Wednesday, 19 August 2020

How Do Delivery Robots Work? How They Safely Deliver Your Packages

delivery-robots-work

A distant future involving robotic package deliveries is now very much a reality. Advances in robotics, GPS tracking, automation, and navigation now mean you might not find a delivery person at your door with your package.

You might find a delivery robot instead.

With semi-autonomous robots beginning to enter the world, here’s a look at how delivery robots work.

What Is a Delivery Robot?

A delivery robot is an automated robot that brings your delivery directly to your door. These robots aren’t walking and talking humanoids; rather, these robots are cute delivery containers on six wheels, resembling giant (but friendly-looking!) bugs.

As with other delivery services, you make your purchases through an app with vendors based on your location. The robot trundles to the vendor—whether for shopping, food, drinks, or otherwise—and then it makes its way to your home.

How Does a Delivery Robot Work?

The primary example of delivery robots in action comes from Starship Technologies, a company based out of San Francisco with engineering facilities in Estonia and Finland. Starship Technologies is the brainchild of Skype co-founders Janus Friis and Anti Heinla, and they are currently the largest “last mile” delivery robot company around.

So, how does an autonomous delivery robot make a delivery?

The robots have a cargo capacity of around 9kg, can travel at a maximum speed of 4 mph, weigh around 25kg, and cost over $5,000 to manufacture. The delivery robot uses many of the same features as an autonomous car: 10 cameras for 360-degree vision, several ultrasonic sensors, GPS navigation, measurement units, gyroscopes, and much more.

How Do Delivery Robots Navigate?

The route between a vendor and a delivery point might look A-to-B if you plug the locations into a navigation app… but there are extra considerations for a delivery robot, including sidewalks, crossings, driveways, humans, animals, vehicles, and so on.

Starship’s robots calculate a route based upon the shortest distance and satellite imagery detailing the route. Each feature on the route (crossings, driveways, etc.) receives a time calculation, which the robot factors into route selection and delivery time.

Over time, the robots build a collaborative memory of an area, creating a wireframe map of constant features (buildings, crossings, statues, pathways, etc.) and ensuring that future journeys through the area are faster. The collaborative area-building makes navigation easier for every robot in the vicinity, with all units contributing to building out the local map.

But navigation isn’t always smooth sailing. Aside from regular navigational dilemmas, a malfunctioning robot comes with its own problems. For example, a Starship robot in Milton Keynes malfunctioned—and drove straight into a canal.

Does Anyone Control the Delivery Robot?

While the Starship Technology robots are autonomous, they are not disconnected from their operators. If a robot comes up against a significant challenge, such as a particularly massive curb (they can climb up and over regular sidewalk curbs), a human operator can take control and find a solution.

But for the most part, the robots are designed to take everything into account, focusing strongly on the sidewalk. Delivery robots sharing the same routes as pedestrians has all the potential for irritation.

All these potential issues are all considered, but the robots must learn the correct way to interact with humans. How many times have you faced the awkward situation of walking at a similar pace to someone just ahead of you? Do you speed up to pass, then continue walking faster? Do you slow down to give them time to move further ahead? Is your destination close enough so that you don’t need to overtake?

The delivery robots are learning how to solve these problems, as well as countless others.

If you want to get involved with robotics, check out these DIY robotic arm kits.

How Do You Order Take-Out From a Robot?

Starship’s robotic delivery team are currently operating in several US cities but in limited geographic areas. For example, you can order via Starship at Arizona State University, in Fairfax City, Virginia, or Modesto, California—but only in a limited area. The images below show the delivery areas for those respective locations:

If the vendor you want to order from and your delivery address are with the bounds of the robot, you can order from the Starship Delivery app. The app displays a list of vendors you can make an order with. You place your order, and a local delivery robot makes its way to the vendor to pick up your order. The robot then trundles to your front door. You track the delivery robot using an app, as well as unlock the secure cargo compartment, too.

The Starship Technologies delivery service costs $1.99 per delivery.

