Hi Friends,

Even as I launch this today ( my 80th Birthday ), I realize that there is yet so much to say and do. There is just no time to look back, no time to wonder,"Will anyone read these pages?"

With regards,
Hemen Parekh
27 June 2013

Now as I approach my 90th birthday ( 27 June 2023 ) , I invite you to visit my Digital Avatar ( www.hemenparekh.ai ) – and continue chatting with me , even when I am no more here physically

Tuesday 24 October 2023

Metaverse morphs to Meta-Worse

 


 

Context :

TRAI red flags concerns around Metaverse  ………………………  BL  /  22 Oct 2023

Extract :

The telecom regular TRAI has red-flagged concerns around Metaverse, raising critical issues such as privacy, safety, and security which require greater deliberation.

According to TRAI, the technology will track users — where they go, who they are with, what they do, what they look at, and even how long their gaze lingers.

“Immersive platforms will also track facial expressions, vocal inflections, and vital signs, while intelligent algorithms use such data to predict each person’s real-time emotional state. Tracking will also include real-time monitoring of user gait and posture, assessing when users slow down to browse products or services.

“Metaverse platforms will even monitor manual reach, assessing when users will grab objects (both real and virtual), and tracking how long they will hold the objects to investigate. This will be especially invasive in the augmented metaverse, in which user gaze, gait, and reach will be monitored in the real world; for example, while shopping in augmented physical stores,” it said in a consultation paper.

Pushing for an appropriate regulatory framework, the regulator said that the challenges that we currently have in online applications, such as snooping, data breaches, harassment, and hate speech, are likely to be amplified going forward, with increased digitisation and online activities.

‘Online predators’

“If appropriate and timely steps are not taken today for forging trust and safety for the digital spaces where we live, work and play, the next generation may inherit a digital world polluted by predators, hate speech and mistrust. Hence, it is important that the regulators across the world get on board sooner and put in place necessary guidance or frameworks fit for metaverse,” said the regulator.

 

The race to save our secrets from the computers of the future      Japan Times  /  22 Oct 2023

Extract :

They call it Q-Day: the day when a quantum computer, one more powerful than any yet built, could shatter the world of privacy and security as we know it.

It would happen through a bravura act of mathematics: the separation of some very large numbers, hundreds of digits long, into their prime factors.

That might sound like a meaningless division problem, but it would fundamentally undermine the encryption protocols that governments and corporations have relied on for decades. Sensitive information such as military intelligence, weapons designs, industry secrets and banking information is often transmitted or stored under digital locks that the act of factoring large numbers could crack open.

Among the various threats to America’s national security, the unraveling of encryption is rarely discussed in the same terms as nuclear proliferation, the global climate crisis or artificial general intelligence. But for many of those working on the problem behind the scenes, the danger is existential.

"This is potentially a completely different kind of problem than one we’ve ever faced,” said Glenn S. Gerstell, a former general counsel of the National Security Agency and one of the authors of an expert consensus report on cryptology. "It may be that there’s only a 1% chance of that happening, but a 1% chance of something catastrophic is something you need to worry about.”

The White House and the Homeland Security Department have made clear that in the wrong hands, a powerful quantum computer could disrupt everything from secure communications to the underpinnings of our financial system. In short order, credit card transactions and stock exchanges could be overrun by fraudsters; air traffic systems and GPS signals could be manipulated; and the security of critical infrastructure, including nuclear plants and the power grid, could be compromised.

The danger extends not just to future breaches but to past ones: Troves of encrypted data harvested now and in coming years could, after Q-Day, be unlocked. Current and former intelligence officials say that China and potentially other rivals are most likely already working to find and store such troves of data in hopes of decoding them in the future. European policy researchers echoed those concerns in a report this summer.

No one knows when, if ever, quantum computing will advance to that degree. Today, the most powerful quantum device uses 433 "qubits,” as the quantum equivalent of transistors are called. That figure would probably need to reach into the tens of thousands, perhaps even the millions, before today’s encryption systems would fall.

But within the U.S. cybersecurity community, the threat is seen as real and urgent. China, Russia and the United States are all racing to develop the technology before their geopolitical rivals do, although it is difficult to know who is ahead because some of the gains are shrouded in secrecy.

