Connect with us

Press Release

Lumino Ceremony: Building the Privacy Protection Infrastructure

Published

on

PlatON, a privacy AI computing network which is committed to building a decentralized collaborative artificial intelligence network and global brain, is promoting the democratization of artificial intelligence and establishing a secure general artificial intelligence. The bottom layer of its decentralized privacy protection infrastructure is based on Zero-Knowledge Proof.

What is Zero-Knowledge Proof

Zero-Knowledge Proof is a cryptographic technology to realize privacy protection authentication. The prover needs to make the verifier believe that he knows or owns a message, without disclosing any information about message which is to be confirmed. For example, if the prover wants to prove that he knows the safe box password without revealing it, he can just show some items existing in the safe box that everyone knows.

This process is Zero-Knowledge Proof. The proof needs an initial credible setting (some items existing in the safe box that everyone knows), namely a series of public parameters to help the prover build Zero-Knowledge Proof.

Deficiency of Zero-Knowledge Proof

As a cryptographic technology with both privacy protection and authentication capability, zero-knowledge proof is widely used to realize transaction verification under hidden business details in blockchain. The zero-knowledge proof system applied in the blockchain field is mainly a cryptographic algorithm called “zk-SNARKs”. At present, the existing classic zk-SNARKs algorithms include  GGPR13, PGHR13, Groth16, GM17, and new generation algorithms such as Sonic, Marlin, Plonk, which support updating public parameters. The current version of ZCash, a well-known private cryptographic currency, uses Groth16 algorithm.

From the above “safe box”, we can see that the premise for the correct operation of this kind of algorithm is existing a series of random trusted parameters. However, randomized parameters will not come out of thin air and there is no trusted third party in the blockchain. Parameters created by centralized third parties can be reconstructed in theory, and it is possible to forge proofs, which may destroy the underlying security in PlatON. Imagine that if a specific institution informed the verifier of the storage of the items in the safe box, the institution and the prover could collude and use this secret information to falsify the illusion that the prover knew the safe box password.

Therefore, it is an undoubtedly excellent idea to organize multiple participants to create these randomized parameters through Secure Multi-party Computation. In this process, single party can not reconstruct the parameters any more. Only when this activity is completed safely will the subsequent decentralized application be safe. In fact, ZCash has successfully created system parameters for Groth16 algorithm in November 2017 through its ceremony, Power of Tau.

Lumino, creating secure parameters

In order to prevent the parameters generated by the centralized mode from affecting the underlying security, PlatON started the Secure Multi-party Computation ceremony Lumino on June 21, 2021, last for   60 days. This ceremony is expected to create necessary secure parameters for the Zero-Knowledge Proof protocol.

During the Lumino ceremony, multiple participants carry out several rounds of calculation in the form of a relay, that is to say, the current participant need to use the calculation results of the previous participant as the input of this round, and the calculation output become the calculation input of the next participant as well. After a certain number of rounds, the output of the last participant is the final result of the whole ceremony, namely the system initialization parameters that Plonk thatalgorithm of PlatON will choose. Obviously, the more participants take part in the ceremony, the safer the parameters will be.

As a practical and efficient Zero-Knowledge Proof algorithm, Plonk is commonly used in PlatON projects and communities, which is characterized by a one-time initialization process, that is, running once can be used to deploy multiple applications. Providing necessary initialization parameters for Plonk algorithm through Lumino ceremony means that no one can master the secret information behind the parameters, which can be used to cheat players in the whole system. Lumino ceremony will lay a solid foundation for the security of PlatON.

About Author

Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.

Continue Reading

Press Release

Inside Bengaluru’s New Urban Escape: How Casasaga Is Redefining City Staycations

Published

on

Editor’s News Feature | Urban Travel and Lifestyle Innovation

Bengaluru is often described as a city that rarely rests. From early morning traffic to late night work calls, the pace of urban life leaves little space for pause. In this environment of constant motion, a new kind of hospitality concept has begun to quietly reshape how city residents think about rest and short escapes.

Casasaga, launched in 2025 by entrepreneur Dinesha B G, was created with a simple idea at its core. What if relaxation did not require long travel, complex planning, or expensive resort bookings. Instead, what if calm could exist within the city itself.

Designed around a Greece inspired theme, Casasaga offers couples a private, aesthetic environment built for stillness and emotional connection. White interiors, curved architecture, soft lighting, and Mediterranean design elements create a visual contrast to the fast paced world outside its doors.

Unlike conventional hotel rooms, Casasaga focuses strongly on privacy. Each unit offers private jacuzzi and pool experiences, allowing guests to relax without shared spaces or public interruptions. In a city where personal space is often limited, this model has attracted couples seeking quiet, uninterrupted time together.

Affordability has remained central to the concept. While private jacuzzi experiences are typically associated with premium resorts, Casasaga positions itself as an accessible alternative for urban residents. This approach has helped the brand attract young professionals and couples looking for meaningful experiences without excessive spending.

The design philosophy behind Casasaga prioritizes emotion over excess. Seating arrangements encourage conversation, lighting is kept warm and subtle, and interiors are arranged to promote comfort rather than formality.

