Connect with us

Tech

Exploring the Impact of Quantum Computing on Modern Cryptography

Published

on

Quantum Computing

The rapid advancements in quantum computing have ushered in a remarkable era of technological transformation, with far-reaching implications for the field of modern cryptography.

As this revolutionary technology continues to evolve, it has become increasingly crucial to explore its profound impact on the security of digital information and the strategies being developed to address the emerging cybersecurity challenges.

At the heart of this exploration lies the intricate relationship between quantum computing and the fundamental principles of encryption that underpin modern cryptographic systems. This article delves into the nuances of this dynamic interplay, shedding light on the vulnerabilities that quantum computers pose to traditional cryptographic algorithms, the concept of QRNG explained, and the ongoing efforts to engineer post-quantum cryptography solutions that can withstand the onslaught of this transformative technology.

Quantum Computing: The Future of Computing

Quantum computing is a paradigm shift in the world of technology, leveraging the principles of quantum mechanics to revolutionize the way we approach computing. Unlike classical computers, which use bits represented as 0s and 1s, quantum computers utilize quantum bits (qubits) that can exist in a superposition of both states simultaneously.

What is Quantum Computing?

At the heart of quantum computing lies the fascinating realm of quantum mechanics, where the behavior of subatomic particles defies the classical laws of physics. Quantum computers harness the unique properties of qubits, such as superposition and entanglement, to perform computations in a fundamentally different way. This allows them to tackle certain problems exponentially faster than traditional computers, opening up new frontiers in fields like cryptanalysis, optimization, and simulations.

The Potential of Quantum Computers

The extraordinary potential of quantum computers lies in their ability to perform specific computations at a speed that would be virtually impossible for classical computers. This is particularly true in areas like quantum algorithms, where quantum computers can outperform their classical counterparts. The promise of quantum supremacy, the point at which quantum computers can demonstrably outperform the world’s most powerful classical supercomputers, has sparked a global race among technology leaders, governments, and research institutions to push the boundaries of quantum computing and quantum mechanics.

As the world eagerly anticipates the next breakthroughs in qubits and quantum algorithms, the future of computing is poised to be transformed, unlocking new possibilities in fields ranging from cryptography and cybersecurity to artificial intelligence and scientific research.

Modern Cryptography: Securing Digital Information

In the rapidly evolving digital landscape, cryptography has become the cornerstone of modern security, safeguarding the integrity and confidentiality of sensitive information. As the world becomes increasingly interconnected, the importance of robust cryptographic techniques cannot be overstated. Cryptography plays a crucial role in securing online transactions, protecting communications, and ensuring the confidentiality of critical data stored in digital systems.

The Importance of Cryptography

Cryptography is the art and science of transforming readable information into an unreadable format, known as ciphertext, to protect it from unauthorized access or tampering. This process of encryption is essential for maintaining the privacy and security of digital communications and data. Conversely, the process of decryption involves restoring the original readable information from the ciphertext, enabling authorized parties to access the content securely.

Types of Cryptographic Algorithms

The field of modern cryptography encompasses two primary types of cryptographic algorithms: symmetric-key cryptography and public-key cryptography. Symmetric-key cryptography utilizes a shared secret key for both encryption and decryption, ensuring the confidentiality of the data. In contrast, public-key cryptography employs a pair of keys – a public key for encryption and a private key for decryption – to secure information exchange between parties.

The choice between symmetric-key and public-key cryptographic algorithms depends on the specific security requirements, performance considerations, and the nature of the application. Both types of cryptographic algorithms play a crucial role in safeguarding the confidentiality, integrity, and authenticity of digital information in today’s interconnected world.

Exploring the Impact of Quantum Computing on Modern Cryptography

The advent of quantum computing poses a significant threat to the security of modern cryptographic algorithms, particularly those based on the difficulty of factoring large numbers and solving the discrete logarithm problem. Quantum computers, with their ability to perform certain computations exponentially faster than classical computers, could potentially break these algorithms in a matter of seconds, rendering current cryptographic methods obsolete.

The vulnerability of modern cryptography to quantum computing lies in the underlying mathematical principles that these algorithms rely on. Many of the widely used cryptographic schemes, such as the RSA cryptosystem and Elliptic Curve Cryptography (ECC), derive their security from the assumption that certain computational problems are intractable for classical computers. However, quantum algorithms like Shor’s algorithm and Grover’s algorithm have the potential to solve these problems much more efficiently, effectively compromising the integrity of these cryptographic systems.

