Even creatives aren’t safe from the AI revolution

Of all the forms of human intellect that one might expect artificial intelligence to emulate, few people would likely place creativity at the top of their list.

Creativity is wonderfully mysterious – and frustratingly fleeting. It defines us as human beings – and seemingly defies the cold logic that lies behind the silicon curtain of machines. Yet, the use of AI for creative endeavors is now growing.

New AI tools like DALL-E and Midjourney are increasingly part of creative production, and some have started to win awards for their creative output. The growing impact is both social and economic – as just one example, the potential of AI to generate new, creative content is a defining flashpoint behind the Hollywood writers’ strike.

And if our recent study into the striking originality of AI is any indication, the emergence of AI-based creativity – along with examples of both its promise and peril – is likely just beginning.

Blend of novelty and utility

When people are at their most creative, they’re responding to a need, goal or problem by generating something new – a product or solution that didn’t previously exist.

In this sense, creativity is an act of combining existing resources – ideas, materials, knowledge – in a novel way that’s useful or gratifying. Quite often, the result of creative thinking is also surprising, leading to something that the creator did not – and perhaps could not – foresee.

It might involve an invention, an unexpected punchline to a joke or a groundbreaking theory in physics. It might be a unique arrangement of notes, tempo, sounds and lyrics that results in a new song.

So, as a researcher of creative thinking, I immediately noticed something interesting about the content generated by the latest versions of AI, including GPT-4.

When prompted with tasks requiring creative thinking, the novelty and usefulness of GPT-4’s output reminded me of the creative types of ideas submitted by students and colleagues I had worked with as a teacher and entrepreneur.

The ideas were different and surprising, yet relevant and useful. And, when required, quite imaginative.

Consider the following prompt offered to GPT-4: “Suppose all children became giants for one day out of the week. What would happen?” The ideas generated by GPT-4 touched on culture, economics, psychology, politics, interpersonal communication, transportation, recreation and much more – many surprising and unique in terms of the novel connections generated.

This combination of novelty and utility is difficult to pull off, as most scientists, artists, writers, musicians, poets, chefs, founders, engineers and academics can attest.

Yet AI seemed to be doing it – and doing it well.

Putting AI to the test

With researchers in creativity and entrepreneurship Christian Byrge and Christian Gilde, I decided to put AI’s creative abilities to the test by having it take the Torrance Tests of Creative Thinking, or TTCT.

The TTCT prompts the test-taker to engage in the kinds of creativity required for real-life tasks: asking questions, how to be more resourceful or efficient, guessing cause and effect or improving a product. It might ask a test-taker to suggest ways to improve a children’s toy or imagine the consequences of a hypothetical situation, as the above example demonstrates.

The tests are not designed to measure historical creativity, which is what some researchers use to describe the transformative brilliance of figures like Mozart and Einstein. Rather, it assesses the general creative abilities of individuals, often referred to as psychological or personal creativity.

In addition to running the TTCT through GPT-4 eight times, we also administered the test to 24 of our undergraduate students.

All of the results were evaluated by trained reviewers at Scholastic Testing Service, a private testing company that provides scoring for the TTCT. They didn’t know in advance that some of the tests they’d be scoring had been completed by AI.

Since Scholastic Testing Service is a private company, it does not share its prompts with the public. This ensured that GPT-4 would not have been able to scrape the internet for past prompts and their responses. In addition, the company has a database of thousands of tests completed by college students and adults, providing a large, additional control group with which to compare AI scores.

Our results?

GPT-4 scored in the top 1% of test-takers for the originality of its ideas. From our research, we believe this marks one of the first examples of AI meeting or exceeding the human ability for original thinking.

In short, we believe that AI models like GPT-4 are capable of producing ideas that people see as unexpected, novel and unique. Other researchers are arriving at similar conclusions in their research of AI and creativity.

Yes, creativity can be evaluated

The emerging creative ability of AI is surprising for a number of reasons.

For one, many outside of the research community continue to believe that creativity cannot be defined, let alone scored. Yet products of human novelty and ingenuity have been prized – and bought and sold – for thousands of years. And creative work has been defined and scored in fields like psychology since at least the 1950s.

The person, product, process, press model of creativity, which researcher Mel Rhodes introduced in 1961, was an attempt to categorize the myriad ways in which creativity had been understood and evaluated until that point. Since then, the understanding of creativity has only grown.

Still others are surprised that the term “creativity” might be applied to nonhuman entities like computers. On this point, we tend to agree with cognitive scientist Margaret Boden, who has argued that the question of whether the term creativity should be applied to AI is a philosophical rather than scientific question.

