encryption – Lifeboat News: The Blog https://lifeboat.com/blog Safeguarding Humanity Mon, 10 Mar 2025 16:08:10 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 Microsoft and Amazon quantum advancements spark questions about the future of encryption https://lifeboat.com/blog/2025/03/microsoft-and-amazon-quantum-advancements-spark-questions-about-the-future-of-encryption https://lifeboat.com/blog/2025/03/microsoft-and-amazon-quantum-advancements-spark-questions-about-the-future-of-encryption#comments Mon, 10 Mar 2025 16:08:10 +0000 https://lifeboat.com/blog/2025/03/microsoft-and-amazon-quantum-advancements-spark-questions-about-the-future-of-encryption

Microsoft’s new “Majorana 1” processor is the first quantum chip powered by a topological core based on a new class of materials. (Photo by John Brecher.

]]>
https://lifeboat.com/blog/2025/03/microsoft-and-amazon-quantum-advancements-spark-questions-about-the-future-of-encryption/feed 2
Ransomware gang encrypted network from a webcam to bypass EDR https://lifeboat.com/blog/2025/03/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr https://lifeboat.com/blog/2025/03/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr#respond Fri, 07 Mar 2025 12:29:57 +0000 https://lifeboat.com/blog/2025/03/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr

The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim’s network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows.

Cybersecurity firm S-RM team discovered the unusual attack method during a recent incident response at one of their clients.

Notably, Akira only pivoted to the webcam after attempting to deploy encryptors on Windows, which were blocked by the victim’s EDR solution.

]]>
https://lifeboat.com/blog/2025/03/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/feed 0
Why a global federation might be needed to manage AI https://lifeboat.com/blog/2025/03/why-a-global-federation-might-be-needed-to-manage-ai https://lifeboat.com/blog/2025/03/why-a-global-federation-might-be-needed-to-manage-ai#respond Sun, 02 Mar 2025 21:08:04 +0000 https://lifeboat.com/blog/2025/03/why-a-global-federation-might-be-needed-to-manage-ai

Rufo Guerreschi.
https://www.linkedin.com/in/rufoguerreschi.