The impact of quantum computing on cryptanalysis is a critical concern, as it could allow adversaries to gain unauthorized access to sensitive data, intercept secure communications, and undermine the foundations of digital security. This threat has spurred the development of post-quantum cryptography, a new class of cryptographic algorithms designed to be resistant to attacks by quantum computers, as a crucial step in safeguarding the future of digital information protection.

The Threat to Traditional Cryptographic Algorithms

The advent of quantum computing poses a significant challenge to the security of traditional cryptographic algorithms, particularly those that rely on the difficulty of factoring large numbers and solving the discrete logarithm problem. This threat is primarily driven by two powerful quantum algorithms: Shor’s algorithm and Grover’s algorithm.

Shor’s Algorithm and the RSA Cryptosystem

Shor’s algorithm, developed by mathematician Peter Shor, is a quantum algorithm that can efficiently factor large numbers and solve the discrete logarithm problem. This capability poses a grave threat to public-key cryptographic schemes, such as the widely-used RSA cryptosystem, which rely on the computational intractability of these mathematical problems for their security. With Shor’s algorithm, quantum computers could potentially break RSA and other public-key cryptographic algorithms in a matter of seconds, rendering them obsolete.

Grover’s Algorithm and Symmetric-Key Cryptography

In addition to the threat posed to public-key cryptography, quantum computing also presents challenges to symmetric-key cryptographic systems. Grover’s algorithm, another quantum algorithm, can be used to search for the keys in symmetric-key cryptographic systems, significantly reducing the time required to break these algorithms. This means that even if a symmetric-key cryptographic system is considered secure against classical attacks, it may be vulnerable to attacks by quantum computers equipped with Grover’s algorithm.

The potential impact of these quantum algorithms on modern cryptography is profound, underscoring the urgent need for the development and adoption of post-quantum cryptographic solutions that can withstand the powerful capabilities of quantum computers.

Post-Quantum Cryptography: The Solution

As the threat of quantum computing to modern cryptography becomes more apparent, researchers have been developing a new class of cryptographic algorithms known as post-quantum cryptography. These algorithms are designed to be resistant to attacks by quantum computers, providing a secure alternative to traditional cryptographic methods.

Lattice-Based Cryptography

Lattice-based cryptography is one of the promising approaches in post-quantum cryptography. This technique relies on the hardness of mathematical problems related to lattices, which are geometric structures composed of a regular arrangement of points. Lattice-based cryptographic algorithms, such as NTRU and Regev’s scheme, are believed to be resistant to both classical and quantum attacks, making them a compelling choice for secure communication in the quantum era.

Multivariate Cryptography

Multivariate cryptography is another area of post-quantum cryptography that has garnered significant attention. This approach involves the use of multivariate polynomial equations to create secure cryptographic systems. Algorithms like the Unbalanced Oil and Vinegar (UOV) scheme and the Minimal Merent Signature (MMS) scheme fall under the multivariate cryptography umbrella and are being actively researched for their potential to withstand quantum attacks.

Hash-Based Cryptography

Hash-based cryptography is a third category of post-quantum cryptographic algorithms that relies on the security of cryptographic hash functions, which are believed to be resistant to quantum attacks. Hash-based signature schemes, such as the Merkle Signature Scheme (MSS) and the XMSS (Extended Merkle Signature Scheme), have emerged as viable options for quantum-resistant algorithms that can be used to secure digital communications and data integrity.

Each of these post-quantum cryptographic approaches offers unique strengths and implementation challenges, and researchers continue to explore their potential to create a secure, future-proof cryptographic landscape in the face of the looming quantum threat.

Unlocking Randomness: Demystifying Quantum Random Number Generation

At its core, QRNG relies on the inherent randomness found in the quantum world. Unlike classical computers, which generate pseudo-random numbers using deterministic algorithms, QRNG devices exploit quantum phenomena such as superposition and entanglement to generate numbers that are truly unpredictable.

How does it work?

QRNG devices typically utilize properties of quantum particles, such as the polarization of photons or the spin of electrons, to generate random bits. For instance, in a photon-based QRNG system, the polarization of individual photons is measured using specialized detectors. Since quantum states are inherently uncertain until measured, the outcome of each measurement is genuinely random, providing a reliable source of randomness.

Why does it matter?

Randomness is crucial in various fields, including cryptography, simulations, and gaming, where unpredictable numbers are essential for ensuring security and fairness. Traditional pseudo-random number generators (PRNGs) are susceptible to predictability if their algorithms or seed values are compromised. In contrast, QRNG offers an unparalleled level of randomness, making it highly resistant to attacks and ensuring robust security for sensitive applications.