AI’s founders foresaw its creative abilities

It’s worth noting that we studied only the output of AI in our research. We didn’t study its creative process, which is likely very different from human thinking processes, or the environment in which the ideas were generated. And had we defined creativity as requiring a human person, then we would have had to conclude, by definition, that AI cannot possibly be creative.

But regardless of the debate over definitions of creativity and the creative process, the products generated by the latest versions of AI are novel and useful. We believe this satisfies the definition of creativity that is now dominant in the fields of psychology and science.

Furthermore, the creative abilities of AI’s current iterations are not entirely unexpected.

In their now famous proposal for the 1956 Dartmouth Summer Research Project on Artificial Intelligence, the founders of AI highlighted their desire to simulate “every aspect of learning or any other feature of intelligence” – including creativity.

In this same proposal, computer scientist Nathaniel Rochester revealed his motivation: “How can I make a machine which will exhibit originality in its solution of problems?”

Apparently, AI’s founders believed that creativity, including the originality of ideas, was among the specific forms of human intelligence that machines could emulate.

To me, the surprising creativity scores of GPT-4 and other AI models highlight a more pressing concern: Within US schools, very few official programs and curricula have been implemented to date that specifically target human creativity and cultivate its development.

In this sense, the creative abilities now realized by AI may provide a “Sputnik moment” for educators and others interested in furthering human creative abilities, including those who see creativity as an essential condition of individual, social and economic growth.

Erik Guzik is Assistant Clinical Professor of Management, University of Montana

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

New-gen ransomware gangs have crypto in their sights

In May 2023, the Dallas City Government was hugely disrupted by a ransomware attack. Ransomware attacks are so-called because the hackers behind them encrypt vital data and demand a ransom in order to get the information decrypted.

The attack in Dallas put a halt to hearings, trials and jury duty, and the eventual closure of the Dallas Municipal Court Building. It also had an indirect effect on wider police activities, with stretched resources affecting the ability to deliver, for example, summer youth programmes. The criminals threatened to publish sensitive data, including personal information, court cases, prisoner identities and government documents.

One might imagine an attack on a city government and police force causing widespread and lengthy disruption would be headline news. But ransomware attacks are now so common and routine that most pass with barely a ripple of attention.

One notable exception happened in May and June 2023 when hackers exploited a vulnerability in the Moveit file transfer app which led to data theft from hundreds of organizations around the world. That attack grabbed headlines, perhaps because of the high-profile victims, reported to include British Airways, the BBC and the chemist chain Boots.

According to one recent survey, ransomware payments have nearly doubled to US$1.5 million over the past year, with the highest-earning organizations the most likely to pay attackers. Sophos, a British cybersecurity firm, found that the average ransomware payment rose from $812,000 the previous year. The average payment by UK organizations in 2023 was even higher than the global average, at $2.1 million.

Meanwhile, in 2022 The National Cyber Security Centre (NCSC) issued new guidance urging organizations to bolster their defenses amid fears of more state-sponsored cyber attacks linked to the conflict in Ukraine. It follows a series of cyber attacks in Ukraine which are suspected to have involved Russia, which Moscow denies.

In reality, not a week goes by without attacks affecting governments, schools, hospitals, businesses and charities, all over the world. These attacks have significant financial and societal costs. They can affect small businesses, as well as huge corporations, and can be particularly devastating for those involved.

Ransomware is now widely acknowledged as a major threat and challenge to modern society.

Yet ten years ago it was nothing more than a theoretical possibility and niche threat. The way in which it has quickly evolved, fuelling criminality and causing untold damage should be of major concern. The ransomware “business model” has become increasingly sophisticated with, for instance, advances in malware attack vectors, negotiation strategies and the structure of criminal enterprise itself.

There is every expectation that criminals will continue to adapt their strategies and cause widespread damage for many years to come. That’s why it is vital that we study the ransomware threat and preempt these tactics so as to mitigate the long-term threat – and that is exactly what our research team is doing.

Prediction of global ransomware damage costs – source: Cyber Security Ventures

A graph showing the damges related to ransomware
Alpesh Bhudia, CC BY-ND

For many years our research has looked to preempt this evolving threat by exploring new strategies that ransomware criminals can use to extort victims. The aim is to forewarn, and be ahead of the game, without identifying specifics that could be used by criminals.

In our latest research, which has been peer-reviewed and will be published as part of the International Conference on Availability, Reliability and Security (ARES), we have identified a novel threat that exploits vulnerabilities in cryptocurrencies.

What is ransomware?

