Page 1,619«..1020..1,6181,6191,6201,621..1,6301,640..»

Securing data within the cloud: Common problems enterprises are facing … and solutions – SiliconANGLE News

The cloud is changing, and not just mildly. As enterprises increasingly adopt hybrid cloud, multicloud and edge technologies, the ways in which to secure data within all these infrastructures are becoming increasingly intricate.

Problems with securing data and other critical assets within the cloud have subsequently increased as organizations refactor their strategies to accommodate in-demand technologies like AWS S3.

The big thing that were seeing is thatcustomers are blind to the fact thatthe data itself must also be protected and looked at, saidEd Casmer (pictured, left), founder and chief executive officer of Cloud Storage Security. And, eventually, we find these customers who do come to therealization that it needs to happen.And so, really, the blind spot is the factthat we find most customers not looking atwhether that data is safe to use.

Casmer andJames Johnson (pictured, right), associate vice president of research and development at iPipeline Inc., spoke with theCUBE industry analystJohn Furrier at the Cybersecurity Detect and Protect Against Threats event, during an exclusive broadcast on theCUBE, SiliconANGLE Medias livestreaming studio. They discussed the areas organizations must begin to pay attention to as they run large swathes of cross-infrastructure, cloud-based data. (* Disclosure below.)

iPipeline, a leading purveyor of cloud-based software for the insurance and financial services industry, is also one of CSSs customers. The company is in the process of fleshing out its digital ecosystem in the cloud, away from the traditional data center implementation. In doing so, iPipeline has had to rethink its approach to file storage and vulnerability scanning, according to Johnson.

It was really necessary for us to identifya solution that both solved for thesevulnerability scanning needs,as well as enabled us to leverage the capabilitiesthat we get with other aspects of our move to the cloud things like being able to automatically scale based and need, he said.

Speed and scale were the main drivers for iPipelines decision to move to CSS, according to Johnson. As the companys infrastructure requirements increased, it began to feel like it needed a cloud-native solution that could perform dynamic security scans without worrying about manually spinning up new engine instances.

Being able to scan dynamically andalso being able to move that out of the application layer is crucial for us,basically doing it all behind the scenes, Johnson stated. We are now able to scan with the file saved in S3, allowing us torelease the fileonce its been deemed safe, rather thanblocking the user while they wait for that scanto take place.

With solutions providers that bear custody of corporate data at any level, theres always the question of compliance and auditing. They are answerable to two tangentially different stakeholders: their customers and the regulatory bodies.

Traditionally, weve looked at that compliance requirement as endpoint dataand the data that you see in your on-premise world, Casmer explained.It doesnt translate as directly to cloud data,but its certainly applicable.And if you want to achieve SOC 2or you want to achieve some of these other pieces,you have to be scanning your data as well.

A solution like iPipelines will inevitably have to ingest data from a vast multitude of sources. And the onus is on the company to ensure the data from all these disparate sources are risk-free, according to Johnson.

As we ingest that data,theres minimal impact toeach one of those integrations,because everything comes into the S3 bucketand is scanned before it is available forconsumption or distribution, he explained. This allows us to ensure thatno matter where that data is coming from,we are able to verify that it is safebefore we allow it into our systems orallow it to continue on to another third party, such as a customer.

Security solutions for cloud data have been available for a while. However, the reason why the enterprise keeps falling prey to malicious actors is that the floor keeps shifting beneath companies as malicious actors change approaches, according to Casmer.

It is a moving target, he said. As new technology becomes available,that opens additional attack vectors.The challenge is keeping up with the changing world,including keeping up with the new ways that people are findingto exploit vulnerabilities.

Heres the complete video interview, part of SiliconANGLEs and theCUBEs coverage of the Cybersecurity Detect and Protect Against Threats event:

(* Disclosure: Cloud Storage Security sponsored this segment of theCUBE. Neither Cloud Storage Security nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Read the original post:
Securing data within the cloud: Common problems enterprises are facing ... and solutions - SiliconANGLE News

Read More..

