Category Archives: Encryption

What Is An SSL Certificate? Everything You Need To Know – Forbes

Table of Contents

Show more Show less

Nothing turns potential customers away from a website faster than a label that reads not secure. Or worse, a screen with a large pop-up that warns, This website might not be secure. Protecting your website with a secure sockets layer (SSL) certificate is the easiest way to prevent this. SSL certificates ensure that the information coming to and from your website is secure.

Featured Partners

1

Namcheap SSL Certificate

Starting Price

Around $5.99/Year (INR 499) onwards

Encryption Level

256-bit or 128-bit encryption

Features

Activate in 4 easy steps and Top-Tier Support

On Namecheap's secure website

An SSL (secure sockets layer) certificate verifies the identity of a website and secures a connection between a web page and a web browser. If you run an e-commerce site and are asking people to input information such as their credit card number, or collect other sensitive information, an SSL certificate ensures that information transmitted to and from your website is encrypted.

Youll know that a website has an SSL certificate installed when HTTPS (Hypertext Transfer Protocol Secure) appears in front of a URL (i.e., https://www.forbes.com/advisor/). Many browsers help you determine if a website has an SSL certificate by displaying a small image of a lock by the URL.

On the other hand, if a website does not encrypt its data youll see a warning sign and the words not secure.

Related: Best Web Hosting Services

The short answer is yes. If you own a website, you should have an SSL certificate. If you are asking users to enter a login username and password, or are collecting private information such as credit card numbers, health data or financial accounts, you need an SSL certificate to ensure the transmission of this data is secure.

Many website owners choose to have an SSL certificate even if they are not collecting sensitive information (such as credit card numbers) because Googles algorithm rewards websites that have them. An SSL certificate also communicates to viewers that their sensitive information (such as credit cards and passwords) is protected on your website. These days, most websites have an SSL certificate.

Its relatively easy to get an SSL certificate and many of the best website builders and web hosting providers even offer them for free. Hosting providers such as GoDaddy and Bluehost offer the ability to buy an SSL directly on their website.

If your site doesnt already have one, you can also use a third-party certificate authority. To research some of the most reliable options with the best prices, read our list of the best SSL certificate services.

There are three different types of SSL certificates: domain validated (DV), organization validation (OV) and extended validation (EV). The one best suited for you will depend on your website and how much security you need.

DV SSL is best for personal project websites and is the least expensive option. It requires that the website owner verify that the domain is registered to the domain owner, which is done through the WHOIS database.

OV SSL is best for business or nonprofit websites, and requires a higher level of verification, so is therefore considered more secure. The SSL certificate issuer verifies the address and location of the owner.

EV SSL is best for e-commerce businesses and businesses exchanging financial data as it offers the most amount of protection. In addition, these certificates offer the highest monetary warranties to any website viewers affected by an SSL failure

If you click on the small image of a lock that appears next to any website with an SSL certificate, youll be able to view some key information about its SSL certificate. Youll see the name of the certificate holder, who it was issued by and the expiration date.

An SSL certificate also contains some details about the issuer of the certificate, a copy of the issuers public key and a digital signature of the certificate issuer.

Featured Partners

1

Namcheap SSL Certificate

Starting Price

Around $5.99/Year (INR 499) onwards

Encryption Level

256-bit or 128-bit encryption

Features

Activate in 4 easy steps and Top-Tier Support

On Namecheap's secure website

An SSL certificate is a digital certificate that encrypts online communication. When a visitor tries to access your website through their web browser, the SSL certificate signals to the browser that your website is secure.

Some website hosting providers offer free SSL certificates. While any SSL certificate is better than none, free SSL certificates typically offer the lowest security level (DV). Additionally, paid SSL certificates often offer a warranty to protect your site visitors against any potential SSL-related security threats, while free versions generally do not.

The price you pay for an SSL certificate will depend on the level of security you need (DV, OV or EV) and whether you need to certify one domain or many. In our list of the best SSL certificate services, prices range from INR 550 per year for DV SSL (for a five-year plan) to INR 18,000 per year (for a six-year plan) for OV SSL. If youre looking to pay per year, you can expect to pay between INR 4,000 and INR 20,000 per year for a DV SSL.

