Tech News : New Quantum Attack-Proof PCs
At its Annual Partner Conference 2024, HP announced the world’s first business PCs to protect firmware against quantum computer attacks.
This Issue
As highlighted by Global Risk Institute research, 27 per cent of experts think there is a 50 per cent likelihood of a cryptographically relevant quantum computer (CRQC) by 2033. HP says that “when that day comes, the security of existing digital signatures on firmware and software will be in question and digital trust will dissolve.”
If quantum computers reach a point where they can crack our current cryptographic protections, the implications for businesses, societies, and individuals could be profound and wide-ranging. For example, the consequences could include:
– Massive data breaches and privacy loss, compromising everything from financial records to private communications.
– The undermining of financial systems, enabling unauthorised access to financial accounts, manipulation of transactions, and theft of funds. This, in turn, could erode trust in digital banking and financial systems, leading to widespread economic instability.
– National security communications being exposed, thereby compromising state secrets, military operations, plus critical infrastructure, potentially altering the balance of power on a global scale.
– Disruption of digital trust systems like digital signatures and SSL certificates, which underpin the security of online communications and commerce, thereby disrupting e-commerce, undermining the integrity of digital contracts, and eroding trust in online services.
New Cryptographic Standard?
In response to these potential threats, the security community has been actively developing and standardising quantum-resistant cryptographic algorithms. These Post-Quantum Cryptography (PQC) algorithms aim to secure cryptographic systems against quantum attacks by relying on mathematical problems that are believed to be difficult for quantum computers to solve.
However, HP says that migrating our entire digital world to a new cryptographic standard is a huge undertaking and that while software can be updated, hardware can’t. This includes some of the cryptography that protects PC firmware. HP points out that “with no cryptographic protections in place, no device would be safe – attackers could access and modify the underlying firmware and gain total control.”
HP’s Answer
HP’s future-proofing answer is embedding protection against quantum computer hacks in PCs at the chip level via its 5th-generation ESC chip. By isolating the chip from the processor and OS, HP says the ESC provides a hardware platform that reduces the risk of data breaches and improves productivity by preventing downtime.
Start Now Says HP
HP points out that with typical PC refresh cycles now every 3 to 5 years (and with the wider trend towards extending the life of hardware to improve sustainability), the migration to post-quantum cryptography should ideally start now. HP says that with its 2024 ESC upgrade, the hardware will be in place to protect PC firmware-integrity with Quantum-Resistant Cryptography, thereby delivering a secure foundation ahead of upgrades to software implementations of cryptography within PCs in the future.
What Does This Mean For Your Business?
The potential of quantum computers being capable of breaking asymmetric cryptography is placing the entire digital world at an increasing risk. For UK businesses, this threat represents both a challenge and a call to action. Research suggests that the arrival of cryptographically relevant quantum computing is not a question of if, but when, with a significant number of experts anticipating its emergence by 2033. This reality necessitates a proactive approach to cybersecurity, particularly in safeguarding digital signatures on firmware and software that underpin the trust and integrity of our digital interactions and transactions.
Currently, the security community is responding by developing and standardising quantum-resistant cryptographic algorithms / Post-Quantum Cryptography (PQC) solutions. These could secure against both classical and quantum computing threats, thereby safeguarding digital assets and communications in the quantum era. However, as HP points out, transitioning our digital infrastructure to a new cryptographic standard is a potentially monumental task, complicated further by the limitations of hardware adaptation.
For UK businesses, this means that relying solely on software updates for future protection may be insufficient. Hardware (particularly PC firmware) that is less frequently updated and often overlooked in cybersecurity strategies, presents a critical vulnerability. This is why HP believes the introduction of the world’s first business PCs designed to protect firmware against quantum computer attacks is a significant development. HP’s idea of embedding protection at the chip level through its 5th generation ESC chip could offer businesses a solution that anticipates the quantum threat and addresses the challenges of hardware security at the same time.
HP also believes its approach of isolating the chip from the processor and operating system could create a more secure hardware platform. This idea may be particularly relevant for UK businesses, where the trend towards extending the lifecycle of hardware for sustainability purposes further exacerbates the vulnerability to future quantum attacks. With the threat apparently just a few years away, HP’s suggestion of starting the migration to quantum-resistant cryptographic solutions now, as part of the typical PC refresh cycle, sounds like it could be a sensible move for businesses.
In short, the message for UK businesses is that the threat of quantum computing to cybersecurity is real and approaching fast and preparing for this issue means adopting a holistic view of cybersecurity that includes both software and hardware considerations. Although HP’s new solution offers one potential answer to quantum threats, there will most likely be other innovative solutions offered by other companies in the near future and it will be a case of businesses choosing the one with the best fit for their individual needs and budget.
Tech News : Bitcoin Value Hits New High
With the famously volatile Bitcoin cryptocurrency briefly hitting a new all-time high value of $69,000 recently, we look at the reasons why this happened and what could happen next.
Why?