For vendors, the reality is slightly different. The delivery robots are cute and get the job done, but Starship’s terms of partnership can take up to a 20% cut per delivery, after a free month’s trial of the service.

Delivery Robots and COVID-19

The 2020 COVID-19 pandemic provided a new and interesting dynamic for Starship Technologies and its delivery robots. With huge numbers of people entering lockdown at differing times and with many people attempting to self-isolate and socially distance from the general public, the delivery robots present a perfect non-human delivery system.

In Milton Keynes, UK, the demand for robot deliveries rose significantly during the early stages of the UK COVID-19 lockdown. The US cities and university campuses also saw similar demand for robotic, almost zero-human interaction deliveries. For those on at-risk lists due to pre-existing conditions or healthcare workers struggling to purchase groceries after a long shift, robotic deliveries are a vital lifeline.

Does Amazon Have Delivery Robots?

Starship Technologies was the first company to use delivery robots as its core delivery method. Recognizing that last-mile delivery is a phenomenally large market is a masterstroke. But the world’s largest online marketplace, Amazon, isn’t far behind.

Amazon Scout is another six-wheeled robot that moves across sidewalks and crossings at walking pace, but this one brings your Amazon delivery directly to your door. Scout is currently available to Amazon customers in the area near Amazon’s headquarters in Seattle, as well as Irving, California, with recent trial expansions to Atlanta, Georgia and Franklin, Tennessee.

Delivery Robots Are Coming to Your Home

A friendly delivery robot bringing curry to your door is charming and is a reality for millions of people. The rollout of delivery robots won’t be overnight, and there are significant challenges for the delivery robotics sector, as well as rural communities.

If you like the sound of robots, check out these robots that’ll do your chores!

Image Credit: JHVEPhoto/Shutterstock

Read the full article: How Do Delivery Robots Work? How They Safely Deliver Your Packages



from MakeUseOf https://ift.tt/3gbFV4P
via IFTTT

Step Up Your Pomodoro Productivity With These 6 Methods

pomodoro-productivity

If you’ve ever used the Pomodoro Technique, you’ve probably noticed an increase in productivity and focus. But most people aren’t aware that there’s a lot more you can do with it. The way that it breaks up your day can lead to some powerful benefits.

Let’s take a look at some less traditional methods to apply the Pomodoro Technique to. If you’re not familiar with it, check out the basics of Pomodoro first.

1. Goal Setting

Have you ever finished a day and felt like you didn’t get enough done? Sometimes you might have actually had a productive day, but just weren’t sure once it was over. One of the first, best, and easiest ways to make the most out of your Pomodoro practice is setting micro-goals.

If you decide to accomplish 10 complete Pomodoros in one day and complete this, you can be confident that you did your best that day. Even if the day wasn’t the most productive, you can rest easy knowing you met your productivity goal.

If you do Pomodoros right and only count the ones you did without distraction, doing 10 a day is quite productive! It’s also a good idea to give yourself thresholds. For instance: if you finish 12, you’re a hero; complete eight, and you still did great.

2. Time Management

clock on a two-tone background

Doing Pomodoros is a great way to stay on track for short bursts of time. In the same vein, planning your days around your Pomodoros is an excellent overall management technique.

If you find you get sucked into one task but neglect other essential tasks, planning your days in terms of Pomodoros can help greatly.

For example, you can set aside one Pomodoro a day for responding to emails. Or if you need to handle a small project, you can assign three Pomodoros on Tuesday to knock it out.

If you keep irregular hours, using Pomodoros for time management can help you do the work you need to whenever you can.

3. Time Tracking

After you’ve spent some time planning your weeks around how many Pomodoros you finish, you can start tracking them on a spreadsheet. There are two ways to do this.

You can plan ahead using the time management technique and listing all the Pomodoros you wanted to get done that week. As you go through the week, highlight the items you finished.

pomodoro time tracking example

The second technique is less rigid: list the overall projects you want to work on that week. You can set goals for the number of poms you want to finish and add them to the total as you complete them. pomodoro time tracking example 2

4. Project Management

If you manage projects for a small team of people, you can use Pomodoros to increase productivity and better track how everyone spends their time. The tricky part can be getting everyone on board to use the Pomodoro Technique. But once you do, this gets a lot easier.

