Publié le Laisser un commentaire

Google proposes Android, browser contract changes to address Search antitrust ruling – 9to5Google

In addition to other remedies, the Justice Department in November shared that it wants Google to sell Chrome. Google today shared its own remedies proposal. 
We don’t propose these changes lightly. They would come at a cost to our partners by regulating how they must go about picking the best search engine for their customers. And they would impose burdensome restrictions and oversight over contracts that have reduced prices for devices and supported innovation in rival browsers, both of which have been good for consumers.
— Google
Google is open to changes that would mean that Android OEMs do not need to license Google Search or Chrome to get access to (preload) the Play Store or other first-party applications. 
…prohibits Google from conditioning licensing, payment, or any other form of consideration on an Android partner agreeing not to preload or place rival general search engines or third-party browsers on mobile devices.
Additionally, Android partners can “license Google Play, Search, and/or Chrome without also licensing Google’s Gemini Assistant mobile application.” This is to address future competition. 
…prohibits [Google] from conditioning consideration on a partner refraining from the preload of rival generative AI assistive chatbot services.
Meanwhile, Google still wants the ability to pay to be the default search engine in browsers like Safari and Firefox, but will limit these contracts to an annual basis to allow for more competition. Additionally, a browser could “set different search engines as the default across different browser operating system versions and different browsing modes” (like for private browsing). 
Finally, while the DOJ wants any remedy to last for 10 years, Google is only proposing a three-year period citing that the “pace of innovation in search has been extraordinary.”
Google will argue that the DOJ’s other proposals relating to sharing Search and ads data with third-parties to allow for the creation of competitors is too broad. It’s also opposed to divesting Chrome and/or Android.
Google’s proposals are subject to change with a hearing between Google and the DOJ set for April of 2025. The judge overseeing the case is expected to rule before September 2025, with Google still planning to appeal the underlying decision.
Updating…
FTC: We use income earning auto affiliate links. More.
Check out 9to5Google on YouTube for more news:
Breaking news for Android. Get the latest on app…
Editor-in-chief. Interested in the minutiae of Google and Alphabet. Tips/talk: abner@9to5g.com
Manage push notifications

source

Publié le Laisser un commentaire

$ABS Airdrop will be MASSIVE Cost: FREE Time: 12 minutes Potential: $4,300+ 😱💸💸💸💸 – Binance

$ABS Airdrop will be MASSIVE😱😱😱😱
Cost: FREE
Time: 12 minutes
Potential: $4,300+
Dive into the step-by-step video guide 🧵👇


We put a lot of research and work into this thread before reading it.🙏 🚨

Very Important 🚨 Please follow

@Coinaute and 🩷Like + Comment and ✅ Share #binance #MarketDownturn
→ @AbstractChain

Abstract is a blockchain crafted with user-centric design, employing sophisticated zero-knowledge (ZK) cryptography.

→ Airdrop

The airdrop process is quite simple, with several straightforward steps

Considering well-regarded projects like Movement, which have won numerous awards, it would be unwise to miss out on this airdrop.
1/ $ETH Faucet

• Move to cloud.google.com/application/we…
• Enter your wallet address
• Receive your test $ETH tokens

2/ Connect your Wallet

• Move to portal.testnet.abs.xyz/bridge
• Connect your wallet
• Switch your network to the Sepolia network
3/ Bridge

• Move to the "Bridge" tab
• Bridge $ETH from Sepolia to Abstract Testnet
• Enter the amount of tokens you want
• Approve the transaction
4/Withdraw

• Stay on the "Bridge" tab
• Bridge from Abstract testnet to $ETH Sepolia
• Enter the number of tokens you want to withdraw
• Approve the transaction
5/ Send

• Open your wallet and copy your address
• Move to the "Assets" tab
• Click on "Send" and "Send to another account"
• Enter the copied wallet address
• Enter some Sepolia $ETH
6/ Galxe

• Move to app.galxe.com/quest/Abstract
• Complete the available tasks
• Get your reward
#Giveway Christmas🌲🎅 : 🎁 1500 $ To 3 Winners 💸💸

➡️Click Here🚀

source

Publié le Laisser un commentaire

Master The Pico WiFi: Simplest HTTPS Client – iProgrammer

What is the simplest HTTPS client you can create using lwIP and mbedtls? The answer is very simple indeed. This is an extract from our latest book on the Pico in C.

