to finalize blocks on Ethereum 1.0. So, there will be this cross linkage and a bunch of interdependency early on.

Forbes: Can you give us specifications for Ethereum 2.0?

Lubin: Ethereum 2.0 will be composed of three major phases: phase zero (the beacon chain), phase one where you hang 1,024 different shards off the beacon chain [this will allow transactions to settle in groups instead of on the entire Ethereum blockchain], and phase two where you turn those shards into not just storage but execution environments, just like the smart contract machine systems on Ethereum 1.0.

Phase zero and phase one are not driven by user or developer experience. It’s a bunch of incredibly smart people solving very deep, distributed computing issues. Phase two is very much driven by developer experience. We have a team that’s building something called Quilt, which is focused first on what the users might want to see in a development environment.

There’ll be different kinds of execution environments so Ethereum 2.0 won’t be homogeneous in its execution environment—we’ll build some of the early execution environments essentially, and they will be very pleasant to use because we’re focusing on that early. It’ll enable us to build a much more scalable system in time and enable us to build different kinds of focused execution environments for different kinds of problems. Different architectures are more efficient for different problem domains.

Forbes: Who are the users?

Lubin: Software developers. But we also have many software developers that build products and services, and so their users are actual customers, whether they’re enterprise, or government, or bank, or central bank customers, or whether they’re game players or people working on journalism platforms or music platforms.

Forbes: How is enterprise demand changing things at the ones and zeros level?

Lubin: Enterprise demand is just starting to change things at the ones and the zeros level. Ultimately this is all being built in the context of building out the decentralized worldwide web—evolving web 2 to web 3. That involves public permissionless blockchains and it involves lots of other blockchains that link into those things.

It also involves decentralized storage, bandwidth and heavy compute, among other things. We started with the toughest thing—the public permissionless blockchain, where anybody could attach byzantine environments. We solved that problem in effectively a not very scalable way, but it’s turning out to be remarkably scalable because we can build interesting solutions at layer two. This basic trust foundation so revolutionized trust on the planet, from subjective trust to automated trust, and guaranteed execution of agreements or objective trust upon that layer, that we’re now building what looks like the financial plumbing for the emerging decentralized economy. So, all that stuff is going on while at the same time all these businesses figure, “hey, we have this new trust tool so that we can collaborate much better.”

Projects like PegaSys (formerly Pantheon)—it’s really the only project that spans that whole range where it’s implementing the enterprise specs. It’s an excellent client at the public mainnet level. And it has all the permissionless, or the permissioning systems, and the privacy confidentiality that businesses need. So, we now have this component that’s situated in three really interesting places. It’s situated in the public Ethereum space; it’s situated in the enterprise Ethereum space; and now it’s situated in the Hyperledger space. Now enterprises are driving the evolution of the product.

Forbes: Are you seeing enterprises getting comfortable with the idea of having to spend gas (pricing value required to conduct a transaction or execute a contract on the Ethereum blockchain platform) to take advantage of these decentralized systems?

Lubin: Whenever you build out a revolutionary new technology you don’t focus on ease of use, you focus on demonstrating the principles and showing why it’s revolutionary. The Ethereum public machine has a whole bunch of gears and pulleys and sharp edges exposed, and you have to get in and turn cranks manually, etc.

Paying gas as a user is not a good element if you care about onboarding a whole bunch of users. But if I’m a software developer and I’m releasing a game or any other application, I’d pay a huge amount for infrastructure. And so, somebody’s paying for that. There is the potential for certain use cases for users to pay miners or validators in the future for the infrastructure. Businesses already incur lots of those costs in the form of paying gas.

Forbes: What is the Ethereum gas station network?

Lubin: It’s a tool that’s getting a bunch of usage now, which basically flips things. It makes use of a technology called metatransactions, where you can just interact with a decentralized application (dapp). Anytime anything needs to be sent into the network and gas would have to be paid, the gas station network basically takes care of that. And that would usually be paid so there’d be a bunch of people who set up software to monitor those things and send them in and they would usually be paid by the developers. So, it gets smoothed, and it avoids the scourge of the internet, which is relying on advertising to power all these applications.

Forbes: Five years ago, did you think gas was going to be such a big obstacle to adoption?

Lubin: I think we knew that user experience was problematic. We were looking at long strings of hexadecimal digits, so we knew we had to build the machine before painting it and covering it over with nicely shaped enclosures.

Forbes: Has it been more difficult than you expected?

Lubin: I’m kind of a stunned by how much progress has been made in such a short time. If you look at all the previous massive societal revolutions—mobile phones, the internet itself, the web, cars, electricity—they all took a lot longer. We’re not really ten years into the decentralized web revolution or evolution, we’re more like five years into it. Because bitcoin was a very narrow implementation and smart contracts were really invented about five years ago. And so, it’s astonishing how many big companies, startups and just people care and think it’s going to be important.

Forbes: Can you unpack the business component of reimagining the web on a blockchain?