If you get employees to use the techniques above to track their time, you can find out exactly how long a task or project took down to the half-hour. Even better, you’ll know that the time spent on that project was optimized by using Pomodoros.

You can also assign people to research projects and make sure they don’t go down any rabbit holes by limiting the amount of Pomodoros they can spend on that project.

5. Improving Estimates

This is a more advanced technique that becomes easier after you have a good amount of experience using Pomodoros to manage time. After you’ve become confident at tracking your Pomodoros, you’ll start to get a feel for how many cycles certain tasks take. Once you get used to this, you can give clients much sharper estimates.

For example, a graphic designer might need to give a client an estimate of how long it will take to deliver a landing page design. If the designer has done enough of this type of work, they can give clients highly accurate estimates within a tight range.

6. Billing Clients

handshake from underneath

Once you’ve gotten used to tracking everything you do with Pomodoros, it becomes a snap to see exactly how much time you spent on every aspect of each project. All you have to do is look at your week as you tracked it and find the work you did for your client.

There are at least two benefits of using Pomodoros for billing. One is that your charges will match your estimates more closely. Another is that you can bill your clients down to the half-hour, showing them that you respect their time and money.

Bonus: 10 Five-Minute Break Time Activities

Doing something productive during your break is a great way to maximize your day. Meanwhile, doing something relaxing is a great way to manage stress. Here are some ideas to put into practice.

1. Take a Walk Around the Block

Exercise is a proven way to reduce stress and improve overall health and well-being. Using it as a break time activity can help ensure that you’re doing something physical throughout the day.

2. Limit Social Media Usage to Break Time

One of the benefits of doing Pomodoros is that you can keep yourself off social media. But you can also use it to limit the time spent on social media if you have a problem with using it too much.

3. Check Email During Breaks or During a Dedicated Pom

Email can be a huge time suck. A five-minute break is the perfect time to work on getting your inbox to zero. And if you need to send responses, schedule a Pomodoro for getting through those.

4. Shop for Productivity Books

Many highly successful people, like Tim Ferriss, read at least one book a week. Five minutes is all it takes to pick up a great one; Ferriss’s own Tools of Titans is full of good advice.

5. Watch Just One YouTube Video

YouTube can be a huge time suck if you get into the rabbit hole of videos. But if used responsibly, it can also take your mind off work for a few minutes.

6. Clean the House or Tidy Your Desk

clean desk

You might be surprised by how much cleaning you can get done in just five minutes. And if you do five minutes of cleaning multiple times a day, you can keep your place spotless.

7. Get Some Water or Coffee

It’s a good idea to stretch your legs and hydrate, so take a walk to the water cooler or fridge. Or if you’re still ramping up, you can grab a cup of coffee.

8. Draw or Doodle to Ease Your Brain

You can keep a pad of paper and a pencil in your desk drawer and pull it out to give your analytical brain a much-needed break. If you want to get serious, you can use YouTube to learn to draw.

9. Play With Your Kids or Pets

If you work from home, this is a great way to use your break. There’s no better way to interrupt your work than to give someone or something a big hug.

10. Read an Article on MakeUseOf

Reading this was a great way for you to spend five minutes, and there are many more articles like it on the site.

Think Out of the Box With Pomodoro

Hopefully, you now have a better idea on how to apply the Pomodoro Technique to other aspects of your life. With some time invested, you can really supercharge both your working and relaxing time.

If you’re after something different, take a look at some unique productivity techniques you haven’t heard of.

Read the full article: Step Up Your Pomodoro Productivity With These 6 Methods



from MakeUseOf https://ift.tt/34jUO2Z
via IFTTT

Tuesday, 18 August 2020

Portable, Powerful Solar Panel: Maxoak SP120 Review

maxoak sp150 solar panel
Our verdict of the Maxoak SP120:
Weighing less than 7lbs, the Maxoak SP120 outputs a serious amount of power in a convenient and portable package. You're paying a premium for the portability though, so consider if you actually need to carry it around or whether a static panel could do the job.
1010

Most portable solar panels are tiny and really only designed to trickle charge a smartphone. If you have a large portable battery pack then finding a suitably powerful and genuinely portable solar panel can be tricky.