Growth for Casasaga has largely come through guest recommendations rather than traditional advertising. Visitors often share their experiences online, refer friends, and return for repeat stays.

Hospitality operations at Casasaga emphasize trust and sensitivity. Cleanliness, responsiveness, and respect for guest privacy remain central to its service approach.

As urban lifestyles continue to accelerate, initiatives like Casasaga highlight a growing shift in consumer preference toward calm, connection, and simplicity within city living.

About Author

Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.

Continue Reading

Press Release

The Human Side of Cybersecurity: How Akilnath Bodipudi Protects Patient Lives Through Technology

Published

on

United States, 24th Jan 2026 – In an era where cyberattacks increasingly threaten hospitals, medical devices, and healthcare networks, cybersecurity has evolved far beyond a technical discipline. For cybersecurity engineer and AI security leader Akilnath Bodipudi, it is a mission deeply rooted in human impact—one where every security decision can influence patient safety, clinical workflows, and even life-saving medical procedures. His career, built on eight years of experience supporting healthcare, media, and technology organizations, reflects a commitment to protecting not only systems, but the people who depend on them.

Bodipudi’s approach to cybersecurity began with a fascination for how minor vulnerabilities could disrupt entire digital ecosystems. Early in his engineering education, he recognized a recurring problem: security was often overlooked until something went wrong. But it was his work in healthcare that revealed the true stakes of this oversight. Hospitals increasingly rely on interconnected medical devices, cloud applications, and AI-powered tools, making them prime targets for sophisticated cyberattacks. In these environments, even seconds of downtime can compromise patient care.

One defining moment in Bodipudi’s career came during a hospital network outage triggered by a security misconfiguration. The disruption brought clinical workflows to a halt—staff struggled to access patient records, equipment slowed, and the consequences became painfully clear. “Watching the medical team lose access to essential systems, even temporarily, was a turning point for me,” he recalls. “It became impossible to view cybersecurity as just a technical job. Real people were affected, and that made the responsibility much heavier.”

Responding swiftly, he conducted a rapid root-cause analysis, identified the misconfiguration, and implemented corrective measures to restore the network safely. Yet the real significance of the incident lay in what came next. Bodipudi expanded the solution into a systemic improvement, implementing automated configuration validation, strengthening role-based access controls, and introducing continuous monitoring across critical systems. He also worked directly with clinicians and IT teams to build clearer incident-response protocols and foster a shared understanding of how cybersecurity ties directly to patient outcomes.

This experience shaped his philosophy: cybersecurity in healthcare is inseparable from patient safety. Every secure-by-design architecture, every compliance control, and every protective measure ultimately supports clinical continuity and saves lives.

Another transformative project that cemented this belief was his leadership in modernizing a hospital’s aging VPN infrastructure. Many healthcare organizations still rely on outdated IKEv1 tunnels that lack modern encryption and frequently suffer outages. For the hospital system he supported, these tunnels connected essential services—electronic medical records, telemedicine platforms, laboratory systems, and administrative tools. The instability didn’t just create technical headaches; it interrupted access to critical data, delaying diagnoses and creating workflow bottlenecks.

Bodipudi approached the challenge with precision and empathy. Before upgrading to IKEv2, he carefully mapped all interdependent clinical and administrative systems, coordinated across departments, and developed a staged migration plan that ensured zero major disruptions. He ran simulated traffic tests, drafted meticulous rollback plans, and collaborated daily with application owners and IT teams to validate performance throughout the transition.

The results were measurable and meaningful: outages dropped by 50%, encryption standards dramatically improved, and clinicians gained consistent, secure access to vital applications. This wasn’t merely a technical upgrade—it was a reinforcement of trust between cybersecurity and clinical operations. “Behind every secure system is a nurse, a doctor, or a patient relying on it. That’s what drives me,” Bodipudi explains.

His ability to merge deep technical expertise with real-world healthcare impact sets him apart. With a master’s degree in cybersecurity and privacy from the New Jersey Institute of Technology and certifications including CISM, CEH v11, and CyberArk Trustee, he has become a leader who blends engineering, governance, and human-centered security transformation. His work spans cloud security, AI security, medical device protection, and enterprise risk reduction, with a consistent focus on designing solutions that are both safe and seamless for end users.

Bodipudi’s influence extends beyond hands-on engineering. His research contributions—22 published journals on cybersecurity, AI, cloud security, and risk assessment—have reached academic institutions and medical professionals across the United States. His widely cited research on biomedical device network segmentation highlights the urgency of securing increasingly complex medical technologies. Furthermore, his 2024 book, “AI-Enhanced Cybersecurity” his commitment to innovation at the intersection of AI and security.

Added, Bodipudi received multiple distinctions that further elevated his profile. He was recognized as one of the Top InfoSec Innovators by Cyber Defense Magazine and earned an award from the Asia Research Awards (ISTRA 2024) for contributions in AI and cloud security. These achievements reflect strong industry acknowledgment of the influence he is developing through research, technical leadership, and thought-driven innovation.

