Category Archives: Encryption

Why quantum computing is a threat to encryption, and what to do about it – New Hampshire Business Review

Impacts of quantum computing threats of tomorrow will change how we use encryption today

Our business and personal lives depend on many things we do not often think about including encryption. Normally this area evolves under its own steam without most business decision-makers having to pay attention, but over the next few years that has to change or else you might inadvertently cede your secrets to adversaries both known and unknown.

A lot has been made of how quantum computing will change the world, but most of these pronouncements are long on hyperbole and short on actual details.

Quantum computing does have a great deal of promise and will eventually change the world in areas such as material science. The more immediate impact of a medium-scale quantum computer is the threat it and those that come after it will pose to how we all use encryption today. To make sense of this, and therefore understand how to mitigate the risk now, we have to back up and define some things.

Encryption today

As of this writing, there are two general types of encryption in use today: symmetric and asymmetric encryption. Symmetric encryption is when the sender and receiver both have the key that is used to encrypt and decrypt the protected data. This is used almost everywhere, but it is often enabled by the use of asymmetric encryption to exchange that key, given many parties need secure communications without meeting. The latter type is where quantum computers expose a major weakness.

Quantum computing

To make sense of this next part, your understanding of quantum computing does not have to go too deep, but you have to accept some strange truths in exchange. The best way to get through this is to remember the last superhero movie you saw and recall that to enjoy the film you had to suspend disbelief and not question how that person is flying or shooting lasers from body parts in ways that defy logic.

Quantum computing leverages the strange world of quantum mechanics, which fails to make sense when held to our day-to-day experiences. The bit to grasp is that a quantum calculation can evaluate all possible values at once rather than having to walk through each possible value one at a time the way a classical computer would have to approach a problem.

A brilliant mathematician at MIT named Peter Shor created an algorithm that could use this quantum weirdness to enable a sufficiently powerful quantum computer to break the hard math problem that lies at the heart of all mainstream asymmetric encryption in use today. We are all awaiting the day (or year) when a sufficient quantum computer breaks our encryption and guts our current security.

Post quantum encryption

Rather than just waiting for the end, the U.S. government has been busy evaluating replacement encryption mechanisms that can replace the soon-to-be vulnerable asymmetric mechanisms in use today. The National Institute of Standards and Technology (NIST) is just about to crown Crystals Kyber and Crystals Dilithium (very geeky names indeed) as the heirs.

Swapping out your encryption is no easy task and will take time. The first step is to dig in and understand where you are using encryption in the first place, and then differentiating where the asymmetric encryption is employed. While not easy, this is likely the easiest part. Once you have completed this inventory, you have to make some complicated changes to code, ensure your vendors make these changes, or change solutions to a vendor who has, or soon will, make these changes.

Many pundits are assuring all who will listen that we have a long time before this threat becomes real, but that is, at best, wishful thinking and, at worst, a disaster in the making. The truth is we do not know. It could be 30 years, but many concede that it could be just a few years. It is not today or tomorrow, but it is so close that it is widely accepted that some threat actors are already storing encrypted data in anticipation of being able to use a future quantum computer to decrypt it. They are betting that this threat will come home to roost sooner rather than later. How will you bet?

Patrick Hynds is the CEO of DTS, a cybersecurity solutions provider in Derry.

Link:
Why quantum computing is a threat to encryption, and what to do about it - New Hampshire Business Review

Encryption shield installed to protect Chinese quantum computer from attack – South China Morning Post

The new methods are to replace the conventional public-key cryptography system, which could be vulnerable in the face of quantum computers with powerful computing capabilities.

01:58

China denies accusations of state-sponsored hacking from US, UK and New Zealand

China denies accusations of state-sponsored hacking from US, UK and New Zealand

The report quoted Dou Menghan, deputy director of the Anhui Quantum Computing Engineering Research Centre, as saying the anti-quantum attack shield was developed and used for the first time by Origin Quantum, the developer of the computer named after the Monkey King of Chinese mythology.

This shows that Chinas home-grown superconducting quantum computer can play both offence and defence in the field of quantum computing, he said.

This is also an important exploration of the application of new data security technologies in China.

The third-generation Wukong is powered by a 72-qubit home-grown superconducting quantum chip, also known as the Wukong chip.

In January, the superfast computer opened remote access to the world, attracting global users from countries such as the US, Bulgaria, Singapore, Japan, Russia and Canada to perform quantum computing tasks.

In traditional computing, a bit is the basic unit of information that represents either zero or one. A quantum bit, or qubit, takes it a step further by being able to represent zero, one, or both simultaneously.

Lawmaker urges China to safeguard tech production chain for a quantum edge

Because quantum computers can simultaneously represent multiple possibilities, they hold theoretical potential for significantly faster and more powerful computation compared to the everyday computers we use now.

But the subatomic particles central to this technology are fragile, short-lived and prone to errors if exposed to minor disturbances from the surroundings. Most quantum computers operate in highly isolated and extremely cold environments to avoid disruption.

The normal operating temperature of the Wukong chip is close to absolute zero, or minus 273.15 degrees Celsius. It is stored in a special fridge before being installed in a vacuum environment for operation.

Link:
Encryption shield installed to protect Chinese quantum computer from attack - South China Morning Post

The best encrypted messaging apps in 2024 – Tom’s Guide

The best encrypted messaging apps are ideal to protect your messages from any prying eyes, and even preserve your privacy against the very companies that make them.

That's because these apps come with encryption methods so heavy that even government agencies can't bust into them. The most common method is end-to-end encryption, which is used by Signal, Threema, WhatsApp and others meaning only the sender and recipient of a message can see its contents.

Apples iMessage protocol uses end-to-end encryption as well but its Messages app which is used to view encrypted messages also handles unencrypted SMS text messages. This makes it easy to get confused which is why youre better off using one of the best encrypted messaging apps instead if you want to ensure that all of your chats are secure. It's worth noting that Google's Messages app can also use end-to-end encryption but both people need to have RCS chats turned on.

These are the best encrypted messaging apps available right now for Android and iOS.

The best encrypted messaging app for most people

Cost: Free

Platforms: Android, iOS

Open source and encrypted

Disappearing messages

Can secure the app with a password

Phone number required for sign up

Signal is a fantastic messaging solution for security-conscious mobile users. It's a free all-in-one messaging, voice-call and group-chat solution that uses its own end-to-end encryption protocol.

