Connect with us


Money’s quantum time bomb | Financial Times

Money’s quantum time bomb | Financial Times

There’s a paradox at the heart of cyber security. It relates to the trade-off between keeping our secrets safe and protecting the communications of bad actors.

Most people are blissfully unaware of it, but an uneasy balance was struck in the early 2000s following the conclusion of the Crypto Wars. After many years of fighting the ability to export secure encryption, US officials finally capitulated on restrictions in 2000, opening the door to a much larger share of the world being able to benefit from secure encryption protocols. While many saw this as too much of a concession to terrorists and criminal organisations, privacy advocates argued the benefits of secure communications for all outweighed the risks.

With quantum computing around the corner, however, some believe the power balance struck in the 2000s could be on the verge of breakdown due to the technology’s potential to break current encryption standards. This time, they say, the consequences could be far graver than anything in the past because of the scale of economic value and infrastructure that has been linked in the interim to secure encryption.

But others think the threat may be being overhyped by those who wish to profit from selling quantum security or by those who have an interest in getting institutions to migrate to platforms they control and can exploit.

In the latest issue of the European Cybersecurity Journal, Jaya Baloo, the vice chair of the Quantum Flagship initiative, an EU-funded research initiative, argued that the impact of quantum computing has the potential to be bigger than the computing revolution. This is why, she says, quantum secure encryption must be rolled out well in advance to fend off any adverse effects.

But rather than focus on building more secure systems, Baloo also noted there are still many officials lobbying to weaken existing encryption regimes via backdoors and system overrides in the name of national security and fighting crime.

Baloo compared this to the arguments made during the Vietnam war that the best way to save a village was to burn it down:

We’re looking at the same absurd situation when it comes to encryption. People with noble ends — stopping crime, terrorism, child pornography, and human trafficking — are proposing means to those ends — weakening encryption with backdoors — that would in fact destroy the very end goal of security and privacy for everyone.

As it stands, banks are probably the most ahead when it comes to fending off quantum decryption risk. Many have discreetly begun assembling teams to think hard about moving — if not already moving — their systems to quantum secure levels. Much of this activity is being done in the shadows because of the downside of accidentally signalling to would-be attackers (especially state-level ones) how insecure one’s system currently is. Nobody wants to let the proverbial quantum security cat out of the bag since doing so would invite a perpetual arms-race between attackers and defenders, with encryption having to be continuously adapted to new threats.

Even so, this scenario may eventually become unavoidable. Amit Katwala, the author of Quantum Computing, how it works and why it could change the world, told FT Alphaville that while quantum is likely to break certain types of encryption eventually, there’s a good chance it will be contained in counter-encryption upgrades. “By the time these devices are ready to break those types of encryption, there will be new types of encryption in place that will be harder for them to break.”

A digital asset nightmare?

Not all in the crypto security world are convinced by the urgency of the matter. In some quarters, an active debate is being had about whether quantum computing will ever be strong enough to break standard encryption protocols. The question is of particularly relevance to those active in the cryptocurrency sphere, since so much of the sector depends on secure cryptography to retain its value. Opinions, however, remain hugely divided.

Among those who see it as a big problem are the founders of Arqit, a British network security company that claims to have solved some key problems in the quantum security field.

Stephen Homes, Arqit’s chief product officer, argues in a new paper co-authored with Liqun Chen from the University of Surrey that quantum computers could in theory use Shor’s algorithm, a number crunching technique, to break Elliptic Curve Digital Signature Algorithm (ECDSA) signatures, which many cryptocurrencies depend on.

To fend off quantum attacks, the paper outlines, cryptocurrencies like bitcoin will have to adapt in ways that would make usability increasingly cumbersome for users. Keeping on top of the threat, they say, “requires a significant change in user behaviour and a cryptocurrency becomes increasingly less usable as each additional protection is added.”

To achieve user-friendly security, the authors add, cryptocurrencies would have to migrate to quantum safe digital signature schemes. But doing so would require a hard fork, which is a notoriously complex process that involves high levels of community consensus to ensure successful implementation.

