Category Archives: Internet Security
Election Security: How 3 Local Counties Are Preparing For 2020 – Houston Public Media
Early voters inside the TSU library.
The 2020 presidential election is now less than a year away. That doesnt leave a lot of time to address peoples concerns about election security concerns that have lingered at least since revelations surfaced about Russian efforts to interfere with the 2016 election. So, what exactly are election officials across Greater Houston doing about it?
Our elections are only as valid as people think that they are, said John Oldham, who has served as election administrator for Fort Bend County for more than 11 years, under both Republican and Democratic leaders. Our country exists under a social contract, and every time we go to the polls to vote for people or on propositions, we ratify that contract again and againAnd so long as people believe elections are secure thats just as important as making them secure.
Oldham said thats a big reason why Fort Bend County has switched over from purely electronic voting to a hybrid system involving paper backups thats what residents say they want.
Fort Bend County is ahead of Harris County when it comes to upgrading voting machines. The Harris County Clerks Office has just reached the point of getting permission from County Commissioners Court to start the bidding process for voting machine vendors. But even if commissioners give their permission at the December meeting, the process of selecting a vendor could take until May.
Once we choose the vendor, well have to order, place an order for these machines, and that will be about 8,000 machines, said Diane Trautman, the Democratic Harris County Clerk. And an order that big, as you can imagine, will take some time to build and get to us. So that places us about early fall before we can actually receive them.
Trying to rush the new machines into service by November of next year could backfire in a big way. Without enough time to educate poll workers and voters on how the new machines work, lines at polling places could explode discouraging many from sticking around to vote.
Our target date to use them first would be the May 2021 election, which is a much smaller election and a good place to start testing that equipment, Trautman said.
In the meantime, Trautman is focusing on the essentials. That includes making sure the existing machines work as intended. It means training all 333 County Clerk staff members for cybersecurity not just election staff and IT workers. And it means undergoing an internal audit of IT and election systems, as required by the Texas Secretary of State.
Lisa Mujica is election director for Republican-led Brazoria County, which has already been through the audit. So we definitely are a step ahead of a lot of the counties out there, said Mujica.
Brazoria County just adopted new voting machines, an all-electronic system with no paper backup. None of our equipment, the equipment that we use, [Hart InterCivic] Verity Touch, those voting booths are not connected to the Internet whatsoever, so even when it comes into our office, its not connected to the Internet, Mujica said.
Dan Wallach, who manages Rice Universitys Computer Security Lab, said local governments are making the best of the hands theyve been dealt.
Counties and states generally are operating with very limited funding for voting equipment, Wallach said. And what that means is, its a slow process to, for the counties to find the budget and to go through the budgetary process to replace old machines with newer ones.
One of Wallachs biggest worries is that a nation-state, like Russia, could hack voter registration databases. That could lead to long lines at polling places, discouraging many from sticking around to cast their ballots. And so if somebody were to damage the voter registration database selectively, like only neighborhoods that vote one way but not neighborhoods that vote another way, then there could be an adverse partisan outcome from that tampering, he said.
In the end, Wallach said, election security largely comes down to public perception. If people assume their vote will be tampered with, they may not vote at all. Thats why one point all three election administrators made is that their success depends on educating the public and instilling trust that the system will work as its supposed to.
Read more here:
Election Security: How 3 Local Counties Are Preparing For 2020 - Houston Public Media
#InfosecNA: The Benefits of Training Employees to Hack – Infosecurity Magazine
For most corporate denizens, security training is an unpleasant but necessary evil, but does it have to be? Not according to Kris Martel, CISO of Imagine IT, who uses a highly interactive approach to create an engaging, entertaining learning environment that makes security meaningful and interesting to the average employee.
Speaking at Infosecurity ISACA North America Expo and Conference in New York, Martel shared some of the things he uses in his trainings to help improve security awareness and compliance, and have employees eagerly awaiting their next session.
Cyber awareness training must change audience perception by making it [security] relevant to the organization or the individuals youre teaching, said Martel. The way to do that is to make it engaging, interactive and fun and unpredictable, he added. One of the ways he engages employees is to teach them real-world hacking skills, including how to craft effective phishing attacks, helping them learn who has their Facebook login and taking them on guided tours of the Dark Web. Whenever possible, Martel finds ways to reward participation with small but popular tokens such as preferred parking spots, movie tickets and, in some cases, internal cryptocurrency.
Martel has developed a fun, and effective way to deal with experienced cyber-workers who dont take the training seriously because they believe they are too smart to be hacked by offering them a friendly challenge. After a co-worker accepts the challenge, he begins a surveillance phase which, depending on how good his opponent is, can last anywhere from a few days to a few months. In one case, with an especially cyber-savvy individual, his usual hunt within social media, inquiries with co-workers, and other tactics failed to produce anything. Even though they had effectively hosted themselves, including paying a service to erase their profile from the internet, he did find evidence of their activity on Amazon which enabled him to craft a phishing attack that eventually proved effective in gaining his victims credentials. Although it took four months to execute, Martel felt it was worth it after the employee agreed to go to training and he got a good story out of it to share with his colleagues.
Here are a few of Martels key takeaways:
Applying these tactics helped Martel stimulate a 70% increase in reporting of phishing attacks, a 45% reduction in the success rate of phishing attacks, and a 94% positive rating on his course feedback surveys. I knew things had changed when people started asking me when the next security training session was going to be held, he concluded.
How to make security awareness training more effective and engaging
For most corporate denizens, security training is an unpleasant but necessary evil, but does it have to be? Not according to Kris Martel, CISO of Imagine IT, who uses a highly interactive approach to create an engaging, entertaining learning environment that makes security meaningful and interesting to the average employee.
Speaking at Infosecurity ISACA North America Expo and Conference in New York, Martel shared some of the things he uses in his trainings to help improve security awareness and compliance, and have employees eagerly awaiting their next session.
Cyber awareness training must change audience perception by making it [security] relevant to the organization or the individuals youre teaching, said Martel. The way to do that is to make it engaging, interactive and fun and unpredictable, he added. One of the ways he engages employees is to teach them real-world hacking skills, including how to craft effective phishing attacks, helping them learn who has their Facebook login and taking them on guided tours of the Dark Web. Whenever possible, Martel finds ways to reward participation with small but popular tokens such as preferred parking spots, movie tickets and, in some cases, internal cryptocurrency.