Lubin: It’s not just on a blockchain; it’s on decentralized protocols. Blockchain is just one of them, but you need other ones like storage and bandwidth. What is the decentralized worldwide web? It’s all the services we care about realized in collaborative networks that we can trust. Because they’re not owned by a single or subset of actors that are controlling the whole thing.

Forbes: How important is the burgeoning network of 5G support going to be?

Lubin: It’s really important. We’re looking into decentralized bandwidth. There’s WiFi Aware, which is a technology that can enable us to link our phones to one another without anybody being able to shut down over pretty sizable distances now. Blockchain networks and tokenization will enable us to build those networks and enable us to share resources and pay each other with different tokens.

Forbes: When you see what’s going on with the global race to 5G and China’s willingness to build a firewall to try to prevent its citizens from using competing cryptocurrencies, where does Ethereum fit into this sociopolitical turmoil?Lubin: It depends how good deep packet inspection gets; it depends how focused places like China are on controlling its digital borders because it can do it if it wants to. It may get more interesting as we have these satellite constellations—OneWeb, SpaceX and a couple others—and as we can do mesh networking, across borders, potentially. Ultimately, I feel like the ideas are so powerful. Essentially the internet woke up so much of the world by just enabling free access to information. I think it’s been complicated, but very largely positive for the planet.

And if you see the potential of a new trust infrastructure and a new collaboration infrastructure and tokenization because you can have digital scarcity—and again, that’s dependent on trust—companies within nations like China are going to start to build on that, and it’s a powerful concept. Lots of people will say, “What if?” and “Why not?” and “Why isn’t this?”

So, I think in terms of getting the ideas out, the ideas are pretty powerful. Ultimately, unless everybody owns decent amounts of the infrastructure on which they live their lives, things will be unstable. So, if we can build a society maybe in the Western world where it’s an ownership society, a stakeholdership society—and proof of stake is interesting, because we will be holding all these tokens that power the networks we live our lives on. You’re going to have to erect some pretty opaque, tall walls to keep that promise out. And unstable societies where a broad swath of the population isn’t benefitting probably won’t last.

Forbes: Years ago, there was this mentality that there was almost no such thing as bad adoption. Like, anybody using anything blockchain or anything crypto was good. Companies that were committing horrendous crimes on the weekends were dropping press releases on the weekdays about how awesome blockchain is for transparency. Are you worried that China could subvert the benefits of blockchain?

Lubin: I would love to help China get expert in Ethereum technology. One reason is if the Belt and Road Initiative [a program trying to connect Asia with Africa and Europe via land and maritime networks] uses one of the weaker technologies and it sort of mandates that those networks be built in that technology, maybe it won’t be as interoperable. But the main idea is that Ethereum is the strongest of the blockchain technologies and it’s a very positive virus to implant in people’s minds.

Forbes: China has made it very clear that it wants to increase transparency and wants to prevent anti-money laundering. It’s saying all the things we’ve been saying for years about what blockchain could do. But when it’s a notoriously oppressive regime talking about it, we start wondering, “How is it going to define money laundering, and what are they going to do with that transparency?”

Lubin: China is a business that writes its own rules and has an enormous customer base—1.4 billion people. That’s a tough economic force to compete with. I do think there’s an instability. I think leaders are constantly terrified of revolution, so they have to keep the people relatively happy at some baseline level.

Forbes: Do you assume that China’s cryptocurrency is going to be interoperable with other cryptocurrencies?

Lubin: I assume it is going to be exactly what Chinese leadership thinks is most beneficial to Chinese leadership. Hopefully that’s also open and we can interoperate with it, but I don’t know. The country could do the calculation and decide there needs to be a firewall around it, or it could do the calculation and decide, “hey, this is an incredible vector for destroying the American reserve currency status,” which is probably my guess.

Forbes: Do you see a world where people might be spending crypto yuan on bread in Nebraska?

Lubin: Have you seen Alipay in American airports?

Forbes: Yes, I have. But isn’t it still U.S. dollars? I think that’s an important difference, isn’t it?

Lubin: It is. But what’s it going to be next year and five years from now? China has the vector and it will do what it can as quickly as it can.

Forbes: Is there a technological development that is not blockchain that is capturing your attention right now?

Lubin: Lots of decentralized stuff is really interesting. Many years ago, I had deep expertise in neural nets or deep learning. It should have been called shallow learning back then. So, I’m paying much more attention to that again. I’ve been in the financial world. I was pretty well-read on finance and economics 10, 15 years ago, and haven’t been paying too much attention there until recently.

In the last year or so it’s become clear that what I’ve been saying for a long time, that our global financial and economic systems are essentially bankrupt, and the central bankers have been kicking the can down the road for a long time, and now that yield curves are flattening we may not have enough dry powder in the central banks to kick the can down the road and this recession could be really problematic. So, I’ve been talking about potential cascading collapses if certain contagions happen.

Forbes: What happened that got your attention to your old career in finance again?