One other option, Holmes and Chen note, is migrating one cryptocurrency to a new cryptocurrency platform designed specifically to be quantum resistant. “This could be achieved relatively easily through an exchange process as a cryptocurrency is becoming more at risk to the ever increasing performance of quantum computers,” they say.

But many top-level bitcoin developers and experts remain sceptical. Some argue there’s no clear indication that quantum computing will ever be strong enough to break either ECDSA or the Sha-256 secure hashing algorithm that underpins bitcoin.

Stepan Snigirev, a former quantum physicist now involved in the crypto space, told FT Alphaville that it is unlikely that quantum computers will become a threat to bitcoin in the next 20 years. As he noted:

In order to break elliptic curve cryptography, one needs ~10 thousand physical qubits and their quantum state should survive several million operations.

The current state of the art Quantum Computers are tiny and very noisy – 20 qubits with ~100 operations is what you can expect today.

Optimistically one can expect ~10x improvement in both parameters every 5 years. Or maybe in 3 years if you have unlimited funding.

So these simple estimates give us about 15-20 years to develop and deploy quantum-safe cryptography.

Others in the community go further than that. They claim the true agenda of those circulating fear, uncertainty and doubt (FUD) about bitcoin’s resilience to quantum is to sabotage trust in the novel financial system, since it poses such a threat to incumbent powers. A counter-narrative that might best be described as “quantum denial” has thus appeared in some quarters too.

The views of those developing quantum computers sit somewhere in the middle.

“Certainly quantum computing is not a hoax,” Dr Kuan Yen Tan, chief technology officer of IQM Quantum Computers, told FT Alphaville. “There is of course lots of hype around, but some of that is very good because quantum has great potential. We think it is going to eventually change everything because it is like a new force of nature that we are taking into use.”

His colleague Prof. Mikko Möttönen of Aalto University and chief scientist at IQM however caveated that “for quantum computers to become a security threat, in the sense that you define, you would need something called quantum error correction. So you would need a machine that makes almost no errors at all . . . and that kind of machine is beyond 10 years from now.”

A quantum security solution for the quantum threat?

Irrespective of how great the quantum threat really is, efforts to provide the market with pre-emptive solutions are coming.

Holmes’ company, Arqit, is among those looking to cash in. In recent months Arqit has come to market claiming it has figured out how to commercialise symmetric key encryption, a much stronger method of encryption that has until now been viewed as impossible to scale.

It works on the basis that if two counterparts can access the same genuinely random number that only they share, they can encrypt their communications in a way that is most likely to be quantum secure. The method is most famous for protecting high security assets like the US nuclear codes, using the nuclear football. But it also comes with a big disadvantage: in most circumstances it calls for the physical exchange of passwords between two parties, meaning it is no good for encryption between distant parties that never have the chance to meet in person.

But Arqit’s CEO David Williams says the company — which consists of a plethora of former GCHQ code crackers and former British and US military types — has solved the trickiest part of the problem by using another quantum process known as quantum key distribution (QKD).

At the heart of the solution is a mechanism that draws on the spooky properties of quantum states to help distribute the keys securely over distance. The quantum properties ensure that if a message is intercepted it disappears before it can be read.

“If you try and read quantum information, you break it, and it doesn’t get used,” says Williams, while pointing out that the downside of quantum key distribution is that its resistance to hacking is also what makes it highly sensitive to more benign forms of interference it the real world. “It unfortunately only lasts a few dozens of kilometres because the quantum information bumps into glass molecules and dies,” says Williams.

Arqit solves this problem by using satellites to distribute the keys to terrestrial receivers, a process which extends the transmissibility of the codes by many hundreds of kilometres. It also claims to have found a way to branch off that security and offer it as a service to mass-market telecoms providers, ensuring everyone’s personal computers and mobiles can benefit from QKD.

Arqit, however, is not the only venture to claim to have solved QKD using satellites. In 2016, China launched a quantum communications satellite known as Micius, that was also set to transmit encrypted keys from space.

Xinhua reported at the time that the satellite was “designed to distribute keys between relay stations on two different continents using high-speed coherent lasers” and that “as a quantum photon cannot be separated or duplicated, it becomes ‘impossible to wiretap, intercept or crack the information transmitted through it.””