Martel has developed a fun, and effective way to deal with experienced cyber-workers who dont take the training seriously because they believe they are too smart to be hacked by offering them a friendly challenge. After a co-worker accepts the challenge, he begins a surveillance phase which, depending on how good his opponent is, can last anywhere from a few days to a few months. In one case, with an especially cyber-savvy individual, his usual hunt within social media, inquiries with co-workers, and other tactics failed to produce anything. Even though they had effectively hosted themselves, including paying a service to erase their profile from the internet, he did find evidence of their activity on Amazon which enabled him to craft a phishing attack that eventually proved effective in gaining his victims credentials. Although it took four months to execute, Martel felt it was worth it after the employee agreed to go to training and he got a good story out of it to share with his colleagues.
Here are a few of Martels key takeaways:
Applying these tactics helped Martel stimulate a 70% increase in reporting of phishing attacks, a 45% reduction in the success rate of phishing attacks, and a 94% positive rating on his course feedback surveys. I knew things had changed when people started asking me when the next security training session was going to be held, he concluded.
Excerpt from:
#InfosecNA: The Benefits of Training Employees to Hack - Infosecurity Magazine
Embedded Security For Internet Of Things Market 2019 Global Analysis by Growth, Size, Share, Trend and Forecast 2025 – Eastlake Times
Anembedded systemis acomputersystemwith a dedicated function within a larger mechanical or electrical system, often withreal-time computingconstraints.It isembeddedas part of a complete device often including hardware and mechanical parts. Embedded systems control many devices in common use today.Ninety-eight percent of allmicroprocessorsare manufactured as components of embedded systems.
The controller chip segment is estimated to be valued at more than US$ 2,300 Mn in 2017, accounting for more than 80% of the global market revenue share.
The global Embedded Security For Internet Of Things market was valued at xx million US$ in 2018 and will reach xx million US$ by the end of 2025, growing at a CAGR of xx% during 2019-2025.
This report focuses on Embedded Security For Internet Of Things volume and value at global level, regional level and company level. From a global perspective, this report represents overall Embedded Security For Internet Of Things market size by analyzing historical data and future prospect.
Regionally, this report categorizes the production, apparent consumption, export and import of Embedded Security For Internet Of Things in North America, Europe, China, Japan, Southeast Asia and India.
For each manufacturer covered, this report analyzes their Embedded Security For Internet Of Things manufacturing sites, capacity, production, ex-factory price, revenue and market share in global market.
The following manufacturers are covered:
Intel
Cisco
NXP
Infineon
Gemalto
Check Point
Palo Alto
ARM
Synopsys
Inside Secure
Trend Micro
Segment by Regions
North America
Europe
China
Japan
Southeast Asia
India
Segment by Type
Software
Controller Chip
Segment by Application
Retail
Aerospace and Defence
Healthcare
Gaming
Automotive
Others
Table of Contents
Executive Summary
Chapter One: Industry Overview of Embedded Security For Internet Of Things
1.1 Definition of Embedded Security For Internet Of Things
1.2 Embedded Security For Internet Of Things Segment by Type
1.2.1 Global Embedded Security For Internet Of Things Production Growth Rate Comparison by Types (2014-2025)
1.2.2 Software
1.2.3 Controller Chip
1.3 Embedded Security For Internet Of Things Segment by Applications
1.3.1 Global Embedded Security For Internet Of Things Consumption Comparison by Applications (2014-2025)
1.3.2 Retail
1.3.3 Aerospace and Defence
1.3.4 Healthcare
1.3.5 Gaming
1.3.6 Automotive
1.3.7 Others
1.4 Global Embedded Security For Internet Of Things Overall Market
1.4.1 Global Embedded Security For Internet Of Things Revenue (2014-2025)
1.4.2 Global Embedded Security For Internet Of Things Production (2014-2025)
1.4.3 North America Embedded Security For Internet Of Things Status and Prospect (2014-2025)
1.4.4 Europe Embedded Security For Internet Of Things Status and Prospect (2014-2025)
1.4.5 China Embedded Security For Internet Of Things Status and Prospect (2014-2025)
1.4.6 Japan Embedded Security For Internet Of Things Status and Prospect (2014-2025)
1.4.7 Southeast Asia Embedded Security For Internet Of Things Status and Prospect (2014-2025)
1.4.8 India Embedded Security For Internet Of Things Status and Prospect (2014-2025)
Chapter Two: Manufacturing Cost Structure Analysis
2.1 Raw Material and Suppliers
2.2 Manufacturing Cost Structure Analysis of Embedded Security For Internet Of Things
2.3 Manufacturing Process Analysis of Embedded Security For Internet Of Things
2.4 Industry Chain Structure of Embedded Security For Internet Of Things
Chapter Three: Development and Manufacturing Plants Analysis of Embedded Security For Internet Of Things
3.1 Capacity and Commercial Production Date
3.2 Global Embedded Security For Internet Of Things Manufacturing Plants Distribution
3.3 Major Manufacturers Technology Source and Market Position of Embedded Security For Internet Of Things
3.4 Recent Development and Expansion Plans
Chapter Four: Key Figures of Major Manufacturers
4.1 Embedded Security For Internet Of Things Production and Capacity Analysis
4.2 Embedded Security For Internet Of Things Revenue Analysis
4.3 Embedded Security For Internet Of Things Price Analysis
4.4 Market Concentration Degree
Chapter Five: Embedded Security For Internet Of Things Regional Market Analysis
5.1 Embedded Security For Internet Of Things Production by Regions
5.1.1 Global Embedded Security For Internet Of Things Production by Regions
5.1.2 Global Embedded Security For Internet Of Things Revenue by Regions
5.2 Embedded Security For Internet Of Things Consumption by Regions
5.3 North America Embedded Security For Internet Of Things Market Analysis
5.3.1 North America Embedded Security For Internet Of Things Production
5.3.2 North America Embedded Security For Internet Of Things Revenue
5.3.3 Key Manufacturers in North America
5.3.4 North America Embedded Security For Internet Of Things Import and Export
5.4 Europe Embedded Security For Internet Of Things Market Analysis
5.4.1 Europe Embedded Security For Internet Of Things Production
5.4.2 Europe Embedded Security For Internet Of Things Revenue
5.4.3 Key Manufacturers in Europe
5.4.4 Europe Embedded Security For Internet Of Things Import and Export
5.5 China Embedded Security For Internet Of Things Market Analysis
5.5.1 China Embedded Security For Internet Of Things Production
5.5.2 China Embedded Security For Internet Of Things Revenue
5.5.3 Key Manufacturers in China
5.5.4 China Embedded Security For Internet Of Things Import and Export
5.6 Japan Embedded Security For Internet Of Things Market Analysis
5.6.1 Japan Embedded Security For Internet Of Things Production
5.6.2 Japan Embedded Security For Internet Of Things Revenue
5.6.3 Key Manufacturers in Japan
5.6.4 Japan Embedded Security For Internet Of Things Import and Export
Follow this link:
Embedded Security For Internet Of Things Market 2019 Global Analysis by Growth, Size, Share, Trend and Forecast 2025 - Eastlake Times
The Internet: Looking Back and Forward 50 Years – Security Boulevard
The numbers are staggering. More than 4.4 billion people now use the Internet.