Coalition for a Baruch Plan for AI
https://www.cbpai.org/

0:00 Intro.
0:21 Rufo Guerreschi.
0:28 Contents.
0:41 Part 1: Why we have a governance problem.
1:18 From e-democracy to cybersecurity.
2:42 Snowden showed that international standards were needed.
3:55 Taking the needs of intelligence agencies into account.
4:24 ChatGPT was a wake up moment for privacy.
5:08 Living in Geneva to interface with states.
5:57 Decision making is high up in government.
6:26 Coalition for a Baruch plan for AI
7:12 Parallels to organizations to manage nuclear safety.
8:11 Hidden coordination between intelligence agencies.
8:57 Intergovernmental treaties are not tight.
10:19 The original Baruch plan in 1946
11:28 Why the original Baruch plan did not succeed.
12:27 We almost had a different international structure.
12:54 A global monopoly on violence.
14:04 Could expand to other weapons.
14:39 AI is a second opportunity for global governance.
15:19 After Soviet tests, there was no secret to keep.
16:22 Proliferation risk of AI tech is much greater?
17:44 Scale and timeline of AI risk.
19:04 Capabilities of security agencies.
20:02 Internal capabilities of leading AI labs.
20:58 Governments care about impactful technologies.
22:06 Government compute, risk, other capabilities.
23:05 Are domestic labs outside their jurisdiction?
23:41 What are the timelines where change is required?
24:54 Scientists, Musk, Amodei.
26:24 Recursive self improvement and loss of control.
27:22 A grand gamble, the rosy perspective of CEOs.
28:20 CEOs can’t really say anything else.
28:59 Altman, Trump, Softbank pursuing superintelligence.
30:01 Superintelligence is clearly defined by Nick Bostrom.
30:52 Explain to people what “superintelligence” means.
31:32 Jobs created by Stargate project?
32:14 Will centralize power.
33:33 Sharing of the benefits needs to be ensured.
34:26 We are running out of time.
35:27 Conditional treaty idea.
36:34 Part 2: We can do this without a global dictatorship.
36:44 Dictatorship concerns are very reasonable.
37:19 Global power is already highly concentrated.
38:13 We are already in a surveillance world.
39:18 Affects influential people especially.
40:13 Surveillance is largely unaccountable.
41:35 Why did this machinery of surveillance evolve?
42:34 Shadow activities.
43:37 Choice of safety vs liberty (privacy)
44:26 How can this dichotomy be rephrased?
45:23 Revisit supply chains and lawful access.
46:37 Why the government broke all security at all levels.
47:17 The encryption wars and export controls.
48:16 Front door mechanism replaced by back door.
49:21 The world we could live in.
50:03 What would responding to requests look like?
50:50 Apple may be leaving “bug doors” intentionally.
52:23 Apple under same constraints as government.
52:51 There are backdoors everywhere.
53:45 China and the US need to both trust AI tech.
55:10 Technical debt of past unsolved problems.
55:53 Actually a governance debt (social-technical)
56:38 Provably safe or guaranteed safe AI
57:19 Requirement: Governance plus lawful access.
58:46 Tor, Signal, etc are often wishful thinking.
59:26 Can restructure incentives.
59:51 Restrict proliferation without dragnet?
1:00:36 Physical plus focused surveillance.
1:02:21 Dragnet surveillance since the telegraph.
1:03:07 We have to build a digital dog.
1:04:14 The dream of cyber libertarians.
1:04:54 Is the government out to get you?
1:05:55 Targeted surveillance is more important.
1:06:57 A proper warrant process leveraging citizens.
1:08:43 Just like procedures for elections.
1:09:41 Use democratic system during chip fabrication.
1:10:49 How democracy can help with technical challenges.
1:11:31 Current world: anarchy between countries.
1:12:25 Only those with the most guns and money rule.
1:13:19 Everyone needing to spend a lot on military.
1:14:04 AI also engages states in a race.
1:15:16 Anarchy is not a given: US example.
1:16:05 The forming of the United States.
1:17:24 This federacy model could apply to AI
1:18:03 Same idea was even proposed by Sam Altman.
1:18:54 How can we maximize the chances of success?
1:19:46 Part 3: How to actually form international treaties.
1:20:09 Calling for a world government scares people.
1:21:17 Genuine risk of global dictatorship.
1:21:45 We need a world /federal/ democratic government.
1:23:02 Why people are not outspoken.
1:24:12 Isn’t it hard to get everyone on one page?
1:25:20 Moving from anarchy to a social contract.
1:26:11 Many states have very little sovereignty.
1:26:53 Different religions didn’t prevent common ground.
1:28:16 China and US political systems similar.
1:30:14 Coming together, values could be better.
1:31:47 Critical mass of states.
1:32:19 The Philadelphia convention example.
1:32:44 Start with say seven states.
1:33:48 Date of the US constitutional convention.
1:34:42 US and China both invited but only together.
1:35:43 Funding will make a big difference.
1:38:36 Lobbying to US and China.
1:38:49 Conclusion.
1:39:33 Outro

]]>
https://lifeboat.com/blog/2025/03/why-a-global-federation-might-be-needed-to-manage-ai/feed 0
New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems https://lifeboat.com/blog/2025/02/new-linux-malware-auto-color-grants-hackers-full-remote-access-to-compromised-systems https://lifeboat.com/blog/2025/02/new-linux-malware-auto-color-grants-hackers-full-remote-access-to-compromised-systems#respond Thu, 27 Feb 2025 08:15:10 +0000 https://lifeboat.com/blog/2025/02/new-linux-malware-auto-color-grants-hackers-full-remote-access-to-compromised-systems

Auto-Color Linux malware targets governments and universities, using stealth tactics and encryption to evade detection and maintain persistence.

]]>
https://lifeboat.com/blog/2025/02/new-linux-malware-auto-color-grants-hackers-full-remote-access-to-compromised-systems/feed 0
China hits quantum internet record with 2.38 kbps speed over 65 miles https://lifeboat.com/blog/2025/02/china-hits-quantum-internet-record-with-2-38-kbps-speed-over-65-miles https://lifeboat.com/blog/2025/02/china-hits-quantum-internet-record-with-2-38-kbps-speed-over-65-miles#respond Thu, 27 Feb 2025 03:08:09 +0000 https://lifeboat.com/blog/2025/02/china-hits-quantum-internet-record-with-2-38-kbps-speed-over-65-miles

Chinese researchers have allegedly made a major breakthrough in Quantum Secure Direct Communication (QSDC). According to reports, the team has developed a new communication protocol that allows secure data transmission using quantum mechanics principles, setting a world record for transmission speed and distance.