The Maxoak SP120 is both affordable, portable, and with 120W output, powerful enough to charge even the largest of battery storage. It takes less than a minute to deploy or pack away and weighs a mere 6.2 pounds (2.8kg). You don’t get much more portable than that.

Retailing at $400 or £300, if you’re quick you can grab one at 30% off during IndieGogo crowdfunding. Those in Germany or the UK can get one even quicker from Amazon (under the PowerOak brand), and use our exclusive £30/€30 coupon–just enter the code makeuseofA at the checkout.

At a Glance: Maxoak SP120

  • Panel type: Monocrystalline, 23% efficiency
  • Open circuit voltage: 23.7V
  • Max current: 6.6A
  • Plug: MC4
  • Dimensions (unfolded): 16.3 x 66.7 inches (415 x 1695mm)
  • Dimensions (folded):  16.3 x 16.1 inches (415 x 410 mm)
  • Weight: 6.2 lbs (2.8kg)
  • US/Worldwide: Back the IndieGogo for 30% off retail price of $400
  • Germany: Buy the PowerOak SP120 (use code makeuseofA for £30 off)
  • UK: Buy PowerOak SP120 (use code makeuseofA for £30 off)

Maxoak SP120 Design

The Maxoak SP120 unclips and folds out to reveal four panels. A convenient carry handle is located on one end, with three loops on the other end for hanging the panels. on the rear of each section is a stiff leg, secured with velcro, allowing you to angle the SP120 up to 45-degrees.

Kickstand on the rear of SP150 solar panels

Each panel is made of monocrystalline solar cells. These are more efficient than cheaper polycrystalline cells, allowing for greater power from the same size panels. Each panel is coated in ETFE, and Maxoak claims they can be bent to around 20-30 degrees before snapping. This isn’t to say you should make a habit of bending these panels, but rather that you needn’t worry should you accidentally apply a little pressure to them.

The SP120 is IP65 rated, meaning it should withstand some rain, but don’t get it soaked.

Maxoak SP150 flexible panels
The Maxoak SP150 panels can bend a little, such as your dog deciding to fall asleep on them.

The hardwired 3m cable which terminates in MC4 plugs is stored in a zipped side pocket. These are standard solar panel connectors, so you can easily daisy chain a couple of panels together (or even supplement a static panel if you wanted). However, the adaptor cables to feed this into a battery are not included. In the case of Maxoak, the adaptor cable is supplied with the battery, but if you’re pairing this with a battery from another manufacturer, you may need to source your own cable. I found the pocket on the side was large enough to also store the cables that came with the EB240 (MC4 to DC9mm).

Portable and Convenient

One of the great things about being so easy to carry and move around is that you can easily reposition the SP120 to take advantage of the sun any time of day. You can lay the panels flat for the high midday sun, then angle them or hang them vertically for morning or evening. This allows you to get the most efficient charge possible—more so than you would with bulky static panels. Our rooftop panels only start to generate after lunchtime!

Reorient the SP150 solar panels

Of course, you shouldn’t expect it to output 120 watts all the time, but I was able to get a good 8 hours of solid charging on a good day.

How Long Will It Take To Charge My Battery?

Assuming eight hours of good sun per day, let’s say you average 100W; that’s 800Wh total. The Maxoak EB240—which is admittedly an enormous store of energy—holds a maximum of 2400Wh. So that would take about 3 days to charge. For a smaller battery like the Maxoak AC50 (500Wh), you could easily charge it and more, in less than a day.

Maxoak AC50 Maxoak AC50 Buy Now On Amazon $399.99

With standard MC4 panel connectors, it’s easy to daisy chain these panels together and charge twice as fast.