Master the Raspberry Pi Pico in C:
WiFiwith lwIP & mbedtls

By Harry Fairhead & Mike James

picomaster360
Buy from Amazon.
       Preface
Appendix 1 Getting Started In C
<ASIN:B0C247QJLK>
 
HTTP using TCP/IP is a simple and relatively efficient way to transport data, but it isn’t secure. Today many web servers will only deliver data if it is protected by encryption and identity confirmation using HTTPS. This, and the general concern for security, causes problems for IoT programmers. Security, and encryption in particular, are not cheap in terms of the resources needed to implement them, but if you are planning to make your code available to the wider world you really don’t have a choice but to implement security. There are many ways of doing this but the best advice is, if possible, don’t do it from scratch. If you are not a security expert you are likely to get it wrong and make all of the effort you put into building something “secure” a waste of time. Users also like to know that your application is secure by recognizing well known standards. In short, there is a lot of pressure to use security standards even if they might be more than is actually required for an IoT device.
What this means in practice is that you most likely need to support HTTPS for web-based interactions and SSL/TLS (Secure Sockets Layer/Transport Layer Security), which is the basis of HTTPS, for other interactions. Fortunately, lwIP has a degree of integration with a very standard SSL/TLS library, mbedTLS.
In this chapter we look at how to use mbedTLS to create an HTTPS client, but this is just a step in using mbedTLS to implement a range of secure data transfers.
The basis of modern security is Public Key Infrastructure, PKI. This in turn is based on the use of public key, or asymmetrical, cryptography. The simplest approach to cryptography is to use the same key for encryption as decryption. In this case, the key is private and has to be known to both the sender and the receiver and has to be kept secret from everyone else. This creates the problem of “key exchange”. How can you get a key securely from the sender to the receiver of the data. In transit the key is vulnerable.
Public key cryptography is amazing because it works with two keys – a public key that anyone can know and use to encrypt a message and a private key that only the receiver knows and can be used to decrypt the message. This is asymmetrical cryptography because different keys are used for encryption and decryption. Its big advantage is that it removes the need to exchange keys. Its big disadvantage is that it is very slow. Because it is so slow and inefficient public key cryptography is used to exchange symmetric keys. That is, most of the time you are using symmetric key cryptography with keys provided by public key cryptography. Keys are generally stored in a special format that associates the keys with an identity – a certificate.
What happens is that, when a client connects to a server, the private and public keys are used to create a shared encryption key which is then used for all further communication. There are two general situations. If the server has a certificate but the client doesn’t then the client generates a random number and uses the server’s public key to securely send this to the server. Of course, as only the server has the private key only the server can decrypt the message and so the client and the server now have a shared secret that they can use to generate a symmetric key. The second situation is where both parties have a certificate and in this case the private and public keys available at each end of the connection are used to transport a random number to act as a shared secret.
What this means in practice is that a client doesn’t need a certificate to establish secure communication. A client only needs a certificate if it needs to prove its identity. What is more, a client IoT device is less secure with a certificate that contains a private key as this has to be stored in the device and most don’t have the necessary hardware to stop someone from connecting to the device and reading the key. Servers can keep their private keys secure because they are physically secure and protecting the key is a matter of software security. For most IoT devices no amount of software security can keep the key safe from a physical attack.
It is also important to know that key exchange can occur more than once in the lifetime of a connection to ensure the maximum security. The actual symmetric key encryption algorithm that is used can also be negotiated between the client and server. This all makes the connection more complicated.
Encryption solves the privacy issue, but it doesn’t solve the identity problem. How does the client know that the server it is connecting to is the real server and not an impostor? This is where digital certificates come into the picture. At the simplest level, a certificate is simply a container for a pair of public and private keys. More commonly the certificate only contains the public key – the private key being stored in a separate key file – this allows the certificate to be shared. Certificates also contain other information about the entity that the certificate is issued to, such as name, address, domain name and so on. Obtaining a certificate is one way for a client to gain information about a server including its public key which allows key exchange to take place.
Certificates are also digitally signed to indicate their validity. Of course, how much trust you can put in the certificate depends on who signed it. You can easily create a certificate that you also sign – a self-signed certificate – and while this is useful as a way to supply a public key, it does nothing to prove that you are who you claim to be. To be convincing evidence of identity a certificate has to be digitally signed by one of a number of well-known certificate-issuing authorities. The certificate-issuing authority will make checks and ask for documentation that proves who you are and for this it makes a charge.
How can you know that a certificate-issuing authority is authentic? It is usually the case that the certificate-issuing authority has a certificate that proves who they are, signed by another, higher, authority. This leads to the idea of a chain of certificates which ultimately end in a signature from a trusted final authority with a certificate that is installed in most browsers and used to give the final verdict on the validity of a certificate. Following a certificate chain and validating an identity is time-consuming and resource heavy.
At the time of writing, the Pico uses certificates for encryption, but doesn’t validate certificates to confirm identities.

