Cryptography

Unlocking Trillions: The Impact of Confidential Computing on Crypto Capital

Monday. July 15 at 9:30 PM

1 min. read
Unlocking Trillions: The Impact of Confidential Computing on Crypto Capital

Confidential computing technologies have the potential to unleash an additional $1 trillion in capital for the cryptocurrency ecosystem. Advancements in privacy tech, such as fully homomorphic encryption (FHE), could drive this influx, as stated by Remi Gai, founder of Inco, at the FHE Summit 2024. Inco, a network focused on confidential computing, aims to integrate FHE solutions into the blockchain's privacy layer. These technologies could attract mainstream institutions to decentralized finance (DeFi) by addressing the lack of privacy in Web3, ultimately boosting liquidity in the crypto market. Gai emphasized that encryption's purpose is not anonymity but securing valuable data, a missing element in blockchain akin to SSL for the internet. The potential new capital from confidential computing would come from both institutional and retail investors, depending on the disruptive use cases introduced by these advancements. Overall, confidential computing holds great promise for financial institutions, offering solutions like FHE that allow computations on encrypted data without decryption.

More news 🗞️

Uncovering Vulnerabilities in AI Robots

Uncovering Vulnerabilities in AI Robots

Friday. October 18 at 9:00 AM

Penn Engineering researchers have identified critical flaws in AI-powered robots, allowing for manipulation to perform dangerous actions such as running red lights or detonating bombs. The team, led by George Pappas, created an algorithm called RoboPAIR that successfully bypassed safety protocols on various robotic systems. This research highlights the need for a thorough reassessment of AI integration in physical systems. Jailbreaking, in the context of AI and robotics, involves exploiting vulnerabilities to override ethical constraints. The study revealed three key weaknesses in AI-powered robots, leading to potential harm categories like physical harm, privacy violations, and illegal activities. Researchers are working with manufacturers to enhance AI safety protocols. As AI becomes more prevalent in society, the battle between researchers and jailbreakers continues to evolve, with more sophisticated approaches being developed. This underscores the importance of identifying weaknesses to improve system safety and security.

Cryptography

Quantum Computing Threat to Encryption

Quantum Computing Threat to Encryption

Monday. October 14 at 11:30 AM

Chinese researchers claim to have breached encryption algorithms used in banking and crypto using a quantum computer. Shanghai University researchers, led by Wang Chao, utilized a quantum computer from Canada’s D-Wave Systems to breach algorithms through quantum annealing. They targeted Present, Gift-64, and Rectangle algorithms, which form the basis of the Substitution-Permutation Network (SPN) structure supporting AES encryption. While AES-256 is considered secure, quantum computers pose a potential threat. Wang's team described quantum annealing as an AI algorithm optimizing solutions globally. Quantum tunneling allows the quantum computer to find the lowest point efficiently. Despite limitations, researchers believe quantum attacks could expose vulnerabilities in cryptographic systems. Vitalik Buterin proposed a hard fork to mitigate quantum computing risks in the future. The findings were published in the China Computer Federation Chinese Journal of Computers. The crypto industry faces challenges as quantum computing advancements could potentially compromise encryption security.

Cryptography

Sophisticated AI Tool ProKYC Raises Concerns in Crypto Fraud

Sophisticated AI Tool ProKYC Raises Concerns in Crypto Fraud

Friday. October 11 at 1:30 PM

A cybersecurity firm, Cato Networks, has raised alarms about a new AI-powered deepfake tool called ProKYC. This tool enables malicious actors to circumvent high-level Know Your Customer (KYC) measures on cryptocurrency exchanges, marking a significant advancement in crypto fraud sophistication. Instead of resorting to traditional methods like purchasing forged ID documents on the dark web, fraudsters can now create entirely new identities using AI tools. ProKYC specifically targets crypto exchanges and financial institutions with stringent KYC protocols, such as facial recognition matching. The tool can generate fake ID documents and deepfake videos to deceive KYC processes successfully. With the rise of AI-powered tools like ProKYC, the threat of New Account Fraud (NAF) on crypto exchanges has escalated. Detecting and preventing such AI fraud poses challenges, but potential methods include manual identification of high-quality images and inconsistencies in facial movements. The consequences of identity fraud can be severe, with penalties including imprisonment and hefty fines.

Cryptography

Brazilian Authorities May Lift Ban on Elon Musk's X Platform

Brazilian Authorities May Lift Ban on Elon Musk's X Platform

Wednesday. October 9 at 7:30 AM

Brazilian regulators are considering lifting the ban on Elon Musk's social media platform, X, following the payment of a 28.6 million Brazilian reais fine. X met the latest requirement for its return after being suspended by Brazil's Supreme Federal Court in August for non-compliance with orders related to misinformation. The final payment, which included fines for lack of cooperation and non-compliance with the suspension, was confirmed after some payment mishaps. X also appointed a new legal representative, blocked accounts spreading fake news, and awaits a decision from Brazil's Attorney General on the platform's return. Justice Moraes, who has been investigating X since 2023, will review the case if the return is approved. Elon Musk has criticized Moraes' actions as politically motivated censorship, accusing him of targeting political opponents unlawfully.

Cryptography