Do I Need a Battery?

Solar technology can be a little confusing at times. Solar panels output a variable voltage depending on the intensity of the sun, which isn’t much use by itself. You need some sort of regulator to fix the voltage at a certain level. Smaller panels that are designed to trickle charge smartphones include a built-in regulator that drops the voltage to 5V (USB).

The SP120 doesn’t include a regulator, so it must be paired with something else before you can utilize the power. Because the amount of power it produces is more than you’ll usually use, the best thing to do is to put that power into a battery.

A battery backup like the EB230, EB150, AC200, or AC50 incorporates a voltage regulator, battery, and AC/DC converter. It takes the solar output, stores it, and converts that power to whatever voltage you need later. That might be 110V AC, 45W DC for your laptop, or 5V USB for your smartphone.

Should You Buy the Maxoak SP120?

As a portable solar panel, it really doesn’t get more convenient than this. 120W is a good amount of power and paired with a convenient travel battery like the AC50, you have an unlimited source of power for your adventures and off-grid needs.

Lightweight and portable Maxoak SP150

But consider if you really need to carry a solar panel around, because you’re paying a premium for the privilege. A similarly specced or even higher efficiency static panel can be purchased for $150 or less. That means you’re paying about three times as much per watt as the price of being ultra-portable. If you’re considering the SP120 to carry between your home and cabin in the woods, for instance, you might be better off buying two higher-powered rooftop panels instead.

Grab yourself a bargain on the IndieGogo now. But be quick, there are only a few days left on the campaign to get 30% off.

Thanks to Maxoak, we have not one, but THREE portable solar panels to give away, to winners in the US, Germany, and the UK. Enter below for your chance to win!

Enter the Competition!

Maxoak SP120 Portable Solar Panel Giveaway

Read the full article: Portable, Powerful Solar Panel: Maxoak SP120 Review



from MakeUseOf https://ift.tt/3aI2Bc0
via IFTTT

How to Access Region Blocked Videos Without a VPN

Wherever you are in the world there is always a reason to want to bypass region blocking. For example, internet users outside the US might want to access Netflix or Hulu; those in the US might want the UK version of BBC iPlayer.

To combat this, VPNs are popular—but they’re not the best solution. Here’s how to watch geo-blocked videos without VPN software.

Why VPNs Aren’t Great for Bypassing Region Blocks

When you connect to a VPN (Virtual Private Network) your internet traffic is forwarded through the VPN server. So, if you’re in the UK and you connect to a VPN in the United States, websites will see you as browsing from the United States. The VPN server acts like a middleman.

This allows you to use VPNs to access US streaming services, such as:

  • Netflix US
  • Hulu
  • Pandora

…and many other region-restricted media websites.

While VPNs have many other uses, they’re less than ideal for bypassing region locks.

  • While VPNs are faster than ever, they’re slower than connecting directly to a website. You don’t connect directly to Netflix—the data is sent through the VPN server. This slows things down.
  • While connected to a VPN, all your network traffic will be sent through the VPN. This slows other internet traffic on your device.
  • You’ll want to leave the VPN disconnected because it slows down your connection. When you want to watch a video, you’ll have to connect to the VPN. When you’re done, you’ll want to disconnect.
  • Most importantly, Netflix is winning the war against VPNs. It’s time to find a new way to access all the Netflix content you can handle, without relying on a VPN.

Why a Standard DNS Can’t Help

Until relatively recently, you could switch your router’s DNS server to access streamed video without relying on a VPN. While the effect was the same for streaming—you appear to be viewing from elsewhere—there was no encryption.

However, as with VPNs, Netflix and other streaming giants got wise to this tactic. As such, standard DNS providers are no longer suitable.

Fortunately, several new methods are available for you to bypass region blocking.

  1. Use browser extensions
  2. Employ a specialist DNS
  3. Use a third-party downloader
  4. Employ VPN-provided DNS

Here’s what you need to know about how to watch region locked videos without DNS or a VPN.

1. Use a Proxy Browser Extension

If you want to access region-restricted websites quickly and easily, a proxy server is a good option.