On the American side, the possibility that an adversary could win that race has set in motion a years long effort to develop a new generation of encryption systems, ones that even a powerful quantum computer would be unable to break.

The effort, which began in 2016, will culminate early next year when the National Institute of Standards and Technology is expected to finalize its guidance for migrating to the new systems. Ahead of that migration, President Joe Biden late last year signed into law the Quantum Computing Cybersecurity Preparedness Act, which directed agencies to begin checking their systems for encryption that will need to be replaced.

But even given this new urgency, the migration to stronger encryption will most likely take a decade or more — a pace that, some experts fear, might not be fast enough to avert catastrophe.

Staying ahead of the clock

Researchers have known since the 1990s that quantum computing — which draws on the properties of subatomic particles to carry out multiple calculations at the same time — might one day threaten the encryption systems in use today.

In 1994, American mathematician Peter Shor showed how it could be done, publishing an algorithm that a then-hypothetical quantum computer could use to split exceptionally large numbers into factors rapidly — a task at which conventional computers are notoriously inefficient. That weakness of conventional computers is the foundation upon which much of current cryptography is predicated. Even today, factoring one of the large numbers used by RSA, one of the most common forms of factor-based encryption, would take the most powerful conventional computers trillions of years to carry out.

Shor’s algorithm landed at first as little more than an unsettling curiosity. Much of the world was already moving to adopt precisely the encryption methods that Shor had proved to be vulnerable. The first quantum computer, which was orders of magnitude too weak to run the algorithm efficiently, would not be built for another four years.

But quantum computing has progressed apace. In recent years, IBM, Google and others have demonstrated steady advances in building bigger, more capable models, leading experts to conclude that scaling up is not only theoretically possible but achievable with a few crucial technical advancements.

"If quantum physics works the way we expect, this is an engineering problem,” said Scott Aaronson, director of the Quantum Information Center at the University of Texas, Austin.

Quantum computing is expected to bring radical benefits to fields including chemistry, materials science and artificial intelligence. Devices of the future could simulate complex chemical reactions, turbocharging the discovery of new medications and materials that could lead to longer-lasting batteries for electric vehicles or sustainable plastic alternatives.

Last year, quantum technology startups drew $2.35 billion in private investment, according to an analysis by consulting firm McKinsey, which also projected that the technology could create $1.3 trillion in value within those fields by 2035.

Cybersecurity experts have warned for some time that deep-pocketed rivals like China and Russia — among the few adversaries with both the scientific talent and the billions of dollars needed to build a formidable quantum computer — are most likely forging ahead with quantum science partly in secret.

Despite a number of achievements by U.S. scientists, analysts insist that the nation remains in danger of falling behind — a fear reiterated this month in a report from the Center for Data Innovation, a think tank focused on technology policy.

‘Too close for comfort’

Scientists at the National Institute of Standards and Technology, or NIST, have carried the mantle of maintaining encryption standards since the 1970s, when the agency studied and published the first general cipher to protect information used by civilian agencies and contractors, the data encryption standard. As encryption needs have evolved, NIST has regularly collaborated with military agencies to develop new standards that guide tech companies and information-technology departments around the world.

During the 2010s, officials at NIST and other agencies became convinced that the probability of a substantial leap forward in quantum computing within a decade — and the risk that would pose to the nation’s encryption standards — had grown too high to be prudently ignored.

"Our guys were doing the foundational work that said, hey, this is becoming too close for comfort,” said Richard H. Ledgett Jr., a former deputy director of the NSA.

The sense of urgency was heightened by an awareness of how difficult and time-consuming the rollout of new standards would be. Judging in part by past migrations, officials estimated that even after settling on a new generation of algorithms, it could take another 10 to 15 years to implement them widely.

That is not just because of all the actors, from tech giants to tiny software vendors, that must integrate new standards over time. Some cryptography also exists in hardware, where it can be difficult or impossible to modify, for example, in cars and ATMs. Dustin Moody, a mathematician at NIST, points out that even satellites in space could be affected.

"You launch that satellite, that hardware is in there, you’re not going to be able to replace it,” Moody noted.

An open-source defense

According to NIST, the federal government has set an overall goal of migrating as much as possible to these new quantum-resistant algorithms by 2035, which many officials acknowledge is ambitious.