source

Publié le Laisser un commentaire

Man found with stab wound in Lincoln-Lemington-Belmar after incident in East Liberty – WPXI Pittsburgh

WPXI Now

PITTSBURGH — A man was found with a stab wound in Lincoln-Lemington-Belmar after an incident in East Liberty.
Police were called to the 1300 block of Montezuma Street in Lincoln-Lemington-Belmar for reports of a man with a stab wound at 7:20 p.m. on Saturday.
Officers found the man and said he had a puncture wound on his hand.
He told them he got the injury in an incident that happened on the 5500 block of Center Avenue in East Liberty. He said he had been in a conflict with another person who had lunged at him with an unknown object. He ran away after that and then called 911.
The victim is currently listed in stable condition.
Download the FREE WPXI News app for breaking news alerts.
Follow Channel 11 News on Facebook and Twitter. | Watch WPXI NOW
©2024 Cox Media Group
© 2024 Cox Media Group. This station is part of Cox Media Group Television. Learn about careers at Cox Media Group. By using this website, you accept the terms of our Visitor Agreement and Privacy Policy, and understand your options regarding Ad Choices.

source

Publié le Laisser un commentaire

What Is Pi Network? Pi Network Value and Market Analysis in 2023 – Latest Cryptocurrency Prices & Articles