But Williams claims Arqit, which fetched a $1.4bn valuation on Nasdaq in early May via a merger with Spac, is far ahead of the Chinese effort. He says Micius unlike Arqit has not yet solved the “global versus trustless” conundrum, which allows for the quantum encryption to be distributed beyond its end point on the ground.

Solving this means the technology can be applied not just to direct communications but much more broadly, including to protect new blockchain-based financial systems from quantum attack.

“Our customer announcement will be about a central bank digital currency, which we think is the best legitimate regulated use of blockchain technology, but only works if it is quantum safe,” he told FT Alphaville.

The idea central banks may be inclined to draw on quantum properties to secure their currencies is certainly intriguing. One of the big challenges facing CBDC issuance, after all, is how they will be able to maintain users’ privacy while simultaneously complying with their own Know-Your-Customer and Anti-Money-Laundering rules, which require active supervision and monitoring of all transactions.

As it stands the two requirements are paradoxical. From a users’ perspective, siding more firmly with one or the other requirement also risks alienating users either way, whether that’s on privacy grounds or on stability and risk grounds. In that context, being able to say “we’ve solved this impossible problem with quantum” seems an awfully convenient thing to be able to promote.

Such assurances, however, are unlikely to satisfy the eternally distrustful crypto community. One high-level cryptographer source told FT Alphaville that even if QKD has been achieved at scale, it doesn’t mean the wider system is necessarily unhackable. If the attacker controls the endpoint in a QKD pair, they said, it is possible they could see the key being generated and that would then give them access.

“That’s how governments will backdoor it,” they noted. “They will be using a keyed random number generator, so the question is: how do you audit the independence of the random number generator? And the answer is you can’t.”

For now at least we guess that means the paranoia in the sector is unlikely to be abated.

Source link

Click to comment


S Korea parliament committee votes to curb Google, Apple commission dominance

S Korea parliament committee votes to curb Google, Apple commission dominance

A South Korean parliamentary committee voted early on Wednesday to recommend amending a law, a key step toward banning Google and Apple from forcibly charging software developers commissions on in-app purchases, the first such curb by a major economy.

After the vote from the legislation and judiciary committee to amend the Telecommunications Business Act, dubbed the “Anti-Google law,” the amendment will come to a final vote in parliament.

That vote could come on Wednesday, although South Korean news agency Yonhap reported that parliament would act at a later date.

A parliament official told Reuters the office had not yet received an official request not to hold the meeting on Wednesday.

Apple Inc and Alphabet Inc’s Google have both faced global criticism because they require software developers using their app stores to use proprietary payment systems that charge commissions of up to 30per cent.

In a statement on Tuesday, Apple said the bill “will put users who purchase digital goods from other sources at risk of fraud, undermine their privacy protections”, hurt user trust in App Store purchases and lead to fewer opportunities for South Korean developers.

Wilson White, senior director of public policy at Google, said “the rushed process hasn’t allowed for enough analysis of the negative impact of this legislation on Korean consumers and app developers”.

Legal experts said app store operators could work with developers and other companies to create secure payment methods other than the ones they provide.

“Google and Apple aren’t the only ones that can create a secure payment system,” said Lee Hwang, a Korea University School of Law professor specialising in competition law. “I think it’s a problem to try to inspire excessive fear by talking about safety or security about using different payment methods.”

Based on South Korean parliament records, the amendment bans app store operators with dominant market positions from forcing payment systems on content providers and “inappropriately” delaying the review of, or deleting, mobile contents from app markets.

It also allows the South Korean government to require an app market operator to “prevent damage to users and protect the rights and interests of users”, probe app market operators, and mediate disputes regarding payment, cancellations or refunds in the app market.

This month in the United States, a bipartisan group of senators introduced a bill that would rein in app stores of companies that they said exert too much market control, including Apple and Google. REUTERS


Continue Reading


US and Chinese tech juggernauts battle over ASEAN clouds

US and Chinese tech juggernauts battle over ASEAN clouds
Alibaba Cloud’s rapid growth slowed in the last quarter. (Photo by Tada Images/Shutterstock)

Amid the great U.S.-China tech divide, Southeast Asia and its fast-growing digital markets have become a main battleground for the digital behemoths of both superpowers.