Backblaze thinks SSDs are more reliable than hard drives – The Register

Cloudy backup and storage provider Backblaze has found that flash SSDs are more reliable than hard drives, at least as far as the boot drives deployed in its datacenters go, but cautions this could change in future as the SSDs age.

These findings come from Backblaze's latest report detailing reliability statistics on the drives used in its infrastructure, and in this case it is only the second such report to focus on SSDs, following one the company published in March.

One of the issues the company wanted to settle is whether SSDs really are more dependable than hard drives, but the data published in March appeared to show that the SSDs were following the same pattern of failure rate as the HDDs over time, albeit with a slightly lower annualized failure rate (AFR).

The SSDs and HDDs here are all used as boot drives, rather than the disks used to store data, and Backblaze began a switch to SSDs in Q4 2018, which means that the two sets of drives are at different points in their respective life expectancy curves. To compensate for this, the company only compared SSDs that were on average one year old with HDDs that were on average one year old, and so on.

With another year of data available, the failure rate of the SSDs took a downward turn rather than continuing to follow the same failure rate as the HDDs.

"At this point we can reasonably claim that SSDs are more reliable than HDDs, at least when used as boot drives in our environment. This supports the anecdotal stories and educated guesses made by our readers over the past year or so," said Andy Klein, Backblaze principal cloud storage evangelist.

However, he warned it is "highly certain" that the failure rate of the SSDs will eventually start to rise again, and it is possible that at some point the SSDs Backblaze uses could "hit the wall" perhaps when they start to reach their media wearout limits.

"Over the coming months we'll take a look at the SMART stats for our SSDs and see how they relate to drive failure. We also have some anecdotal information of our own that we'll try to confirm on how far past the media wearout limits you can push an SSD," Klein said.

The boot drives do more than just boot up Backblaze's storage servers, of course, as they also store log files and temporary files produced by each server, and so a boot drive will read, write, and delete files depending on the activity of the storage server itself.

As of June 30, 2022, there were 2,558 SSDs in the storage servers. This compares to the 2,200 SSDs that were covered in the March report.

Looking over the quarterly failure rates for Q1 and Q2 2022, it can be seen from the respective tables that the same number of failures was recorded (7) in each quarter, despite there being more drives included in Q2 than in Q1. This is reflected in the lower AFR for Q2 than for Q1.

Klein said that for any drive model within this cohort of SSDs, Backblaze would prefer to see it represented by at least 100 drives and account for at least 10,000 drive-days (the number of days all the drives of a specific model were operational) in a given quarter before considering the calculated AFR to be "reasonable." None of the drives meet this threshold yet.

Backblaze also examined the entire lifetime data available for all the SSD models it had active in its datacenters as at the end of Q2 2022.

It found that this lifetime AFR for all of the SSDs came out at 0.92 percent, a figure that is down from the 1.04 percent for the whole of 2021, but exactly the same as the Q2 2021 AFR of 0.92 percent. Klein warned here that Backblaze likes to see a confidence interval of 1 percent or less between the low and the high confidence interval values before the company is confident about the calculated AFR.

He noted that in these figures there are three drives with a confidence interval of 1 percent or lower, and picks out the Dell drive as the best.

"It is a server-class drive in an M.2 form factor, but it might be out of the price range for many users as it currently sells from Dell for $468.65," he commented. In contrast, the other two drives are consumer-focused and ship in the traditional SSD form factor, and both are from Seagate the ZA250CM10003 and ZA250CM10002.

As ever, Backblaze makes available the data collected and analyzed for this report on its Hard Drive Test Data page for others to examine. Anyone can download and use this data for free, provided they cite Backblaze as the source and do not sell this data to others.

Follow this link:
Backblaze thinks SSDs are more reliable than hard drives - The Register

Read More..

Meeting the ESG Imperative Holistically – Institutional Investor

According to BNY Mellon interviews and survey, securities lending has regained a degree of momentum as a part of front-office investment activity, with the most sophisticated investors making it a core component of the total portfolio approach.

Among institutions already engaged in securities lending, some plan to liberalize lending guidelines and review existing lending agreements. These shifts counter the retreat from securities lending programs following the 2008 financial crisis, when a lack of transparency, concerns about short selling and perceived links to market volatility steered many public asset owners away.