Collectively, we:
Watch this BBC click video to learn more about our Internet history and how it all got started.
There is no doubt that the Internet has revolutionized life in America over the past 5 decades. Forbes Magazine, and many others say the Internet is the greatest invention since the printing press, but quickly point out that we are really talking about the world-wide web (www). When this all started in 1969, no one could possibly have imagined the technological changes that would occur by 2019.
The Internet 2069
So where is this technological journey heading in the long run? Where will our innovation take us in the next fifty years?
Next month, I will be taking a detailed look at the cyber outlook for the next decade, as seen by the top tech and security companies around the world. My annual blog on cybersecurity predictions, similar to this list of top security predictions for 2019, will cover a wider span and look beyond just the year 2020.
Nevertheless, I am writing this blog to highlight the incredible work by Pew Research and Elon University which looks in detail at what will happen in another 50 years of digital life as seen by many of the top global experts from various academic disciplines.
Before I begin, I want to strongly urge readers to take the time to read the full Pew Research report. The excerpts and opinions which I offer as a summary (Read more...)
The rest is here:
The Internet: Looking Back and Forward 50 Years - Security Boulevard
Internet security Market Outlook 2019: Business Overview And Top Company Analysis Forecast By 2026 – The Market Publicist
Internet security Market Overview:
This research study is one of the most detailed and accurate ones that solely focus on the Internet security Market. It sheds light on critical factors that impact the growth of the Internet security market on several fronts. Market participants can use the report to gain sound understanding of the competitive landscape and strategies adopted by leading players of the Internet security market. The authors of the report segment the Internet security market according to type of product, application, and region. The segments studied within the report are analyzed on the idea of market share, consumption, production, market attractiveness, and other vital factors.
Global Internet security Market was valued at USD 32.67 Billion in 2017 and is projected to reach USD 61.42 Billion by 2025, growing at a CAGR of 8.2% from 2018 to 2025.
The geographical analysis of the Internet security market provided in the research study is an intelligent tool that interested parties can use to identity lucrative regional markets. It helps readers to become aware of the characteristics of different regional markets and how they are progressing in terms of growth. The report conjointly offers a deep analysis of market dynamics, as well as drivers, challenges, restraints, trends and opportunities, and market influence factors. It provides statistical analysis of the Internet security market, which includes CAGR, revenue, volume, market shares, and other important figures. On the whole, it comes out as a complete package of various market intelligence studies focusing on the Internet security market.
Request a Sample Copy of this report @https://www.verifiedmarketresearch.com/download-sample/?rid=5846&utm_source=TMP&utm_medium=AK
Key Players Mentioned in the Internet security Market Research Report:
Internet security Market: Regional Segmentation
For a deeper understanding, the research report includes geographical segmentation of the Internet security Market. It provides an evaluation of the volatility of the political scenarios and amends likely to be made to the regulatory structures. This assessment gives an accurate analysis of the regional-wise growth of the Internet security Market.
Internet security Market: Research Methodology
The research methodologies used by the analysts play an integral role in the way the publication has been collated. Analysts have used primary and secondary research methodologies to create a comprehensive analysis. For an accurate and precise analysis of the Internet security Market, analysts have bottom-up and top-down approaches.
Ask for Discount @https://www.verifiedmarketresearch.com/ask-for-discount/?rid=5846&utm_source=TMP&utm_medium=AK
Table of Content
1 Introduction of Internet security Market
1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions
2 Executive Summary
3 Research Methodology of Verified Market Research
3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources
4 Internet security Market Outlook
4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis
5 Internet security Market, By Deployment Model
5.1 Overview
6 Internet security Market, By Solution6.1 Overview
7 Internet security Market, By Vertical
7.1 Overview
8 Internet security Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East
9 Internet security Market Competitive Landscape
9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies
10 Company Profiles
10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments
11 Appendix
11.1 Related Research
Complete Report is Available @ https://www.verifiedmarketresearch.com/product/global-internet-security-market-size-and-forecast-to-2025/?utm_source=TMP&utm_medium=AK
We also offer customization on reports based on specific client requirement:
1-Freecountry level analysis forany 5 countriesof your choice.
2-FreeCompetitive analysis of any market players.
3-Free 40 analyst hoursto cover any other data points
About Us:
Verified Market Research has been providing Research Reports, with up to date information, and in-depth analysis, for several years now, to individuals and companies alike that are looking for accurate Research Data. Our aim is to save your Time and Resources, providing you with the required Research Data, so you can only concentrate on Progress and Growth. Our Data includes research from various industries, along with all necessary statistics like Market Trends, or Forecasts from reliable sources.
Contact Us:
Mr. Edwyne FernandesCall: +1 (650) 781 4080Email:sales@verifiedmarketresearch.com
Read the original here:
Internet security Market Outlook 2019: Business Overview And Top Company Analysis Forecast By 2026 - The Market Publicist
The American Internet Sucks. The Alternative Is China. – BuzzFeed News
Congratulations! After a grueling campaign, you have been elected president of Discursia, a small nation somewhere in the Global South.
Discursia is peaceful and prosperous compared to its neighbors. But in 2028, how long can that last? Your economy is booming, but a small cadre of elites hoards its spoils. A restive minority group clamors for rights its been denied rights it might take up arms to obtain. And thousands of refugees mass at your borders, driven by the scarcity of a scorched planet.
Your mandate is to preserve democracy and stability, with minimal immiseration.
Outside your office, two trade delegations are waiting. Theyre from the two most powerful nations on Earth: the United States and the Peoples Republic of China.
The Americans go first. They propose a sweeping trade package, a plank of which is a 10-year commitment to American social networks: Facebook, Twitter, YouTube. On these networks, Discursians can assume any identity they want, and post any content they want. (Except female nipples. Those are strictly forbidden.) The American platforms will resist requests from your government to take down content, including posts that could foment violence. Also, the deal prevents you from suing the platforms over content posted on them, even if it leads to something really bad, like a genocide. And yet, freedom of expression, baby! Just look at what its done for our country, the Americans say.