Ransomware can mean subtly different things in different contexts. In 1996, Adam Young and Mordechai “Moti” Yung at Columbia University described the basic form of a ransomware attack as follows:

Criminals breach the cybersecurity defenses of the victim (either through tactics like phishing emails or using an insider/rogue employee). Once the criminals have breached the victim’s defences they deploy the ransomware.

The main function of which is to encrypt the victim’s files with a private key (which can be thought of as a long string of characters) to lock the victim out of their files. The third stage of an attack now begins with the criminal demanding a ransom for the private key.

The simple reality is that many victims pay the ransom, with ransoms potentially into the millions of dollars.

Using this basic characterisation of ransomware it is possible to distinguish different types of attack. At one extreme we there are the “low level” attacks where files are not encrypted or criminals do not attempt to extract ransoms. But at the other extreme attackers make considerable efforts to maximize disruption and extract a ransom.

The WannaCry ransomware attack in May 2017 is such an example. The attack, linked to the North Korean government, made no real attempt to extract ransoms from victims. Nevertheless, it led to widespread disruption across the world, including to the UK’s NHS, with some cybersecurity risk-modelling organizations even saying the global economic losses are going into the billions.

It is difficult to discern motive in this case, but, generally speaking, political intent, or simple error on the part of the attackers may contribute to the lack of coherent value-extraction through extortion.

Our research focuses on the second extreme of ransomware attacks in which criminals look to coerce money from their victims. This does not preclude a political motive. Indeed, there is evidence of links between major ransomware groups and the Russian state.

We can distinguish the degree to which ransomware attacks are motivated by financial gain by observing the effort invested in negotiation, a willingness to support or facilitate payment of the ransom, and the presence of money laundering services.

By investing in tools and services which facilitate payment of the ransom, and its conversion to fiat currency, the attackers signal their financial motives.

The impact of attacks

As the attack on the Dallas City Government shows, the financial and social impacts of ransomware attacks can be diverse and severe.

High-impact ransomware attacks, such as the one which targeted Colonial Oil in May 2021 and took a major US fuel pipeline offline, are obviously dangerous to the continuity of vital services.

In January 2023, there was a ransomware attack on the Royal Mail in the UK that led to the suspension of international deliveries. It took over a month for service levels to get back to normal. This attack would have had a significant direct impact on the Royal Mail’s revenue and reputation. But, perhaps more importantly, it impacted all the small businesses and people who rely on it.

In May 2021, the Irish NHS was hit by a ransomware attack. This affected every aspect of patient care with widespread cancellation of appointments. The Taoiseach Micheál Martin said: “It’s a shocking attack on a health service, but fundamentally on the patients and the Irish public.”

Sensitive data was also reportedly leaked. The financial impact of the attack could be as high as 100 million euros. This, however, does not account for the health and psychological impact on patients and medics affected by the disruption.

As well as health services, education has also been a prime target. For instance, in January 2023 a school in Guilford, UK, suffered an attack with the criminals threatening to publish sensitive data including safeguarding reports and information about vulnerable children.

Attacks are also timed to maximize disruption. For instance, an attack in June 2023 on a school in Dorchester, UK, left the school unable to use email or access services during the main exam period. This can have a profound impact on children’s well-being and educational achievement.

These examples are by no means exhaustive. Many attacks, for instance, directly target businesses and charities that are too small to attract attention. The impact on a small business, in terms of business disruption, lost reputation and the psychological cost of facing the consequences of an attack can be devastating.

As an example, a survey in 2021 found that 34% of UK businesses that suffered a ransomware attack subsequently closed down. And, many of the businesses that continued operation still had to lay off staff.

It began with floppy disks

The origins of ransomware are usually traced back to the AIDS or PC Cyborg Trojan virus in the 1980s. In this case, victims who inserted a floppy disk in their computer would find their files subsequently encrypted and a payment requested.

Disks were distributed to attendees and people interested in specific conferences, who would then attempt to access the disk to complete a survey – instead becoming infected with the trojan.

Files on affected computers were encrypted using a key stored locally on each target machine. A victim could, in principle, have restored access to their files by using this key. The victim, though, may not have known that they could do this, as even now, technical knowledge of cryptography is not common among most PC users.

Eventually, law enforcement traced the floppy disks to a Harvard-taught evolutionary biologist named Joseph Popp, who was conducting AIDS research at the time. He was arrested and charged with multiple counts of blackmail, and has been credited by some with being the inventor of ransomware.

No one knows exactly what provoked Popp to do what he did.