You can send text messages, voice calls, group messages, media and attachments to your phone contacts, all without having to mess with PIN codes or special login credentials. Updates to the app have added user-friendly features such as custom wallpapers and animated stickers, and Signal group video chats can now have up to 40 participants.

All Signal messages can be set to self-destruct after a certain amount of time while a Chrome browser plugin lets you use Signal from your desktop as well. You can transfer Signal accounts from one Android phone to another and from one iOS device to another. In fact, you can even change phone numbers while keeping Signal account data as long as you're staying on the same device.

Signal's encryption protocol is so strong that WhatsApp and Facebook Messenger use it too. But unlike Facebook, Signal's parent company is a non-profit foundation created by an anarchist cryptographer and one of the founders of WhatsApp.

Ease of use and strong, open-source, regularly audited encryption makes Signal a favorite of the security-conscious, with accolades from Edward Snowden and other privacy advocates. User-friendliness without compromising on security makes Signal a fantastic option for users looking for an encrypted messaging and calling app. Here's our guide on how to use Signal.

Download Signal: Android, iOS

An increasingly popular cloud-based, secure messaging app

Cost: Free

Platforms: Android, iOS

Intuitive interface

Syncs seamlessly

End-to-end encryption isn't enabled by default

Like Signal and WhatsApp, Telegram lets users link their phone number to a Telegram account to send fast, encrypted messaging over the internet, with client-server encryption for standard chats.

But Telegram is much more than just a messaging service. It has grown into a worldwide social-media platform, with huge user groups and broadcasts that let accounts reach millions of followers in an instant. It has uses far beyond secure messaging.

However, end-to-end encryption is not enabled by default on Telegram. To get it, you'll have to switch to Secret Chat mode. You can set messages to self-destruct, share videos and documents and participate in group chats of up to 200,000 users.(Yes, Telegram really does support group chats that large.) However, chats with more than two participants won't be end-to-end encrypted.

A caveat? Telegram uses its own custom MTProto encryption rather than a more proven system. Here's our guide on how to use Telegram.

Download Telegram: Android, iOS

A secure messaging app many of your contacts likely already use

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Messages and images can self destruct

Widely used

Requires phone number

Owned by Facebook

The world's most popular stand-alone chat and call app, WhatsApp has used Signal's end-to-end encryption protocol on all messages since 2016.

Its developers are continuously adding tweaks to the app's security and privacy features, such as fine-tuned group invitations and controls so that you're always aware who is reading your group chats.

The app is also testing transfers of chat history when switching between iOS and Android phones and using a single account on four different devices at once. Updates to WhatsApp have made it possible to have end-to-end-encrypted backups and have added the ability to make disappearing chats the default. You can also transfer your chat history from iPhone to Android, and the iOS beta suggests an Android-to-iPhone transfer feature is coming soon.

In 2014, WhatsApp was bought by Facebook, which later broke its promise that it wouldn't "monetize" the service which led its founders to leave and one of them co-founded Signal. Some WhatsApp user behavioral data is now shared with Facebook, which has created more demand for WhatsApp alternatives, but the messages remain entirely walled-off.

No matter who owns it, WhatsApp remains one of the easiest ways for anyone to use end-to-end encrypted messaging. If you're not comfortable with Facebook's presence, there are plenty of other options on this page.

Users who want to be absolutely sure about their security can verify each chat's 60-digit security-verification code or QR code that you can compare with a contact to ensure that your conversation is encrypted.You'll also want to make sure your messages are backed up with WhatsApp itself and not with Apple's iCloud.

Combined with WhatsApp's ubiquity, ease of use and the ability to send voice messages, photos, and video messages, and conduct group chats, makes for a robust and fully encrypted mobile-messaging app.

Download WhatsApp: Android, iOS

A private messaging app worth paying for

Cost: $3.99

Platforms: Android, iOS

End-to-end encryption

Private chats

No phone number or email required

Not free

Few advanced features

Threema is a very secure end-to-end encrypted messaging app that uses the NaCl cryptography library to protect your communications.

When you fire up the app, it generates a unique Threema ID key, allowing you to use the app completely anonymously no names required. Otherwise, you can associate your account with an email address or phone number, which makes it easier for other Threema users to find you.

You'll also get a scannable QR code that you can present to other Threema users if you meet in person but don't want to exchange names.

In addition to the usual raft of messaging features such as encrypted text, voice, picture, and video messaging, the app also includes file sharing (20MB per file), emojis, group messaging and a polling system for getting feedback from friends and contacts.

While some other secure-messaging apps that haven't reached WhatsApp or Telegram adoption levels have pivoted toward the enterprise market to stay afloat, Threema still has one foot planted firmly in the consumer market. Charging a few bucks for the app makes that financially possible.

So what's the downside? Threema hasn't really caught on in the English-speaking world, so you may have a hard time finding other users unless you speak German. But its impeccable security is well worth spending $4 for.

Download Threema: Android, iOS

Secure messaging and collaboration for businesses

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Independently audited

Easy to use

Email or phone number required

No two-factor authentication (2FA)

Wire features end-to-end encryption for instant messages, voice and video calls, with support for GIFs, audio and video clips, and sketches, and local and Dropbox file sharing. The app also offers multiplatform cross-device syncing and support for multiple accounts, allowing you to separate personal and work communications.

Wire uses its own Proteus encryption protocol based on the Signal protocol, and its code is open-source and subject to external security audits. The mobile and web versions of the app are free, with a premium tier available for businesses.

The parent company, Wire Swiss, was originally founded and run out of Switzerland which is famous for its privacy laws. The holding company moved to the United States in 2019, which alarmed some users, but then moved to Berlin in early 2021.

Like Silent Circle and Wickr, the company seems to have retooled its website to appeal primarily to business users. But you can still get Wire's free consumer desktop software from the "Download" link at the bottom of the site's main page, and its mobile apps on the Play Store or App Store.

Download Wire: Android, iOS

Secure messaging, voice and video calls all in one place

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Disappearing messages

Hidden chats

Syncs across desktop and mobile

Not as popular as it used to be

Viber offers end-to-end encryption on all platforms.Originally developed in Israel, the app is now owned and operated by Japanese e-commerce giant Rakuten. It offers many of the same bells and whistles as Telegram, including stickers and communities, and, most recently, augmented-reality filters to jazz up selfies.