Applications of QRNG

Cryptography: QRNG can enhance the security of cryptographic protocols by providing truly random keys and seeds, thereby thwarting adversaries attempting to exploit patterns in pseudo-random sequences.

Simulation and Modeling: In scientific simulations and modeling, truly random numbers are essential for accurately representing stochastic processes and generating statistically significant results.

Gaming and Lotteries: Fairness is paramount in gaming and lottery systems. QRNG ensures unbiased outcomes, maintaining the integrity of games and lotteries while fostering trust among participants.

Quantum Key Distribution: A Secure Communication Channel

In the face of the threat posed by quantum computing to traditional cryptographic methods, quantum key distribution (QKD) emerges as a promising alternative for secure communication. Unlike conventional cryptographic techniques, QKD leverages the principles of quantum mechanics to establish a shared secret key between two parties, ensuring the security of the communication channel.

The cornerstone of QKD is its ability to detect any eavesdropping attempts, a crucial feature that sets it apart from traditional cryptographic systems. By exploiting the quantum properties of photons, QKD systems can identify unauthorized access, safeguarding the confidentiality of the transmitted data. This technology offers a robust solution for high-security applications, such as sensitive government communications, financial transactions, and critical infrastructure protection.

However, the deployment of quantum key distribution is not without its challenges. Scalability and practical implementation remain barriers to widespread adoption, as QKD systems often require specialized equipment and infrastructure. Nonetheless, the continued advancements in quantum cryptography and quantum communication technologies are paving the way for more accessible and user-friendly secure communication solutions in the future.

Challenges in Implementing Post-Quantum Cryptography

As the cryptographic community continues to develop and refine post-quantum cryptographic algorithms, several challenges have emerged that must be addressed to ensure their widespread adoption and implementation. These challenges span computational complexity, standardization, and real-world deployment.

Computational Complexity

Many post-quantum cryptographic algorithms, such as those based on lattice-based, multivariate, or hash-based approaches, are inherently more computationally complex than the traditional RSA or elliptic curve cryptography (ECC) algorithms they aim to replace. This increased complexity can lead to higher processing power requirements, larger key and ciphertext sizes, and greater energy consumption, which can pose significant challenges for resource-constrained devices and systems.

Researchers and developers must work to optimize the performance and efficiency of post-quantum algorithms, balancing security requirements with practical implementation concerns. This may involve exploring hardware-based acceleration, developing new software optimization techniques, or designing hybrid cryptographic schemes that combine traditional and post-quantum approaches.

Standardization and Adoption

The successful widespread adoption of post-quantum cryptography will require a coordinated effort among government agencies, industry leaders, and cryptographic experts to establish clear standards and guidelines. This standardization process is crucial to ensuring interoperability, security, and trust in the new algorithms.

Additionally, the transition from current cryptographic methods to post-quantum solutions will be a complex and gradual process, as organizations must carefully evaluate the performance, security, and compatibility of the new algorithms before implementing them. Effective communication, education, and collaboration among stakeholders will be essential to navigating this transition and driving the adoption of post-quantum cryptography.

The Race for Quantum Supremacy

The development of quantum computing has sparked a global race for quantum supremacy, with major countries and organizations vying to be the first to achieve a significant breakthrough. This competition has significant implications for national security, as the ability to break current cryptographic methods could give a strategic advantage to those who possess powerful quantum computers.

Leading Countries and Organizations

Countries like the United States, China, and the European Union, as well as technology giants and research institutions, are investing heavily in quantum computing research and development to secure their position in this emerging field. The race for quantum supremacy has become a top priority for these global players, as they recognize the potential impact of this transformative technology on national security and the future of computing.

Quantum Computing and National Security

The development of powerful quantum computers has far-reaching implications for national security. The ability to break current cryptographic methods could give a significant advantage to those who possess this technology, potentially compromising sensitive information and undermining the security of critical infrastructure. As a result, governments around the world are closely monitoring the progress of quantum computing and investing heavily in quantum supremacy initiatives to ensure they maintain a competitive edge in this global competition.

Preparing for the Quantum Era

As the threat of quantum computing to modern cryptography becomes more apparent, organizations and governments are taking proactive steps to prepare for the quantum era. This includes transitioning to post-quantum cryptographic algorithms, which are designed to be resistant to attacks by quantum computers.

