{"id":31794,"date":"2019-12-16T07:01:00","date_gmt":"2019-12-16T12:01:00","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=31794"},"modified":"2023-05-30T05:49:25","modified_gmt":"2023-05-30T09:49:25","slug":"spacegraph-interview","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/spacegraph-interview\/31794\/","title":{"rendered":"Shimmer, SPARKLE and digital toilets: The art and cybersecurity world of Lin Hsin Hsin"},"content":{"rendered":"<p>As part of Kaspersky\u2019s\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/bring-on-the-future\/\" target=\"_blank\" rel=\"noopener nofollow\">Bring on the Future<\/a>\u00a0series, we meet people and businesses around the world who are changing the industry, and society, for the better.<\/p>\n<p>Lin Hsin Hsin is the Founder and CTO of <a href=\"https:\/\/lhham.com.sg\/SpaceGraph\/\" target=\"_blank\" rel=\"noopener nofollow\">SpaceGraph<\/a>. She\u2019s an inventive technologist, artist, poet and composer from Singapore whose practice is deeply rooted in mathematics and information technology. In 1994, she established the <a href=\"https:\/\/www.lhham.com.sg\/\" target=\"_blank\" rel=\"noopener nofollow\">Lin Hsin Hsin Art Museum<\/a>\u00a0\u2013 the first\u00a0virtual museum in the world. I met Lin at a recent cybersecurity conference, and we discussed the connections between cyber-tech and art in her work.<\/p>\n<p><strong>Oleg: How did you become interested in cybersecurity?<br>\n<\/strong><br>\nLin Hsin Hsin: Cybersecurity is a discipline I\u2019m hugely interested in. I specialize in threat intelligence. I\u2019m particularly interested in new encryption methods and emerging technologies like blockchain and biometrics. I like exploring smart contracts too \u2013 these are an integral part of cryptocurrencies but they\u2019re not so \u2018smart\u2019 \u2013 they use weak programming language with flawed language design.<\/p>\n<p><strong>I think of cybersecurity as a \u2018cat and mouse\u2019 game between the cybercriminals and the security experts. Can we beat them?<\/strong><\/p>\n<p>Well said!<\/p>\n<blockquote><p>It isn\u2019t a question of whether the experts or cybercriminals will win, it boils down to the prevalence of cybersecurity awareness.<\/p>\n<\/blockquote>\n<p>Even more so at the enterprise level, incidents show that people are often the weakest link. All you need is a moment of lapsed attention and all your cautious preparation is rendered invalid.<\/p>\n<p>On the other hand, enterprises are constantly battling with insider threats too. Is it possible to have a quantum leap in cybersecurity? Well, yes, the deployment of data science and advancements in artificial intelligence (AI) can propel us toward better solutions, but hackers are also using the same tools and processes to get ahead of the curve.<\/p>\n<p><strong>Recently you created a series of artworks around Brexit. Will you create more art based on political themes? <\/strong><\/p>\n<p>My Brexit Art Series consists of 50 digital artworks \u2013 it\u2019s now complete. Why 50? Because of <a href=\"https:\/\/en.wikipedia.org\/wiki\/United_Kingdom_invocation_of_Article_50_of_the_Treaty_on_European_Union\" target=\"_blank\" rel=\"noopener nofollow\">Article 50<\/a>! I even created a markup language &lt;BREXML&gt; based on the term \u2018Brexit.\u2019<\/p>\n<p><strong>You invented the first 100 percent Directed Acyclic Graph (DAG) protocol, known as SpaceGraph, and you excel in using blockchain algorithms. What are your thoughts about using blockchain?<\/strong><\/p>\n<p>I was the first person in the world to author the phenomenon of cryptocurrency, back in 1996. To date, there are only two protocols in existence, Bitcoin and Ethereum. The rest are either platforms or apps.<\/p>\n<p>The 10-year-old Bitcoin protocol is all about mining, where transactions are verified by peer-to-peer networking through cryptography and recorded in a public-distributed ledger called blockchain. Ethereum is a modified Bitcoin consensus via transaction-based state transitions.<\/p>\n<p>In June 2016, Ethereum and \u0110AO (the related decentralized autonomous organization) was exploited due to several security vulnerabilities associated with \u0110AO\u2019s smart contract software. It performed credible trackable, but irreversible, transactions without third parties to reduce transaction costs. Every transaction executed on Ethereum requires gas, defined as a fraction of an Ethereum token.<\/p>\n<p>There was a time when people thought blockchain was immutable. Now people have realized a few <a href=\"https:\/\/www.investopedia.com\/terms\/1\/51-attack.asp\" target=\"_blank\" rel=\"noopener nofollow\">51% attacks<\/a> (blockchain attacks) do exist.