Read more:
What Is An SSL Certificate? Everything You Need To Know - Forbes

NYPD extends radio encryption to Staten Island, blocking public and media access – amNY

Sign up for our amNewYork email newsletter to get news, updates, and local insights delivered straight to your inbox!

The NYPD began encrypting police radio transmissions in Staten Island on Thursday, thereby blocking the public and media from listening to radio transmissions.

The move to block the public from listening to NYPD police radio on Staten Islandthrough encryptionrepresents a continuation of a policy that began in July, when several precincts in Brooklyn went silent. In its latest round, radio transmissions have been encrypted across the four Staten Island precincts including the 123, 122, 121 and 120.

The move to start encrypting calls began last year after the public and press had access to police radio chatter for 90 years. The NYPD says that it has decided to encrypt its radio transmissions as a means to keep the bad guys from listening to its communications. The news industry, however, argues that it will lose access to vital information that is used to keep the public informed about crime and major incidents.

Eight local, state and federal press organizations, led by the New York Media Consortium, have been waging a campaign to compel the NYPD to provide access to police communications, but have received only tacit assurances from officials that access would be explored after encryption is completed in 2025. In the meantime, areas of Brooklyn and the entire borough of Staten Island will be silent in terms of radio transmissions, with police news primarily controlled by the NYPD or obtained through questionable social media sources.

The NYPD issued a statement regarding the implementation of the Staten Island encryption policy.

Currently Staten Island radio zones are being upgraded off dated infrastructure and onto new digital infrastructure. Once completed the Staten Island radio frequencies will be encrypted.

All Staten Island frequencies have now been fully encrypted with the radios updated last week, according to high-placed NYPD sources who are on Staten Island.

The news outlet most dependent on the NYPD radio communications on Staten Island is the Staten Island Advance, with the publicationsExecutive Editor Brian Laline issuing a statement.

We understand the NYPDs need to upgrade a system so many decades old. But to trash the publics right to know in the process is wrong and dangerous. Transparency is essential if the NYPD expects to maintain trust of New Yorkers. Mayor Adams says the bad guys monitor transmissions in the pursuit of doing bad things. That is probably true. But other cities have discovered ways that the good guys continue access to the transmissions in order to keep the public informed about what the bad guys are up to.

Diane Kennedy, president of the New York News Publishers Association of which the Advance is a member, agreed and said encryption is a loss for Staten Island residents and the public as a whole.

It is important for journalists to be able to inform the public of dangerous situations as they are happening and the safety of journalists rushing to cover breaking news events [as to the] risks that lie ahead of them, said Kennedy, whos organization is also part of the Consortium. Many families call Staten Island home and its important that they are afforded accurate immediate information about public safety risks in their neighborhoods.

The New York City Council held a hearing in November where councilmembers criticized the NYPD of its policy to block media access to radio transmissions. NYPD Chief Ruben Beltran, who has presided over the implementation of the program, told the council that media access would not be considered until after the entire city is encrypted, which wont be until at least 2025. Police officials have said any access in the future will be with a delay of up to 30 minutes, eliminating real-time reporting.

Encryption has become a trend throughout the country, with some jurisdictions blocking media access entirely, while others implementing a 1530-minute delayed access.

The Consortium has been calling on the city council to compel the NYPD to provide access to radio transmissions without success. Staten Island councilmembers, including Councilmember Kamillah Hanks who chaired the November hearing, did not respond for comment. The new chair of the Public Safety Committee, Yusef Salaam, an avid police radio listener, did not respond.

A spokesperson for Council Speaker Adrienne Adams, however, issued a statement.

Transparency is key to public safety. Journalists, volunteer first responders, and other key entities across diverse neighborhoods rely on the publicly available radio system to help keep people safe and deliver important information. At a Council hearing on the issue, the NYPD did not specify a plan to integrate stakeholders in their rollout of encrypted radio frequencies, which raises serious public safety and policy concerns.