A neat feature for Viber is a color-coded lock icon to quickly show users how protected a conversation is (gray for encrypted communications, green for encrypted communications with a trusted contact, and red in the event that there is an issue with the authentication key). Viber has self-destructing Secret Chats, included in group chats and on its desktop app, plus a Hidden Chats feature for hiding chatrooms on a shared device.

All of this is in addition to Viber's solid mobile-messaging feature set which includes text, voice, and group messaging all tied to your phone number. The app and communications with other Viber users are free, but you'll have to pay a bit for calls to non-Viber users.

Download Viber: Android, iOS

Encrypted messaging from the social media giant

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Disappearing messages

Hugely popular

Familiar interface

Sending encrypted messages could be more intuitive

The near-ubiquitous Facebook Messenger may not be the first app you think of when it comes to encrypted messaging, but the mobile versions of the app include end-to-end encrypted communication options in the form of Secret Conversations.

See original here:
The best encrypted messaging apps in 2024 - Tom's Guide

Best Free VPN: Top 7 Free VPNs in April 2024 – VPNOverview.com

Short on time? Click here for a summary!

The Best Free VPN in 2024: Our Top 8 Recommendations

The best free VPNs offer powerful online security without a premium price tag. We tested dozens of free VPNs to present you our best free VPNs for 2024.

These VPN providers offer excellent protection at zero cost. Our extensive research has taught us that many free VPNs are dangerous, as they log and sell your data or simply dont work as a VPN is expected to.

If you need an affordable, trustworthy VPN without any restrictions or limitations, we recommend Surfshark. This is one of the few premium VPNs that offer a free trial and a 30-day money-back guarantee! Surfshark is fast, secure, and great for streaming.

If you want a completely free VPN and youre not sure which provider is best for you, well help you decide. Check out your options below!

Free VPNs provide secure VPN connections and encrypted data at zero cost. The best free VPNs ensure that your data, online activities, and browsing history remain private.

However, most free VPN services come with limitations, including data and speed caps. Youll also have to vet for security vulnerabilities that may put your private data at risk or expose you to malicious software.

Dont want the hassle? Choose a cheap, premium provider like Surfshark. Surfsharks best plan costs only $ 2.49 per month. It also offers a free trial and a 30-day money-back guarantee.

Want a truly free VPN instead? PrivadoVPN is our editors choice; it came out on top in our tests to discover the best free VPNs. Keep reading for a review of every free VPN service we tested.

Free products usually have hidden costs. This is certainly the case for free virtual private networks, which might log your data or leave your IP address exposed.

Here are some of the biggest risks and limitations associated with free VPNs:

Besides these security risks, free VPNs may also hinder your user experience by capping your data and offering only a limited amount of servers.

We like saving money as much as the next person. However, we dont recommend free VPNs for the reasons stated above.

If you dont want to pay for a VPN service, youre better off taking advantage of a VPN free trial or money-back guarantee. Surfshark currently has a 7-day free trial for new users! Have a look to see how it compares to the best free VPN providers.

You can also use Surfshark for 30 days if you want more time to make a decision. Not satisfied? No harm! You can easily get a full refund.

If a totally free VPN is what youre looking for, we rounded up the most reliable options in one list. You dont even have to provide your payment information or make use of a money-back guarantee.Free really means free with these VPN providers.

Our in-depth tests revealed the strengths and weaknesses of each of these free VPNs. Read on to find out which one fits your needs best.

Privado is the best free VPN on the market and our editors choice. It keeps your identity safe and is especially suited for PC and Mac users, with an easy-to-navigate interface and solid security features.

PrivadoVPN also has apps for iOS, Android, and Android TV. Theres even a Fire TV Stick app, which is pretty great for a free VPN!

Privacy and security: When testing this VPN, we were impressed by its features. PrivadoVPN offers a high level of privacy thanks to its strict zero-logs policy. The VPN does not collect or store any data. Plus, its headquarters is in Switzerland, which has favorable privacy laws!

On top of that, PrivadoVPN offers highly secure VPN protocols like WireGuard and OpenVPN, as well as AES 256-bit encryption. For a free VPN, it also offers advanced security features, including an automatic kill switch and a split-tunneling feature called SmartRoute.

Server network: Privado offers free servers in 10 locations, namely:

At start-up, Privado will automatically suggest the best server location for you. This means you can get a secure VPN connection in a matter of seconds.

Streaming and torrenting: Privado does wonders for streaming! We connected to the UK server easily and had no trouble unblocking BBC iPlayer. We could access various Netflix libraries and watch shows on HBO Max, Disney Plus, and Amazon Prime Video without issues.

While the 10 GB data limit is restrictive, Privado is one of the best free Netflix VPNs. You can always reduce the playback quality to save some data.

Torrenting enthusiasts will be happy to know that PrivadoVPN allows for P2P file sharing. We tried downloading some torrents and didnt encounter any throttling.

Limits on speed and data: PrivadoVPN offers unlimited speeds as long as you stay within the monthly 10 GB data limit. When testing, we noticed that the speeds on Privados free servers are a lot lower than that of premium VPNs like Surfshark.

Privado will only provide you with a 1 Mbps speed once youve exceeded your 10 GB monthly data cap. And, as you may know, agonizingly slow internet is very frustrating, especially when streaming.

Good to know: Besides the 10 GB data cap, Privado has no dedicated Linux app. On top of that, you can only use PrivadoVPNs free version on one device at a time. Of course, youre free to create multiple accounts to get around this, but it will be a hassle.

PrivadoVPN has a beautiful and user-friendly app. Its currently the best free VPN out there, especially for Windows and Mac users.

Overall, PrivadoVPN performed exceptionally well in our tests and has several impressive features you wouldnt expect from a free service. Have a look for yourself!

Check out the results of our tests on the premium version of Privado to learn more about this service.

Proton VPN is one of the most well-known free VPNs. As one of the only unlimited free plan options, this provider is ideal if you need unlimited data to browse the internet for as long as you like.

The VPN works well on almost all devices. Weve tried it on Mac, Windows, Android, Android TV, iOS, Linux, Chromebook, and even on some routers.