There,, Microsoft, Google, Alibaba Group Holding and other players are investing heavily in cloud computing — services that provide processing power and data storage to all sizes of corporations and government institutions.

A massive 170,000-sq.-meter structure is going up in Tanjong Kling, about a 20-minute drive from Singapore’s city center. The 11-story building is taking on the appearance of a vast logistics center or warehouse. However, strict security teams and surveillance cameras around the site betray a much more critical piece of infrastructure. As a reporter pulled out his smartphone to take a photograph of the construction site, a security guard rushed up and warned, “This is private property. No photos allowed.”

Once completed, the “private property” facility will be filled by rows and rows of servers hosting hundreds of millions of internet users’ sensitive personal information. It will be Facebook’s first custom-built data center in Asia. The company has announced it will invest 1.4 billion Singapore dollars (US$1 billion) in the project.

It is one of many data centers that global tech giants are building in Southeast Asia. With a stable political system, an abundance of skilled tech workers and its connection to an undersea communications cable that links to the rest of the world, Singapore has become a prime spot for the big players of tech vying for slices of Southeast Asia’s swelling need for cloud services.

US and Chinese tech juggernauts battle over ASEAN clouds

According to real estate service company Cushman & Wakefield, Singapore data centers have 410 megawatts of capacity, with another 170 megawatts on the way, making the city-state a global hub for data, matching the likes of Frankfurt and Chicago.

But Singapore stands out in that it is also a strategic foothold for Chinese tech companies such as Alibaba and Tencent, who are competing for the same clients.

Amazon is the global leader among cloud service providers. Its Amazon Web Services (AWS) controlled more than 30% of the worldwide market in the second quarter of 2021, according to research company Canalys. It is currently adding infrastructure in Jakarta, Indonesia, which is expected to be operational by the end of 2021 or early 2022.

The data centers will be AWS’ second location in Southeast Asia. AWS centers have been operating in Singapore since 2010.

“AWS sees tremendous potential in Southeast Asia,” Conor McNamara, AWS’ managing director for ASEAN operations, said via email. “Across the board, we see all segments, including startups, enterprises, and small and medium-sized businesses, continuing to drive cloud adoption.”

Microsoft, the world’s second-largest cloud service provider, early this year announced it would establish data centers in Indonesia and Malaysia. It is bullish on the region’s growth potential.

“If you look at Southeast Asia, [there are] 650 million people, that makes it [almost] 50% bigger than in the European Union [446 million],” Microsoft Asia President Ahmed Mazhari said. And the region’s “mobile penetration and mobile-first approach that is unparalleled in the world.”

Mazhari also sees ambition. “We continue to see growth traction from somebody that wants to go from idea to building a unicorn, to micro SMEs, to the biggest enterprise of the world,” he said.

Alibaba, No. 4 in the global cloud service market, behind Amazon, Microsoft and Google, in June announced it would invest up to $1 billion over the next three years to nurture developers and support Asia-Pacific startups. “We are seeing a strong demand for cloud-native technologies in emerging verticals across the region, from e-commerce and logistics platforms to fintech and online entertainment,” Jeff Zhang, president of Alibaba Cloud Intelligence, said in a news release.

The company’s cloud division launched its third data center in Indonesia and plans to launch one in the Philippines this year.

Cloud services are becoming a revenue pillar. In the second quarter of this year, the global market was worth $47 billion, up 36% from the year-earlier period, according to Canalys.

AWS’ net sales grew to $14.8 billion in the same quarter, up 37% from the year-earlier period, with AWS accounting for more than half of Amazon’s consolidated operating income.

Microsoft’s Azure revenue grew 51% during the quarter ended June.

Until recently, the global market has been bifurcated.

