Two major technological advances—AI and quantum computing—are the impetus for significant innovation across industries. Unfortunately, the cybercriminal ecosystem isn’t any different.
Cybercriminals’ experimentation with AI, the threat quantum computing poses to encrypted data, and the rapid adoption of digitized value are leading to massive changes, says Ian Rogers, chief experience officer at Ledger, a provider of secure signer platforms.
“We’ve got lived through the ‘once in humanity’ digitization of all information, and now we reside through the ‘once in humanity’ digitization of all value,” he says. “And I might say, we may all have a little bit of whiplash from the web, but you ain’t seen nothing yet.”
The ubiquity of AI and continuing advances in quantum computing will transform the safety landscape and alter what firms and users must safeguard their digital assets. Quantum computing poses challenges for the cryptocurrency ecosystem, especially for those areas not updated to make use of post-quantum cryptography, while AI lowers the barriers to creating synthetic identities and convincing fake information.
“We’ve got lived through the ‘once in humanity’ digitization of all information, and now we reside through the ‘once in humanity’ digitization of all value,” he says. “And I might say, we may all have a little bit of whiplash from the web, but you ain’t seen nothing yet.”
Ian Rogers, chief experience officer, Ledger
The impact? Unless firms and digital-asset owners adopt more stringent security, they face more advanced threats and risks to their portfolios.
Disruption, but when?
As demonstrated by the mentorship scam, AI already poses a threat to technology users. Quite a lot of other AI-augmented attacks have popped up as well. Attackers use AI code generators to provide variations on their tools, often successfully evading malware detectors and antivirus software. In a single instance, a cybercrime group generally known as GreedyBear generated 150 wallet extensions for Firefox using AI code-generators. The malicious campaign stole greater than $1 million from users.
“As a user, it is extremely difficult to know should you are interacting with a human or with a bot,” he says. “How do you understand that you just are, today, interacting with me and that I’m a human? Since it’s already quite easy for AI to impersonate me.”
Charles Guillemet, chief technology officer, Ledger
Increasingly, AI is getting used to masquerade as executives at firms or create synthetic identities for fraud. The attacks are sometimes very convincing, even fooling tech-savvy victims, says Charles Guillemet, chief technology officer at Ledger.
“As a user, it is extremely difficult to know should you are interacting with a human or with a bot,” he says. “How do you understand that you just are, today, interacting with me and that I’m a human? Since it’s already quite easy for AI to impersonate me.”
The threat posed by quantum computing to encrypted data is real, however it’s still in a future state. For instance, it’s likely a quantum computer able to storing 1,000,000 qubits is required to interrupt today’s commonly used public-key encryption. Nonetheless, even with accelerated investment in research and development a practical quantum computer will only be deployable in the following decade or two.
Nonetheless, while practical quantum computing might not be here today, sensitive data needs to begin being protected now. Far-sighted crypto thieves—not to say nation-state threat actors—can collect high-value data today within the expectation that the information will remain helpful when it may well be decrypted in a decade. The scheme, generally known as “harvest now, decrypt later, ” signifies that today’s most precious data needs to make use of post-quantum encryption to guard against the long run development of a practical quantum computer.
“It’s not that easy to judge the threat,” says Guillemet. “Nonetheless, the excellent news is that we have now an answer to this threat.”
Your complete cryptocurrency ecosystem must adopt post-quantum cryptographic algorithms to guard asset owners from these future threats. The EU and US are already moving to require quantum-resistant crypto by 2035. Ecosystem firms, resembling Ledger, are creating tools to make post-quantum security easier to adopt and to prove authenticity of digital assets.
Next-generation identity is required
With these rapidly evolving technologies threatening the ecosystem, the boundaries between identity protection and asset security proceed to blur. Securing each identity and assets has change into vital. Because the trend toward the digitization of all value continues, cryptocurrency-technology providers must innovate in each identity and privacy. Security alone will not be enough; users and corporations need higher identity and privacy as well.
“If we’re doing cryptocurrency, then we’d like self-custody, and if we have now self-custody, then we’d like security,” he says. “It doesn’t matter if it’s on the user side, the organizational side, or the federal government side — any person goes to carry those tokens, and while stealing a billion in gold bars could be very difficult, stealing a billion in cryptocurrency is simple.”
Ian Rogers, chief experience officer, Ledger
Self-custody and permissionless value are vital for the long run but make security hard. Cryptocurrencies are predicated on the principle of self-custody—meaning a user, not a third-party, holds the keys that secure them in a digital wallet—and so they require no permission to make use of. Nonetheless, these characteristics also mean that, if stolen, that value is irretrievably lost.
These attributes mean that cryptosecurity providers must proceed to innovate, says Rogers.
“If we’re doing cryptocurrency, then we’d like self-custody, and if we have now self-custody, then we’d like security,” he says. “It doesn’t matter if it’s on the user side, the organizational side, or the federal government side — any person goes to carry those tokens, and while stealing a billion in gold bars could be very difficult, stealing a billion in cryptocurrency is simple.”
When a 3rd party, resembling a cryptocurrency exchange, is the custodian for an owner’s digital assets, proving identity is critical. With the potential for AI to make spoofing users or stealing users’ digital identities easier, and quantum computing potentially undermining some legacy crypto systems, identity also must have well-tested security, says Guillemet.
“Cryptography is the reply,” he says. “If I can authenticate myself and authenticate my content, then you definately can have the strong guarantee that you just are talking to me and that I’m a human.”
Securing the next-generation economy
A serious difference between digital assets and physical assets is that bits are easily copied, whereas atoms require more effort. As such, security decisions should be made today to organize for tomorrow’s digital-based economies. As a start, post-quantum encryption algorithms should be adopted in any respect levels of the cryptocurrency ecosystem, and no less than a decade before a viable quantum computer is built.
Security is a series, and it’s never stronger than the weakest link. More often than not this link is the user, which is why the cryptocurrency marketplace’s de facto mantra is “Do your personal research.” Security technology must be easy and train the user by default, so that they could make the fitting decision and avoid signing away their assets.
Cryptosecurity firms must innovate each in security and in user experience to assist users make the fitting decision. The most recent hardware wallets display critical information on secure screens before allowing the user to sign a transaction, resembling the Transaction Check feature of Ledger wallets, which frequently helps warn a user if something seems amiss. The user doesn’t need to try to know what type of transaction they’re signing, but they’re still protected.
“We’re working on our next-generation devices, and we’re ensuring they will probably be post-quantum-crypto ready,” he says. “We can have this capability on the newer generations.”
Charles Guillemet, chief technology officer, Ledger
One other Ledger initiative, generally known as Clear Signing, goals to present all of the relevant details of a transaction before the asset owner signs the contract, says Guillemet. “We’re working on our next-generation devices, and we’re ensuring they will probably be post-quantum-crypto ready,” he says. “We can have this capability on the newer generations.”
Cybercriminals don’t rest and are always innovating, he adds. While the timing of the arrival of certain threats are uncertain, the indisputable fact that they are going to arrive will not be. Almost every consumer relies on their smartphone for security, but in the long run, the safety of those devices might not be enough. Guillemet stresses, “So we’re talking about next generation, but I feel it’s already here and we will not wait. That is what we’d like to organize for the long run.”
Learn more about learn how to secure digital assets within the Ledger Academy.
This content was produced by Insights, the custom content arm of MIT Technology Review. It was not written by MIT Technology Review’s editorial staff. This content was researched, designed, and written by human writers, editors, analysts, and illustrators. This includes the writing of surveys and collection of information for surveys. AI tools that will have been used were limited to secondary production processes that passed thorough human review.
By MIT Technology Review Insights