Next files in a group of Chinese government officials with a deal of their own. They want to refinance the debt they hold on the highway and ports theyve already built for you. But first, you have to commit to a 10-year partnership with platforms built by homegrown Chinese tech giants like Tencent and ByteDance. The Chinese networks are a lot like the American ones, with four major differences. The first is: Discursians cant say anything bad about the Chinese government, like that it might be committing a genocide. The second is: Despite assurances to the contrary, you suspect the Chinese Communist Party will have unfettered access to your citizens data. The third is: No aliases. Each account is linked to a national ID number. The fourth: These companies will be much more amenable to taking down anything you ask them to.
Everything in these deals washes out except for the platforms. You want whats best for Discursia. You also want to get reelected. Youve got to choose one.
This is an oversimplification, sure. But it is the way the global internet is trending. The rise of cyber sovereignty, the idea that governments should control the internet that their citizens use and the data they generate, proved in its most extreme form in China, heralds a fragmentation of the digital world. Countries are already blocking each others social networks as agents of foreign influence, requiring data to be housed on local servers or heading that way, and threatening to cut themselves off from the worlds internet in a pinch. Bipolar spheres of digital influence radiating out from Washington, DC, and Beijing are not only not out of the question they may be likely.
Move fast and break things. Let people post what they want and may the consequences be damned. Profits over patriotism. For years, these have been the values of the American-led social internet and its masters in Silicon Valley. Defined by lucratively reckless expansion and the total absence of planning, this laissez-faire model now faces, for the very first time, a real competitor. It doesnt come from Sens. Elizabeth Warren or Josh Hawleyled antitrust, nor from European-style data protection regimes. It is not an adjustment but a different paradigm entirely. Built to the specifications of the CCP, this model operates according to a much different principle: Shut up and leap forward. And to a world shifting from unipolar American leadership to something much less certain, an internet governance that stresses central state control, order, and authority may well be the rational, if terrifying, choice.
Terrifying: Uighurs thrown in vast prison camps for verboten speech on their smartphones. A pro-democracy intellectual suspended from China's version of Twitter on the flimsiest of pretexts. An influencer jailed for singing a lighthearted version of the national anthem. These models aren't morally equivalent far from it. The Chinese one lends itself directly to mass repression, while the American one leads to mass amplification, with sometimes horrible consequences. But despite that difference, or perhaps because of it, it's the former that's on the rise.
The Chinese internet governance model is the first real challenge to a free and open internet, Samm Sacks, a fellow of cybersecurity policy and Chinese digital economy at New America, told me recently. And as we see Chinese social media platforms gain real market share in countries that arent emerging economies, we are confronted head-on with this question.
That question: Which model will the world adopt ruthless government control, or chaotic, corporate-approved freedom?
Mark Zuckerberg speaks at Georgetown University in a "conversation on free expression" in Washington, DC, on Oct. 17.
This schism is the future Mark Zuckerberg asked Americans to envision last month in a curious speech in Washington, DC. Anchored to a lectern at Georgetown University, he forecast a great-power competition over the nature of online expression. In one corner were Made-in-the-USA platforms like his own, which, for all their faults, were inspired by the American tradition of free speech.
While we may disagree on exactly where to draw the line on specific issues, he said, we at least can disagree. The fact that we can even have this conversation means that were at least debating from some common values. If another nations platforms set the rules, our discourse will be defined by a completely different set of values.
That other nation, of course, is China. And while Zuckerberg didnt deign to name its values god help him if he had tried its clear that he was referring to censorship of the kind Chinese social media companies have for years imposed on Chinese citizens at the behest of the CCP.
Until recently, the internet in almost every country outside China has been defined by American platforms with strong free expression values, he said. Theres no guarantee these values will win out. A decade ago, almost all of the major internet platforms were American. Today, six of the top 10 are Chinese.
Critics were quick to point out the self-interestedness and hypocrisy of Zuckerbergs alarming forecast. For one thing, Facebook only started to use China as a foil recently as calls in Washington for regulation and possible antitrust action against it intensified. (The companys argument: Chinese tech platforms are so huge and so closely bound to the Chinese government that breaking Facebook up would weaken a key American industry and cede the global market to China, thus weakening the US.) And Zuckerberg is the guy, after all, who was once so eager to crack open the worlds most populous market that he reportedly asked Chinese President Xi Jinping to name his firstborn child. (Xi declined.)
Zuckerberg gave his speech at a time of deep, probably overdue, American concern about Chinese censorship coming home to roost on the wings of Western corporations. The issue burst onto the national stage in early October after the Houston Rockets general manager, Daryl Morey, tweeted in support of pro-democracy protesters in Hong Kong. The furious reaction from the Chinese government and segments of the Chinese public, along with conciliatory statements by NBA players and officials, led to charges from figures across the American political spectrum that the league was placing money before the time-honored American value of free speech.
This was hardly the first example of an American or European company humbling itself to the Chinese government following an incident of freedom of expression. In 2018 alone, Gap apologized for selling a T-shirt in Canada that featured a map of China without Taiwan; Marriott apologized for listing Tibet and Taiwan as countries on a customer survey; Daimler apologized for using a quote from the Dalai Lama in a social media post; and several US airlines acceded to Chinese demands to remove references to Taiwan, Hong Kong, and Macau from drop-down menus of countries on their websites. This year, Givenchy, Versace, and Coach lost all-important Chinese celebrity brand ambassadors after releasing T-shirts that listed Hong Kong, Macau, and Taiwan as separate countries. They all apologized. Activision Blizzard not only apologized it even punished an esports player for expressing support for the Hong Kong protesters; it promised, on the Chinese microblogging site Weibo, to resolutely safeguard the countrys dignity.
The language on both sides of these flare-ups has been all about pride and disgrace, and who respects whom. Against the background of President Donald Trumps trade war, the apologetics have played in the American context as humiliations, exposures of the relative cheapness of the American value of free speech in an international marketplace with an irresistibly rich new buyer. (Its worth noting that maximizing shareholder value is also an American value.) Zuckerberg who once said Facebook is more like a government than a company came to Washington, DC, to announce that he had glimpsed a future where such humiliations are the rule and discovered that he runs a very American company after all.
"We are now in a position that we're much more free to stand up for what we believe in than the other companies," he reiterated in a conference call Wednesday.
To be clear: Facebooks vision of free speech is flawed, extravagantly so. But putting aside the opportunism of Zuckerbergs argument for a moment, which he made only after Facebook failed to enter the Chinese market and regulators began knocking on his door, his point about the vulnerability of the American model of free speech around the world is correct.