US and Chinese tech juggernauts battle over ASEAN clouds

In China, Alibaba and Tencent have been able to dominate mainly due to restrictions imposed upon foreign tech companies. In the West, Amazon, Microsoft, Google and other players rigorously compete.

In recent years, however, Alibaba has been pushing into the West, including the United States. However, this ambition is dimming as Washington is increasingly concerned over possible security risks for companies that avail themselves to Chinese cloud services.

Amid this global dichotomy, Southeast Asia has emerged as a battleground where Chinese and Western companies “can compete with each other,” said Kevin Imboden, senior research manager of Data Center Insights, Global Research, at Cushman & Wakefield.

The cloud service providers’ intertwined customer lists in the region reflect intense competition.

Amazon and Microsoft provide cloud services to Singapore-based supper app Grab, according to both companies. Alibaba on its website boasts of having Indonesian e-commerce leader Tokopedia as a key cloud customer, and Amazon says AWS also provides services to Tokopedia.

Among the region’s unicorns, startups with valuations of $1 billion or more, Carsome, a Malaysia-based used car marketplace, and Carro, a Singapore online car sales platform, use AWS. Bukalapak, one of Indonesia’s largest e-commerce platforms and Tokopedia competitor, uses Microsoft’s Azure. Alibaba is one of Tokopedia’s largest shareholders, and Microsoft has stakes in Grab and Bukalapak.

U.S. and Chinese cloud companies “are very focused on acquiring market share,” Imboden said, even “at the expense of profit.”

According to Google, Temasek Holdings, and Bain & Co., the gross merchandise value of the region’s internet economy is expected to grow threefold, to $300 billion, by 2025 from 2020. Cloud services, which serve as the infrastructure of this burgeoning ecosystem, will surely expand, too.

However, geopolitical risks are also emerging.

According to a report by China’s Caixin news service, Chinese internet technology company ByteDance, which owns TikTok, has stopped using Alibaba’s cloud for its businesses outside China.

Last year, the Trump administration attempted to ban the popular social media app in the U.S., citing security risks. In June, U.S. President Joe Biden withdrew a series of executive orders related to the banning of TikTok but ordered a broad security review of apps connected to “foreign adversaries,” including China.

Alibaba on Aug. 3 announced cloud computing revenue of 16.05 billion yuan ($2.48 billion) for the quarter through June, up 29% from a year earlier. However, the company’s earnings release states that the cloud computing division’s “year-on-year revenue growth began to moderate since the last quarter primarily because of revenue decline from a top cloud customer in the Internet industry that has stopped using our overseas cloud services with respect to their international business due to non-product related requirements.”

Eric Schmidt, a former Google CEO and the chair of the U.S. National Security Commission on Artificial Intelligence, wonders if Alibaba can attract clients in the West. “Alibaba Cloud and so forth are good enough that you could build on the Chinese side, but you are not going to use them in the West. Similarly, American clouds are very, very good, but you can’t use them in China,” he recently told Nikkei Asia.

“As an entrepreneur, you would prefer to have one [cloud provider] but you live with two [one in China and one everywhere else].”

While well-funded unicorns and large corporations can minimize risks by dividing their cloud needs between Western and Chinese companies, many small and mid-size companies, as well as startups, lack the wherewithal to follow suit.

With American and Chinese players competing for slices of Southeast Asia, businesses in the region “need a geopolitical strategy” and might even have to “pick sides,” said Abishur Prakash, a geopolitical futurist at Toronto-based consultancy Center for Innovating the Future.

“What is your long-term strategy? What geographies do you plan to operate in? Which consumers do you want to access the most?” he asks. “Those should be the vectors that you [use to] decide whose cloud computing infrastructures to use.” NIKKEI

Continue Reading


Authorities warn of scammers impersonating officers from government agencies, police

Authorities warn of scammers impersonating officers from government agencies, police
An unsolicited call is the first red flag for a scam, experts say. GETTY IMAGES

Scammers have been targeting members of the public by calling them and claiming to be officers from government agencies, said the Immigration and Checkpoints Authority (ICA) on Friday (Aug 13).

In an advisory, ICA said members of the public have received calls from +65 6812 5555, similar to its SafeTravel Enquiries Helpline (6812 5555).