Securities lending is moving beyond these concerns. Growing regulatory support, front-office control and governance, flexible platforms and technology, and alignment to broader principles and mandates may create a supportive backdrop and foster a more positive attitude.

Recent initiatives focusing on transparency and reporting seem to have reinforced institutional confidence. For example, the European Unions Securities Financing Transactions Regulation (SFTR) introduced granular transparency for securities lending transactions.4 In November 2021, the U.S. Securities and Exchange Commission (SEC) proposed similar reporting rules for securities lending participants.5 Regulators are also considering mandatory clearing to strengthen securities lending.6 Central clearing could increase utilization and revenue for public asset owners while potentially reducing risk.

Based on interviews, institutions increasingly see securities lending as part of front-office investment activity rather than merely an offset for administration and custody costs. One official in the survey who relies heavily on external managers explained, The most sophisticated investors see securities lending as a component of a total portfolio approach alongside their investments.

Interviews revealed that public asset owners have more flexibility in securities lending than previously. For example, they can tailor lending for a given spread or focus only on a limited set of high-value securities. The industry is also increasing its flexibility by extending the range of acceptable collateral. Ultimately, however, its the overall features of a collateral set, such as concentration limits, minimum capital requirements and minimum share price levels, that are recognized as more important than the inclusion or exclusion of a specific security. Additionally, fintechs are also offering so-called fully paid securities lending, allowing intermediary banks or brokers to act as a counterparty for higher value/spread trades. Finally, securities lending platforms can increasingly integrate with institutions operations for better visibility alongside other portfolio data, using APIs, for instance.

Interviews showed that sustainability considerations can raise concerns about conflicts with an institutions mandate and objectives. Further, public asset owners in the Middle East and parts of Asia want to ensure that securities lending counterparties are Shariah-compliant. Malaysia became the first market to adopt a Shariah-compliant securities lending framework in 2017.7 Still, others interviewedstruggle with the ethical implications of perceived downward pressures on markets. As a result, securities lending platforms are evolving to accommodate a broader set of principles, affording public asset owners better tools to understand the implications of their securities lending programs. Emerging solutions are also allowing clients to see the ESG implications of their collateral and to control prohibited short-selling.

Read the original:
Meeting the ESG Imperative Holistically - Institutional Investor

Read More..

Distributed Cloud Market worth $11.2 billion by 2027 Exclusive Report by MarketsandMarkets – GlobeNewswire

Chicago, Sept. 13, 2022 (GLOBE NEWSWIRE) -- Distributed Cloud Marketsize is expected to grow from USD 4.4 billion in 2022 to USD 11.2 billion by 2027, at a Compound Annual Growth Rate (CAGR) of 20.6% during the forecast period, according to a new report by MarketsandMarkets.

Browse in-depth TOC on Distributed Cloud Market211 Tables 55 Figures 208 Pages

Download PDF Brochure: https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=165173185

Data storage service type to hold largest market share of Distributed cloud in 2022.

The distributed cloud enables business data transfer of any size without any additional fee. It can protect the sovereignty of data in full compliance with GDPR. It offers an AI-powered data lake to keep data in one place by raising the quality of predictive analytics. It is applicable for various use cases using manufacturing, IoT, machine learning, and imaging.

Small and medium enterprises are likely to adopt distributed cloud solutions at a higher rate during the forecast period.

Cloud solutions offer scalable infrastructure and capabilities for SMEs to meet a sudden demand. SMEs face stiff competition due to a lack of technical skill sets and IT budgets. To overcome these challenges, SMEs are adopting the pay-as-you-go model, which offers the flexibility to manage the IT infrastructure as per their requirement. SMEs are focusing on adopting the hybrid cloud solution, which enables the quick transfer of workload to the public cloud per the requirements, which is likely to drive the adoption of the Distributed Cloud Market.