Transitioning to Post-Quantum Cryptography

The transition to post-quantum cryptographic algorithms is a critical priority for ensuring the continued security of digital systems. These quantum-resistant algorithms leverage alternative mathematical problems that are believed to be resistant to attacks by quantum computers, providing a viable solution to the vulnerabilities posed by the advancements in quantum computing.

Quantum-Safe Security Practices

Alongside the adoption of post-quantum cryptography, the development of quantum-safe security practices is crucial to safeguarding digital systems in the quantum era. This includes the implementation of hybrid cryptographic schemes that combine traditional and post-quantum algorithms, as well as the deployment of quantum-resistant protocols for secure communication and data storage.

As organizations and governments navigate the cryptographic transitions necessary to address the quantum computing threat, adherence to cybersecurity best practices will be essential to ensuring a seamless and secure transition.

Future Developments and Implications

The ongoing advancements in quantum computing are expected to have far-reaching implications beyond the realm of cryptography. As quantum computers become more powerful and accessible, they could potentially revolutionize fields such as artificial intelligence, drug discovery, materials science, and financial modeling, among others. The impact of quantum computing on these industries will likely be profound, requiring organizations to adapt their strategies and technologies to leverage the capabilities of this transformative technology.

Advancements in Quantum Computing

Researchers and technology leaders are making rapid progress in the development of larger, more stable, and more powerful quantum computers. These advancements are driven by breakthroughs in areas such as quantum hardware, software, and algorithms, as well as increased investments and collaboration across the global quantum computing ecosystem. As quantum supremacy is achieved, the practical applications of this technology are expected to expand exponentially, ushering in a new era of scientific discovery and technological innovation.

The Impact on Other Industries

Beyond the realm of cryptography and cybersecurity, quantum computing advancements are poised to disrupt a wide range of industries. In the field of artificial intelligence, quantum algorithms could enable the development of more powerful and efficient machine learning models, leading to breakthroughs in areas like natural language processing, image recognition, and decision-making. In the life sciences, quantum computers could accelerate drug discovery and design by simulating complex molecular interactions and predicting the behavior of new drugs with unprecedented accuracy. Similarly, quantum computing could revolutionize materials science, allowing for the design of novel materials with tailor-made properties for applications in energy, transportation, and electronics.

The financial sector is another industry that stands to benefit from quantum computing. Quantum algorithms could optimize complex financial models, improve portfolio optimization, and enhance risk analysis, potentially leading to more efficient and profitable investment strategies. As the capabilities of quantum computers continue to grow, the impact on these and other industries will become increasingly significant, necessitating a strategic and proactive approach to leveraging this transformative technology.

Conclusion

The rise of quantum computing poses a significant challenge to the security of modern cryptographic algorithms, rendering many of them vulnerable to powerful quantum attacks. In response, the development of post-quantum cryptographic algorithms and the implementation of quantum-safe security practices have become crucial priorities for governments, organizations, and the cybersecurity community.

As the race for quantum supremacy continues, it is essential for stakeholders to work collaboratively to ensure a seamless transition to a quantum-resistant cryptographic landscape. This collaborative effort is crucial to safeguarding the security of digital information and paving the way for a more secure future in the face of this emerging technological revolution.

The implications of quantum computing extend beyond the realm of modern cryptography, with the potential to transform various industries, from artificial intelligence to materials science. As this technology continues to advance, organizations must adapt their strategies and technologies to leverage its capabilities while addressing the associated security challenges.

By embracing the development of post-quantum cryptography and implementing robust quantum-safe security practices, we can ensure the continued protection of sensitive digital information and maintain the trust and confidence of individuals, businesses, and governments in the face of this technological revolution.

Continue Reading

Tech

US: A Judge Mandates that Google Allow Competing App Stores to Access Android

Published

on

By

Google

(VOR News) – The ruling is that Google, the greatest technology firm in the world, is required to make its Android smartphone operating system available to merchants that supply applications that are in direct rivalry with Google’s. This decision was reached by a judge in the United States of America.

The Android Play store, which is owned and operated by Google, was found to be an example of an illegal monopoly arrangement by a jury in the state of California on Monday. The finding was reached by a jury. Monday is the day that this decision was come to.

An earlier federal judge ruled Google’s search engine illegal.

This finding, which came after that decision, has forced the company to suffer yet another setback. As a result of the corporation having already encountered its initial obstacle, this decision has been established. This particular decision was made by the judge during the month of August, when the month was in progress.

In light of the fact that the decision was made, what exactly does it mean that the choice was accepted?