<\/p>\n<p>Will these attacks persist? Yes, definitely. In May 2018, Bitcoin Gold \u2013 then the 26th-largest cryptocurrency \u2013 suffered a 51% attack. The malicious actor, who controlled a vast amount of Bitcoin Gold\u2019s hashpower, was able to double spend for several days, eventually stealing 18 million US dollars worth of Bitcoin Gold.<\/p>\n<p>More interestingly, it\u2019s the 34% attack, via the tangle \u2013 a distributed ledger fundamentally distinct from a blockchain, but designed to achieve similar goals \u2013 that could be more of a risk. It\u2019s called a \u201834% attack\u2019 because it would take just 34 percent of network hashing power to carry out the attack.<\/p>\n<p><strong>You\u2019re a pioneer in both the IT industry and digital art. How do you imagine the future of digital art?<\/strong><\/p>\n<p>We used to read physical copies of newspapers and books. How many people still have this habit? Book stores have converted to caf\u00e9s for people to socialize, though most people are ordering a drink with their eyeballs glued to their mobile screen rather than interacting with another person!<\/p>\n<blockquote><p>Only a few things won\u2019t go digital, like chicken rice and wine. In 1994, I built a digital toilet, complete with digital toilet paper and poems, inside my virtual museum. It attracted over one million visitors to its \u2018throne.\u2019<\/p>\n<\/blockquote>\n<p><strong>Will the advance of neuro-interfaces create artificial effects on our senses?<\/strong><\/p>\n<p>Yes, these already exist. Recently, I invented some shimmering art for your pleasure! <a href=\"https:\/\/lhham.com.sg\/digisalon\/Lin-Hsin-Hsin-SPARKLE.html\" target=\"_blank\" rel=\"noopener nofollow\">SPARKLE<\/a> (Shimmering Pixels Assimilated Resistive Touchscreen Kindle iLuminated Emissions) is my latest invention.<\/p>\n<p><strong>Will physical art survive?<\/strong><\/p>\n<blockquote><p>If our senses can be activated and experienced digitally anytime, anywhere, why should we need the physical world? <\/p>\n<\/blockquote>\n<p>Archiving art is a nightmare because its materials always degenerate. It needs a great deal of space and preservation.<\/p>\n<p>Let me take you further on the journey. With the current capabilities of neuro-networks Generative Adversarial Network (GAN and deepGAN), the days of Hollywood\u2019s rule are numbered! Do we even need actors, cameras or production crew?<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-31798\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/12\/16070001\/m077-spacegraph-inline-1024x768.jpg\" alt=\"spacegraph interview\" width=\"1024\" height=\"768\"><\/p>\n<p>I\u2019m also a composer. I\u2019ve recreated Western orchestral instruments from alternative sounds. For example, using the sound of water rippling, gushing and dripping, you can create the foundation of a sonic tone for a digital musical instrument. There\u2019s no difference in building a cat\u2019s meow or a dog\u2019s bark from this digital instrument.<\/p>\n<p><strong>Don\u2019t you think something would be lost in the process?<\/strong><\/p>\n<p>No! This is a replacement \u2013 there\u2019s no loss. New art and art forms can be created by harnessing the inherent properties of digital, like the internet and smartphone.<\/p>\n<p>I\u2019m a huge admirer of the Bolshoi Ballet. The AI-assisted and sensor-based pointed shoes can be used to track a dancer\u2019s movements, training the dancer\u2019s skills to perfection. By measuring the dancer\u2019s exact body, it\u2019s also faster and better. Of course, robots could replace ballerinas very soon.<\/p>\n<p><strong>How have you used virtual reality (VR) in your art?<\/strong><\/p>\n<p>I started creating 3D art back in 1982. My first awareness of VR was in 1997, when I met the father of VRML (Virtual Reality Modeling Language), Mark Pesces, in Los Angeles, USA. I started making VR art two years later, the same year I exhibited my first 3D printing work. I was the first person in the world to successfully use equations to create 3D design for sculptures, objects and jewelry.<\/p>\n<p>Fast-forward to 2011, I invented the first cardboard VR glass, three years before Google Cardboard!<\/p>\n<p><strong>There\u2019s a lot of talk about digitization and tokenization in art, but people sometimes say viewing digitized art in cyberspace feels \u2018fake\u2019 and \u2018bland.\u2019 What\u2019s your view?<\/strong><\/p>\n<p>Art was digitized about two decades ago! About the tokenization of art, I can\u2019t see the benefits because you must first filter out all the fakes, and that in itself is a mammoth task! I\u2019ve delivered lectures on fake art, both fake non-digital art as well as fake digital art.