Did Someone Really Break Bitcoin’s Encryption? Here’s The Truth About What Ha...
The latest threat to Bitcoin’s cryptography is quantum computing. A researcher called Giancarlo Lelli has now won a one Bitcoin prize for using quantum hardware to crack a small cryptographic key linked to the same family of mathematics that protects Bitcoin. This sounds terrifying at first glance, as it threatens the future of billions worth […]
Related News
Encryption has always been a hot topic in the world of technology and innovation. Not only does encryption allow both consumers and businesses to keep data safe from prying eyes, but it has also been a thorn in the side of governments around the world. The French government is not a fan of backdoors to break encryption, whereas a recent New York Bill....
The war between law enforcement and encryption is far from over by the look of things. Yesterday afternoon, the Dutch police and government officials shut down a communication network using PGP encryption. According to the official statement, this system was used by criminals, although it remains to be seen whether or not his is the case. With all of the recent focus on governments trying to break consumer encryption to prevent “terrorist attacks”, it only seems normal people are starting to take their privacy more seriously. This creates new business opportunities for companies as well,....
Discussions about encryption are becoming more of a norm than the exception these days, and the situation is only getting direr in certain regions. The Hungarian Parliament is in favour to ban end-to-end encryption in the not-so-distant future. Hungary Takes on End-to-End Encryption. According to local sources, the Hungarian parliament voted on an amendment which prohibits end-to-end encryption in the country. Similar to most other countries in the world taking an aggressive stance on encryption, they label this decision as part of the “ongoing war on terrorism in Hungary”. As a result of....
Surprised? Probably not. According to recent documents from Edward Snowden, the National Security Agency is spending $79.7 million on a research program called “Penetrating Hard Targets”. This project involves building a quantum computer that would be able to break most types of encryption. At the moment, the agency is nowhere near completion of the project, so no need to worry yet. However, the NSA is already pretty good at breaking encryption and bribes companies to promote flawed encryption, so with this much power and money, it doesn’t seem too far-fetched that the NSA will....
Tor, the (in)famous encrypted web browser, may not be strong enough to resist the next generation’s attacks on encryption. What will the next generation of encryption tools look like? Tor came to the forefront of the privacy debate through providing an encrypted web browser used by such services as the Silk Road. In the years since Edward Snowden leaked the NSA’s mass collection of metadata, the amount of Internet users interested in encryption grew dramatically. However, Tor’s encryption may not be completely trusted. In fact, 80% of user types may be de-anonymized within six months,....