Connect with us

Tech

Scientists develop end-to-end encryption for git services

Published

on

Scientists develop end-to-end encryption for git services


Credit: Pixabay/CC0 Public Domain

From large technology corporations to startups, from computer science students to indie developers, using git services is as common as opening a word document is for most of the rest of us. Git services are online repositories, indispensable in the IT industry, that manage and store projects that may contain sensitive information or trade secrets such as emerging artificial intelligence models.

However, this makes git services vulnerable to frequent cybersecurity threats. There is also the risk of malicious code being inserted into existing projects without the developer’s knowledge.

University of Sydney researchers are part of a team that have developed end-to-end encryption that can be deployed to protect git services. The encryption is compatible with existing git platforms such as Github and Bitbucket. When it is deployed, the researchers say, it will align seamlessly for storage and the time it takes for data to be synchronized among devices and git servers.

Initial testing on existing git services and public repositories ( available for researchers to test algorithms) has been successful.

“Privacy and security of software code has long been a concern for industry and individual users that rely on git services,” said one of the lead developers Associate Professor Qiang Tang, from the School of Computer Science, Faculty of Engineering. “Just like we want our messages to be private and safe, the IT industry also wants their code to be protected. End-to-end encryption is currently the gold standard to protect data.”

End-to-End encryption works by securing data from start to finish, meaning the data sent is protected from the source to the destination, even if the service platform is hacked. It is currently used in messaging services such as WhatsApp.

The researchers say the threat of security breaches to git services is becoming more commonplace. Earlier in the year cryptocurrency exchange CoinBase was a target. In 2022 Okta had stolen.

But Associate Professor Tang says current efforts on git security are not strong enough and with large overheads, which means when a significant amount of computational resources such as processing time, bandwidth, or storage is being used.

The researchers hope to introduce the code to git services for widespread use or intend to make it open source. The results will be presented at the ACM Conference on Computer and Communications Security in October.

Collaborator Moti Yung, distinguished research scientist from Google, said that this was an excellent opportunity to protect the git services system and its users.

“The evolution of computing ecosystems always start with a new utility designed for trusted entities: the internet, the mobile networks, chat apps, and so on.

“Therefore, due to these utilities maturing and expanding, one has then to deal with less trusted and malicious players within the ecosystem. git services, enabling collaborations and version control among participants also started without thoroughly taking care of potential bad players, and the system proposed now is a necessary step to its maturity.”

Creating the security box for the world’s code and the rising demand for end- to-end security online

Imagine git services as a giant word document where countless people can write, edit and update content, but for computer code.

“What makes git services such as Github indispensable is their ability to host a large number of collaborators working on the same coding project at the same time, without losing any efficiency,” said Associate Professor Tang. “However, this advantage is also an obstacle that prevented git services from getting end-to-end encryption.”

When you use a messaging service, the content or text remains relatively unchanged, or the edits will be very minor.

But in GitHub, countless lines of code are being written, edited and updated constantly at a such a rapid rate, standard end-to-end encryption cannot keep up. It would constantly need to refresh to encrypt new versions.

“It’s a balancing act—keep the code safe but not where it impacts the user’s computer so much that it becomes a hindrance,” Tang added.

The research team was able to achieve this balance with a tradeoff—by using only small bits of computational power at a time to significantly reduce the level of communication and storage needed. Specifically, using character-level encryption where only edits are treated as new data to be encrypted and appended (added to an existing data collection). In this way, the pressure on computational resources becomes minimal.

Another way of putting it is if you removed a word from a sentence in a document, the code would recognize that and encrypt the change, instead of encrypting the entire document.

By doing this, it would save a large amount of bandwidth and storage otherwise used on each entire new version of the code.

Co-author Dr. Ya-Nan Li from the University of Sydney said another challenge was to identify the necessary security requirements, which at times could be subtle. For example, when to enable the tracking and public verification of the source of all edits.

“With addressing this issue, it leaves the git server vulnerable to the potential injection of malicious code and sometimes can even directly hinder confidentiality,” said Dr. Li.

More information:
Ya-Nan Li et al, End-to-End Encrypted Git Services, (2025). DOI: 10.1145/3719027.3744815. eprint.iacr.org/2025/1208

Citation:
Scientists develop end-to-end encryption for git services (2025, October 7)
retrieved 7 October 2025
from https://techxplore.com/news/2025-10-scientists-encryption-git.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.





Source link

Tech

Port of Tyne advances connected mobility, autonomous logistics | Computer Weekly

Published

on

Port of Tyne advances connected mobility, autonomous logistics | Computer Weekly


The North East Automotive Alliance (NEAA), alongside the Port of Tyne, autonomous driving technology provider Oxa and a consortium of leading industry and academic partners, has delivered the Port‑Connected and Automated Logistics (P-CAL) project.