<\/p>\n<p>Recently I created a method to make a digital canvas. It redefines the medium. If you use a physical bristle to draw an elephant on textured cloth or canvas, there will be two different impressions, so you will see two different elephants. I programmed a digital canvas to create this textured effect, to evoke a feeling. It\u2019s designed to make you feel better, compared to seeing the image with the factory default settings. It\u2019s like going to a concert hall to hear a concert and discussing the acoustics over a glass of wine in the intermission, compared to staying home and listening to the concert on your headphones. You\u2019re the first person I\u2019m sharing this concept with!<\/p>\n<p><strong>I\u2019m delighted to hear about it!<\/strong> <strong>How do you see the future of utility tokens and cryptocurrency? Will the world adopt cryptocurrency as its preferred payment method?<\/strong><\/p>\n<p>In all countries, the function of a central bank is to exercise control of the country\u2019s monetary system and policy. Central banks issue and regulate, limiting the circulation of the national currency. Other than security tokens and stable coins, cryptocurrency is decentralized and unregulated by financial policymakers, hence their objections to it.<\/p>\n<p>But several countries, like Luxembourg, Malta and Marshall Islands, have endorsed and adopted cryptocurrencies as their sovereign and legal tender. As cryptography is anonymous, it eases peer-to-peer transactions and facilitates instant currency exchanges. It\u2019s the rise of the truly \u2018cashless society.\u2019 It may even help to find solutions to debt.<\/p>\n<p><strong>That would be a game-changer. What\u2019s your perspective on quantum computing?<\/strong><\/p>\n<p>Unlike the existing computing world, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/quantum-encryption\/28372\/\" target=\"_blank\" rel=\"noopener nofollow\">quantum computing<\/a> is based on qubits \u2013 sub-atomic bits such as electrons or photons. In cryptocurrency, quantum computers can break the elliptic curve cryptography efficiently in the two existing protocols, Bitcoin and Ethereum.<\/p>\n<p>Though not tested, it shouldn\u2019t affect the third protocol, <a href=\"https:\/\/lhham.com.sg\/SpaceGraph\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">SpaceGraph\u2122<\/a> that I architected in 2018. A quantum computer can calculate the private key from a signature, although it may not be as useful, as there\u2019s no longer any credit on the address. In any case, it can also exercise powerful attacks on the RSA asymmetric key systems.<\/p>\n<p><strong>Art vs technology: How do you share these disciplines in your life?<\/strong><\/p>\n<p>There is no \u2018art.\u2019 I define ART as:<br>\nArt<br>\nRequires<br>\nTechnology<\/p>\n<p>Technology<br>\nRedefines<br>\nArt<\/p>\n<p><strong>What are your hopes for the future?<\/strong><\/p>\n<p>I\u2019d like a future devoid of scams and fakes.<\/p>\n<p>About a year ago, I was attending a tech event. When I was waiting for our (human-made) coffee, I met a man who asked me what I did for work.<\/p>\n<p>I replied, \u201cI\u2019m an artist.\u201d<\/p>\n<p>He was shocked. \u201cWhy are you at a tech event? What else do you do?\u201d<\/p>\n<p>I replied, \u201cCybersecurity.\u201d<\/p>\n<p>He became more puzzled and asked, \u201cWhat\u2019s the connection?\u201d<\/p>\n<p>I said, \u201cThe logic is very simple: cybersecurity prevents the theft of my digital IP.\u201d<\/p>\n<p>Eradicating plagiarism, fakes and lies is important to my future as a digital artist, and for the world of technology.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Inventive technologist, artist, poet and composer Lin Hsin Hsin builds links between cybersecurity and art.<\/p>\n","protected":false},"author":2534,"featured_media":31797,"template":"","coauthors":[3546],"class_list":{"0":"post-31794","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-blockchain","7":"emagazine-category-bring-on-future","8":"emagazine-category-future-tech","9":"emagazine-category-opinions","10":"emagazine-category-threat-intelligence","11":"emagazine-tag-blockchain","12":"emagazine-tag-cryptocurrencies","13":"emagazine-tag-cyberattacks","14":"emagazine-tag-quantum-computing"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/spacegraph-interview\/31794\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/31794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/31797"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=31794"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=31794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}