In case you are unaware, QSDC is a type of quantum communication that directly transmits information in quantum states (such as photons) without needing encryption keys like traditional methods (e.g., quantum key distribution or QKD).

]]>
https://lifeboat.com/blog/2025/02/china-hits-quantum-internet-record-with-2-38-kbps-speed-over-65-miles/feed 0
Scientists create world’s 1st chip that can protect data in the age of quantum computing attacks https://lifeboat.com/blog/2025/02/scientists-create-worlds-1st-chip-that-can-protect-data-in-the-age-of-quantum-computing-attacks https://lifeboat.com/blog/2025/02/scientists-create-worlds-1st-chip-that-can-protect-data-in-the-age-of-quantum-computing-attacks#respond Wed, 26 Feb 2025 07:08:49 +0000 https://lifeboat.com/blog/2025/02/scientists-create-worlds-1st-chip-that-can-protect-data-in-the-age-of-quantum-computing-attacks

Scientists in Switzerland have developed a new method to improve internet security against quantum computing attacks, using quantum-resistant encryption and a new type of hardware.

]]>
https://lifeboat.com/blog/2025/02/scientists-create-worlds-1st-chip-that-can-protect-data-in-the-age-of-quantum-computing-attacks/feed 0
A tunable entangled photon-pair source based on a Van der Waals insulator https://lifeboat.com/blog/2025/02/a-tunable-entangled-photon-pair-source-based-on-a-van-der-waals-insulator https://lifeboat.com/blog/2025/02/a-tunable-entangled-photon-pair-source-based-on-a-van-der-waals-insulator#respond Mon, 24 Feb 2025 16:12:05 +0000 https://lifeboat.com/blog/2025/02/a-tunable-entangled-photon-pair-source-based-on-a-van-der-waals-insulator

Compact sources of entangled photons are desired for quantum communication, computing, and cryptography. Here, the authors report high entangled photon pair generation rates in rhombohedral boron nitride, showing its potential as a tunable platform for Bell state generation.

]]>
https://lifeboat.com/blog/2025/02/a-tunable-entangled-photon-pair-source-based-on-a-van-der-waals-insulator/feed 0
A History of Cryptography From the Spartans to the FBI https://lifeboat.com/blog/2025/02/a-history-of-cryptography-from-the-spartans-to-the-fbi https://lifeboat.com/blog/2025/02/a-history-of-cryptography-from-the-spartans-to-the-fbi#respond Sun, 23 Feb 2025 19:13:23 +0000 https://lifeboat.com/blog/2025/02/a-history-of-cryptography-from-the-spartans-to-the-fbi

Computer scientist Panos Louridas traces the evolution of secret communication, from ancient Greece to the quantum era.

]]>
https://lifeboat.com/blog/2025/02/a-history-of-cryptography-from-the-spartans-to-the-fbi/feed 0
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives https://lifeboat.com/blog/2025/02/cybercriminals-use-eclipse-jarsigner-to-deploy-xloader-malware-via-zip-archives https://lifeboat.com/blog/2025/02/cybercriminals-use-eclipse-jarsigner-to-deploy-xloader-malware-via-zip-archives#respond Sun, 23 Feb 2025 09:06:24 +0000 https://lifeboat.com/blog/2025/02/cybercriminals-use-eclipse-jarsigner-to-deploy-xloader-malware-via-zip-archives

XLoader malware is spreading via Eclipse Jarsigner using DLL side-loading, evading detection with encrypted decoys and advanced obfuscation.

]]>
https://lifeboat.com/blog/2025/02/cybercriminals-use-eclipse-jarsigner-to-deploy-xloader-malware-via-zip-archives/feed 0
China Launches Its Own Quantum-Resistant Encryption Standards, Bypassing US Efforts https://lifeboat.com/blog/2025/02/china-launches-its-own-quantum-resistant-encryption-standards-bypassing-us-efforts https://lifeboat.com/blog/2025/02/china-launches-its-own-quantum-resistant-encryption-standards-bypassing-us-efforts#respond Wed, 19 Feb 2025 11:04:59 +0000 https://lifeboat.com/blog/2025/02/china-launches-its-own-quantum-resistant-encryption-standards-bypassing-us-efforts

China has launched a global initiative to develop post-quantum cryptographic algorithms, diverging from US-led efforts.

]]>
https://lifeboat.com/blog/2025/02/china-launches-its-own-quantum-resistant-encryption-standards-bypassing-us-efforts/feed 0