This latest surge in the value of Bitcoin has been attributed to US finance giants like Grayscale, BlackRock, and Fidelity investing billions of dollars into Bitcoin, thereby driving up its value and becoming major players or “Bitcoin whales” in the cryptocurrency market.
Some reasons why Bitcoin is so appealing to them include:
– Bitcoin’s scarcity. This particular cryptocurrency has a cap of 21 million coins, of which 19 million have already been mined, thereby giving potential for high returns.
– Bitcoin ETFs offering a more accessible way for investors to gain exposure to Bitcoin, especially in retirement accounts like IRAs, without dealing with the complexities and costs of direct cryptocurrency purchases and management.
Last High
Bitcoin reached its new high of $69,000 (on March 5, 2024), only to see its trading value fall to around $62,185 just six hours later that day. Bitcoin’s previous highest value of $68,789.63 was reached back in November 2021. At the time, the rise was fuelled by its increased adoption by mainstream finance and significant investments from large corporations and institutional investors. Also, there was heightened interest in cryptocurrency as a hedge against inflation and currency devaluation amid expansive monetary policies worldwide.
Volatile
However, from its inception in 2009, Bitcoin’s volatility has become legendary. For example, in 2021 it saw a drop from highs of over $63,000 in April to as low as $29,000 in a few months, while in 2022, Bitcoin’s value plummeted from a high of $68,000 to below $20,000. At that time, the fall was driven partly by the broader instability in the crypto market and the collapse of TerraUSD Classic (USTC). However, many of its famous crashes have been triggered by a variety of factors, including hacks, regulatory changes, market sentiment shifts, and broader economic conditions.
General Upward Trend
All that said, it’s worth noting that despite the many downturns, Bitcoin has shown a general upward trend and a pattern of recovery and growth over time, though the timing and trajectory of these recoveries have varied widely.
Good News For Some
Clearly, the current high value of Bitcoin is good news for many investors, not least of which is El Salvador’s President Nayib Bukele’s national government which has followed a policy of purchasing 1 BTC daily following the FTX exchange collapse. What many may see as a somewhat risky endeavour (especially for a nation’s public funds) has seen the country adopting Bitcoin as legal tender, acquiring nearly 2,800 Bitcoins, and now having an investment that could potentially yield a 40 per cent profit! For some, therefore, El Salvador’s policy could be viewed as a forward-looking strategy that could redefine financial sovereignty and economic stability.
What Does This Mean For Your Business?
The recent surge to a new all-time high of $69,000 for Bitcoin, albeit brief, is significant for several reasons, especially for so-called ‘Bitcoin whales’ and other business investors in the UK and globally. This peak, driven by massive investments from US finance giants, underscores Bitcoin’s appeal due to its scarcity and the potential for high returns. Also, the introduction of Bitcoin exchange-traded funds (ETFs) provides an accessible investment route, avoiding the complexities of direct cryptocurrency management.
This latest high-point reflects Bitcoin’s ongoing appeal amidst a landscape where digital currencies are increasingly viewed as a hedge against traditional financial uncertainties. However, the sharp decline in its value just hours later also highlights the inherent volatility of Bitcoin. Its history is riddled with rapid ascents followed by steep declines, clearly illustrating the risky nature of investing in cryptocurrency.
For businesses considering Bitcoin or other digital currencies as an investment, the current high represents both an opportunity and a cautionary tale. Bitcoin’s appeal lies in its decentralised nature, finite supply, and its potential to offer significant returns. Businesses attracted to Bitcoin enjoy the advantage of high liquidity and the potential to diversify their investment portfolio away from traditional fiat currencies, which may be subject to inflation and devaluation.
That said, its volatility suggests a cautious approach is best, where businesses should not invest more than they can afford to lose and rather consider Bitcoin as part of a diversified investment strategy.
Looking ahead, predicting the future value of Bitcoin and the duration of its current high is challenging with market analysts divided. Businesses should, therefore, try to stay informed and agile, ready to adapt their investment strategies in response to Bitcoin’s rapid price changes.
For businesses wary of Bitcoin’s volatility, there are, of course, alternatives in the cryptocurrency space, such as stablecoins, which are pegged to fiat currencies and offer less price volatility, or investing in blockchain technology itself, which underpins cryptocurrencies and has broader applications across industries.
All things considered, despite this latest rise being good news for some, companies may be well advised to approach cryptocurrency investment with a strategy that acknowledges its volatility, incorporates thorough research, and includes a plan for managing potential downturns.
An Apple Byte : Apple Fine and Sideloading
In two recent blows to Apple, it’s just been fined £1.5bn for breaking EU competition laws over music streaming, while its latest iPhone update means allowing developers to offer their own ‘app stores’.
The Fine
Following a complaint by Swedish music streaming service Spotify, Apple has been fined £1.5bn by the European Commission for abusing its market position by preventing developers from telling users about alternative, cheaper music services outside the Apple app store (which is illegal under EU antitrust rules). However, it’s been noted that the EC found no concrete evidence of consumer harm and Apple has said it will appeal.