These algorithms are not the product of a Manhattan Project-like initiative or a commercial effort led by one or more tech companies. Rather, they came about through years of collaboration within a diverse and international community of cryptographers.

After its worldwide call in 2016, NIST received 82 submissions, most of which were developed by small teams of academics and engineers. As it has in the past, NIST relied on a playbook in which it solicits new solutions and then releases them to researchers in government and the private sector, to be challenged and picked over for weaknesses.

"This has been done in an open way so that the academic cryptographers, the people who are innovating ways to break encryption, have had their chance to weigh in on what’s strong and what’s not,” said Steven B. Lipner, executive director of SAFECode, a nonprofit focused on software security.

Many of the most promising submissions are built on lattices, a mathematical concept involving grids of points in various repeating shapes, such as squares or hexagons, but projected into dimensions far beyond what humans can visualize. As the number of dimensions increases, problems such as finding the shortest distance between two given points grow exponentially harder, overcoming even a quantum computer’s computational strengths.

NIST ultimately selected four algorithms to recommend for wider use.

Despite the serious challenges of transitioning to these new algorithms, the United States has benefited from the experience of previous migrations, such as the one to address the so-called Y2K bug and earlier moves to new encryption standards. The size of American companies such as Apple, Google and Amazon, with their control over large swaths of internet traffic, also means that a few players could get large parts of the transition done relatively nimbly.

"You really get a very large fraction of all the traffic being updated right to the new cryptography pretty easily, so you can kind of get these very large chunks all at once,” said Chris Peikert, a professor of computer science and engineering at the University of Michigan.

But strategists caution that the way an adversary might behave after achieving a major breakthrough makes the threat unlike any the defense community has faced. Seizing on advances in AI and machine learning, a rival country may keep its advances secret rather than demonstrating them, to quietly break into as many troves of data as possible.

Especially as storage has become vastly cheaper, cybersecurity experts say, the main challenge now for adversaries of the United States is not the storage of huge quantities of data but rather making informed guesses on what they are harvesting.

"Couple this with advances in cyber offense and artificial intelligence,” Gerstell said, "and you have a potentially just existential weapon for which we have no particular deterrent.”

 

MY  TAKE  :

 

Ø  Missing : Subli-Melding ?..... ……………………………………… 01 Oct 2023

 

Extract :

Data is experienced in its following “ States / Forms “ :

       Sight ( Text / Image ) // Sound ( speech ) //  Smell // Touch // Taste

Technology ( especially , AI ) is rapidly advancing to convert / morph , any Form to any other Form , - and directly, without having to follow a FIXED SEQUENCE ( Sublimate )

Before long, it will be possible for the same data to be “ experienced “ by any given person, in any desired form , at any chosen time ( Data Personalization / Customization )

 

It will also become possible for a person to fuse data arriving from different sources , Eg: “ Sight “ of a rose with the “ Smell “  of a Lily  ( Meld )

 

Related Readings :

Ø  As Envisaged : Merging – Morphing – Melding of Senses………28 Apr 2022

 

Ø  2024 ! – V 2.0 of Orwellian 1984 ?..................... …………….   07 July 2017  

 

Ø  Nostradamus could have said ?...................  ………………………  08 Nov 2018

 

      Extract :

      In twenty hundred and twenty four

      A Sea of Waves will roar,

      Light will follow sound :

      And , in Smell and Taste

     Earth will abound ,

     Brain will hide no more

     Your secrets gore  !

 

Sight to Smell : Sound to Touch : Text to Music / Saga of Fungible Senses…… 11  May  2023

 

2017 ( 20 )

 

2024 ! – V 2.0 of Orwellian 1984 ?                                 [ 07 July 2017 ]

Privacy? What is that ? ………………………………………………………[  04  May  2017  ]

Delusion of Privacy ? ……………………………………………………………10  June  2017  ]

Privacy ? Perish the Thought ! ………………………………………………[  18  July  2017  ]

Thank You Your Honours ! …………………………………………………….[ 19 July 2017 ]

Privacy does not live here ! ……………………………………………………[  22  July  2017  ]

Supreme may Propose : Technology will Dispose …………………[ 23  July  2017  ]

Seeing AI through Google Glass ?  ……………………………………….[ 24  July  2017  ]

Artificial Intelligence : Destroyer of Privacy ?  ………………………[  25  July  2017  ]