Privacy and security: Proton VPN doesnt keep any logs of user data. As long as your VPN connection is active, youre safe and anonymous online.

Besides a kill switch, Proton VPN offers secure VPN protocols, including OpenVPN, WireGuard, and IKEv2. It even has a Stealth protocol to overcome censorship and bypass geo-restrictions. This protocol masks the fact that youre using a VPN.

Note:

Proton VPN is one of the few open-source VPN apps, which means that a community of developers works to improve the software. This process makes Proton VPN safer and more transparent. Proton VPN apps are also audited by cybersecurity expert to guarantee the safety of users.

Server network: Unfortunately, free users are not spoiled for choice when it comes to Protons server location. There are only three countries with free servers: the United States (22 servers), the Netherlands (38 servers), and Japan (8 servers).

In comparison, a VPN like Surfshark provides you with 3200+ servers across 100 countries. For only a few dollars per month, you wont have any limitations.

Streaming and torrenting: Unfortunately, Proton VPN free doesnt support torrenting. Even the best torrent sites are not accessible with this VPN unless you upgrade to the premium version.

In terms of streaming, the results were mixed. We tried to access Netflix using Proton but got an error message about using a VPN/proxy. The same happened for Amazon Prime Video. At other times, however, weve had no issues streaming with Proton VPN.

Limits on speed and data: Proton VPN Free has no data or speed limits. Thats a huge thing for us Proton is the only reliable, fully free VPN that offers uncapped data.

Having said that, we found that the free version of Proton VPN can be quite slow at times. This makes sense, considering the large volume of free users using a limited amount of servers.

Note:

The Proton website openly advertises the speed of their free VPN as medium, while their paid subscriptions all have high speeds.

Good to know: You can use Proton for free on one device at a time. Want to protect different devices? You can use different email addresses to create multiple accounts.

Proton account gives you access to a wide range of security services, including:

If you choose to upgrade to Proton VPN premium, youll get upgrades for all these services, making it a great all-in-one solution for online privacy

Proton VPN is one of the best free VPNs currently available, thanks to its security features and unlimited bandwidth. Its just not the best choice for streaming or gaming.

This popular provider from Switzerland offers user-friendly software, an array of free security tools, and high-level encryption.

Want to know more? Read our full Proton VPN review to see our testing results!

Hide.me is a trustworthy VPN that allows P2P file sharing and has excellent free customer support. If youre a beginner to VPNs and want to torrent safely, we think that this is the best free option for you.

The VPN has an app for most major operating systems, including Windows, iOS, macOS, Android, Linux, and even Fire TV Stick.

Privacy and security: Hide.me is a zero-logs VPN that has been independently certified. The provider doesnt store any information about your internet activities, which is good news for privacy-conscious users.

Hide.me is based in Malaysia, which is outside of the Eyes Alliance, so you wont have to deal with invasive privacy legislation.

In terms of VPN protocols, you have a wide variety to choose from:

Server network: The free version of Hide.me only gives you access to servers in eight countries: Canada, France, Germany, Netherlands, Singapore, Spain, United Kingdom, United States.

From our experience, this is not impressive, but its about average for a free provider.

Streaming and torrenting: In the past, Hide.me didnt allow free users to download torrents. Luckily, the provider changed this policy, and free users can now download safely via torrent sites.

Unfortunately, we had issues streaming with this VPN. Hide.me does not work with Netflix US. We tested this ourselves and werent able to unblock any geo-restricted shows or movies on Netflix.

Limits on speed and data: The free version of Hide.me has a data cap of 10 GB per month. If you want to stream or download something, youll reach this limit easily. When testing the VPN, we also found that speeds varied quite a bit.

If you dont want to deal with these restrictions, have a look at our best VPNs for streaming.

Good to know: During the first week of your free membership, youll be able to use Hide.me Premium with a seven-day free trial. After that, youll be limited to the free features. You can use Hide.me on one device at a time.

We did find that Hide.mes upsell campaign is quite invasive. Theres always a button urging you to switch to the premium version, which can be annoying.

On a positive note, we found Hide.mes customer support is very responsive and supportive!

While Hide.me is not the best free VPN out there, it definitely has its merits. We recommend this VPN for anyone who wants to torrent without paying for a VPN subscription.

Hide.me has a few advantages over other VPNs, mainly its variety of VPN protocols and torrenting capabilities.

Weve tested all of Hide.mes features. Read our Hide.me review to learn more about what this VPN can offer.

TunnelBear is a practical VPN with many servers. It also offers a cheeky design thats easy to use! While TunnelBears free version has a small data limit, its great for users looking for plenty of server locations and a well-designed app.

Another great benefit is that you can use TunnelBear Free on unlimited devices.

Privacy and security: TunnelBears security and privacy features are very solid. In comparison to other free VPN services, we noted some great extra features, like a kill switch (VigilantBear) and obfuscation technology to hide the fact youre using a VPN (GhostBear).

Thanks to these features, we could unblock more streaming services with TunnelBear than with many other free VPNs.

In terms of privacy, TunnelBear has a no-logs policy. The provider is located in Canada, however, which is part of the Eyes Alliance. Have a look at our best VPNs outside the 14 Eyes for alternative options.

Server network: Thanks to its huge server list, TunnelBear is one of the best free VPNs out there. Even with the free version, TunnelBear allows you to choose from all of its available servers in 42 countries, including the United States, United Kingdom, and many more.

These servers give you the same experience as the Premium TunnelBear servers, which is unique among free VPNs.

Streaming and torrenting: We tested TunnelBear to see if it could unblock online streaming sites, and the results were a resounding success. TunnelBear was able to circumvent geo-restrictions on sites like Hulu, BBC iPlayer, and Netflix.

Unfortunately, there are torrenting restrictions. TunnelBear doesnt allow P2P traffic on its servers.

Limits on speed and data: With such good test results, what is TunnelBears catch? While we didnt experience any speed throttling, theres one major drawback.

The biggest disadvantage we found when using TunnelBear is the data limit you only get 500 MB per month. You can add another 1 GB of free data if you tweet about TunnelBear, but thats not ideal for people looking for more online privacy.

Good to know: Who said VPNs are boring? TunnelBear is one of the most fun VPN apps to use! The visual style is unique and engaging, and the software is full of bear-related puns.