In accordance with the verdict, Google is obligated to make it possible for users to download Android app stores that are offered by third-party competitors. For a period of three years, the corporation is prohibited from imposing restrictions on the usage of payment mechanisms that are integrated into the application.

In addition, it is important to keep in mind that Google does not possess the right to impose restrictions on the utilization of ways to make payments online.

Additionally, the verdict makes it unlawful for Google to give money to manufacturers of smartphones in order to preinstall its app store. Smartphone manufacturers are prohibited from doing so.

Furthermore, it prevents Google from the possibility of sharing the revenue that is generated by the Play store with other companies that are in the industry of delivering mobile applications.

In addition to this, the court has mandated the establishment of a technical committee that will be made up of three different people chosen at random.

The committee will be responsible for monitoring the implementation of the reforms and finding solutions to any disagreements that may occur as a consequence of the implementation of the reforms while they are being implemented. This task will fall under the committee’s purview so that it may fulfill its duties.

However, certain components were allowed to be put into action until July 1st, despite the fact that the judge’s statement suggested that the ruling would take effect on November 1st. The statement was the basis for the ruling, which ultimately became effective.

Particularly, I wanted to know what Google’s reaction would be.

There is a fact that Google does not adhere to this directive, which has been brought to their attention. This document argued that the alterations that the judge had ordered to be made would “cause a range of unintended consequences that will harm American consumers, developers, and device makers.”

The judge had ordered the modifications to be implemented. The alterations were to be carried out as indicated by the judge’s ruling. The judge made it clear that he expected these revisions to be carried out in accordance with his guidance.

The company’s regulatory affairs vice president, Lee-Anne Mulholland, provided the following statement: “We look forward to continuing to make our case on appeal, and we will continue to advocate for what is best for developers, device manufacturers, and the billions of Android users around the world.”

On average, over seventy percent of the total market for smartphones and other mobile devices is comprised of mobile devices that are powered by the Android operating system. Both smartphones and other small mobile devices are included in this category.

In the event that the Play app store continues to be shown on the home page and that other Google applications are pre-installed prior to the installation of the Android application, smartphone manufacturers are entitled to install the Android application at no cost at their discretion.

Additionally, the Android application can be installed on devices that are manufactured for smartphones.

SOURCE: DWN

SEE ALSO:

Over The Planned “Link Tax” Bill, Google Threatens to Remove NZ News Links.

Continue Reading

Tech

WhatsApp Now Features a “Mention” Tool for Status Updates and Stories.

Published

on

By

WhatsApp

(VOR News) – Those who use WhatsApp now have the ability to mention other people in their stories or status updates as a consequence of a feature that was only recently enabled on the platform.

Previous to this point, this capability was not available. It wasn’t until quite recently that this capability became available to the public.

According to the information that was provided by the company, users now have the opportunity to tag close friends in their stories, and the person who is mentioned will have the option to go back and re-share an earlier version of that story. This information was provided by the company. The corporation was kind enough to reveal this information to us.

Because of a new feature that has been added to the WhatsApp app, users now have the opportunity to like individual stories and status updates.

This capability was previously unavailable to WhatsApp users.

A significant amount of progress has been made in this context. Alternative readers now have the chance to “like” a work, which is comparable to liking a post on Facebook. This feature was introduced in recent years. When compared to the past, this is a tremendous shift.

At one point in time, viewers were only permitted to observe the total number of views that a particular story had gotten. These restrictions were eliminated in later versions of the software.

Additionally, it is essential that the likes and reactions to a story be kept anonymous during the entire process. One of the factors that contributes to the general mystery that surrounds this characteristic is the fact that this is one of the elements.

The person who brought it to the attention of others is the only person who will be able to judge who enjoyed it and who did not care about it. These individuals will be able to make this determination.

A notification will be issued to the individual who was referenced earlier in the sentence and who was named in the story or status update that was discussed. A notification of this nature will be sent to the individual via WhatsApp.

This message will be sent to the user in question whenever that person makes a reference to another person while they are in the process of elaborating on a narrative or updating their status. You will receive a notification alerting you that you have been tagged in the narrative.

This notification will be delivered to the person who receives this message. In addition, students will be provided with the opportunity to re-share the tale for themselves.

It is important to note that if the names of individuals who have been referenced in a narrative or a status update are included in any of these, then the names of those individuals will not be accessible to any third party through any of these. In light of the fact that the identities of those individuals will be concealed from public disclosure, this is the condition that will be required.