Queens state Sen. Michael Gianaris introduced legislation in November that would compel all police departments in the Empire State, including the NYPD, to provide real-time unencrypted police radio communications to credentialed members of the media. While press members would get a real-time feed, the general public would have access to a 10-minute delayed broadcast of police communications. An Assembly sponsor has not yet stepped forward to introduce the bill in that chamber.

Preserving access to law enforcement radio is critical for a free press, use by violence interrupters, and the freedoms and protections afforded by the public availability of this information, said Gianaris. As encrypted radio usage grows, my legislation would strike the proper balance between legitimate enforcement needs and the rights and interests of New Yorkers.

Media organizations blasted the latest encryption of police frequencies.

Its a shame that the police department is not informing us, and its wearing away transparency that will result in a reduction in trust from the community, said Bruce Cotler, president of the New York Press Photographers Association and a member of the Consortium. We continue to request that the NYPD find a solution in a timely fashion to allow the press to continue to have access to their communications as we have had for the past 90 years.

Reporters in the field remain the loudest critics of the NYPD encryption policy.

Adam West Balhetchet of Loudlabs News, which provides video and photos to news organizations city-wide, said the elimination of Brooklyn and now Staten Island police radio transmissions will cripple news operations and may even lead to job losses.

So far, weve not had any concrete assurances that the media will be provided access, said Balhetchet. We still dont have access to north Brooklyn frequencies. We do not have access to Staten Islands newly encrypted frequencies. There are alternative ways to get news but none of them are as reliable and consistent as good old-fashioned scanner listening.

Balhetchet lamented not only will the public be left in the dark, but the media industry will be damaged.

My message to anyone who depends on this and does it for a living: Be prepared, have exit strategies and prepare to find work immediately should things go dark, he said.

Visit link:
NYPD extends radio encryption to Staten Island, blocking public and media access - amNY

Fortifying iMessage: Apple’s defense against quantum threats – TechHQ

The imperative for impregnable security measures has reached a crescendo in the ever-accelerating march toward quantum computing dominance. Today, as the quantum supremacy specter looms, the clamor for steadfast cryptographic shields has amplified. So, in a groundbreaking move, Apple has unveiled PQ3, a cutting-edge post-quantum cryptographic protocol tailored for iMessage. Touted by the tech giant as possessing unparalleled security features, PQ3 represents a paradigm shift in communication security.

At the heart of Applesembrace of post-quantum cryptography(PQC) lies a deep understanding of the evolving threat landscape. Simply put, as quantum computing advances, traditional cryptographic methods face unprecedented challenges, making the integration of PQC imperative for safeguarding sensitive data and preserving user privacy.

For context, with their exponential computational power, quantum computers can potentially render existing encryption algorithms obsolete, posing significant risks to data security. Recognizing this, Apple has proactively invested in research and development to pioneer cryptographic solutions capable of withstanding quantum attacks.

Thats where the latest addition to Apples cryptographic arsenal, the PQ3 protocol, represents a paradigm shift in communication security. By introducing a new post-quantum encryption key within the iMessage registration process, Apple ensures that data exchanged through its platform remains protected against future quantum threats. PQ3 also incorporates advanced security features, such as a rekeying mechanism within iMessage conversations, designed to mitigate the impact of critical compromises and bolster overall resilience.

To our knowledge, PQ3 has the strongest security properties of any at-scale messaging protocol in the world, Apples Security Engineering and Architecture (SEAR) team stated in ablog posta week ago.

PQ3 for iMessage integrates post-quantum key establishment and ongoing self-healing ratchets. Source: Apple

Traditionally, messaging platforms rely on classical public key cryptography like RSA, elliptic curve signatures, and Diffie-Hellman key exchange for secure end-to-end encryption. These algorithms are based on complex mathematical problems deemed computationally intensive for conventional computers, even with Moores law in play. But the advent of quantum computingposes a new challenge.