It is worth noting that customer support is limited for free users, since premium users get priority.

The free version of TunnelBear is high quality, and we love the casual, flashy interface. But its only suitable if you dont mind the tight data restrictions.

TunnelBear Free is available for Windows, Mac, Android, and iOS and can be used on unlimited devices simultaneously.

You can find more details and our personal testing experience in our TunnelBear review.

Windscribe is a popular free VPN that works on almost all operating systems and devices, including Linux. It also offers fast servers and a reasonable data limit.

You can get unlimited simultaneous connections with Windscribe, which is also a plus!

Privacy and security: Windscribe offers world-class security features, including a kill switch, an ad blocker, and a split-tunneling option. You rarely see this many security features in a free VPN. Previous software hiccups have been overcome, and the provider has a tight no-logging policy.

As privacy-conscious internet surfers, we appreciate that Windscribe offers multiple strong security protocols:

Server network: The free version of Windscribe has fewer options than the paid package. For free users, Windscribe only provides servers in a handful of countries.

Paying customers have access to global servers in as many as 63 countries. However, for a free plan, the number of server locations is still surprisingly high.

Streaming and torrenting: We were able to unblock and stream content from many different streaming platforms with Windscribe. Unfortunately, we were unable to access Netflix with Windscribe.

While this is a downside, it is rare to see a free VPN that can unblock Netflix without any issues these days. Of course you can easily watch Netflix with a VPN offered by premium providers.

Torrenting is entirely possible with Windscribe, a benefit for P2P fans!

Limits on speed and data: Windscribe is the fastest free VPN we tested. The secure servers maintained good speeds when we used them for browsing, even while we downloaded a file in the background.

There is a data limit of 2 GB per month. However, if you choose to share your email address with Windscribe and verify your account, you get 10 GB a month. Unfortunately, Windscribe may use this data for marketing, so we recommend using a throwaway email address.

Good to know: Windscribe is not as easy to use as some of the other free VPN providers listed above. Most of the buttons in the software take you to your account page.

We would prefer it if you could change your account settings in the VPN application itself.

Windscribes free VPN package is really solid, especially if youre a Linux user. The speeds are great, though bear in mind that the data limits are strict and it cant unblock Netflix.

Originally posted here:
Best Free VPN: Top 7 Free VPNs in April 2024 - VPNOverview.com

Insta’s AI finds nudes in encrypted DMs – iTnews

Instagram nudes sent or received by under-18s will be detected and blurred with device-based software able to scan end-to-end encrypted (E2EE) direct messages (DMs).

The launch of the client-side feature coincides with Facebook Messengers current, and Instagrams planned, global rollout of E2EE, which police and regulators have opposed.

E2EE is not interoperable with the server-based software Meta currently uses to detect, remove and report child sexual exploitation material (CSEM).

Following pushback against mandatory E2EE backdoors, online safety watchdogs in the UK and Australia have more recently pitched scanning communications from users devices, or from government-owned, intermediary servers, as an alternative method of detecting and removing illegal content.

However, unlike the device-based content scanning technology that UK and Australian regulators are pushing E2EE providers to deploy, Instagrams Nudity Protection feature does not block illicit material.

The settings, default for teens and available to adults, warn users of the dangers of sexual exploitation scams and revenge porn, but still allows them to unblur detected nudes.

Meta wont have access to these images unless someone chooses to report them to us, the company, which, in the last financial year, handed 5054 users data to various Australian law enforcement and regulatory bodies, said in a statement.

Acting eSafety Commissioner Toby Dagg told iTnews that he welcomes the feature, but would also welcome further information from Meta about the long-term efficacy and uptake of these tools over time.

Scanning platforms for crime

Dagg said that eSafetys transparency notices to 29 services, including those owned by tech giants Apple, Meta, Microsoft and Google had mapped out the use of language analysis processing to detect child grooming, which Xbox Live, Facebook, Instagram, TikTok and Twitch currently use.

Reports to our investigators show that the criminals behind these [sexual extortion] scams initially make contact posing as an attractive young woman on social media services, with Instagram and Snapchat the most frequently targeted.

When unencrypted, Facebook, Instagram, TikTok, Twitch, Google Chat, Twitter, TikTok, Snapchat, Xbox Live, and Discord messages are scanned for verified CSEM, reports eSafety released in 2022 [pdf] and 2023 [pdf] revealed.

Instagram, Facebook, YouTube, Discord and Twitch also use AI trained on verified CSEM to detect new CSEM.

Automate detect and block regime

Dagg said that eSafetys transparency powers to evaluate platforms detection software work hand in hand with new mandatory codes which require providers of online products and services in Australia to do more to address the risk of harmful material, including child sexual exploitation material and grooming.

In the UK and Australia, Meta, Apple, Signal and other E2EE providers are pushing back against their inclusion in industry codes that could mandate solutions that scan, detect and block content before encryption when the regulator deems it "technically feasible" for the provider in question.

Technical feasibility depends on whether it is reasonable for service providers to incur the costs of taking action, having regard to the level of risk to the online safety of end-users.

eSafety has said that scanning communications from a device or government-owned server would not amount to mandating companies to design systematic vulnerabilities or weaknesses into any of their end-to-end encrypted services.

Metas submission [pdf] to eSafety said that, unless the industry codes explicitly defined technically feasibility to exclude solutions that could render methods of encryption less effective, they could force providers to design systematic vulnerabilities or weaknesses.

Like Apples similar, device-side child safety features for iMessage, Metas nudity protection feature is likely aimed at demonstrating to authorities that harmful E2EE material can be reduced without third-parties directly blocking or reporting it.

eSafetys Updated Position Statement on End-to-end encryption [pdf], released in October, said Apples child safety feature demonstrates at scale that device side tools can be used alongside E2EE, without weakening encryption and while protecting privacy.

It adds, however, that Apples intervention is limited in that it does not prevent the sharing of illegal material or activity, or enable accounts to be banned by the service.

eSafety was more supportive of Apples iCloud solution [pdf], which Apple discontinued after a backlash from privacy advocates.

The iCloud solution would have scanned content from users' devices before it was uploaded to their backup; police would have been alerted when illegal material was detected.