The Port of Tyne is one of the UK’s major deep-sea ports handling specialised bulk and containerised products, alongside delivery logistics, and assisting growing passenger numbers via its International Passenger Terminal.

Overall, the Port of Tyne adds £658m to the local economy, supporting 10,400 jobs directly and indirectly, and as one of the UK’s largest trust ports. Fully self-financing, it runs on a commercial basis, reinvesting all of its profits back into facilities along the River Tyne for the benefit of the North East and its stakeholders.

Delivered and funded through the UK government’s CAM [Connected and Automated Mobility] Pathfinder programme, NEAA – a collaborative, industry-led cluster dedicated to fostering a competitive and sustainable environment for businesses – is working with its partners to deliver P-CAL to demonstrate autonomous container transport at the Port of Tyne. The initiative will see the deployment of a fully autonomous terminal tractor and secure mesh communication network to move containers between the dockside and the container compound, creating a UK first in waterside port automation.

P-CAL was designed to push the boundaries of autonomous logistics by deploying and validating a fully autonomous terminal tractor in a live port environment. Building on the North East’s earlier 5G CAL and V‑CAL initiatives – which looked to assess the commercial viability of deploying autonomous yard tractors on the Vantec-Nissan route in Sunderland – the project worked to move autonomous technology from proof‑of‑concept trials into a complex, safety‑critical, real‑world operational setting.

Over the course of the project, the consortium is said to have successfully designed, integrated and tested an autonomous container transport service capable of operating on a busy quayside. The scope of work included the deployment of a fully autonomous terminal tractor; a resilient mesh communication network; the capability to integrate with terminal operating systems; real‑time coordination with live crane movements; and the implementation of a cyber security framework to enable safe, remote and automated operations.

The system was developed and tested in a newly defined and highly complex operational design domain. This is said to reflect the realities of a working port environment where traffic density, variable conditions and human interaction present unique challenges.

The regional and national partnership delivering the project combined expertise across autonomous systems, logistics, cyber security, academia, legal compliance and industrial operations. The consortium believes its project has generated valuable technical, operational and regulatory insight that will inform the future deployment of CAM services across ports, logistics hubs and industrial sites nationwide.

By augmenting the capability of the existing workforce, it says it has shown that autonomous systems can take on repetitive or more hazardous tasks, allowing skilled workers to focus on higher-value roles. This is seen as particularly vital for the North East, ensuring the region remains at the forefront of industrial evolution while creating a more resilient and tech-enabled labour market.

“Delivering autonomous logistics in a live port environment has been a major step forward for the sector,” said Graeme Hardie, operations director at the Port of Tyne. “P-CAL has shown what’s possible when innovation is applied to real operational challenges, improving safety, efficiency and sustainability. The Port of Tyne is proud to have played a leading role in a project that will influence how ports across the UK and beyond approach automation.”

Oxa founder and CEO Paul Newman added: “The success of P-CAL proves how autonomy will enable the future of resilient logistics operations. Through the project, we’ve demonstrated that existing work vehicles can be turned into a digital workforce – successfully completing autonomous container movements in a dynamic quayside environment, while providing worksite intelligence necessary for real-time industrial optimisation. P-CAL provides a blueprint for how ports and industrial hubs worldwide can deploy autonomous technology to drive productivity, efficiency and safety.”

CAM Pathfinder is funded by the UK government, delivered by the Department for Business and Trade in partnership with automated mobility firm Zenzic and Innovate UK, the UK’s national innovation agency.

Zenzic programme director Mark Cracknell said: “P-CAL is a strong example of how government and industry can work together to accelerate the commercial readiness of CAM technologies. Projects like this are vital in turning innovation into deployment, creating high‑value jobs and ensuring the UK remains globally competitive in connected and automated mobility. As the project closes, the outcomes and learning from P-CAL will continue to shape future CAM initiatives, investment opportunities and policy development, both regionally and nationally.”

The next phase of the project will examine how the system performs across broader port operations, including the added pressures of multiple vehicles working alongside people, equipment and live commercial activity.



Source link

Continue Reading

Tech

‘STAGED’: Conspiracy Theories Are Everywhere Following White House Correspondents’ Dinner Shooting

Published

on

‘STAGED’: Conspiracy Theories Are Everywhere Following White House Correspondents’ Dinner Shooting


In the immediate aftermath of the attack on the White House Correspondents’ Dinner on Saturday night, influencers, pundits, and random posters lit up social media platforms like X, Bluesky, and Instagram with conspiracy theories about the attack and the alleged shooter.

Both left and right-wing accounts claimed, without evidence, that the attack was staged.