Proxies can be accessed via a website, but it’s easier to simply use a browser extension.

To access Netflix, consider Weechee, a browser extension for Google Chrome. This is designed to unblock Netflix, Hulu, and BBC iPlayer, wherever in the world you’re based.

Download: Wachee for Google Chrome (Free)

Proxies are a great option for US residents trying to access BBC iPlayer in the UK. See our guide to watching BBC iPlayer with a proxy for more details.

Encountered blocked videos on YouTube? Use this block-checking tool to find out which countries the video is available in, then set your proxy extension accordingly.

Relying on a proxy browser extension is smarter than simply visiting a standard proxy site.

2. Unblock-Us

Want to know how to watch geo blocked videos? Changing your device’s DNS can help. While this isn’t the number one solution and has been largely defeated by streaming services, it remains an option.

You’ll need something a little extraordinary for this to work, which is where Unblock-Us comes in. An all-in-one solution with a $4.99 monthly subscription, Unblock-Us offers a seven-day free trial. It aims to give you enhanced internet security, better speed, and the freedom to avoid region blocking.

Should you rely on this enhanced DNS solution? It’s certainly an option; the free trial is worth it to find out if it works for you. Unblock-Us features detailed setup instructions and works computers, consoles, mobile devices, TVs, and TV streaming boxes.

Check our guide to changing DNS settings to learn more about what is required.

3. Download Blocked YouTube Videos

Region-locked content can be frustrating. If a proxy browser extension won’t work and a specialist DNS service is drawing a blank, consider downloading the video. While this probably won’t work with Netflix, it’s a good solution for YouTube.

To bypass region locks on YouTube videos, a downloader can help. One example is ssyoutube.com. To use this:

  1. Copy the URL of the region locked YouTube video
  2. Paste it into your browser’s address bar
  3. Click or tap so the insertion point is between the “www.” and “youtube”
  4. Add “ss” to the URL (e.g. “http://www.ssyoutube.com”)
  5. Hit Enter on your keyboard, or tap OK on your device

The video will then be downloaded to your device via the ssyoutube.com site, bypassing region blocking.

Note that downloading YouTube videos is a breach of the platform’s terms of use.

4. Use Smart DNS for Region Blocked Video Streams

While using a VPN to access region blocked streaming services isn’t the fastest option, some VPN services have provided an alternative. Smart DNS can be considered a sort of “VPN lite” solution, which allows access to region blocked content (such as all the Netflix you can watch) without the encryption and IP masking a VPN delivers.

How can you use smart DNS? One option is to find a specialist provider such as www.smartdnsproxy.com. However, if you’re already using a VPN you might have smart DNS access without knowing it.

For example, ExpressVPN (MakeUseOf readers can get 40% off our top-rated VPN) offers the MediaStreamer DNS service as part of the VPN subscription. This is a great way to view region blocked videos from all streaming services. Like other smart DNS solutions, it can be used on almost any platform, including games consoles and smart TVs.

Note that other VPN providers offer smart DNS.

Bypass Region Locks and Access All Netflix Content

Accessing blocked content isn’t as simple as it was. You can’t just visit a proxy and view all your favorite Netflix content anymore.

Solutions like UnoDNS, Tunlr, and MediaHint have fallen by the wayside. These days, you need smarter solutions to region blocking, tools that will give you reliable access to Netflix and other region blocking streaming services.

Trying to access restricted content at work or school? Use these methods to bypass blocked sites.

Read the full article: How to Access Region Blocked Videos Without a VPN



from MakeUseOf https://ift.tt/2IZ1MxC
via IFTTT

11 Basic Encryption Terms Everyone Should Know by Now

encryption-terms

Chances are that you’re familiar with the word encryption. You’ve probably heard about how important it is, as well as how vital it is for keeping so much of our hyper-networked lives secure.

Use WhatsApp? You’re using encryption. Log into online banking? Same again. Have to ask the barista for a Wi-Fi code? That’s because you’re connecting to a network using encryption—the password is the key.