Apple's director of user privacy and child safety Erik Neuenschwander said in an email [pdf] obtained by Wired that the project was ditched over concerns it could create new threat vectors for data thieves to find and exploit" and lead to authoritarian surveillance through function creep.

How can users be assured that a tool for one type of surveillance has not been reconfigured to surveil for other content such as political activity or religious persecution? the email - sent to a child rights group that supported Apple readopting the solution - said in August.

See the original post:
Insta's AI finds nudes in encrypted DMs - iTnews

Top 10 Companies with Exceptional Encryption in 2024 – Analytics Insight

Cybersecurity has become an essential issue in the world of digital innovation where cyber threats are evolving at a fast pace. Effective encryption is a necessity. Encryption goes hand in hand with the defense system against illegal access to confidential information, namely, such information being at rest or in transit. Consequently, the data integrity of a system is protected. The intricacies of data encryption in 2024 demand exploration, with some companies standing out from the crowd for their best encryption practices, thus providing the high-quality protection of a companys most important data assets.

In its role as a titanic webmaster that offers the likes of Gmail to Google Drive, encryption is a security principle Google has always stood by with fortitude. With policies and projects such as the Advanced Protection Program and the development of default encryption in all of its products, Google will be the landmark in the direction of data privacy in the age of digital.

Powered by a comprehensive toolkit of enterprise services and cloud options, Microsoft continues as the leader in encryption architecture. Ranging from super strong encryption algorithms to evolutionary threat detection capabilities to the multiple security attributes Microsoft products and services are made up of, it is plain to see security is embedded in its DNA.

The Apple system has been always characterized by its privacy orientation thanks to its implementation of encryption technologies for its hardware or software. Apple has invested in steps like end-to-end encryption on iMessage and Secure Enclave technology in devices which are designed to maintain privacy and functionality in place at the same time.

As the major player in cloud computing provisioning through AWS, Amazon built its encryption technologies to do data protection for customer purposes. As AWS has elements such as AWS KMS and encryption at rest and during transit, it not only encourages businesses to feel more secure but also assists them in encrypting in the cloud effectively.

Responding to the growing realization of the efficiency of using encryption in networking communications, Cisco incorporates cryptographic features into its range of communication hardware and software solutions. Another feature of Cisco is Cisco Encrypted Traffic Analytics and Cisco AnyConnect VPN which allows the organizations to protect the data across the network periphery.

Fortinet has expertise in providing cyber concerns and its broad range of encryption devices is tailored to address the growing threat landscape. Among which SSL examination, and encryption management, and the last one defends a network from advanced threats is just an example of what Fortinet offers to the organization.

Symantec, by accumulating great cyber security products over time, has become a highly valued name in the industry that sells such services. Symantec secures organizations through its varieties of Symantec end point encryption and Symantec data loss prevention software. This helps the companies to keep their sensitive data safe and reduce the risk of threats.

Encryption is at the core of Sophos enterprise cybersecurity solutions, which is why the encryption functionality is written as a critical feature in its product catalog. With these instruments in place, those organizations can secure the most sensitive data from vulnerabilities including but not limited to Sophos SafeGuard Encryption and the intercepting and blocking threats by Sophos Intercept X.

Growing as a global giant in cybersecurity, Trend Micro, its encryption solutions are on target, dealing with the ever-growing cyber threats in this modern era. Trend Micro now offers products like Deep Security and Data Loss Prevention. Such tools become the companys main weapon to defend their data whether its endpoints, networks, or cloud from being lost, leaked, or stolen.

This is an ordinary tool that prevents the data from being exploited by cybercriminals and other cyber threats. It has been seen above that the listed enterprises have demonstrated good abilities in protecting top-10 vital assets through the use of a practical encryption technique.

As a trusted and established player in the team of industry IBM implements encryption as one of the basic elements of its cybersecurity capabilities. With IBM Security Guardium and IBM Data Privacy Passports two powerful instruments, IBM enables organizations to protect data assets from all threats and ensure compliance with the essential data privacy regulations.

Read more:
Top 10 Companies with Exceptional Encryption in 2024 - Analytics Insight

Over and out? Public Advocate Jumaane Williams says keeping public access to NYPD radios more critical in wake of … – amNY

Public Advocate Jumaane Williams.

Photo by Dean Moses

Weeks after 19-year-old Win Rozario was shot to death by police during a mental health crisis, Public Advocate Jumaane Williams and other elected officials told amNewYork Metro that it is imperative that the press have access to NYPD radio chatter.

Those comments come as the NYPD continues a methodical plan to eventually encrypt all police radio communications, shutting out journalists and the public from chatter in a purported effort to block out criminals who could use the frequencies to their advantage.

Journalists descended on Rozarios Ozone Park home on March 27 after it was reported that he was gunned down while wielding scissors shortly after he himself dialed 911. Members of the media were able to get the news of the shooting out rapidly thanks to having heard the incident unfold in real time via police radio communication.

But should the NYPD stay on course with its encryption plan it already locked out communications in northern Brooklyn and Staten Island for all of New York City, it will make such independent reporting on police incidents almost impossible. Thats something which deeply concerns Williams and others in city government.

Its really disturbing, Public Advocate Williams told amNewYork Metro regarding police encryption plans. This administration has a pattern of trying to be less transparent. This seems to be in that modality.

Williams indicated that he and fellow elected officials have put forward ideas in order to ensure the media could maintain access, yet he says the brainstorming has fallen on deaf ears.

Police say the encryption process, which is expected to be completed in 2025, is intended to keep criminals from listening in to their response and planning it. When the NYPD first announced that some radio channels would be going dark, they also stated that they were mulling over how exactly to give media access on a timed delay. Yet as time wore on and more police channels were taken offline, the NYPD has come no closer to providing media access.

Elected leaders like Williams believe it is a necessity and in the public interest for the press to maintain access to police chatter, in real time.

Its one hundred percent needed for the media to be able to have access, Williams said. Going dark completely for the public and the media unfortunately follows the pattern that we have seen of this administration, and I am concerned about it.

Bronx Council Member Pierina Sanchez also weighed in on the debate, going as far as to say that locking press out of radios is dangerous.

I think complete and total and complete encryption of NYPD radios is dangerous to public safety. It is bad for accountability, It is bad for transparency for the public, Sanchez told amNewYork Metro.