PostCold War narratives about the inevitable triumph of open societies and American mass culture have run aground. Authoritarian regimes that shutter universities and arrest journalists have prospered. China has become the world's second-largest economy through economic liberalization without democratic reform.
Meanwhile, the chaotically open and user-hungry communications platforms we have created and exported have inherent, obvious weaknesses: They are vulnerable to meddling, conducive to demagoguery, and damaging to social trust. They mishandle Americans data and broadcast the USs profound divisions throughout the world. And they now have a competitor that takes the flow of information very, very seriously.
A man walking past an image of China's President Xi Jinping on a propaganda billboard in Nuanquan in China's northern Hebei province.
In 2013, shortly after he took power, Xi addressed the CCPs top leadership behind closed doors. This summer, the CCPs main journal of political theory, Qiushi, published a version of that speech, titled Uphold And Develop Socialism With Chinese Characteristics. In the document, translated by Tanner Greer at Palladium Magazine, Xi presents the conflict between China and the West not as primarily economic but on the level of ideas: Why did the Communist Party of the Soviet Union fall to pieces? An important reason is that in the ideological domain, competition is fierce! ... This is a lesson from the past! ... For a fairly long time yet, socialism in its primary stage will exist alongside a more productive and developed capitalist system. In this long period of cooperation and conflict, socialism must learn from the boons that capitalism has brought to civilization economic, technological, and military might.
These warring philosophies, Xi suggests, will produce dueling systems of propaganda: We must face the reality that people will use the strengths of developed, Western countries to denounce our countrys socialist development. Here we must have a great strategic determination, resolutely rejecting all false arguments that we should abandon socialism. We must consciously correct the various ideas that do not accord with our current stage.
Xi has given contradictory statements about whether the CCP wants to export its system abroad. In 2017, he told a forum for foreign political groups that we will not import other countries models, and will not export the China model. Last year, in a speech to nonparty political advisers, he called the China model a new type of political party system that is a great contribution to political civilization of humanity a flourish that seemed to signal just the opposite.
Indeed, influential hardline theorists within the CCP have begun to predict a large-scale, neo-imperial struggle between the US and China to center the world around their respective values. In such a struggle, these values will clash and seek to eradicate each other, even in very small ways, like Gap T-shirts that dont respect Chinas territorial sovereignty.
Today, short of a hot war, a nation pushes itself into a broader space primarily through the export of its technology: infrastructure, equipment, consumer goods, cyberwarfare, social media, and all the permutations thereof. Unsurprisingly, many observers see Trumps trade war against China as primarily a technological one: pushing Chinese tech companies out of Western markets, forcing Western tech companies to stop doing business with Chinese ones, and blocking Chinese investments in the US tech sector.
The trade war isnt popular, and it has taken a financial toll on working Americans but that doesnt mean Chinese tech firms arent also American adversaries. The CCP very plainly sees its homegrown tech giants as vectors to advance what it defines as the national interest.
The leadership of Xi Jinping aspires to be a superpower in cyberspace in science and tech, Sacks, the New America fellow, told me. Creating national champion companies that can go out and be globally competitive is fundamental to that.
These arrangements arent just implied or hoped for; more often, theyre formalized and enforced. Under Xi, party membership has become even more of a professional boon. Private companies set up dedicated party cells to comply with Article 19 of Chinas corporate legal code, which requires companies [to] provide the necessary conditions for the Party organizations to carry out their activities. In practice, according to one China analyst, that has increasingly meant party members with influence over executive-level decision-making. Signs hung up around tech offices, according to the analyst, read This company will not betray party values.
On the one hand I have not gone looking for a document where they say tech companies should act as platforms to retransmit party values and norms, another China analyst at a major American think tank told me. On the other hand, that document probably exists because thats how they describe literally every other media platform. The party seeks to instrumentalize all of Chinese society as a vessel for its ambitions and preferred norms.
And when the CCP decides a tech platform is harming its ambitions, the consequences can be severe.
In April 2018, the Chinese government forced ByteDance the $75 billion company headquartered in Beijing that makes TikTok, the outrageously popular app for video sharing to shut down a popular app called Neihan Duanzi. Its infraction? Hosting lewd jokes and comments that obliquely poked fun at the CCP. After the shutdown, ByteDance CEO Zhang Yiming performed an elaborate apology in a public letter. Our product took the wrong path, and content appeared that was incommensurate with socialist core values, he wrote. In the future, he added, the company would further deepen cooperation with authoritative media.
For a comparison, imagine Jack Dorsey apologizing to Trump for all the sick owns by Twitter users, then offering to build deeper synergies with Fox News.
What exactly the CCPs ideological struggle as instrumentalized through tech platforms looks like beyond China's borders isnt yet clear.
Chuanying Lu, a research fellow at the Shanghai Institutes for International Studies and a visiting fellow at the Center for Strategic and International Studies, told me that the international spread of its digital model is a much lower priority for the Chinese government than its domestic effect. "The data security, privacy, and social stability concerns are far more important than projecting influence around the world," he said.
But that doesn't mean it isn't happening. WeChat, the billion-user-strong Chinese messaging and payments app, has tens of millions of users outside of China. Media reports and China analysts both indicate that Tencent, the company that owns WeChat, has turned its frighteningly sophisticated censorship apparatus on foreign users by disallowing sensitive news stories and blocking dissidents who live overseas from sending messages.
Meanwhile, TikTok, the worlds most-downloaded app this year and Chinas greatest global social media success, has strenuously denied censoring users content about the Hong Kong protests. But TikToks algorithm, like those of Facebook and Twitter, is a black box, and its impossible to tell the degree to which it limits content that challenges the CCP narrative versus what is the mere result of normal algorithmic activity. Last week, the Washington Post reported that ByteDance exerts strict control over what content can appear on the US version of the app, following a Reuters report that the US government had opened a national security investigation into TikTok. President Trumps ban in May on American firms doing business with Huawei, the Chinese telecom giant, suggests that restrictions against Chinese-made social platforms, mirroring the Chinese bans on Twitter, Facebook, and Google, arent outside the realm of possibility.
But there are other markets: Turkey, Pakistan, Brazil, Nigeria, India. The whole rest of the world.
And the whole rest of the world can see exactly whats happening in the US. Its all right there, online. And when viewed without sentimentality about the primacy of the US and its values, the chaos machines of American social media become a much harder sell.
The US is in the midst of an identity crisis, one that has been hastened, for better or worse, by the mass use of largely unregulated social networks. Recently, a former Facebook executive encouraged me to think of our internet model as a proposition with costs and benefits. There are a lot of both.