Early form of white computer text on red background
The on-screen message after the AIDS Trojan Horse ransomware was activated. Wikipedia

Many early versions of ransomware were quite basic cryptographic systems which suffered from various issues surrounding how easy it was to find the key information the criminal was trying to hide from the victim. This is one reason why ransomware really came of age with the CryptoLocker attack in 2013 and 2014.

CryptoLocker was the first technically sound ransomware attack virus to be distributed en masse. Thousands of victims saw their files encrypted by ransomware that could not be reverse-engineered. The private keys, used in encryption, were held by the attacker and victims could not restore access to their files without them.

Ransoms of around $300-600 were demanded and it is estimated the criminals got away with around $3 million. Cryptolocker was eventually shut down in 2014 following an operation involving multiple, international law enforcement agencies.

CryptoLocker was pivotal in showing proof of concept that criminals could earn large amounts of money from ransomware. Subsequently, there was an explosion of new variants and new types. There was also significant evolution in the strategies used by criminals.

Off-the-shelf and double extortion

One important development was the emergence of ransomware-as-a-service. This is a term for markets on the dark web through which criminals can obtain and use “off-the-shelf” ransomware without the need for advanced computing skills while the ransomware providers take a cut of the profits.

Research has shown how the dark web is the “unregulated Wild West of the internet” and a safe haven for criminals to communicate and exchange of illegal goods and services. It is easily accessible and with the help of anonymization technology and digital currencies, there is a global black economy thriving there. An estimated $1 billion was spent there during the first nine months of 2019 alone, according to the European Union Agency for Law Enforcement.

With ransomware as a service (Raas) the barrier to entry for aspiring cyber criminals, in terms of both cost and skill, was lowered.

Under the Raas model, expertise is provided by vendors who develop the malware while the attackers themselves may be relatively unskilled. This also has the effect of compartmentalizing risk – the arrest of cyber criminals using ransomware no longer threatens the entire supply chain, allowing attacks launched by other groups to continue.

We have also seen a movement away from mass phishing attacks, like CryptoLocker, which reached more than 250,000 systems, to more targeted attacks. That has meant an increasing focus on organizations with the revenue to pay large ransoms. Multinational organizations, legal firms, schools, universities, hospitals and healthcare providers have all become prime targets, as well as many small and micro businesses and charities.

A more recent development in ransomware, such as Netwalker, REvil/Sodinokibi, has been the threat of double extortion. This is where the criminals not only encrypt files but also exfiltrate data by copying the files. They then have the potential to leak or post potentially sensitive and important information.

An example of this occurred in 2020, when one of the largest software companies, Software AG, was hit with a double extortion ransomware called Clop. It was reported that the attackers had requested an exceptionally high ransom payment of $20 million, which Software AG refused to pay.

This led to attackers releasing confidential company data on the dark web. This provides criminals with two sources of leverage: they can ransom for the private key to decrypt files and they can ransom to stop publication of sensitive data.

Double extortion changes the business model of ransomware in interesting ways. In particular, with standard ransomware, there is a relatively straightforward incentive for a victim to pay a ransom for access to the private key if that would allow decryption of the files, and they cannot access the files through any other means.

The victim “only” needs to trust the cybercriminal will give them the key and that the key will work.

‘Honor’ among thieves?

But with data exfiltration, by contrast, it is not obvious what the victim gets in return for paying the ransom. The criminals still have the sensitive data and could still publish it any time they want. They could, indeed, ask for subsequent ransoms to not publish the files.

Therefore, for data exfiltration to be a viable business strategy the criminals need to build a credible reputation of “honoring” ransom payments. This has arguably led to a normalized ransomware ecosystem.

For instance, ransom negotiators are private contractors and in some cases are required as part of a cyber insurance agreement to provide expertise in the managing of crisis situations involving ransomware. Where instructed, they will facilitate negotiated ransom payments. Within this ecosystem, some ransomware criminal gangs have developed a reputation for not publishing data (or at least delaying publication) if a ransom is paid.

More generally, the encryption, decryption or exfiltration of files is typically a difficult and costly task for criminals to pull off. It is far simpler to delete the files and then claim they have been encrypted or exfiltrated and demand a ransom.

However, if the victims suspect that they won’t be getting the decryption key or encrypted data back then they won’t pay the ransom.

And those that do pay a ransom and get nothing in return may disclose that fact. This is likely to impact the attacker’s “reputation” and the likelihood of future ransom payments. Simply put, it pays to play “fair” in the world of extortion and ransom attacks.