The Councilmember conceded that certain aspects of police radios should be taken off the airwaves, such as specific investigation information. However,she said that should be the expectation and not the norm.

I think public transparency is really the most important and access to the media is a really important component of keeping New York City safe, Sanchez noted.

Link:
Over and out? Public Advocate Jumaane Williams says keeping public access to NYPD radios more critical in wake of ... - amNY

Future quantum computers will be no match for ‘space encryption’ that uses light to beam data around with the 1st … – Livescience.com

By converting data into light particles and beaming them around the world using satellites, we could prevent encrypted messages from being intercepted by a superpowerful quantum computer, scientists claim.

Currently, messaging technology relies on mathematical, or cryptographic, methods of protection, including end-to-end encryption. This technology is used in WhatsApp as well as by corporations, the government and the military to protect sensitive data from being intercepted.

Encryption works by scrambling data or text into what appears to be nonsense, using an algorithm and a key that only the sender and recipient can use to unlock the data. These algorithms can, in theory, be cracked. But they are designed to be so complex that even the fastest supercomputers would take millions of years to translate the data into something readable.

Quantum computers change the equation. Although the field is young, scientists predict that such machines will be powerful enough to easily break encryption algorithms someday. This is because they can process exponentially greater calculations in parallel (depending on how many qubits they use), whereas classical computers can process calculations only in sequence.

Fearing that quantum computers will render encryption obsolete someday, scientists are proposing new technologies to protect sensitive communications. One field, known as "quantum cryptography," involves building systems that can protect data from encryption-beating quantum computers.

Unlike classical cryptography, which relies on algorithms to scramble data and keep it safe, quantum cryptography would be secure thanks to the weird quirks of quantum mechanics, according to IBM.

For example, in a paper published Jan. 21 in the journal Advanced Quantum Technologies, scientists describe a mission called "Quick3," which uses photons particles of light to transmit data through a massive satellite network.

Get the worlds most fascinating discoveries delivered straight to your inbox.

Related: Experts divided over claims of 1st 'practical' algorithm to protect data from quantum computers

"Security will be based on the information being encoded into individual light particles and then transmitted," Tobias Vogl, professor of quantum communication systems engineering at TUM and co-author of the paper, said in a statement. "The laws of physics do not permit this information to be extracted or copied."

That's because the very act of measuring a quantum system changes its state.

"When the information is intercepted, the light particles change their characteristics," he added. "Because we can measure these state changes, any attempt to intercept the transmitted data will be recognized immediately, regardless of future advances in technology."

The challenge with traditional Earth-based quantum cryptography, however, lies in transmitting data over long distances, with a maximum range of just a few hundred miles, the TUM scientists said in the statement. This is because light tends to scatter as it travels, and there's no easy way to copy or amplify these light signals through fiber optic cables.

Scientists have also experimented with storing encryption keys in entangled particles meaning the data is intrinsically shared between two particles over space and time no matter how far apart. A project in 2020, for example, demonstrated "quantum key distribution" (QKD) between two ground stations 700 miles apart (1,120 km).

When it comes to transmitting photons, however, at altitudes higher than 6 miles (10 kilometers), the atmosphere is so thin that light is not scattered or absorbed, so signals can be extended over longer distances.

The Quick3 system would involve the entire system for transmitting data in this way, including the components needed to build the satellites. The team has already tested each component on Earth. The next step will be to test the system in space, with a satellite launch scheduled for 2025.

They will probably need hundreds, or perhaps even thousands, of satellites for a fully working quantum communications system, the team said.

See more here:
Future quantum computers will be no match for 'space encryption' that uses light to beam data around with the 1st ... - Livescience.com

Backdoor found in widely used Linux utility breaks encrypted SSH connections – Ars Technica

Enlarge / Internet Backdoor in a string of binary code in a shape of an eye.

Getty Images

Researchers have found a malicious backdoor in a compression tool that made its way into widely used Linux distributions, including those from Red Hat and Debian.

The compression utility, known as xz Utils, introduced the malicious code in versions 5.6.0 and 5.6.1, according to Andres Freund, the developer who discovered it. There are no known reports of those versions being incorporated into any production releases for major Linux distributions, but both Red Hat and Debian reported that recently published beta releases used at least one of the backdoored versionsspecifically, in Fedora Rawhide and Debian testing, unstable and experimental distributions. A stable release of Arch Linux is also affected. That distribution, however, isn't used in production systems.

Because the backdoor was discovered before the malicious versions of xz Utils were added to production versions of Linux, it's not really affecting anyone in the real world, Will Dormann, a senior vulnerability analyst at security firm Analygence, said in an online interview. BUT that's only because it was discovered early due to bad actor sloppiness. Had it not been discovered, it would have been catastrophic to the world.

Several people, including two Ars readers, reported that the multiple apps included in the HomeBrew package manager for macOS rely on the backdoored 5.6.1 version of xz Utils. HomeBrew has now rolled back the utility to version 5.4.6. Maintainers have more details available here.

The first signs of the backdoor were introduced in a February 23 update that added obfuscated code, officials from Red Hat said in an email. An update the following day included a malicious install script that injected itself into functions used by sshd, the binary file that makes SSH work. The malicious code has resided only in the archived releasesknown as tarballswhich are released upstream. So-called GIT code available in repositories arent affected, although they do contain second-stage artifacts allowing the injection during the build time. In the event the obfuscated code introduced on February 23 is present, the artifacts in the GIT version allow the backdoor to operate.

The malicious changes were submitted by JiaT75, one of the two main xz Utils developers with years of contributions to the project.

Given the activity over several weeks, the committer is either directly involved or there was some quite severe compromise of their system, Freund wrote. Unfortunately the latter looks like the less likely explanation, given they communicated on various lists about the fixes provided in recent updates. Those updates and fixes can be found here, here, here, and here.

On Thursday, someone using the developer's name took to a developer site for Ubuntu to ask that the backdoored version 5.6.1 be incorporated into production versions because it fixed bugs that caused a tool known as Valgrind to malfunction.

This could break build scripts and test pipelines that expect specific output from Valgrind in order to pass, the person warned, from an account that was created the same day.

One of maintainers for Fedora said Friday that the same developer approached them in recent weeks to ask that Fedora 40, a beta release, incorporate one of the backdoored utility versions.