The Update
In other bad (but expected) news for Apple, in compliance with the Digital Markets Act (DMA), its latest iOS 17.4 update allows developers to offer their own ‘app stores’ (also referred to as ‘sideloading’). This means that users can download new software without going through the official App Store, and developers such as Google can now offer their own app store, which offers their own content and their own restrictions. However, developers will still have to pay a fee to Apple for installs.
Security Stop Press : Wireless Chargers Phone Hack & Fry Threat
Researchers from the University of Florida have reported how VoltSchemer, a set of attacks that exploit two commonly found features in commercial-off-the-shelf wireless chargers (COTS), can give attackers control over a phone then enable man-in-the middle attacks.
VoltSchemer attacks work by exploiting voltage noises from the power supply (electromagnetic interference) to manipulate wireless chargers without the need for any malicious modifications to the chargers themselves. The researchers were able to show how such attacks were successful on 9 top-selling wireless chargers and can also alter chargers to overheat and ‘fry’ phones.
Since these attacks rely on setting up a malicious power source in a specific location, the advice is to use your own personal charging port (e.g. the one at home) or your own portable charger/plug where possible.
Sustainability-in-Tech : How Cheese Helped Extract Gold From E-Waste
ETH Zurich researchers have reported discovering an effective method for recovering gold from e-waste with the help of byproducts from the cheesemaking process.
Protein Fibre Sponge
The group of researchers, led by ETH Professor Mezzenga, have reported using a sponge made from a protein matrix (a cheesemaking byproduct) to extract gold from e-waste.
The protein matrix/protein fibre sponge was made by denaturing whey proteins under acidic conditions and high temperatures, thereby aggregating them into protein nanofibrils in a gel. The gel was then dried to create the protein fibre sponge.
The Process
To test the protein fibre sponge, the research team salvaged 20 old computer motherboards and extracted the metal parts. They then dissolved the parts in an acid bath to ionise the metals. The protein fibre sponge was then placed in the metal ion solution and the gold ions adhered to the protein fibres.
The final part of the process was to heat the sponge, thereby reducing the gold ions into flakes. These flakes were then melted down to form a gold nugget.
How Much Gold?
The researchers reported making a nugget of around 450 milligrams out of the 20 computer motherboards using this process. The nugget was reported to be 91 percent gold (the remainder being copper), which corresponds to 22 carats.
Not Just Gold
Despite being particularly effective at extracting gold ions, the researchers reported that the process can also be used to extract other metal ions.
How Much Gold In E-Waste?
It’s estimated that 7 per cent of the world’s gold may be currently locked-away in e-waste and that there is 100 times more gold in a tonne of e-waste than in a tonne of gold ore! Also, for every 1 million mobile phone handsets that are recycled, an estimated 35,274 lbs of copper, 772 lbs of silver, 75 lbs of gold, and 33 lbs of palladium can be recovered.
What Does This Mean For Your Business?
The growing pile of e-waste, the fact that in global terms only 20 per cent of e-waste is formally recycled, and that so much of the world’s gold (7 per cent), and other precious metals are locked up in e-waste are huge challenges. This ingenious method for gold recovery developed by the ETH Zurich researchers which uses a cheesemaking byproduct is, therefore, very promising in terms of sustainability.
The fact that it’s also reported to be a cost-effective method (and, therefore commercially viable) is a bonus that could see it being made ready for the market soon. Another benefit of this method is its flexibility, making it useful for extracting gold from industrial waste from microchip manufacturing or from gold-plating processes. It’s understood that the scientists are also eyeing the possibility of manufacturing the protein fibre sponges out of other protein-rich byproducts or waste products from the food industry, thereby potentially widening the scope and perhaps reducing the cost of the process even more.
Although apparently effective, it should be remembered that tackling the world’s e-waste problem needs a much wider approach. For example, creating a circular economy for electronic goods where waste is minimised, resources are maximised, the environment and health are protected, while businesses and developing economies can still meet their demand, would all help. However, there’s still quite a way to go before this can happen.
Some of the actions that could help bring these necessary changes about could include more legislation and having a more digital and connected world to help accelerate progress towards sustainable development goals. This could possibly be achieved through ‘device-as-a-service’ business models, better product tracking and take-back schemes, plus entrepreneurs, investors, academics, business leaders and lawmakers working together helping create a circular economy that really works.
The e-waste challenge is significant, but as the ETH Zurich researchers have shown, innovative yet relatively simple solutions exist and could have a major impact if scaled up.
Tech Tip – Easy Batch Renaming of Files in File Explorer
Renaming multiple files one by one can be tedious and time-consuming. Windows File Explorer offers a simple way to batch rename files, which can be especially useful for organising documents, photos, or project files efficiently. Here’s how it works:
– Select the all the files you want to rename in File Explorer (mouse click and drag or Ctrl + A).
– Right-click just one of the selected files and choose Rename (or press F2).
– Type the new name for the files and press Enter.
– Windows will automatically append a number to each file to differentiate them