So in less than ten years we have seen the ransomware threat evolve enormously from the relatively low-scale CryptoLocker, to a multi-million dollar business involving organized criminal gangs and sophisticated strategies.

From 2020 onwards the incidents of ransomware, and consequent losses, have seemingly increased by another order of magnitude. Ransomware has become too big to ignore and is now a major concern for governments and law enforcement.

Crypto extortion threats

Devastating though ransomware has become, the threat will inevitably evolve further, as criminals develop new techniques for extortion. As mentioned already, a key theme in our collective research over the last ten years has been to try and preempt the likely strategies that criminals can employ so as to be ahead of the game.

Our research is now focused on the next generation of ransomware, which we believe will include variants focused on cryptocurrency, and the “consensus mechanisms” used within them.

A consensus mechanism is any method (usually algorithmic) used to achieve agreement, trust and security across a decentralized computer network.

Financial business concept, bitcoin, etheruem, litecoin
The next target could by crypto. Photo: Shutterstock via The Conversation / sundaemorning

Specifically, cryptocurrencies are increasingly using a so-called “proof-of-stake” consensus mechanism, in which investors stake significant sums of currency to validate crypto transactions. These stakes are vulnerable to extortion by ransomware criminals.

Cryptocurrencies rely on a decentralized blockchain that provides a transparent record of all the transactions that have taken place using that currency. The blockchain is maintained by a peer-to-peer network rather than a central authority (as with conventional currency).

In principle, the transaction records included in the blockchain are immutable, verifiable and securely distributed across the network, giving users full ownership and visibility into the transaction data.

These properties of blockchain rely on a secure and non-manipulable “consensus mechanism” in which the independent nodes in the network “approve” or “agree” which transactions to add to the blockchain.

Until now, cryptocurrencies like Bitcoin have relied on a so-called “proof-of-work” consensus mechanism in which the authorization of transactions involves the solving of complex mathematical problems (the work). In the long term, this approach is unsustainable because it results in duplication of effort and avoidable large-scale energy use.

The alternative, which is now becoming a reality, is a “proof-of-stake” consensus mechanism. Here, transactions are approved by validators who have staked money and are financially rewarded for validating transactions. The role of inefficient work is replaced by a financial stake. While this addresses the energy problem, it means that large amounts of staked money becomes involved in validating crypto transactions.

Ethereum

The existence of this staked money provides a novel threat to some proof-of-stake cryptocurrencies. We have focussed our attention on Ethereum, a decentralized cryptocurrency that establishes a peer-to-peer network to securely execute and verify application code, known as a smart contract.

Ethereum is powered by the Ether (ETH) token that allows users to transact with each other through the use of these smart contracts. The Ethereum project was co-founded by Vitalik Buterin in 2013 to overcome shortcomings with Bitcoin. On September 15, 2022, The Merge, moved the Ethereum network from proof-of-work to proof-of-stake, making it one of the first prominent proof-of-stake cryptocurrencies.

The proof-of-stake consensus mechanism in Ethereum relies on “validators” to approve transactions. To set up a validator there needs to be a minimum stake of 32ETH, which is currently around $60,000. Validators can then earn a financial return on their stake from operating a validator in accordance with Ethereum rules. At the time of writing there are around 850,000 validators.

A lot of hope is being pinned on the “stake” solution of validation – but hackers are sure to be looking into how they can infiltrate the system.

In our project, which was funded by the Ethereum Foundation, we identified ways in which ransomware groups could exploit the new proof-of-stake mechanism for extortion.

Slashing

We found that attackers could exploit validators through a process called “slashing”. While validators receive rewards for obeying the rules, there are financial penalties for validators that are seen to act maliciously. The basic objective of penalties is to prevent exploitation of the decentralized blockchain.

There are two forms of penalties, the most severe of which is slashing. Slashing occurs for actions that should not happen by accident and could jeopardize the blockchain, such as proposing conflicting blocks are added to the blockchain, or trying to change history.

Slashing penalties are relatively severe with the validator losing a significant share of their stake, at least 1ETH. Indeed, in the most extreme case the validator could lose all of their stake (32ETH). The validator will also be forced to exit and no longer act as a validator. In short, if a validator is slashed there are big financial consequences.

To perform actions, validators are assigned unique signing keys, that, in essence, prove who they are to the network. Suppose that a criminal got hold of the signing key? Then, they could blackmail the victim into paying a ransom.

Flow diagram showing just how complicated it gets when there is an extortion attack against proof-of-stake validators, such as Ethereum

Flow chart showing what happens when ransomware attacks infiltrate crypto.
Alpesh Bhudia, CC BY-ND

A ‘smart contract’

The victim may be reluctant to pay the ransom unless there is a guarantee that the criminals will not take their money and fail to return/release the key. After all, what is to stop the criminals asking for another ransom?