President Donald Trump, Vice President JD Vance, and dozens of other high-profile administration officials and journalists were attending the dinner at the Hilton hotel in Washington, DC, when a suspect, later identified by media reports as Cole Tomas Allen from California, allegedly ran past security towards the event. He was detained by law enforcement while the president and vice president were evacuated. Police said that they believe Cole acted alone, but did not expand on who his intended target was or what his motive may have been. “We believe the suspect was targeting administration officials,” acting attorney general Todd Blanche told NBC’s Meet the Press on Sunday morning.

On Bluesky, which has a predominantly left-leaning user base, many people simply wrote the word “STAGED” over and over again, echoing the response to the Trump assassination attempt in Butler, Pennsylvania in 2024.

On X, many claimed the shooting was staged as a way to bolster support for Trump’s plan to build a new ballroom in the White House. The president referenced the ballroom in a press conference after the incident and a Truth Social post on Sunday morning. Many prominent online Trump boosters echoed the need for the ballroom, including far-right podcaster Jack Posobiec, Libs of TikTok creator Chaya Raichik, and Tom Fitton, the right-wing activist who runs Judicial Watch.

Their quick response, conspiracy theorists claimed, was evidence of a coordinated campaign following the shooting. “Is this another staged event,” one X user asked in a post that has been viewed more than 5 million times.

Other social media users who claimed the incident was staged pointed to a Fox News clip that featured the station’s White House correspondent Aishah Hasnie speaking from the Hilton hotel. Hasnie told viewers that prior to the shooting, press secretary Karoline Leavitt’s husband allegedly told her “you need to be very safe,” before the call was cut off.

“Fox News just cut one of their reporters off as they seemed to indicate the shooting was a pre-planned false flag,” one X user wrote in a post that has been viewed more than 2 million times. Hasnie later clarified in an X post that her cell service had cut out in a location with notoriously bad service, adding: “He was telling me to be careful with my own safety because the world is crazy. He was expressing his concern for my safety.”

“I don’t want to be fomenting conspiracies,” wrote Angelo Carusone, the chair and president of Media Matters, on Bluesky about the Fox News interview. “But I mean…this was super weird. Super weird.”

Leavitt herself was also the focus of conspiracy theories after she said “shots will be fired” in an interview ahead of the dinner, referring to the jokes Trump was scheduled to deliver. Following the attack, X users claimed the comment was “strange,” “sus,” or a “curious choice of words,” while sharing memes that suggested the shooting was staged. At least one mainstream outlet appeared to amplify the conspiracy theory as well, describing Leavitt’s comment as “eerie” and “bizarre.”





Source link

Continue Reading

Tech

Your Kindle Is Better With Accessories. Here’s Where to Start

Published

on

Your Kindle Is Better With Accessories. Here’s Where to Start



Kindle Holders

Hate holding up your Kindle? Or struggle with chronic pain that makes holding it feel terrible? These holders will literally take the weight out of your hands.

Lamicall

Gooseneck iPad Holder

This holder works for Kindles and tablets alike, and even my Nintendo Switch. The clamp base lets you attach it to tables and furniture, and it’s easy to position in front of or even above you if you wanted to lie down and read.

Lamicall

Tablet Pillow Stand Holder

If you want something that’s freestanding, this pillow tablet stand holder works great for a Kindle. I use it on the couch, and I can sit up or lounge back and adjust the stand arm to suit my position. There are also two built-in cup and snack holders. Lamicall says they’re food safe, but I just use it to hold my tea mug and phone.


A Freestanding Charger

Looking to keep your Kindle charged without adding another cord to the floor of your desk or bedside table? Same. Here’s a more stylish solution if you have one of the Signature editions.

Anker

Wireless Charging Dock for Kindle

This wireless charging dock is made by Anker for Kindles, specifically for Kindle Paperwhite and Colorsoft’s seven-inch Signature editions. Those versions have wireless charging capabilities, and this stand takes advantage of that with charging coils that line up with the back of the Kindle, where the wireless charging is. You’ll want to take off any MagSafe cases; leaving mine on made the little light on the charging dock flash until I took it off.


A Kindle Page Turner

The hottest new item to get as a Kindle lover is a page turner. They’re especially handy for holders like the ones above, where your hands aren’t already on the device, and can make for a great accessibility accessory for readers with different needs.

My biggest irritation with these devices so far is that you have to charge them both individually, and if one runs out of battery, the whole thing is useless. I also don’t love that the turner does tend to block at least one letter while I read, and you can’t place it on the lower or upper margins since it’ll activate the menus instead of turning the page. Still, it makes reading ultra comfortable, especially for my strained wrists.

Here’s my favorite one so far, that’s been solid at holding a charge, and next I’m testing this remote ($15) with a wearable ring clicker instead of a remote.



Source link

Continue Reading

Trending