The cryptocurrency market is still quite new, and there is a lot of room for improvement and innovation. And because it’s new and it involves large sums of money, the crypto market is kind of a wild west.   
Many have tried and failed to recreate a new and improved Bitcoin. Some people came up with new concepts, but they didn’t seem to get anywhere near the success of Bitcoin and Ethereum.  
And truth be told, the more innovative, the more complicated the cryptocurrency matter gets.   
Therefore, a team of Standford PhDs tackled the challenge of creating PI, a user-friendly inclusive currency that could see massive worldwide adoption.
And to do so, they made use of the Stellar Consensus Protocol, another concept born at Stanford University. 
So, in this article, you will find out what this crypto project is about and how it behaves on the market.  
Well, Pi is 3.14159265359 and is a mathematical constant. But that’s not what we’re here for.  
We’re here to talk about the Pi Network. Pi Network is a cryptocurrency project developed by Standford PhDs and graduates — Nicolas Kokkalis, Chengdiao Fan, and Vince McPhillip designed to run on mobile phones.
The goal is to create a blockchain that works with the Stellar Consensus Protocol (SCP) to make it as resource-efficient and user-friendly as possible by employing a “security circles” system.  
It all started on March 14, 2019 (the official Pi Day), when the developers launched their mobile app. They marketed it as a free, battery-friendly mobile mining app that you only have to access once a day for it to continue mining for you on its own.
The mining rate started at 3.1 Pi/h and halved every time the number of users grew over a certain number.   
The community grew larger and larger, and by October 2022, the app had already got over 45 million engaged users with a 0.0147 Pi/h base mining rate. Moreover, it is essential to note that the Pi base mining rate adjusts on the first day of every month.
“Over 45 million people making free loads of money in one year? That’s amazing!”  
Yes, it is, but that’s not actually what happens. Inside the white paper, we can see that the Pi network project has three stages: betatestnet, and mainnet.  
Currently, it is in the Enclosed Mainnet phase, meaning that users can complete the KYC (Know Your Customer) procedure and move their digital assets on the mainnet.
The team launched the Pi Mainnet blockchain on December 28, 2021, and since then, it has been in an enclosed mainnet stage.
If you are wondering why Pi Network decided to pass through an enclosed mainnet period (also called the Enclosed Network Period of Mainnet), it is mainly because the team behind Pi Network aims to build a strong and trustworthy ecosystem. And to do that, developers made this strategic choice in order to offer users a network of true substance and truly valuable utilities.
As for the Pi mining, “the mining” is not actually mining as it’s understood in the crypto market. What we commonly understand as mining doesn’t even work in an SCP.  
Neither! It’s a project in a testnet state that uses common terms to hook people in. So, in order to answer the question “Is Pi Network legit?” we first need to understand how it works.  
After analyzing the white paper and taking a deeper look at this project, we can understand why the Pi Network project was designed and advertised as it is.  
The use of buzzwords to gather a vast community is essential to how the Pi cryptocurrency is thought out and the Byzantine Fault Tolerant System it employs, as we will see.
Pi Network users are distributed globally. They help to grow the network by performing different functions to keep the network going.  
The pioneers are users who keep the network busy by just logging into the free Pi mining app on a daily basis and confirming that they are not robots. This way, they manage to mine Pi. As of the beginning of 2023, there are over 45 million Pioneers on Pi Network.
Contributors build a trusted network by providing a list of pioneers they know personally. This can bring an incentive for them, thus keeping them close to the crypto project.
Contributors usually have a different mining rate, depending on how many Pioneers they refer to the Pi ecosystem. Thus, if a Contributor refers several Pioneers, they will have a higher mining rate.
However, it is essential to note that Contributors’ mining rates highly depend on Pioneers’ activity. If a Contributor refers a Pioneer and the latter does not mine Pi constantly, the Contributor’s mining rate will not stay the same.
As of March 2023, Pi Network has introduced specific ambassador programs for users. Ambassadors earn Pi when they verify and register new applications in the ecosystem.
This initiative came as a way of contributing to the Pi ecosystem specially designed for users who do not have product development or software programming knowledge.
A node is a user who combines the first two roles and operates a Pi network node. This category of network users helps to validate the network and keep its integrity in addition to playing the other roles.