One solution we have found – which harks back to the fact that ransomware has in fact become a kind of business operated by criminals who want proof they have an “honest” reputation – is a smart contract.

This automated contract can be written so that the process only works if both sides “honor” their side of the bargain. So, the victim could pay the ransom and be confident that this will resolve the direct extortion threat. This is possible through Ethereum because all the steps required are publicly observable on the blockchain – the deposit, the sign to exit, the absence of slashing and the return of the stake.

Functionally, these smart contracts are an escrow system in which money may be held until pre-agreed conditions are met. For instance, if the criminals force slashing before the validator has fully exited, then the contract will ensure that the ransom amount is returned to the victim.

Such contracts are, however, open to abuse, and there’s no guarantee that an attacker-authored contract can be trusted. There is potential for the contract to be automated in a fully trusted way, but we have yet to observe such behavior and systems emerge.

The staking pools threat

This type of “pay and exit” strategy is an effective way for criminals to extort victims if they can obtain the validator signing keys.

So how much damage would a ransomware attack like this do to Ethereum? If a single validator is compromised then the slashing penalty – and so maximum ransom demand – would be in the region of 1ETH, which is around $1,800. To leverage larger amounts of money the criminals, therefore, need to target organizations or staking pools that are responsible for managing large numbers of validators.

Remember, that given the high entry costs for individual investors, most of the validating on Ethereum will be run under “staking pools” in which multiple investors can collectively stake money.

To put this in perspective, Lido is the largest staking pool in Ethereum with around 127,000 validators and 18% of the total stake; Coinbase is the second largest with 40,000 validators and 6% of the total stake. In total, there are 21 staking pools operating more than a 1,000 validators. Any one of these staking pools is responsible for tens of millions of dollars of stake and so viable ransom demands could also be in the millions of dollars.

Proof-of-stake consensus mechanisms are too young for us to know whether extortion of staking pools will become an active reality. But the general lesson of ransomware’s evolution is that the criminals tend to gravitate towards strategies that incentivize payment and increase their illicit gains.

The most straightforward way that investors and staking pool operators can mitigate the extortion threat we have identified is by protecting their signing keys. If the criminals cannot access the signing keys then there is no threat. If the criminals can only access some of the keys (for operators with multiple validators) then the threat may fail to be lucrative.

So staking pools need to take measures to secure signing keys. This would involve a range of actions including: partitioning validators so that a breach only impacts a small subset; step up cyber security to prevent intrusion, and robust internal processes to limit the insider threat of an employee divulging signing keys.

Concept using blocks with locks and keys printed on them to show encryption keys being compromised.
What happens when hackers gain access to secret keys? Photo: Shutterstock via The Conversation / Andrii Yalanskyi

The staking pool market for cryptocurrencies like Ethereum is competitive. There are many staking pools, all offering relatively similar services, and competing on price to attract investors. These competitive forces, and the need to cut costs, may lead to relatively lax security measures. Some staking pools may, therefore, prove a relatively easy target for criminals.

Ultimately, this can only be solved with regulation, greater awareness and for investors in staking pools to demand high levels of security to protect their stake.

Unfortunately, the history of ransomware suggests that high-profile attacks will need to be seen before the threat is taken seriously enough. It is interesting to contemplate the consequences of a significant breach of a staking pool.

The reputation of the staking pool would presumably be badly affected and so the staking pool’s viability in a competitive market is questionable. An attack may also have implications for the reputation of the currency.

At the most serious, it could lead to a currency collapsing. When that happens – as it did with FTX in 2022 following another hacking attack, there are knock-on effects to the global economy.

Here to stay

Ransomware will be a challenge for years, if not decades, to come.

One potential vision of the future is that ransomware just becomes part of normal economic life with organizations facing the constant threat of attack, with few consequences for the largely anonymous gangs of cyber criminals behind the scams.

To preempt such negative consequences we need greater awareness of the threat. Then investors can make more informed decisions over which staking pools and currencies to invest in. It also makes sense to have a market with many staking pools, rather than a market dominated by just a few large ones, as this could insulate the currency from possible attacks.

Beyond crypto, preemption involves investment in cyber security across a range of forms – from staff training and an organizational culture that supports reporting of incidents. It also involves investment in recovery options, such as effective back-ups, in-house expertise, insurance and tried and tested contingency plans.