A powerful enough quantum computer could solve these mathematical problems in novel ways, potentially jeopardizing the security of end-to-end encrypted communications. While quantum computers capable of decryption arent yet available (as far as we know, supervillains notwithstanding), well-funded attackers can prepare by exploiting cheaper data storage. They accumulate encrypted data now, planning to decrypt it later with future quantum technologya tactic called harvest now, decrypt later.

When iMessage launched in 2011, it became the first widely available messaging app with default end-to-end encryption. Over the years, Apple has continually enhanced its security features. In 2019, the iPhone maker bolstered the cryptographic protocol by transitioning from RSA to elliptic curve cryptography (ECC) and safeguarding encryption keys within the secure enclave, increasing protection against sophisticated attacks.

Additionally, we implemented a periodic rekey mechanism for cryptographic self-healing in case of key compromise. These advancements underwent rigorous formal verification, ensuring the robustness ofour security measures, the blog post reads. So, the cryptographic community has been developing post-quantum cryptography (PQC) to address the threat of future quantum computers. These new public key algorithms can run on todays classical computers without requiring quantum technology.

Designing PQ3 involved rebuilding the iMessage cryptographic protocol to enhance end-to-end encryption, meeting specific goals:

According to Apple, PQ3 introduces a new post-quantum encryption key during iMessage registration, using Kyber post-quantum public keys. These keys facilitate the initial critical establishment, enabling sender devices to generate post-quantum encryption keys for the first message, even if the receiver is offline.

PQ3 also implements a periodic post-quantum rekeying mechanism within conversations to self-heal from crucial compromise and protect future messages. This mechanism creates fresh message encryption keys, preventing adversaries from computing them from past keys.

The protocol utilizes a hybrid design, combining elliptic curve cryptography with post-quantum encryption during initial critical establishment and rekeying. Rekeying involves transmitting fresh public key material in line with encrypted messages, with the frequency of rekeying balanced to preserve user experience and server infrastructure capacity.

PQ3 continues to rely on classical cryptographic algorithms for sender authentication and essential verification to thwartpotential quantum computer attacks. These attacks require contemporaneous access to a quantum computer and cannot be performed retroactively. However, Apple noted that future assessments will evaluate the need for post-quantum authentication asquantum computing threats evolve.

Apple iPhone 15 series devices are displayed for sale at The Grove Apple retail store on release day in Los Angeles, California, on September 22, 2023. (Photo by Patrick T. Fallon / AFP)

Integrating PQ3 into iMessage signifies a monumental leap forward inprivacy and securityfor iPhone users. With the exponential growth of data and the looming specter of quantum computing, traditional encryption methods face unprecedented challenges. PQ3 mitigates these risks by providing quantum-resistant protection, ensuring that your conversations remain shielded from future threats.

In essence, PQ3s implementation in iMessage demonstrates Apples interest in safeguarding user privacy and staying ahead of emerging security threats. Beyond its robust encryption capabilities, PQ3 introduces a host of additional security features designed to enhance the overall integrity of iMessage. These include secure fundamental establishment mechanisms, cryptographic self-healing protocols, and real-time threat detection capabilities.

By incorporating these advanced security measures, Apple ensures that iMessage remains a bastion of privacy in an increasingly interconnected world.

Support for PQ3 will begin with the public releases of iOS 17.4, iPadOS 17.4, macOS 14.4, and watchOS 10.4. Already available in developer previews and beta releases, PQ3 will automatically elevate the security of iMessage conversations between devices that support the protocol. As Apple gains operational experience with PQ3 globally, it will gradually replace the existing protocol within all sustained conversations throughout the year.

See the original post:
Fortifying iMessage: Apple's defense against quantum threats - TechHQ

Apple Brings Post-Quantum Encryption To iMessages – The Tech Report

Amidst growing cyberattacks, Apple has taken a brand new initiative to protect its iMessage users with a new post-quantum cryptographic protocol called PQ3.

The announcement came through a blog post where the tech giant said that the use of practical quantum computers has made it possible for hackers to launch even more sophisticated attacks. To protect Apple users from these new-age attacks, a new protocol is being integrated into the app.