Everyone playing any of the above roles can earn new Pi coins for their roles in sustaining the network. And while the Pi price may not be well established now, it will be when the project enters the Open Mainnet stage.
The design of the Pi network makes it very convenient to use, and thanks to this, many users decided to become part of it. Within two months of its launch, the network had already recorded over 200,000 active users.
As of the beginning of February 2021, the network had at least 2.5 million miners who mined the cryptocurrency using different devices and more than 10 million users in all.  
The number of Pi Network active users is constantly growing, and this is proof that crypto enthusiasts truly believe in the project and are willing to mine Pi now and see the results later.
The roadmap of the Pi Network involves 3 main phases:  
The Pi crypto will be available on cryptocurrency exchanges at the end of the 3rd phase, the mainnet. At that point, those who are mining now will be able to trade their Pi crypto for other tokens or coins.
The project is still in quite an early stage, and new miners can be added strictly by invitation. At the time of writing, Pi Network reached over 45 million engaged pioneers (miners). 
Generally, a blockchain works as a decentralized digital ledger sustained through a distributed network of computers. In a distributed system, the participants of a cryptocurrency network need to achieve consensus safely and efficiently regularly.   
However, reaching a consensus is quite difficult, especially when some of the nodes are likely to fail or act dishonestly. But through the Byzantine Fault Tolerant System, a blockchain can continue operating even when some nodes fail to communicate.   
Sidenote. Byzantine Fault Tolerance (BFT) is the property of a system to resist the types of failures that come from nodes failing to communicate or act maliciously and continue to operate as long as there is a majority of nodes in agreement.  
Bitcoin’s Proof of Work mechanism has proven to be one of the most secure implementations of BFT for blockchain. But the complex cryptographic puzzles employed by Bitcoin’s PoW turned the network rather slow and inefficient from an energy consumption point of view.  
Therefore, many other projects implemented protocols with derived BFT to create improved networks based on voting that are faster and cheaper. However, they come up with several disadvantages, like a higher risk of accidental forks, centralization, and the appearance of powerful whales.   
In 2015, Professor Mazières from Stanford introduced an alternative to Byzantine Fault Tolerance called The Federated Byzantine Agreement.
The concept is based on quorums that achieve consensus, employing overlapped quorum slices formed by validators.  
SCP is the first general FBA protocol that gives an open membership system. So, how does Stellar’s Consensus Protocol work?  
In SCP, each validator decides which validators they trust to form a quorum slice. Therefore, there is no need for a central authority to decide on a validator’s list.  
In a distributed asynchronous system, a consensus mechanism must prefer 2 of the following 3 properties:  
The SCP version of the Federated Byzantine Agreement prefers fault tolerance and safety. Also, there is no mining process. There is only a 3-5 second voting process where messages pass around to reach a consensus.
And because of the safety preference over liveness, there is no risk of a fork making you wait for a few ledgers, so a transaction is permanent from the first time it reaches consensus.   
Federated Byzantine Agreement is asymptotically secure concerning the security of the network since applying computing power to sabotage consensus is impossible.
And even if there remains the possibility of bad actors colluding, it is virtually impossible for them to form a majority because the network is formed of a complex web of overlapping quorum slices. 
On December 29, 2022, Huobi Global, a popular crypto exchange, announced that they would be listing a new digital currency called PI, which is the native token of the Pi Network. 
CoinGecko data shows that the price of Pi increased by 461.3% from $47.20 to $249.84 between December 29, 2022, and December 31, 2022.
However, Pi Network quickly responded by warning people not to buy or sell this token on Huobi or any other exchanges. They stated that they did not give permission for any crypto exchange to list their token and were not involved in the listing process.
The Pi Network team also issued an official statement reminding their users that they should be cautious when dealing with any third-party exchanges or actors who claim to be affiliated with the Pi Network.
Pi Network warned that these actions could result in loss or damage to the users. They also requested for these unauthorized posts and exchange listings to be removed.  
It’s important to note that during the Enclosed Mainnet period, it is prohibited to trade PI through any exchange, and doing so would be against the Pi Network’s policies.