While WhatsApp recently made the announcement that it will be incorporating this functionality, it is highly likely that not all users will have access to it at the same time.

This is despite the fact that WhatsApp recently made this announcement.

Despite the fact that WhatsApp has only recently made a public announcement that it will move forward with the deployment, this is the situation that has presented itself.

As soon as a short period of time has elapsed, access will be made available to each and every person on the entire world.

Additionally, WhatsApp has hinted that new functionalities might be introduced to the status and updates tab in the future months.

The purpose of these capabilities is to provide users with assistance in maintaining healthy connections with the individuals who play a vital role in their living experiences. This is done in order to give users with support in maintaining close relationships with the folks who are the subject of the inquiry.

It is with the purpose of supporting users in successfully keeping close ties with the individuals in question that this step is taken.

SOURCE: DN

SEE ALSO:

Over The Planned “Link Tax” Bill, Google Threatens to Remove NZ News Links.

Accenture and NVIDIA Collaborate to Enhance AI Implementation.

Meta has started the Facebook Content Monetization Program.

Continue Reading

Tech

Over The Planned “Link Tax” Bill, Google Threatens to Remove NZ News Links.

Published

on

By

Google

(VOR News) – Google has sent a strong message to the New Zealand government, threatening to stop boosting local news content should the Fair Digital News Bargaining Bill become law.

The law, put up by the Labour government and backed by the coalition in power at the moment, mandates that digital companies such as Google pay back news organizations for links to their material.

News publishers, on the other hand, charge the tech giant with “corporate bullying.”

Google says this measure may have unanticipated effects.

Google New Zealand’s country director, Caroline Rainsford, voiced her worries that the law, which is being referred to as a “link tax,” is not doing enough to support the media industry in New Zealand right now.

She underlined that Google would have to make major adjustments if the previously mentioned law were to pass, including cutting off links to news articles from its Search, News, and Discover platforms and cutting off financial ties with regional publications.

According to Rainsford, similar legislation has been proposed and approved in other nations including Australia and Canada, but it has not been proven to be effective there and breaches the principles of the open web.

She drew attention to the fact that smaller media outlets will be most negatively impacted, which will limit their capacity to reach prospective audiences.

Google says its alternative options will protect smaller, local media from negative effects.

Conversely, it conveys apprehension regarding the possible fiscal obligations and vagueness of the legislation, which it feels generates an intolerable level of ambiguity for enterprises functioning within New Zealand.

The New Zealand News Publishers Association (NPA) has reacted to Google’s warnings by alleging that the internet behemoth is using coercive tactics.

They specifically contend that the need for regulation stems from the market distortion that Google and other tech giants have created, which has fueled their expansion into some of the most significant corporations in global history.

The legislation aims to create a more equal framework that media businesses can use to negotiate commercial relationships with technological platforms that profit from their content.

New Zealand Media Editors CEO Michael Boggs stated that he was in favor of the bill, citing the fact that Google now makes a substantial profit from material created by regional publications.

He also emphasized that the use of artificial intelligence by Google—which frequently makes references to news articles without giving credit to the original sources—highlights the significance of enacting legislation.

Paul Goldsmith, the Minister of Media and Communications, has stated that the government is now evaluating various viewpoints and is still in the consultation phase.

He stated that the government and Google have been having continuous talks and will keep up these ongoing discussions.

However, not all political parties accept the validity of the Act.

The ACT Party’s leader, David Seymour, has voiced his displeasure of the proposal, saying that Google is a game the government is “playing chicken” with. He threatened the smaller media companies, saying that they would suffer from worse search engine rankings if the internet giant followed through on its promises.

Seymour contended that it is not the government’s responsibility to shield companies from shifts in the market brought about by consumer preferences.

The things that have happened in other nations are similar to what has happened in New Zealand.

Google has agreements with a number of Australian media firms that are in compliance with its News Media Bargaining Code. These agreements contain provisions that permit an annual cancellation of these agreements.

Due to the government’s decision to exempt Google from the Online News Act, the company has committed to supporting news dissemination by contributing annually to the Canadian journalistic community.

The New Zealand measure is consistent with global approaches aimed at regulating the relationships that exist between technology corporations and media organizations.

It’s hard to say what will happen with the Fair Digital News Bargaining Bill as the discussion goes on. Google and the New Zealand media landscape are preparing for what might be a protracted legal battle.

SOURCE: TET

SEE ALSO:

Accenture and NVIDIA Collaborate to Enhance AI Implementation.

 

Continue Reading

Trending