But even though we use encryption in our day-to-day lives, most encryption terminology remains mysterious. Here’s a list of 11 essential encryption terms you need to understand.

1. Plaintext

Let’s start with the most basic encryption term, which is simple but just as important as the others: plaintext is an unencrypted, readable, plain message that anyone can read.

2. Ciphertext

Ciphertext is the result of the encryption process. The encrypted plaintext appears as apparently random strings of characters, rendering them useless. A cipher is another way of referring to the encryption algorithm that transforms the plaintext, hence the term ciphertext.

3. Encryption

Encryption is the process of applying a mathematical function to a file that renders its contents unreadable and inaccessible—unless you have the decryption key.

For instance, let’s say you have a Microsoft Word document. You apply a password using Microsoft Office’s inbuilt encryption function. The file is now unreadable and inaccessible to anyone without the password. You can even encrypt your entire hard drive for security.

4. Decryption

If encryption locks the file, then decryption reverses the process, turning ciphertext back to plaintext. Decryption requires two elements: the correct password and the corresponding decryption algorithm.

5. Keys

The encryption process requires a cryptographic key that tells the algorithm how to transform the plaintext into ciphertext. Kerckhoffs’s principle states that “only secrecy of the key provides security,” while Shannon’s maxim continues “the enemy knows the system.”

These two statements influence the role of encryption, and keys within that.

Keeping the details of an entire encryption algorithm secret is extremely difficult; keeping a much smaller key secret is easier. The key locks and unlocks the algorithm, allowing the encryption or decryption process to function.

Is a Key a Password?

No. Well, at least not entirely. Key creation is a result of using an algorithm, whereas a password is usually a user choice. The confusion arises as we rarely specifically interact with a cryptographic key, whereas passwords are part of daily life.

Passwords are at times part of the key creation process. A user enters their super-strong password using all manner of characters and symbols, and the algorithm generates a key using their input.

6. Hash

encryption terms - MD5 Online Cracking

When a website encrypts your password, it uses an encryption algorithm to convert your plaintext password to a hash. A hash is different from encryption in that once the data is hashed, it cannot be unhashed. Or rather, it is extremely difficult.

Hashing is really useful when you need to verify something’s authenticity, but not have it read back. In this, password hashing offers some protection against brute-force attacks (where the attacker tries every possible password combination).

You might have even heard of some of the common hashing algorithms, such as MD5, SHA, SHA-1, and SHA-2. Some are stronger than others, while some, such as MD5, are outright vulnerable. For instance, if you head to the site MD5 Online, you’ll note they have 123,255,542,234 words in their MD5 hash database. Go ahead, give it a try.

  • Select MD5 Encrypt from the top menu.
  • Type your password, hit Encrypt, and view the MD5 hash.
  • Select the hash, press Ctrl + C to copy the hash, and select MD5 Decrypt from the top menu.
  • Select the box and press Ctrl + V to paste the hash.
  • Complete the CAPTCHA, and press Decrypt.

As you see, a hashed password doesn’t automatically mean it is secure (depending on the password you chose, of course). But there are additional encryption functions that boost security.

7. Salt

When passwords are part of key creation, the encryption process requires additional security steps. One of those steps is salting the passwords. At a basic level, a salt adds random data to a one-way hash function. Let’s examine what that means using an example.

There are two users with the exact same password: hunter2.

We run hunter2 through an SHA256 hash generator and receive f52fbd32b2b3b86ff88ef6c490628285f482af15ddcb29541f94bcf526a3f6c7.

Someone hacks the password database and they check this hash; each account with the corresponding hash is immediately vulnerable.