We even worked with him to fix the valgrind issue (which it turns out now was caused by the backdoor he had added), the Ubuntu maintainer said. "He has been part of the xz project for two years, adding all sorts of binary test files, and with this level of sophistication, we would be suspicious of even older versions of xz until proven otherwise."

Maintainers for xz Utils didnt immediately respond to emails asking questions.

The malicious versions, researchers said, intentionally interfere with authentication performed by SSH, a commonly used protocol for connecting remotely to systems. SSH provides robust encryption to ensure that only authorized parties connect to a remote system. The backdoor is designed to allow a malicious actor to break the authentication and, from there, gain unauthorized access to the entire system. The backdoor works by injecting code during a key phase of the login process.

I have not yet analyzed precisely what is being checked for in the injected code, to allow unauthorized access, Freund wrote. Since this is running in a pre-authentication context, it seems likely to allow some form of access or other form of remote code execution.

In some cases, the backdoor has been unable to work as intended. The build environment on Fedora 40, for example, contains incompatibilities that prevent the injection from correctly occurring. Fedora 40 has now reverted to the 5.4.x versions of xz Utils.

Xz Utils is available for most if not all Linux distributions, but not all of them include it by default. Anyone using Linux should check with their distributor immediately to determine if their system is affected. Freund provided a script for detecting if an SSH system is vulnerable.

Here is the original post:
Backdoor found in widely used Linux utility breaks encrypted SSH connections - Ars Technica

Quantum Encryption: The Vanguard of Digital Safety – yTech

Summary: During the OFC Conference, Toshiba and Ciena presented a groundbreaking secure communications platform employing quantum key distribution, poised to become a fundamental countermeasure against advanced cyber threats, including strategies that leverage the future capabilities of quantum computers.

Amid the mounting concerns over cyber security, a revolutionary technology was unveiled at the recent OFC Conference, signaling a transformative era in cybersecurity with quantum encryption. Toshiba, collaborating with network specialist Ciena, showcased their quantum key distribution (QKD) platform, capable of protecting data transmissions at rapid speeds, a necessity in the metropolitan networks domain.

This technology exemplifies innovation, drawing on the properties of quantum mechanics to enforce powerful security through undecipherable cryptographic keys. The demonstration at the conference illustrated the utilization of Toshibas QKD apparatus in conjunction with Cienas Waveserver 5, culminating in a reinforced, secure transmission network that exemplifies the capability of a Trusted Node system.

Quantum encryptions significance transcends terrestrial limitations. With Verizon experimenting with a quantum-safe virtual network and SpaceX extending quantum key distribution to safeguard satellite communications, the potential applications are as wide as the spectrum of modern communication itself. The absorption of such technology by these sector behemoths indicates a market ready to embrace quantum encryption to counteract potential future cyber-attacks, including those by quantum computers.

Quantum encryption is not without its challenges; from integrating this nascent technology into existing infrastructures to developing standards for universal application. Nonetheless, the market prospects look promising, with increasing investment and research pushing forward this cryptographic frontier.

For further insight into the evolutions of quantum cryptography and other technological advancements, resources such as Toshiba and Ciena provide in-depth knowledge for industry and academic professionals alike. They offer a glimpse into the current technological landscape and the essentials for potential future market dynamics in cybersecurity.

Quantum Encryption Technology: Industry and Market Outlook

The introduction of quantum encryption technology, featuring quantum key distribution (QKD), at the OFC Conference serves as a landmark in the cybersecurity industry. As Toshiba and Ciena navigate the forefront of this space, the implication of their success could redefine how sensitive information is protected across various communication platforms.

The cybersecurity industry is currently faced with the daunting prospect of quantum computer attacks which could render traditional encryption methods obsolete. Herein lies the significance of QKD; it uses the principles of quantum mechanics to create keys which are virtually impossible to intercept without detection. Given the universal importance of data security, this technology has vast implications across numerous sectors, including government, military, financial services, and healthcare.

Market Forecasts for Quantum Cryptography

As quantum technology becomes more tangible, market forecasts reflect an optimistic growth trajectory. Quantum cryptography is expected to experience exponential growth due to the increasing need for secure communications. A report by MarketsandMarkets suggests that the global quantum cryptography market size is expected to grow from an estimated value of USD 89 million in 2020 to USD 214 million by 2025, at a Compound Annual Growth Rate (CAGR) of 19.1% during the forecast period.

This growth is fueled by the rising incidents of cyber threats, government investment in secure communications, and multinational corporations recognizing the urgent need for next-generation security solutions. With companies like Verizon and SpaceX investing in QKD, it indicates a pronounced confidence in its market potential and viability.

Challenges and Advancements in the Quantum Encryption Sector

Despite the markets upward trend, quantum encryption technology is not without hurdles. Key issues include the complexity of integrating this leading-edge technology into existing communication infrastructures and the need for developing universally accepted standards. Additionally, the current reach of QKD is limited in distance, and quantum technologies often require extreme operating conditions, such as very low temperatures, to function effectively.

However, the industry continues to invest heavily in research and development, addressing limitations and enhancing usability. Innovations in QKD systems, such as the Trusted Node system demonstrated by Toshiba and Ciena, hint at a future of more robust and practical quantum-resistant networks that could withstand the capabilities of quantum computers.

For those seeking a deeper understanding of the expanding domain of quantum cryptography and its associated technologies, reputable sites like Toshiba and Ciena can offer a wealth of knowledge. These resources stand as pillars for professionals interested in the ongoing narrative of cybersecurity technology and the market possibilities that it presents. With continuous advancement and the collaboration of tech giants, quantum encryption is becoming an increasingly integral part of the conversation on securing the future of communication.

Leokadia Gogulska is an emerging figure in the field of environmental technology, known for her groundbreaking work in developing sustainable urban infrastructure solutions. Her research focuses on integrating green technologies in urban planning, aiming to reduce environmental impact while enhancing livability in cities. Gogulskas innovative approaches to renewable energy usage, waste management, and eco-friendly transportation systems have garnered attention for their practicality and effectiveness. Her contributions are increasingly influential in shaping policies and practices towards more sustainable and resilient urban environments.

See more here:
Quantum Encryption: The Vanguard of Digital Safety - yTech