Request Sample Pages: https://www.marketsandmarkets.com/requestsampleNew.asp?id=165173185

North America holds the largest market size in 2022

The global Distributed Cloud Market is expected to be dominated by North America, which is considered the most advanced region regarding the adoption of cloud computing solutions and associated services. The Distributed Cloud Market is expected to observe major growth in the North American region due to increased cloud enablement activities and trends in cloud marketplaces.

Key Players

The major players for Distributed Cloud Market include Google (US), IBM (US), Microsoft (US), AWS (US), VMware (US), Alibaba Cloud (China), Teradata (US), F5 (US), Cohesity (US), Oracle (US) Commvault (US), SCC (UK) Wind River Systems (US), Cubbit (Italy), PhoenixNAP (US), Pluribus Networks (US), Anyscale(US), Panzura (US), Platform9 (US), Zededa (US), and Hazelcast (US).

Browse Adjacent Markets:Cloud Computing Market Research Reports & Consulting

Related Reports

Hybrid Cloud Marketby Component, Service Type (Cloud Management and Orchestration, Disaster Recovery, and Hybrid Hosting), Service Model, Organization Size (SMEs and Large Enterprises), Vertical, and Region - Global Forecast to 2023

Cloud Storage Market by Component (Solutions and Services), Application (Primary Storage, Backup and Disaster Recovery, and Archiving), Deployment Type (Public and Private Cloud), Organization Size, Vertical and Region - Global Forecast to 2027

Read the original here:
Distributed Cloud Market worth $11.2 billion by 2027 Exclusive Report by MarketsandMarkets - GlobeNewswire

Read More..

9 Reasons Why Businesses are Switching to the Cloud (as told by a business consultant) – JD Supra

[Author: Arnold Rogers]

As an experienced business consultant, Arnold Rogers has advised businesses across many industries in areas of lead generation, customer experience, service development, and small business cash flow and financial management. He has experience in handling diverse industries, from fast-moving consumer goods to business-to-business hardware retailers.

Many businesses are switching to the cloud for their day-to-day operations, and you should too. Todays business climate keeps changing. You should be able to access data on your phone, tablet, or computer, whether in the office, home, or field. This will help you remain competitive. Cloud technology allows employees to access files and work platforms from any place in a secure way. Read on to find out why businesses are switching to the cloud.

Any data you store in the cloud is encrypted, making it safe. And since cloud technology is frequently updated, the cloud hosting company will implement the latest cybersecurity measures, ensuring your data isnt at risk. This is particularly important when you have a lot of customer information you wouldnt want to lose. Integrating your digital marketing strategies from Digital Spotlight into cloud computing can ensure your tricks remain safe with your business.

By switching to the cloud, you free up your staff members to focus on other important things. For instance, if you have hired an IT team, they can now focus on helping other employees with IT needs. Cloud computing also tends to boost employees productivity. Users can successfully focus on the task at hand without mixing different software bundles to accomplish tasks.

One of the advantages of cloud computing is the flexibility it offers. Your employees can work from whichever location, at whatever time. Considering that 1 in 3 remote employees may quit if asked to return to the office, cloud computing can protect you from such an inconvenience. On the other hand, a business can reduce workstations in the office, saving rental costs. As long as you have fast internet, youll continue monitoring your business and employees work from whichever corner of the world youre in.

Cloud hosting companies allow businesses to scale depending on their current needs. That means you only pay for what you need. As the business continues growing and your needs change, you can scale up quickly. For instance, you may not need data analysis tools or CRM immediately when youre a startup. But as you continue expanding, your cloud technology will have to include CRM programs. When that happens, contact your provider, and they will upgrade your package in a few minutes.

While it may seem counterproductive, hiring a third party to manage your IT infrastructure is cheaper than hiring an in-house team. With an in-house team, youll need to buy hard drives, software, and mobile devices and add workstations. The level of expertise and infrastructure needed to match that of a cloud computing company is expensive. Its much cheaper to work with a hosting company because you only call them when necessary. At the same time, businesses can save 30% to 50% by switching to the cloud, ultimately saving their running costs.