Unfortunately, cyber security practices are not improving as one might hope in many organizations and this is leaving the door open for cyber criminals. Essentially, everyone needs to get better at hiding, and protecting, their digital keys and sensitive information if we are to stand a chance against the next generation of ransomware attackers.

Alpesh Bhudia is Doctoral Researcher in Cyber Security, Royal Holloway University of London; Anna Cartwright is Principal Lecturer in Accounting, Finance and Economics, Oxford Brookes University; Darren Hurley-Smith is Senior Lecturer in Information Security, Royal Holloway University of London, and Edward Cartwright is Professor of Economics, De Montfort University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

Ministry of Economy launches ‘one of a kind’ digital leadership programme

Aimed at developing leadership in both public and private sectors
Partnered with ASB)/MIT Sloan Management, AWS,Google Cloud, IBM, Microsoft, Shopee

The Malaysian government, in its effort to build up the nation’s digital ecosystem, announced the launch of a new initiative called the Executive Digital Leadership (EDL) Programme. Calling the initiative “one of a kind”,…Continue Reading

Malaysia grows with Time: Catalysing ASEAN’s digital powerhouse

Envisioning ASEAN’s Digital Future
Malaysia stands on cusp of becoming next digital hub of ASEAN

Malaysia’s digital economy currently contributes 23.2% to the country’s GDP and is set to surpass expectations by 2025. Bolstered by the highest number of Internet users in the region, boasting close to 98% Internet penetration, Malaysia is primed…Continue Reading

Southeast Asian recommerce platform, CompAsia, raises Series A with Gobi Partners as lead investor

Contributed to reduction of 420 tonnes e-waste, saving 46 bil gallons of water
Claims to be among SEA’s leading vertically integrated device lifecycle companies

Pan-Asian venture capital firm, Gobi Partners, has taken on the lead investor role in the Series A funding round of Malaysian based Southeast Asian focused integrated recommerce platform, CompAsia.
Since 2016,…Continue Reading

Internships – focus should be on job quality and conducive environment for learning

Pikom contends that the conversation should not be about compensation
Ensure interns receive meaningful assignments, gain industry-specific skills

The question of compensation for internship has been a hot button topic since the start of the year with interns, employers and even the Government taking turns to voice their views on this contentious issue.
In…Continue Reading

Ballyhooed LK-99 neither superconductor nor even a metal

The past few weeks have seen a huge surge of interest among scientists and the public in a material called LK-99 after it was claimed to be a superconductor at room temperature and ambient pressure.

LK-99 garnered attention after South Korean researchers posted two papers about it on arXiv, a non-peer-reviewed repository for scientific reports, on July 22. The researchers reported possible indicators of superconductivity in LK-99, including unexpectedly low electrical resistance and partial levitation in a magnetic field.

The potential discovery drew enthusiasm on social media and was widely reported in traditional media too. As a physicist working on quantum phenomena in materials, I was gratified to see the interest in superconductivity, and I shared in the excitement about the report. But I also approached the results with scepticism, especially since many previous reports of room-temperature superconductivity have failed to be reproduced.

Now, after follow-up experiments by scientists around the world, it seems LK-99 is not so special after all. However, while this particular avenue of research may be a dead end, the dream of a room-temperature superconductor is still very much alive.

What is a superconductor, and why are they useful?

You’re probably familiar with ordinary conductors, like metals, in which electrons can move fairly easily through the “crystal lattice” of atoms that makes up the material. This means an electric current can flow – but the electrons are jostled around a bit as they move, so they lose energy as they travel. (This jostling is called electrical resistance.)

In a superconductor, there is zero resistance and an electrical current can flow perfectly smoothly without losing any energy. Many metals become superconductors at very low temperatures.

YouTube video

[embedded content]

Superconductivity occurs when the electrons slightly distort the crystal lattice of the metal in a way that makes them team up into “Cooper pairs.” These pairs of electrons then “condense” into a superfluid, a state of matter that can flow without friction.

Superconductors are very useful. They can be used to create extremely powerful electromagnets, such as those in MRI scanners, particle accelerators, fusion reactors and maglev trains.

Current superconductors work only at ultra-cold temperatures, so they require expensive refrigeration. A material that superconducts at everyday temperature and pressure could be used much more widely.

YouTube video

[embedded content]

Currently, the highest superconducting temperatures at ambient pressure are around –138℃ (135 Kelvin), found in “cuprate” superconductors, a family of copper-containing compounds discovered unexpectedly in 1986. Electron pairing in the cuprates appears to involve a different mechanism than interaction with the lattice.