“They accused the recipients of either spreading fake news related to COVID-19 or breaking COVID-19 rules, further saying that a report would be made against them or they had to pay a penalty,” said the authority. “This is a scam.”

ICA added that the calls were not made by ICA officers or officers from any other government agencies, and that it “does not call members of the public to request money in any form over the phone”.

The public is advised to ignore the calls and the caller’s instructions should they receive them.

No government agency will request for personal details or transfer of money over the phone or through automated voice machines, said ICA.

“Scammers may use caller ID spoofing technology to mask the actual phone number and display a different number. Calls that appear to be from a local number may not actually be made from Singapore,” said ICA.

“Do not provide your personal information such as name, identification number, passport details, contact details, bank account or credit card details to suspicious or unknown parties.”

The authority said it takes “a serious view of such scam calls as it undermines public trust in ICA”, adding that a police report has been made.


Separately on Friday, the Singapore Police Force (SPF) said there have been at least 200 reports of banking-related phishing scams where police officers were impersonated.

In a news release, SPF said scammers have been posing as police officers on messaging apps by using publicly available pictures of officers to validate their identity so that the victims would provide their banking details.

The victims received WhatsApp calls from an account with a profile picture showing police officers. During the conversation, the scammer would also provide an SPF name card as proof of identity.

“The victims would be informed that their bank accounts had been found to be involved in criminal activity and were frozen,” said SPF.

The scammer would instruct victims to provide their banking details under the pretext of facilitating the release of their bank accounts.

“Victims only realised that they had fallen prey to a scam when they received notifications informing them that money had been transferred from their bank accounts to bank accounts unfamiliar to them or when they discovered unknown transactions made using their credit or debit card,” said the police. CNA

Continue Reading


Three Australian publishers accuse Facebook of unfairly taking their content

Three Australian publishers accuse Facebook of unfairly taking their content
The Facebook app is seen on a phone screen August 3, 2017. REUTERS/Thomas White/File Photo

Three Australian publishers of lifestyle content say Facebook Inc used their articles on its just-launched news service after refusing to negotiate licensing deals, and that the country’s tough new internet law has failed to protect them.

Australia this year passed a law that pressured Facebook and Alphabet Inc’s Google to sign deals with some of the country’s biggest news companies by threatening government intervention.

The dispute highlights possible shortcomings in the controversial law. While most of Australia’s main media firms have signed deals, some smaller outlets say the law has not stopped their content generating clicks and advertising revenue for Facebook without compensation.

Broadsheet Media, Urban List and Concrete Playground, websites which publish entertainment news, reviews and listings, say that after the law was passed in February they approached the social media giant about payment for their content.

Facebook knocked them back, calling their content unsuitable for its Facebook News platform and recommending they apply for grants it was offering from a A$15 million (US$11 million) fund for Australian regional and digital newsrooms, the three companies told Reuters in a joint call.

“They told me that, ‘oh well, you’re not going to be included in News tab and that’s what we’re paying for’,” said Nick Shelton, founder of Broadsheet Media.

“To our surprise, we woke one morning last week and all of our content was there.”

Facebook News went live in Australia on Aug 4.

Facebook declined to comment directly on the three companies but said it created value for publishers by sending viewers to their sites.

Under the law, Facebook and Google must negotiate payment deals with outlets or a government-appointed arbitrator will do it for them, but a publisher must first prove its primary purpose is producing news and that it has been unfairly disqualified.

The three publishers said they want Facebook to come to the table to talk but if it declined they may seek government intervention.

“If at the end of the day we don’t get included in a commercial agreement, then absolutely they need a stick,” said Shelton. “We are three prime examples of publishers and media businesses which should be included as part of this framework.”

To be covered by the law, publishers must register as a news provider with the Australian Communications and Media Authority “based on criteria including the levels of ‘core news’ (essentially public interest journalism) that they produce”, the Australian Competition and Consumer Commission (ACCC), which drafted the law, said in an email.

Urban List has registered on the list. Broadsheet and Concrete Playground have yet to register, saying they want to hold out for a private deal.