So be very careful and don’t put money in without documenting from reliable sources before. In Pi Network’s case, the Pi team keeps users informed through the official Pi Network website and various updates posted on the Pi mining app.
Furthermore, Pi Network has recently launched a new app called Pi Browser, where the project offers various information regarding the Pi cryptocurrency, Pi blockchain, Pi Wallet, and the overall Pi project.  
Unfortunately, market data is untracked on CoinMarketCap for the real Pi Coin. Pi live data is also unavailable. So, we’re yet to get data for a reliable Pi Coin price prediction.  
As Pi is still in its Enclosed Mainnet phase, it is quite difficult to predict the price of Pi tokens. Miners have expressed optimism about its future value because of the efficiency and ease of use for mining.  
However, although it has not yet launched on exchanges and has no real value, for now, the cryptocurrency exchanges are giving Pi Network price predictions rather based on users’ opinions.
Changelly predicted that the price of Pi would be $0.16 by the beginning of 2020. This did not come to pass, and Pi Network’s value is currently $0.00. Moreover, it’s already early 2023, and it hasn’t even been fully launched on the mainnet yet.  
However, this is an opportunity for new miners to enter the project and start mining Pi coins so that they will have as much of the crypto as possible before trading commences.
Changelly also predicts that the price of Pi may rise to $1 by 2025, and those who already have cryptocurrencies could profit significantly. According to their price prediction, if Pi Network becomes highly promoted by various celebrities and crypto-related businesses, it might reach the market cap of XRP.
WalletInvestor, on the other hand, predicts that Pi crypto will have a price lower than $0.5 by 2025. And it is no wonder that predictions differ that much, considering that there has not been a Pi Coin launch yet, and such websites base their price predictions on other entities’ opinions.
Thus, it is highly important to thoroughly research every website you decide to use in order to stay informed about the Pi Network cryptocurrency. And as we have previously mentioned, checking the official Pi Network website will offer you significantly more news and updates and assure you that the information is trustworthy.
At the moment of writing, the pi Coin value does not truly exist. The main reason is that the Pi Network price cannot increase while the project is still in the Enclosed Mainnet period.
Currently, Pi Network is not worth anything. However, several websites post daily updates regarding how the market feels about Pi Network and the Pi Coin value.
Nevertheless, it is essential to keep in mind that the “How much is Pi Network worth now?” question still has no concrete answer.
The Pi Coin value is yet to be discovered when the project lists the Pi cryptocurrency on various cryptocurrency exchanges.
Simply put, it strongly depends on the research users perform before joining Pi Network. The crypto project seems to have been built pretty well, and the team behind it can be trustworthy.
However, some users believe that Pi Network is just another pyramid scheme. Pyramid schemes are quite popular all over the world, but they are also illegal in several countries.
Yes, it is possible that Pi Network will have quite a bright future. According to various specialized websites, Pi Network might increase in value after being launched on the market. For instance, some websites predict that the Pi coins might even reach values higher than $50.
However, it is essential to note that the prediction is not based on the Pi Coin price history, as there is no such thing at the moment. Thus, Pi users should still be cautious when including Pi Network in their investment plan.
Launched on Pi Day, Pi Network is a cryptocurrency project developed by Standford PhDs and graduates Nicolas Kokkalis, Chengdiao Fan, and Vince McPhillip designed to run on mobile phones.  
The project is currently in the testnet phase, and the Pi Network app is only a simulation of a faucet. The Pi token holds no value at the moment and cannot be traded on exchanges.  
Pi Network is built on top of the Stellar Consensus Protocol. The Stellar Consensus Protocol (SCP) is a system that works based on quorums that achieve consensus, employing overlapped quorum slices formed by validators.  
In order to build an inclusive and functional network, every role is built around producing trustworthiness. 
The Pi Network price is likely to grow when it finally lists on exchanges. The project’s team plans to make PiCoin the most popular in the future. Some people already call it “The Future Bitcoin.”  
If you wish to be a part of the Pi ecosystem and mine Pi coins on your mobile devices, you can still do that now and be a part of the future Pi Network phases.
While it is still pretty uncertain, the Pi Network price prediction shows a bright future for this cryptocurrency.  
George Town, Grand Cayman, 20th December 2024, Chainwire…
Dubai, United Arab Emirates, 20th December 2024, Chainwire…
Lahore, Pakistan, 20th December 2024, Chainwire…
Clicky

source