Benefit: Americans have never had more information about their elected officials. Cost: Americans have never been more vulnerable to foreign influence in their elections. Benefit: Isolated young men find companionship in online affinity groups. Cost: Those affinity groups sometimes produce white nationalist terrorists. Americans have never heard more from politicians on social media. Americans have never heard more from politicians on social media. Et cetera.
It can be hard to know how to deal with the costs without canceling out the benefits; indeed, the openness of the American social networks can appear to be at once their greatest strength and most intractable weakness. And those weaknesses are real. Social trust in the US has imploded, and, according to a Pew poll, Americans list social media as the third-most-likely reason why (after Societal/political problems and Government activity/inactivity.)
The US is a mature, if imperiled, democracy, with strong, if imperiled, institutions. But other countries dont necessarily share Americans relative capacity for nonviolent social conflict. So when American platforms tout the benefits of the unregulated internet in foreign markets, it can sound insane, like a raving drunk urging you to take a swig of Jack Daniels.
We have pushed around the world an internet freedom agenda that says dont try too hard to control social media, Andrew Keane Woods, a law professor at the University of Arizona and a scholar of international law and technology, told me. Were still emphasizing a model of internet governance that was good for us when it was good for us.
The US government and US tech companies emphasize it not just through rhetoric about free speech, but through trade deals and enforcement decisions. Recent agreements with Mexico, Canada, and Japan have tucked in legal protections for internet companies based on Section 230 of the Communications Decency Act, the controversial legislation that shields internet service providers from liability for content posted by third-party users. In other words: Your American speech device malfunctioned and hurt someone? Sorry, you cant sue us. And foreign governments have had a notoriously difficult time getting networks like Facebook and Twitter to comply with local laws in the interest of taking down content. Sometimes Twitter has a good reason for that; a government might spuriously label a rival political group a terrorist organization in order to get Twitter to remove its content. But at other times, governments have simply had to block or shut out entire American social networks to prevent the spread of violence.
I recently talked to an executive at a major American social platform who speculated that Chinese social networks would quickly comply with any takedown request from a non-Chinese government.
You will not see them battle for users, they said. How we respond to government requests is built around American notions of due process. Theyre not thinking about these as values-based decisions the way we are.
But the American tech platforms seem incapable of admitting that some governments and the people who support them may see authority and control as greater virtues than untrammeled speech or even human rights, especially when taking into account the bloody history of these platforms abroad. They facilitated the Arab Spring, yes. But also: They facilitated the Arab Spring! American social networks have fueled genocide in Myanmar, an authoritarian dystopia in the Philippines, and lynchings in India. I asked the same executive at a major social network what their companys value proposition would be compared to a hypothetical Chinese app that offers equivalent features, strong control, and pro forma takedowns. The answer was an appeal to incumbency. The rest of the world is on us, they told me.
The scale advantage is even more powerful in tech than it is elsewhere. Maybe thats the end of the conversation. But there is an irony to a Silicon Valley executive stressing incumbency as a sales pitch; if anyone should be afraid of a disruptor, offering a service no one else does, shouldnt it be them?
Yes, its true that most of the worlds people who go online do so via American internet companies. But its also true that these platforms are young, and they dont sell a physical product like the ones that led the globalization of American culture in the second half of the 20th century. They offer a service that to the vast majority of people in the world will look no different from a Chinese competitor.
That doesn't, of course, mean they're the same.
Facebook, Twitter, and YouTube are in many cases not good actors, the China analyst at the major American think tank told me. They are not forthcoming about how information spreads on their platform. But they are still light-years better than any Chinese social media platform.
And yet, in a bipolar future where China wields economic clout comparable to that of the US, its easy to imagine governments choosing the devil they control over the devil they dont.
The values are so different, the analyst said. China has the juice to affect literally what path countries in Africa, Latin American, and the Middle East choose to take. The United States is never going to become an authoritarian country because of China, but hundreds of millions or billions of people will see their futures altered by the rise of this influence.
Last month, after the NBA and several of its stars publicly undermined Daryl Moreys support of the Hong Kong protesters, the American left and right united in their criticism. However briefly, they came together to heap scorn on so-called woke capitalism the practice of supporting progressive social causes as long as they dont hurt the bottom line, or indeed because they are good for it.
While it is easy to defend freedom of speech when it costs you nothing, equivocating when profits are at stake is a betrayal of fundamental American values, read a letter that was cosigned by eight members of Congress, including political foes Sen. Ted Cruz and Rep. Alexandria Ocasio-Cortez. The intensity of the reaction to the NBAs capitulation These spineless weaklings have shamed themselves and their country, read a column in the Washington Post at the time seemed to exceed mere patriotic indignation. Trump, who literally invites foreign powers to investigate his political enemies, has never drawn such a furiously nationalistic condemnation.
Remember, though, that the woke causes of NBA players tend to be issues of racial injustice, which threaten foundational American stories about equality and opportunity. Remember that this discourse plays out mostly on Twitter and Facebook. Indeed, there is a deeper factor at work here in this messy collision of our open model of cyber sovereignty and Chinas territorial aspirations: anger that Americans who persistently question the countrys legitimacy on American speech platforms wont in turn question the legitimacy of the CCP in the same way. More than that, there is anxiety, even shame, over a market-driven world order that doesnt revolve around US values. That the US has produced global brands the NBA and Facebook with a higher allegiance to the bottom line than to the flag is simply a tension inherent in the libertarian capitalist American ethos, one the Chinese government will never allow its corporations to have.
Heres another way of thinking about it. The Chinese Communist Party has built an internet with its own best interests at its core. US internet companies have built an internet with their best interests at their core. Where this gets complicated is when actors celebrities, brands, and tech companies themselves are torn between serving the interests of the Chinese Communist Party and those of the US internet companies. Yet absent any other imperative, they will likely follow the money.
This explains Zuckerbergs sudden patriotic turn. In a digital world increasingly drawn along allied national boundaries, it makes the most sense for his bottom line to be as big and as close as possible to the US government; something like a communications version of Boeing or Lockheed Martin. In a different tech sector, Amazon is already taking this path.
Breaking up our tech giants could absolutely have negative implications for our competition with China, which presents a far more coherent and predictable model of digital control.
US and Chinese tech companies are actively competing for users and advertising, so its naive to think that breaking up a large successful American tech company would have no impact on the economic Cold War being fought between the two countries, Matt Perault, the director of the Duke University Center for Science & Technology Policy and the former director of public policy at Facebook, told me recently.
But the cost of inaction might be worse.