In the past, computing systems would need backup plans for large amounts of data. Understandably, a company will suffer a financial loss if theres no backup storage and disaster strikes. When storing data in the cloud, you dont need any such means to back up your data. That data will always be there whenever users need it. They only need to have internet, and they are good to go. In fact, the cloud itself is your backup plan because the data stored there is safe.

There are different cloud computing models which let you choose the option that fits your business. The main models include:

Business owners know just how important collaboration at work can help propel the company forward. One of the ways to boost team performance is through cloud computing. Employees can easily share information and collaborate on projects even when in different locations. Field workers can upload data in real-time, allowing those at the office to get updates. This saves time and eliminates redundant tasks like data re-entry. This level of efficiency increases productivity and saves money.

If you have yet to switch to cloud computing, start looking for a provider. Ensure its the right one, as your ability to enjoy the benefits outlined will depend on the provider you go with. You can ask for referrals from businesses that have already switched to cloud computing.

More:
9 Reasons Why Businesses are Switching to the Cloud (as told by a business consultant) - JD Supra

Read More..

Better Late Than Never: Ring Adds End-to-End Encryption to Battery Powered Doorbells – Gizmodo

Photo: Chip Somodevilla (Getty Images)

Amazon-owned home surveillance camera king Ring is making good on its promise to bring end-to-end encryption (E2EE) to a wider range of its devices. This week, the company added the encryption secretive for audio and video to its lower-cost battery-powered doorbells and cameras which were left out of the companys previous E2EE rollout. The addition marks Rings latest attempt to correct course on a product history littered with privacy and security blunders.

Privacy advocates and security experts have for years pushed Ring and other device makers like it to incorporate E2EE by default. Rings encryption services, which are annoyingly opt-in, provide enrolled devices with a one of its-kind encryption key to unlock the encrypted videos. Ring claims that the key keeps anyone other than the devices users, including Ring itself, from accessing the videos. Further, Ring says all video uploaded to its cloud network features E2EE, by default at rest and in transit.

We believe we should offer a full range of privacy options to as many customers as possible, Ring said in its blog post. And we know that different devices make sense for different living situations.

If this all sounds a bit familiar, thats because Rings journey to finally bring E2EE to its doorbells was years in the making. The company first toyed with the capability in January 2021 as a technical preview for a select number of users. Then, in July 2021 the company pleased some security experts by adding encryption to a selection of its products globally. That rollout applied to 13 Ring products but notably did not include the companys battery-powered video doorbells. Fast forward 14 months and, well, here we are. Now, E2EE is available on all of Rings devices except its lower-priced Ring Video Doorbell Wired, according to TheVerge.

So why the long wait for E2EE on battery-powered devices? According to Ring, it was to ensure the quality of the product.

G/O Media may get a commission

A feature as ambitious as video End-to-End encryption, quite simply, took time to build, a Ring spokesperson said in an email to Gizmodo. We hold ourselves to a high standard to give our customers the best possible experience and offer products and features they can trust.

Ring users who own the battery-powered doorbells will likely welcome the change, especially considering the companys long history of less than stellar security bonafides. In recent years, thousands of Ring owners have reportedly had their personal information compromised and leaked during data breaches. Rings also found itself on the receiving end of lawsuits calling into question its security practices following a long list of concerns and sometimes creepy hacks. In one case, hackers even broke into a Ring device to scare the shit out of a household and taunt their dog.

E2EE encryption is definitely better than the alternative, but it alone wont solve thornier privacy concerns more fundamental to Rings design. Case in point, earlier this year Ring rejected requests made by Massachusetts Democratic Senator Ed Markey to adjust the devices settings so it would not record audio by default after product testing from Consumer Reports found its flagship doorbells microphone could potentially capture recording of conversations from 20 to 25 feet away in his letter to the company. Markey argued this granularity of data potentially being collected by the doorbells threatens the right to assemble, move, and converse without being tracked. Ring, in rejecting the proposal, said making audio recording opt-in would result in a negative experience for its customers.

Update 4:23 P.M: Added statement from Ring.

View post:
Better Late Than Never: Ring Adds End-to-End Encryption to Battery Powered Doorbells - Gizmodo

Read More..