However, while our understanding of such exotic superconductors has improved, we still can’t yet predict with any certainty new materials which could superconduct at even higher temperature.

Still, there is no reason to think this can’t be achieved. Moreover, many if not most superconducting materials are discovered serendipitously – so a claimed discovery of an unexpected room-temperature superconductor can’t be dismissed out of hand.

So what about LK-99?

LK-99 is a compound containing oxygen, phosphorus, lead and copper. Little was known about the material when the papers claiming superconductivity emerged. For example, it wasn’t even known whether it should conduct electricity at all.

The report of superconductivity at ambient conditions sparked a crash effort from researchers around the world to understand the material and reproduce the results.

While it is still early days, and neither the initial report nor the follow-ups have been peer-reviewed, a picture has started to emerge that the LK-99 compound described by the authors is not a superconductor, and not even a metal.

So if it’s not a superconductor, why did the original researchers think it was? One study has pointed out that an impurity in the initial LK-99 samples, cuprous sulfide, could explain some of what they saw.

Cuprous sulfide experiences a sudden, large change in resistance at a temperature of around 127℃ (400K). The first researchers saw this drop in resistance and attributed it to superconductivity in LK-99, but it is more likely explained by very low (not zero) resistance in the cuprous sulfide impurity.

The partial levitation of LK-99, which might have indicated a property of superconductors called “magnetic flux pinning”, seems to be caused by ferromagnetism, a familiar effect that occurs in iron and many other materials.

So while nobody has proven the LK-99 samples studied in the original reports don’t superconduct, the balance of evidence right now is strongly in favour of other explanations. Most scientists studying superconductivity don’t see much reason to continue looking at LK-99.

Excitons and beyond

What’s next for superconductivity research? Well, we can cross LK-99 off the list of materials to study, but the search goes on.

In fact, there has been a lot of progress in the past few years towards creating zero resistance under ordinary conditions.

Making electrons pair together is the key to superconductivity, but this is hard to do as they naturally repel each other. However, it’s possible to make an electron pair up with a “hole” in a material – a gap where an electron should be.

These electron–hole pairs are called excitons, and they can be combined with light to form a frictionless superfluid at room temperature. This superfluid doesn’t carry an electrical current (because the charges of the electron and the hole cancel out), but separating the electron and hole might allow supercurrents without resistance.

Topological insulators

An alternate route to zero resistance at room temperature has been found in so-called topological insulators. These are materials that only allow electrons to move along their edges or surfaces, in some cases with no resistance.

Graphene, a material made of sheets of carbon only a single atom thick, can be turned into a topological insulator in a strong magnetic field. But the required magnetic field is so extreme it can only be realised in a few laboratories in the world.

A photo shows a scientist manipulating a levitating piece of metal surrounding by vapour from liquid nitrogen.
Typical superconductors only function at extremely low temperatures. Michelmond / Shutterstock

There are also other types of topological insulators that work without an externally applied magnetic field. Current versions of these materials show zero resistance only at very low temperatures, but there appears to be no reason they couldn’t work at room temperature.

Unfortunately superfluid excitons and topological insulators can only carry a limited amount of current, and are probably not useful for creating powerful magnets.

But they could still be useful for transmitting the tiny electrical signals used in computer chips, and my colleagues and I are using them to create low-power electronic and computing technologies.

Michael Fuhrer is Professor of Physics, Monash University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

Soul Parking revenue skyrockets 100x, emerges as key player in Indonesia’s EV charging 

AC Ventures, a pioneer investor in Soul Parking
Aims to tap into Indonesia’s growing EV revolution 

Soul Parking, Indonesia’s tech-enabled pioneer in innovative parking solutions announced a 100x growth in its topline revenue over the past three years. 
In a statement, the startup said this growth underscores its dominance in Indonesia’s urban mobility sector,…Continue Reading

Bread & Kaya: 2022 Cyberlaw cases of interest..Pt 2

A question of technical glitches & breaching of contractual obligations
Singapore’s First Action against Unknown Persons on Cyberspace
After sharing Part 1 of some interesting cases last week, I conclude my annual review of noteworthy cyberlaw cases with some notable online contract matters and examples of where the Singapore government has filed…Continue Reading

Eight startups chosen for Cyberview Living Lab® Accelerator Programme

Current cohort focused on developing AI-powered digital solutions 
Solutions designed to serve the property, retail & healthcare sectors 

Cyberview’s Living Lab Accelerator (CLLA) Programme has selected eight local startups in the domains of smart city development: smart living, industrial IoT, and digital solutions. These startups were chosen from a pool of 20 applicants.
In…Continue Reading