A Facebook bloated from the government teat might never have to clarify its murky privacy and data collection policies, Samm Sacks, the New America fellow, said. This could precipitate a race to the bottom with China, in which the Zuckerbergs of the world use free speech as a fig leaf while exploiting their users more than ever; corporate overreach in the US would mirror state overreach in China. That would be an enormous propaganda victory for the CCP, which could then claim, cynically, that each countrys tech giants are equally dependent instruments of monolithic powers.
Indeed, the challenge for the American digital model in the future is to make the case that even in a time of extraordinary uncertainty around the world, freedom online is preferable to order.
And to deliver that message effectively, we first have to actually believe it.
View original post here:
The American Internet Sucks. The Alternative Is China. - BuzzFeed News
Cybersecurity and digital trade: What role for international trade rules? – Brookings Institution
Trade and cybersecurity are increasingly intertwined. The global expansion of the internet and increased use of data flows by businesses and consumersfor communication, e-commerce, and as a source of information and innovationare transforming international trade. 1 The spread of artificial intelligence, the internet of things, (IoT) and cloud computing will accelerate the global connectivity of businesses, governments, and supply chains.2
As this connectivity grows, however, so does our exposure to the risks and costs of cyberattacks.3As the Presidents National Security Telecommunications Advisory Council observed, the U.S. is faced with a progressively worsening cybersecurity threat environment and an ever-increasing dependence on internet technologies fundamental to public safety, economic prosperity, and overall way of life. Our national security is now inexorably linked to cybersecurity.4
Not only are traditional defense and other national security targets at risk of cyberattack, so too is the broader economy. This includes critical infrastructuresuch as telecommunications, transport, and health carewhich relies on software to network services. There is also cybertheft of intellectual property (IP) and manipulation of online information. More broadly, these risks undermine business and consumer trust in the internet as a basis for commerce and trade.5
Many countries are adopting policy measures to respond to the threat.6 According to one estimate, at least 50 percent of countries have adopted cybersecurity policies and regulations. 7 Some of these policies recognize a need for international cooperation: the EU identified a need for closer cooperation at a global level to improve security standards, improve information, and promote a common global approach to network and information security issues 8 and the most recent U.S. Cybersecurity Strategy reaffirms the need to strengthen the capacity and interoperability of those allies and partners to improve our ability to optimize our combined skills, resources, capabilities, and perspectives against shared threats. 9
Cybersecurity policy is also increasingly risk-based, requiring governments, organizations, and businesses to assess the risk of attack, determine potential harm, and develop appropriate measures to reduce the risk or impacts.10This includes addressing cybersecurity risk over global supply chains. Some proposed measures are likely to constitute barriers to data flows and digital trade. These include data-flow restrictions, data-localization requirements, and import restrictions on information technology (IT) products, including software from countries or supply chains where cyber risk is high. Countries may also resort to import restrictions including higher tariffs as a means of punishing and deterring cyberattacks.
By treating goods, services, or data from high-risk countries less favorably than those from countries where cyber risk is lower, cybersecurity measures may violate various World Trade Organization (WTO) and free trade agreement (FTA) commitments. Where a government is in breach of such commitments, they can seek to justify the cybersecurity regulations under the security or general exception provision of the relevant treaty.
Until recently, governments have largely avoided relying on the security exception to justify trade restrictions. There had been no WTO case dealing with the security exception provision prior to 2018. This was largely because of the potential for abuse of this provision to justify trade restrictions. However, changes in the global security environment, in particular the end of the notion that major powers would converge and stop treating each other as rivals,11 has revealed once again that economic integration can be a source e of vulnerability,12 Digital connectivity over the internet and through cross-border data flows has expanded opportunities for trade and integration more broadly. In parallel, this has created vulnerability to cyberattacks. This includes use of cyber methods to attack another governments defense and industrial base, or steal its IP or trade secrets or manipulate online information to sow discord.
These developments are underpinning a broader turn by governments to economic instruments to promote or defend what are seen as national security, leading to greater reliance on the WTO security exception to justify these measures.13 The Trump administrations reliance on national security to justify tariffs on steel and aluminum, and potentially on imports of automobiles, points to this trend. U.S. tariffs on Chinese imports is also in part an effort to deter Chinese cyber theft of U.S. IP and trade secrets.14 This administration is not alone in resorting to security to justify trade barriers. Russia relied on a WTO security exception to justify restrictions on the transit of Ukrainian goods and services, leading to the first WTO case on the security exception. The UAE is also using the WTO security exception to justify trade restrictions with Qatar as part of its broader dispute.
The rising need for cybersecurity creates two distinct challenges for the rules-based trading system. The first is the role of the security or general exceptions provision in the WTO and in FTAs in distinguishing between genuine cybersecurity measures taken by governments and those that are merely disguised protectionism. The second is that as economies become more digital and connected, there is likely to be significant growth in trade restrictions for legitimate cybersecurity purposes.
As discussed in this paper, the WTO security exception was designed to address a more traditional set of security measures: it is not well designed to deal with measures that restrict trade to address cybersecurity risk. In particular, the approach in the WTO to determining what is a security issue, and the requirement that security measures be taken in response to a security issue, is at odds with how governments are responding to the diffuse, longer-term nature of cyber risk. FTA security exceptions provide more flexibility. Yet here, the risk is that growth in cybersecurity regulation will blow a hole in FTA digital trade commitments.
The alternative to relying on the security exception is to justify cybersecurity regulation under the WTO and FTA general exceptions. Yet, governments are unlikely to tolerate the higher levels of WTO scrutiny that goes with seeking to justify what they see as increasingly important security measures. Moreover, the complexity of the issues, and the mix of economic and security concerns that leads government to rely on classified information, will present significant hurdles to using the general exceptions provision as a way to discipline disguised protectionism.
Addressing these issues requires a new way of thinking about the trade rules for cybersecurity. What is needed is a more fine-grained understanding of the types of cybersecurity risk. Consideration should be given to developing a new set of cybersecurity-specific trade rules.
It is also necessary to build cooperation on cybersecurity: this paper outlines areas where this can happen, including around sharing and access to data and the development of cybersecurity standards. Indeed, where the ethics of cybersecurity are about reducing harm and building trust, cybersecurity can be a vital part of the digital economy and trade. Yet, in the absence of cooperation, cybersecurity risks becoming a core organizing principle for the digital economy, leading to increasing trade with trusted partners and less exposure to countries presenting cyber risk.
This paper proceeds as follows:
View post:
Cybersecurity and digital trade: What role for international trade rules? - Brookings Institution
3 types of email you should never open – AndroidPIT
Internet security is an issue that should concern us all. While users tend to become more responsible with experience, the traps are becoming more sophisticated and the malicious people who invent them are constantly renewing their tactics. Email is one of the main gateways for cybernetic offenders who want to exploit a flaw in our systems.