Beware, That VPN May Not Be What You Think It Is – CNET

There are some excellent, well-tested virtual private networks we recommend you try. But if you're exploring the competitive market of VPNs on your own, you're likely to find some shoddy VPNs companies that scatter hints of their dubiousness everywhere they go. Learning to identify a few of these red flags can save you hours of research and a hefty annual subscription cost for supposedly getting connected to the internet more securely.

Is the price too good to be true? Has the company been caught keeping logs? How are your connection speeds?

To save you time, here are a few of the biggest red flags to watch out for when taking your new VPN out for a test drive. And on the flip side, here are three things to look for in a VPN.

Read more: Best iPhone VPN of 2022

There's no such thing as a free lunch. Maintaining the hardware and expertise needed for large VPN networks isn't cheap. As a VPN customer, you either pay for a premium service with your dollars, or you pay for free services with your usage data when it's collected by the free VPN and bargained away to advertisers or malicious actors.

As recently as August 2019, 90% of apps flagged as potentially unsafe in Top10VPN's investigation into free VPN ownership still posed a privacy risk to users. Free VPNs can also leave you open to quiet malware installation, pop-up ad barrages and brutally slow internet speeds.

Read more: Best Free VPN 2022: Try These Risk-Free Services for a Privacy Boost

If a VPN is caught keeping or sharing user activity logs, I won't recommend it. While most VPN services claim they don't track or keep logs of user activity, that claim can sometimes be impossible to verify. In other instances, the claim falls apart publicly when a VPN company hands over internet records to law enforcement.

The latter has happened in a few cases. EarthVPN, Hide My Ass VPN and PureVPN have all been clocked by privacy advocates for handing over logs to authorities, as hasIPVanish.

To be clear, it is entirely possible to be grateful for the arrest of reprehensible scumbags while ardently advocating for consumer privacy interests. My beef isn't with any VPN company helping cops catch a child abuser via usage logs; it's with any VPN company that lies to its customers about doing so. The lie that helps law enforcement in the US catch a legitimate criminal is the same lie that helps law enforcement in China arrest a person watching footage of the 1989 Tiananmen Square protests.

Ideally, the VPN you choose should have undergone -- and published the results of -- an independent third-party audit of its operations, including its use of activity logs.

Read more: All the VPN Terms You Need to Know

Now playing: Watch this: Top 5 Reasons to Use a VPN

2:42

Another red flag to watch for when choosing a VPN is shoddy encryption standards. Users should expect AES-256 encryption or better from VPN services. Nearly every web browser and app already uses AES, often touted as "military-grade" encryption, after it was adopted by the US government in 2002. If your VPN only offers PPTP and L2TP encryption, look elsewhere.

While you're snooping around for encryption details, keep an eye out for one of our favorite phrases, "Perfect Forward Secrecy." Those three little words can have a hefty impact on your privacy: If one of your VPN's servers is ever breached, Perfect Forward Secrecy ensures that any keys used to decrypt private internet traffic quickly become useless -- giving you more security.

Read more: How We Evaluate and Review VPNs

With just a little bit of elbow grease, any moderately skilled internet jerk can throw together a service that looks like a VPN but is actually little more than a proxy service reselling your internet bandwidth. Not only can that slow your internet speed, it could potentially leave you on the legal hook for whatever they do with that resold bandwidth.

Hola's case was the most famous. The company was caught in 2015 quietly stealing users' bandwidth and reselling it to whatever group wanted to deploy its user base as a botnet. Hola CEO Ofer Vilenski admitted it'd been had, but contended this harvesting of bandwidth was typical for this type of technology.

Read more:How to Set up a VPN on our iPhone or Android Phone: Yes, You Need One

"We assumed that by stating that Hola is a (peer-to-peer) network, it was clear that people were sharing their bandwidth with the community network in return for their free service," he wrote.

Nearly all VPNs slow your browsing speed, some by as much as half. But a brutal crawl can be a sign of something worse than a simple lack of servers. So if being pressed into service as part of a botnet isn't your cup of tea, double-check those suspiciously slow speeds and the reputation of the VPN you're paying for.