Tama Leaver, a professor of internet studies at Australia’s Curtin University, said that while Facebook had not broken the law as the matter was not yet before arbitration, its apparent treatment of the three publishers was “extremely poor practice, disingenuous and further disadvantages the smaller players in the news business arena”.

In a separate dispute, the ACCC has said it would look into a claim by The Conversation, which publishes current affairs commentary by academics, that Facebook has refused to negotiate a licensing deal. The Conversation has secured a deal with Google. REUTERS

Continue Reading


Twitter Suspends pro Trump US Lawmaker for Covid Misinformation

Twitter Suspends pro Trump US Lawmaker for Covid Misinformation
U.S. Representative Marjorie Taylor Greene (R-GA) wears a mask reading "Censored" as she walks to the House floor during debate on the second impeachment of President Donald Trump at the U.S. Capitol in Washington, U.S. January 13, 2021. REUTERS/Jonathan Ernst

Twitter said Tuesday it had suspended the account of controversial US lawmaker Marjorie Taylor Greene, a staunch supporter of former Republican president Donald Trump, for a week over a “misleading” tweet on coronavirus vaccines.

The tweet in question, sent on Monday, said the US Food and Drug Administration should not give final approval to anti-coronavirus vaccines, with Greene saying they were “failing” and did not curb the spread of the virus.

Twitter labeled the message “misleading” and suggested that users consult information provided by US health authorities about vaccines and mask-wearing.

“The tweet you referenced was labeled in line with our Covid-19 misleading information policy,” a Twitter spokesperson said in a statement to AFP.

“The account will be in read-only mode for a week due to repeated violations of the Twitter rules.”

The platform’s rules on Covid misinformation state that a seven-day suspension comes with a fourth violation of the site’s terms of use.

If the first-term Georgia congresswoman were to break the rules again, she could face a permanent ban.

Greene accused Twitter of suspending her for “speaking the truth, and tweeting what so many people are saying.”

The lawmaker has been a staunch defender of Trump and his unsubstantiated claims that Democrats stole the 2020 presidential election.

In February, she apologized for her past support for QAnon conspiracy theories but was stripped of her two committee assignments.

Then in May, she courted controversy by repeatedly equating mask mandates with Nazis forcing Jews to wear yellow stars in wartime Germany. AFP

Continue Reading


New Child Safety Features for Google, YouTube

New Child Safety Features for Google, YouTube
Google is unveiling new measures aiming at protecting children and teens from being tracked or exposed to mature content. AFP

Google on Tuesday unveiled a series of online safety measures for children including a private setting for videos uploaded by teens and safeguard for ads shown to users under 18.

The new features, which come amid heightened concerns about online child exploitation and safety at a time of growing internet usage during the global pandemic, affect Google’s YouTube video platform as well its online services such as search and Google Assistant.

“As kids and teens spend more time online, parents, educators, child safety and privacy experts, and policy makers are rightly concerned about how to keep them safe,” said Google product and user experience director Mindy Brooks.

“We engage with these groups regularly, and share these concerns.”

Google’s “safe search” — which excludes sensitive or mature content — will be the default setting for users under 18, which up to now had been the case only for under-13 users.

On the massively popular YouTube platform, content from 13- to 17-year-olds will be private by default, the tech giant said.

“With private uploads, content can only be seen by the user and whomever they choose,” said a blog post by James Beser, head of product management for YouTube Kids and Family.

“We want to help younger users make informed decisions about their online footprint and digital privacy… If the user would like to make their content public, they can change the default upload visibility setting and we’ll provide reminders indicating who can see their video.”

Google will also make it easier for families to request removal of a child’s photos from image search requests.

“Of course, removing an image from search doesn’t remove it from the web, but we believe this change will help give young people more control of their images online,” Brooks said.

In another safety move, Google will turn off location history for all users under 18 globally, without an option to turn it back on. This is already in place for those under 13.

Google will also make changes in how it shows ads to minors, blocking any “age-sensitive” categories and banning targeting based on the age, gender or interests of people under 18. AFP

Continue Reading

Recent Posts


You May Also Like