This time, we use an individual salt, adding a random data value to each user password:

  • Salt example #1: hunter2 + sausage: 3436d420e833d662c480ff64fce63c7d27ddabfb1b6a423f2ea45caa169fb157
  • Salt example #2: hunter2 + bacon: 728963c70b8a570e2501fa618c975509215bd0ff5cddaf405abf06234b20602c

Quickly compare the hashes for the same passwords with and without the (extremely basic) salt:

  • Without salt: f52fbd32b2b3b86ff88ef6c490628285f482af15ddcb29541f94bcf526a3f6c7
  • Salt example #1: 3436d420e833d662c480ff64fce63c7d27ddabfb1b6a423f2ea45caa169fb157
  • Salt example #2: 728963c70b8a570e2501fa618c975509215bd0ff5cddaf405abf06234b20602c

You see that the addition of the salt sufficiently randomizes the hash value that your password remains (almost) completely safe during a breach. And better yet, the password still links to your username so there is no database confusion when you sign into the site or service.

8. Symmetric and Asymmetric Algorithms

In modern computing, there are two primary encryption algorithm types: symmetric and asymmetric. They both encrypt data, but function in a slightly different manner.

  • Symmetric algorithm: Uses the same key for both encryption and decryption. Both parties must agree on the algorithm key before commencing communication.
  • Asymmetric algorithm: Uses two different keys: a public key and a private key. This enables secure encryption while communicating without previously establishing a mutual algorithm. This is also known as public key cryptology (see the following section).

The overwhelming majority of online services we use in our daily lives implement some form of public-key cryptology.

9. Public and Private Keys

Now we understand more about the function of keys in the encryption process, we can look at public and private keys.

An asymmetric algorithm uses two keys: a public key and a private key. The public key can be sent to other people, while the private key is only known by the owner. What’s the purpose of this?

Well, anyone with the intended recipient’s public key can encrypt a private message for them, while the recipient can only read the contents of that message provided they have access to the paired private key. Check out the below image for more clarity.

encryption terms - Public and Private Keys Explained

Public and private keys also play an essential role in digital signatures, whereby a sender can sign their message with their private encryption key. Those with the public key can then verify the message, safe in the knowledge that the original message came from the sender’s private key.

A key pair is the mathematically linked public and private key generated by an encryption algorithm.

10. HTTPS

HTTPS (HTTP Secure) is a now widely implemented security upgrade for the HTTP application protocol that is a foundation of the internet as we know it. When using a HTTPS connection, your data is encrypted using Transport Layer Security (TLS), protecting your data while in transit.

HTTPS generates long-term private and public keys that in turn are used to create a short-term session key. The session key is a single-use symmetric key that the connection destroys once you leave the HTTPS site (closing the connection and ending its encryption). However, when you revisit the site, you will receive another single-use session key to secure your communication.

A site must completely adhere to HTTPS to offer users complete security. Since 2018 the majority of sites online began offering HTTPS connections over standard HTTP.

11. End-to-End Encryption

One of the biggest encryption buzzwords is that of end-to-end encryption. Social messaging platform service WhatsApp began offering its users end-to-end encryption (E2EE) in 2016, making sure their messages are private at all times.

In the context of a messaging service, EE2E means that once you hit the send button, the encryption remains in place until the recipient receives the messages. What is happening here? Well, this means that the private key used for encoding and decoding your messages never leaves your device, in turn ensuring that no one but you can send messages using your moniker.

WhatsApp isn’t the first, or even the only messaging service to offer end to end encryption. It did, however, move the idea of mobile message encryption further into the mainstream—much to the ire of myriad government agencies around the world.

Encryption Until the End

Unfortunately, there are many governments and other organizations that really dislike encryption. They hate it for the very same reasons we think it is fantastic—it keeps your communication private and, in no small part, helps the internet function.

Without it, the internet would become an extremely dangerous place. You certainly wouldn’t complete your online banking, purchase new slippers from Amazon, or tell your doctor what’s wrong with you.

On the surface, encryption and encryption terminology seems daunting. I won’t lie; the mathematical underpinnings of encryption are at times complicated. But you can still appreciate encryption without the numbers, and that alone is really useful.

If you want to start encrypting your digital world, check the easiest ways to encrypt your daily life with minimal effort.

Read the full article: 11 Basic Encryption Terms Everyone Should Know by Now



from MakeUseOf https://ift.tt/2DMSnFf
via IFTTT