Phishing is a form of computer fraud that aims to convince a user, using a graphical interface similar to that of a company or a bank, that he or shecan enter their contact details. Of course, they are then received by the malicious person who created the interface. This is one of the most common tactics for appropriating our personal information.
There is a simple rule to ensure security in emails: always be wary of anything you receive. If you apply this strategy, your devices and personal information will be a little more secure. However, here are three types of e-mails that you should absolutely avoid opening:
No company or bank will send you an email asking you to "confirm" your personal data through a form or by replying to the email or following a link. If they need to verify your identity or any of your data, the process will be done personally or from the company's website.
Congratulations, you are the lucky winner of a prize of one hundred thousand dollars! The situation is simple: if you have not entered a contest or sweepstakes, it is impossible for you to have won something, and therefore to receive an email notification. Emails warning you that you have inherited a huge fortune from an unknown relative also fall into this category.
Generating fear is an effective strategy for others to do what we want. In the case of technology, what is scarier than a virus? It is not impossible that our devices may be contaminated, but if so, the virus will manifest itself through system errors or an antivirus alert, but certainly not by email.
Remember that it is best to delete these emails without opening them. If you have any doubts, open them; but do not answer or click on the links in the email.
Have you ever been the victim of an Internet trap? Share your stories in the comments section below.
When will 5G arrive? – Verizon Communications
For many cities across the U.S., 5G has already arrived.
Verizon has been preparing for the launch of 5G over the past few years and has been testing the technology in a variety of markets to ensure it is built right. Verizons 5G Ultra Wideband mobile network officially launched in April of 2019 in Chicago and Minneapolis and is expected to reach more than 30 cities nationwide by year end. In addition to 5G mobility, Verizon also offers 5G Home broadband internet service in select cities in the United States.
Verizons 5G network can help spur the continuous growth of business, education and technology around the world. It has the potential to support millions of devices at once and can support improvements in accessibility, expand the capabilities of broadband and progress public safety, health and security.
The following cities and neighborhoods have already welcomed the Verizon 5G mobile network in 2019 and there are more on the way.
Expect to see Verizon launch 5G in more cities across the country throughout the rest of the year. These will be in both large and small cities, focusing on areas like business districts, public spaces and tourist gathering spots to provide super-fast speeds in high-density regions. For example, if you visit Millennium Park in Chicago or the National Mall in Washington, D.C., and you have a 5G device, you can experience the power of Verizon 5G Ultra Wideband in parts of these locales.
Learn more about all there is to come with Verizon 5G as well as 5G Home internet. Dont forget to check out our selection of 5G phones.
Read this article:
When will 5G arrive? - Verizon Communications
New Bytecode Alliance Brings the Security, Ubiquity, and Interoperability of the Web to the World of Pervasive Computing – Mozilla & Firefox
New community effort will create a new cross-platform, cross-device computing runtime based on the unique advantages of WebAssembly
MOUNTAIN VIEW, California, November 12, 2019 The Bytecode Alliance is a newly-formed open source community dedicated to creating new software foundations, building on standards such as WebAssembly and WebAssembly System Interface (WASI). Mozilla, Fastly, Intel, and Red Hat are founding members.
The Bytecode Alliance will, through the joint efforts of its contributing members, deliver a state-of-the-art runtime environment and associated language toolchains, where security, efficiency, and modularity can all coexist across the widest possible range of devices and architectures. Technologies contributed and collaboratively evolved through the Alliance leverage established innovation in compilers, runtimes, and tooling, and focus on fine-grained sandboxing, capabilities-based security, modularity, and standards such as WebAssembly and WASI.
Founding members are making several open source project contributions to the Bytecode Alliance, including:
Modern software applications and services are built from global repositories of shared components and frameworks, which greatly accelerates creation of new and better multi-device experiences but understandably increases concerns about trust, data integrity, and system vulnerability. The Bytecode Alliance is committed to establishing a capable, secure platform that allows application developers and service providers to confidently run untrusted code, on any infrastructure, for any operating system or device, leveraging decades of experience doing so inside web browsers.
Partner quotes:
Mozilla:
WebAssembly is changing the web, but we believe WebAssembly can play an even bigger role in the software ecosystem as it continues to expand beyond browsers. This is a unique moment in time at the dawn of a new technology, where we have the opportunity to fix whats broken and build new, secure-by-default foundations for native development that are portable and scalable. But we need to take deliberate, cross-industry action to ensure this happens in the right way. Together with our partners in the Bytecode Alliance, Mozilla is building these new secure foundationsfor everything from small, embedded devices to large, computing clouds, said Luke Wagner, Distinguished Engineer at Mozilla and co-creator of WebAssembly.
Fastly:
Fastly is very happy to help bring the Bytecode Alliance to the community, said Tyler McMullen, CTO at Fastly. Lucet and Cranelift have been developed together for years, and were excited to formalize their relationship and help them grow faster together. This is an important moment in computing history, marking our chance to redefine how software will be built across clients, origins, and the edge. The Bytecode Alliance is our way of contributing to and working with the community, to create the foundations that the future of the internet will be built on.
Intel:
Intel is joining the Bytecode Alliance as a founding member to help extend WebAssemblys performance and security benefits beyond the browser to a wide range of applications and servers. Bytecode Alliance technologies can help developers extend software using a wide selection of languages, building upon the full capabilities of leading-edge compute platforms, said Mark Skarpness, VP, Intel Architecture, Graphics, and Software; Director, Data-Centric System Stacks.
Red Hat:
Red Hat believes deeply in the role open source technologies play in helping provide the foundation for computing, from the operating system to the browser to the open hybrid cloud, said Chris Wright, senior vice president and Chief Technology Officer at Red Hat. Wasmtime is an exciting development that helps move WebAssembly out of the browser into the server space where we are experimenting with it to change the trust model for applications, and we are happy to be involved in helping it grow into a mature, community-based project.
Useful Links:
About Mozilla
Mozilla has been a pioneer and advocate for the web for more than 20 years. We are a global organization with a mission to promote innovation and opportunity on the Web. Today, hundreds of millions of people worldwide use the popular Firefox browser to discover, experience, and connect to the Web on computers, tablets and mobile phones. Together with our vibrant, global community of developers and contributors, we create and promote open standards that ensure the internet remains a global public resource, open and accessible to all.
Go here to see the original:
New Bytecode Alliance Brings the Security, Ubiquity, and Interoperability of the Web to the World of Pervasive Computing - Mozilla & Firefox