For more VPN buying advice, here's how to pick the right VPN for your work-from-home setup. Plus, why we don't recommend US-based VPNs, and three things a VPN can't help you with.

See the original post here:
Beware, That VPN May Not Be What You Think It Is - CNET

Read More..

How to Use Secret Conversations on Facebook Messenger – How-To Geek

Peter Gudella/Shutterstock.com

Using Facebook Messengers Secret Conversations feature, you can ensure your messages and calls are end-to-end encrypted so that only the sender and the receiver can access them. Well show you how to utilize this feature on your iPhone or Android phone.

RELATED: What Is End-to-End Encryption, and Why Does It Matter?

When you enable the Secret Conversations feature with a user, Messenger encrypts your messages and calls as soon as you send them. Then, these contents are only decrypted on the receivers phone. This ensures no one can access your chat contents, not even Metaat least not without physical access to you or your recipients phone.

That encryption is the difference between a regular chat and a secret one. If any bad actors gain access to Metas servers, they cant see your encrypted messages. Any of your regular chats might be visible, as they remain unencrypted on Metas servers.

However, Meta restricts who you can have secret chats with. At the time of writing in August 2022, you cant start such a chat with businesses, professional accounts, Instagram accounts from Messenger, and people you havent messaged before. Also, both you and your chatting partner need to be using the latest version of the app, so make sure you both update Messenger on your respective devices.

Additionally, certain features you might be used to wont work while in one of these chats. Metastates that group messages and money payments are not supported in secret conversations. If those limitations create problems for you, look into alternativesecure communication methodsthat might offer the features you need.

To begin a new secret chat with someone, first, launch the Messenger app on your phone.

In the Messenger apps top-right corner, tap the pencil icon.

Youll see a New Message screen. Here, in the top-right corner, turn on the Secret Conversations option.

On the same page, in the To field, enter the name of the person you want to have a secret chat with. Then, select that person on the list.

A new chat will start with your chosen person. Any messages or calls you make in this conversation will be end-to-end encrypted. You can start sending messages as usual.

To make a voice or video call, then at the top of the chat screen, tap the appropriate icon.

To delete your secret chat with someone, then in the chat screens top-right corner, tap the i icon. Then, scroll down the page and choose Delete Chat.

And thats how you hold secret conversations with your chosen people on Facebooks Messenger platform. Happy chatting!

Did you know Messenger lets you send disappearing messages? Check out our guide to learn how to use that feature.

RELATED: How to Send Disappearing Messages in Facebook Messenger

Originally posted here:
How to Use Secret Conversations on Facebook Messenger - How-To Geek

Read More..

Here’s My Top Cryptocurrency to Buy in September – The Motley Fool

The stock market has been on a downhill slide this year, and crypto prices have also taken a tumble.

While that can be discouraging for investors, there is a silver lining: It's one of the most affordable times to buy. Most cryptocurrencies are priced at a steep discount compared to their peaks late last year, and if you've been on the fence about investing, now may be a smart time to dive in.

Choosing the right investment is critical, however. While everyone's investing preferences will be different, there's one cryptocurrency I'm loading up on in September: Ethereum (ETH 2.47%).

Ethereum has long been one of the strongest players in the crypto space, but its upcoming update, "The Merge," has many investors feeling even more optimistic.

The Merge will move Ethereum from a proof-of-work (PoW) mining protocol to proof of stake (PoS). This is an enormous undertaking, and it will reduce Ethereum's energy usage by roughly 99%.

Not only will this update help Ethereum better compete with smaller networks like Cardano and Solana (which already use a PoS protocol), but it will also set the stage for future updates to improve Ethereum's speed and transaction costs.

The Merge is already underway, with developers kicking off the first step of the update, Bellatrix, on Sept. 6. It's unclear exactly how long it will take to complete, but it's expected to finish sometime between Sept. 13-16. Once The Merge is fully rolled out, it will be the start of a new chapter for Ethereum.

Ethereum has plenty of advantages. It's the most popular network for decentralized applications (dApps) such as non-fungible token (NFT) marketplaces and decentralized finance (DeFi) projects. It's also the second- most popular cryptocurrency, with a market cap of more than $200 billion.