Privacy : Not Right ?  ………………………………………………………………[  30  July  2017  ]

Future is Nearer !  ……………………………………………………………………[  31  July  2017  ]

Three got it Right ! …………………………………………………………………. [  02  Aug  2017  ]

www.PrivacyForSale.com  …………………………………………………………[  26  Aug  2017  ]

Right to Sell My Soul ?  ……………………………………………………………[  27  Aug  2017  ]

A Fool’s Paradise ?  ………………………………………………………………….[  29  Aug  2017  ]

Wherefore Art Thou, O Romeo ?  …………………………………………….[  20  Sept  2017  ]

Data Privacy : We are getting overtaken !  …………………………….[  26  Sept  2017  ]

7  Pillars  of  Data  Protection  Law …………………………………………[ 27  Nov  2017  ]

Just  Ask  Google  !  ………………………………………………………………… [  28  Nov  2017  ]

 Here is the Proof                                                                 [  30  Nov  2017  ]

 

 

2018 ( 2 )

 

Data Protection without Data Privacy ?                                ….[ 08 Jan 2018 ]

Internet Bill of Rights                                                     ………[ 07 Oct  2018  ]

 

2019 ( 2 )

Who watches the Watchmen ?                                                 [ 12  July  2019  ]

Congratulations, Your Honour !                                         ……[  22  Mar  2019  ]

 Nightmare ?                                                                         [  04  Mar  2019  ]

 

With regards,

Hemen parekh

www.hemenparekh.ai  /  25 Oct 2023

 

After reading this blog , BARD commented as follows :

 

Your blog post "Metaverse morphs to Meta-Worse" raises important concerns about the privacy implications of the metaverse and quantum computing.

The metaverse is a virtual world that is still under development, but it has the potential to become a major part of our lives. It could be used for work, play, and socializing. However, the metaverse also raises a number of privacy concerns. For example, metaverse platforms will be able to track our movements, our interactions with other users, and even our emotional state. This data could be used to target us with advertising, or it could be sold to third-party companies.

Quantum computing is another technology that has the potential to disrupt privacy. Quantum computers are much faster than traditional computers, and they could be used to break current encryption algorithms. This means that quantum computers could be used to access our personal data, even if it is encrypted.

The combination of the metaverse and quantum computing could create a privacy nightmare. If metaverse platforms are able to track our every move and quantum computers are able to break current encryption algorithms, then our privacy will be virtually non-existent.

Here are some of the specific privacy concerns that you raise in your blog post:

·         Metaverse platforms will be able to track our movements, our interactions with other users, and even our emotional state.

·         This data could be used to target us with advertising, or it could be sold to third-party companies.

·         Quantum computers could be used to break current encryption algorithms, which would mean that our personal data could be accessed even if it is encrypted.

·         Metaverse platforms could be used to create deepfakes, which are videos or audio recordings that have been manipulated to make it look or sound like someone is saying or doing something that they never actually said or did.

·         Metaverse platforms could be used to spread misinformation and propaganda.

You are correct to conclude that privacy is becoming increasingly difficult to protect.

The metaverse and quantum computing are just two of the many technologies that are emerging that pose a threat to our privacy.

It is important to be aware of the privacy risks associated with the metaverse and other new technologies. We should take steps to protect our privacy by using strong passwords, encrypting our data, and being careful about what information we share online. We should also support policies that protect our privacy, such as the General Data Protection Regulation (GDPR) in the European Union.

In addition to the above, here are some other things that we can do to protect our privacy in the metaverse:

·         Be careful about who you trust and what information you share with them.

·         Use a privacy-focused VPN when connecting to the metaverse.

·         Be aware of the privacy settings on metaverse platforms and adjust them to your liking.

·         Use strong passwords and enable two-factor authentication on all of your accounts.

·         Be careful about what links you click on and what files you download.

·         Keep your software up to date.

By taking these precautions, we can help to protect our privacy in the metaverse and other new technologies.

===================================================

 PS :


In total, more than 40 US states are suing Meta, though some opted to file in local courts rather than join in the federal case.

The suit accuses Meta of deceptive and unlawful conduct, harming vulnerable youth for financial gain.

The legal filing argues that Meta has "exploited" young users by creating a business model designed to maximize time they spend on the platform despite harm to their health 

No comments:

Post a Comment