Lubin: We’ve been building and hoping that central bankers could keep kicking the can down the road so that we could build alternative infrastructure—sounder foundations that enable more-sustainable growth on these systems. We’re not there yet; we need more time because the technology isn’t mature enough. Hopefully we get out of this one and it isn’t a horrendous recession; no matter how deep it is, it’ll be called a recession, I think.

What I’ve been paying attention to is the intersection of our ecosystem with the transition from the current economic regime on the planet, and the current monetary regime on the planet, because our monetary systems are end-of-life’ing right now. Facebook’s Libra is an interesting project—not based on who’s going to run it—if it does end up launching. But the idea that we could have cryptocurrency essentially with underlying baskets of currencies or nation-state bonds or commodities—that’s really, really interesting.

Forbes: Going back to the concept of, “there’s no such thing as bad adoption,” do you think this is progress or are you scared about Libra?

Lubin: I don’t mind Libra at all. I don’t think Libra will be implemented because its biggest asset is its biggest liability. Lots of people should be able to sit up there on business blockchain networks with their own currencies. JPMorgan’s doing it, Signature Bank, etc. That’s all good. But linking its 1.3 billion global Facebook citizens through Collibra into all this, is pretty scary.

And essentially giving Mark Zuckerberg control over monetary politics of lots of small nations is concerning. So, I do think that we should have lots of these systems; there should be choice and I think that lots of smaller countries would really benefit from the currency stability and being able to buy stuff frictionlessly across borders.

I think those are great systems and as long as we have a bunch of them, providing choice, providing different underlying baskets, I think that’s going to be our new dominating monetary regime. And I think governments are going to like that because they’re going to be able to sell their debt into those systems.

Forbes: You talked about the central banks kicking the can, is this an improvement, or is it just kicking the can down further?

Lubin: I think it’s an improvement. I think it’s borne of a really broken system that’s end-of-life’ing. But I think conceptually—if implemented well—it’s great. It’s optionality, it’s money. It is kind of dumb that a capitalist society controls the price of money. These systems will behave like businesses and they will succeed or fail based on how they serve their customers.

Forbes: In the time since Libra was announced, we’ve confirmed three interesting central bank concepts: the Libra concept, the People’s Bank of China concept and the idea that Mark Carney floated about a basket of currencies that the central banks willingly participate in. Do you have a favorite?

Lubin: My favorite is optionality. I’d like to see lots of different experiments.

Forbes: Is China’s cryptocurrency a threat to the U.S. dollar?

Lubin: I don’t think so. Lots of things are threats to the U.S. dollar. China and Russia are making lots of effort to do business without using U.S. dollars, and other countries following suit. There are lots of reasons why American influence is shrinking and will probably continue to shrink. That may not be a bad thing but in some ways, it’ll be a bad thing. China’s particular cryptocurrency I don’t think is a major factor.

Forbes: My colleague Jeff Kauflin wrote an article a while ago about ConsenSys and its job situation. How is the slightly more-slender version of ConsenSys, progressing? Are you hiring again yet?

Lubin: We’ve probably hired 100-150 people since December.

Forbes: Since the culling is there a net growth?

Lubin: Pretty steady state. We’re at 1,000.

ForbesWhere is the growth coming from with respect to zero knowledge proof?

Lubin: Our own Pegasus Group is doing some breakthrough work there. You’re aware of Ernst & Young’s activities on that front so it’s doing some cool stuff. And we have a portfolio company that we work really closely with called Aztec, which is building out a whole bunch of zero knowledge components that you’ll be able to stack together and compose in two different kinds of solutions, so like Lego blocks.

ForbesWhat do you think about the work currently underway at Hyperledger where a number of giant companies are trying to work together to build the Trusted Compute Framework, which would move computational trust off-chain?

Lubin: That’s an even bigger stew of different technologies. Trusted computing involves hardware and software, and trusted execution environments and secure enclaves. Even within narrow categories like zero knowledge proofs, there are many different approaches, usually varying depending on the setup of the system—whether it’s trusted, or whether there’s one big setup where you have to do it a bunch of times. And how much computation is required to essentially do the encryption, and how much to verify it? It’s a very young technology, and lots of different groups are employing it.

Forbes: How is this going to be done successfully? There’s a lot of different people trying to build the Trusted Compute Framework at the same time. It’s open-source; it’s part of the foundation. It feels like a Frankenstein monster, but it might be beautiful.

Lubin: It’s a Frankenstein monster, just like the internet and the web are Frankenstein monsters. It’ll be built through merit, through lots of different really talented people exploring the solutions base, openly collaborating—not 100% openly—but collaborating a lot. And the best there won’t be one best technology because there will be different technologies that are suited to different use cases. It’s moving fast and if you read or are aware of the cathedral in the bazaar, it’s not being built in a top down, control-like fashion. That wouldn’t be as effective as a whole lot of brilliant ants scurrying around and getting collective work done.

Forbes: Thank you.

Source link

The post #deepweb | <p> Joe Lubin Talks Trump, Blockchain’s ‘Frankenstein,’ And Willingness To Work With China <p> appeared first on National Cyber Security.

View full post on National Cyber Security