The Merge is a step in the right direction, but Ethereum will still face challenges. For one, this update won't solve Ethereum's most pressing issues -- namely its sluggish transaction times and high gas fees.

There is another update in the works to solve these problems, but it's not expected to happen until 2023 or 2024. While that upgrade could take Ethereum to new heights, one to two years is a long time for competitors to catch up and gain market share.

With many users and developers already frustrated by Ethereum's drawbacks, it's uncertain how much longer investors will be able to tolerate the network's slow speeds and high costs before moving to a competitor.

Whether the rewards outweigh the risks will depend largely on your personal investing preferences. Like all cryptocurrencies, Ethereum is a risky investment, and there are no guarantees that it will succeed over the long term.

Before you buy, consider how much risk you're able to tolerate, as well as how long you're willing to hold your investment. Ethereum is a long-term investment, and it will take years for it to reach its full potential. If you're willing to stick it out through the inevitable periods of volatility, it could pay off big time.

There's not necessarily a right or wrong answer as to where you should invest. Ethereum isn't perfect, but it remains one of the strongest cryptocurrencies in the field. If you believe in its long-term potential, it could be a fantastic buy right now.

More here:
Here's My Top Cryptocurrency to Buy in September - The Motley Fool

Read More..

This cryptocurrency exchange becomes the latest to set up shop in the UAE – AMBCrypto News

Blockchain.com, London-based crypto exchange, has been granted a provisional regulatory approval by the Virtual Assets Regulatory Authority (VARA), Dubai. With granted provisions, institutional and retail clients can use the crypt platform in the United Arab Emirates (UAE).

Blockchain.com, via ablogpost, stated that the organization is in the process of setting up a local office in the area. Furthermore, the company has full intentions of hiring for the same. The platform also underlined the importance of the licensing process as critical to its commitment to global compliance and regulation.

Peter Smith, CEO and co-founder, Blockchain.com appreciated the efforts of the local team via Twitter.

It was on 9 March 2022 that HH Sheikh Mohammed bin Rashid Al Maktoum, Vice President, Prime Minister and Ruler of Dubai approved the crypto assets law. Furthermore, with the establishment of VARA the goal of establishing the UAEs position as a global player in the virtual assets industry becomes easier.

The countrys crypto assets law necessitates cryptocurrency exchanges and users to register with the regulatory body before engaging in crypto-related activities, such as operating a crypto exchange, transferring crypto assets, and trading tokens or other assets. Since then, a number of cryptocurrency exchanges have been granted regulatory approval in the UAE by VARA.

Furthermore, on 3 June, Crypto.com received provisional approval of its Virtual Asset MVP from VARA. Thus, allowing crypto.com to offer crypto products and services. On 21 June, Hex Trust received a provisional approval from VARA.

On 14 July, crypto trading application OKX was provided a provisional virtual assets license by VARA. On 29 July, FZE, a division of the cryptocurrency exchange FTX, received the Minimal Viable Product (MVP) license by VARA. This proves that the country is open to offering virtual asset exchange products and services in the UAE.

In July, HH Sheikh Hamdan bin Mohammed bin Rashid Al Maktoum announced a new metaverse strategy. This strategy aims at increasing the number of blockchain and metaverse companies by 5x in the next five years.

The plan also aims to generate $4 billion. He further added that the move will help Dubai become a metaverse leader in the region. Thus, making it one of the 10 leading economies, besides generating 40,000 virtual jobs.

On 2 August, Blockchain.com successfully registered itself in the Cayman Islands to offer a range of crypto services to institutional clients. Soon after, the company secured regulatory approval from Italys Organismo Agenti e Mediatori (OAM) as a Virtual Asset Service Provider (VASP).

Blockchain.com said that the company is actively pursuing additional licenses in other countries as well. These include Germany, the Netherlands, France, Spain, and Ireland.

The crypto firm operates several offices in North America, Europe, South America, and Singapore.

See the original post:
This cryptocurrency exchange becomes the latest to set up shop in the UAE - AMBCrypto News

Read More..