Despite his growing accomplishments, Bodipudi remains anchored in his mission-driven perspective. Cybersecurity is often portrayed as a battlefield of code, controls, and compliance requirements, but he focuses on the people behind the systems. His experiences in hospital environments taught him that cyber professionals must collaborate—not compete—with clinicians, administrators, and engineers. He often conducts workshops, leads cross-functional training, and advocates for a culture where cybersecurity is viewed not as an obstacle but as a natural extension of patient care.

Looking ahead, he envisions contributing to global cybersecurity standards for digital health ecosystems, mentoring emerging security leaders, and shaping policy for AI-driven medical technologies. His long-term goal is to build security frameworks that protect hospitals as they adopt advanced AI, more connected devices, and increasingly cloud-driven infrastructures.

For Akilnath Bodipudi, cybersecurity is fundamentally human. Every firewall rule, AI safeguard, and risk assessment strengthens the invisible backbone of healthcare—a backbone that supports doctors treating patients, nurses monitoring vital signs, and hospitals delivering lifesaving care. His work reminds us that cybersecurity is more than a technical necessity; it is a moral responsibility to ensure that technology remains a source of healing, not harm.

Media Contact

Organization: Common Spirit Health

Contact Person: Akilnath Bodipudi

Website: https://sites.google.com/view/akilnathbodipudi

Email: Send Email

Country:United States

Release id:40531

The post The Human Side of Cybersecurity: How Akilnath Bodipudi Protects Patient Lives Through Technology appeared first on King Newswire. This content is provided by a third-party source.. King Newswire makes no warranties or representations in connection with it. King Newswire is a press release distribution agency and does not endorse or verify the claims made in this release. If you have any complaints or copyright concerns related to this article, please contact the company listed in the ‘Media Contact’ section

file

About Author

Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.

Continue Reading

Press Release

Rankiteo Opens Global Tender for Cyber Insurers: Exclusive Access to 5 million Enterprise Profiles and the Future of Cyber Insurance Distribution

Published

on

United States, 24th Jan 2026Rankiteo, today announced a 30-day strategic tender specifically for Cyber Insurers, inviting one sole partner to gain exclusive distribution rights across the world’s largest open cybersecurity inventory.

Rankiteo has successfully secured the “Pre-Purchase Intent” phase, positioning itself as the “Crunchbase” of the industry. With 1 million public company profiles and 4 million comparison pages, the platform is now the primary destination for CISOs and CFOs evaluating their risk posture before they ever speak to a broker.

Total Market Foreclosure for Cyber Insurers

Unlike traditional lead generators, Rankiteo is offering a complete takeover of its distribution funnel. The selected partner chosen from industry leaders such as AXA, Swiss Re, Zurich, Gallagher, SCOR, Aon, and other top-tier Cyber Insurers will benefit from:

  • Platform Exclusivity: The partner will be the only insurer promoted across Rankiteo’s 5 million+ indexed pages, effectively blocking competitors from this high-intent traffic.
  • Direct Intent Capture: Every time a company audits its Rankiteo score, the exclusive partner is positioned as the sole provider of “Actionable Protection”.
  • Incentivized Risk Improvement: A proprietary cycle where companies improve their Rankiteo scores specifically to qualify for the partner’s preferential Cyber Insurance terms.
  • Early-Bird Intelligence: Access to 360° global risk data, allowing the partner to see emerging threats and leads before they reach the open market.

World-Class Authority in Cyber Risk

Rankiteo is led by a powerhouse team: Jeremy Canale, a Cybersecurity expert with deep roots in Swiss Re and AXA, and Maochao XU, PhD, officially recognized as the world’s most cited expert in Cybersecurity Insurance modeling & statistics.

30-Day Mandatory Response Window for Cyber Insurers

Rankiteo is enforcing a strict 30-day window for Expressions of Interest (EOI). At the end of this period, the platform will grant exclusive access to the carrier or broker best aligned with its mission to set the global standard for Cyber Insurance distribution.

“We aren’t just selling leads, we are handing over the keys to the world’s most strategic cyber-acquisition engine,” stated the Rankiteo founders.

Media Contact:

For media inquiries, please contact:

Rankiteo Inc.
3790 El Camino Real
# 1174 Palo Alto,CA 94306
United States

USA Offices: + 1 650 3744052 
Europe Offices: +337 87 77 55 92

Email: contact@rankiteo.com

Website: www.rankiteo.com

Media Contact

Organization: Rankiteo Inc.

Contact Person: Jeremy Canale

Website: http://www.rankiteo.com/

Email: Send Email

Country:United States

Release id:40523

The post Rankiteo Opens Global Tender for Cyber Insurers: Exclusive Access to 5 million Enterprise Profiles and the Future of Cyber Insurance Distribution appeared first on King Newswire. This content is provided by a third-party source.. King Newswire makes no warranties or representations in connection with it. King Newswire is a press release distribution agency and does not endorse or verify the claims made in this release. If you have any complaints or copyright concerns related to this article, please contact the company listed in the ‘Media Contact’ section

file

About Author

Disclaimer: The views, suggestions, and opinions expressed here are the sole responsibility of the experts. No Digi Observer journalist was involved in the writing and production of this article.

Continue Reading

LATEST POST