In their own words, this new encryption will provide Apple users with Level 3 protection which is better than anything other widely-used messaging apps can provide.

To our knowledge, PQ3 has the strongest security properties of any at-scale messaging protocol in the world.Apple blog

Current algorithms that support end-to-end encryption are based on mathematics. For now, these mathematics problems are easy to do in one direction but its almost impossible in the reverse direction.

We can expect to see PQ3 support rolling out with iOS 17.4, macOS 14.4, iPadOS 17.4, and watchOS from the next month.

However, with the rise of quantum computing, reversing mathematical equations will become fairly simple. And if that happens, then end-to-end encryption will be left vulnerable.

Since most messaging platforms rely on end-to-end encryption to keep their users data safe, millions of users will be exposed to data theft. Hence the need for this new-age post-quantum encryption.

Although quantum computing has a long way to go before it reaches that level, its still a matter of concern because hackers can use the harvest now, and decrypt later (HNDL) technique. Under this, they can steal data, encrypt it now, and decode it later when quantum computing becomes a reality for all.

Apple isnt the only company concerned about the threat of quantum computing on data security. Previously, Amazon, Google, and Cloudflare have also voiced support for quantum-resistant encryption in their tools.

Post-quantum cryptography establishes two-step protection. First, it secures the initial key establishment and then the ongoing conversation. The best part is, that even if the cryptography is somehow compromised, it will automatically and quickly restore it.

This technology also focuses on limiting the number of messages that can be decrypted with one compromised key. So at most, the keys are rotated every 50 messages and at least once a week.

After being out of the news for so long in this AI boom, Apple quickly hit the headlines with a series of new-age technologies it was working on.

One of them is Ask. According to reports available as of now, Ask is going to be a lot like ChatGPT but its purpose would be only to offer tech support, especially based on data available in Apples own tech support databases.

It will self-diagnose your device for problems it might be facing and then offer you solutions for the same.

The chatbot is currently under training under Apples own tech support team. What makes this feature even more interesting is that you can ask up to 5 follow-up questions on the same problem.

We dont know when this tool will come out or what will be the device requirements to use this but we can say for sure that by the end of 2024, Apple will emerge as one of the biggest AI leaders in the industry.

Visit link:
Apple Brings Post-Quantum Encryption To iMessages - The Tech Report

Apple buffs up iMessage security with quantum computer-proof encryption – Android Authority

Dhruv Bhutani / Android Authority

TL;DR

Todays encryption is good enough to defend against most encryption cracking attempts. But will todays encryption hold up when pitted against more powerful computers in the future? Apple is not waiting to find out and is updating the security protocol for its messaging app to handle attacks from quantum computers.

According to Bloomberg, Apple is introducing a new form of encryption meant for iMessage called PQ3 cryptographic protocol. This new encryption layer will work alongside the companys existing encryption tools.

PQ3 was designed to prevent whats known as harvest now, decrypt later attacks. This is an attack where the perpetrator like a nation-state hacker extracts as much encrypted data as they can get. They then sit on that data, waiting for a future when quantum computers are powerful and reliable enough to crack the encryption.

The day when quantum computers become capable enough to tear through most encryption is referred to by experts as Q-day. Theres no agreement on when Q-day will arrive, with some believing it could happen in the coming decades. Given that Apple is taking this precaution now suggests that the company believes this day will come sooner than later.

Read more:
Apple buffs up iMessage security with quantum computer-proof encryption - Android Authority

What Is Apple PQ3 Protocol And How Will It Affect IMessage? – Dataconomy

The tech giant has revealed its new Apple PQ3 protocol for iMessage, a proactive response to the looming threat of quantum computing.

Traditional encryption methods, which protect vast amounts of online data, are vulnerable to the incredible power of future quantum computers. Apple PQ3 protocol dramatically redefines iMessage security with cutting-edge technologies designed to withstand these advanced attacks, ensuring your conversations remain private even as technology evolves.

The revolutionary Apple PQ3 protocol represents a quantum leap in secure messaging. It is a meticulously designed system that employs a combination of traditional and cutting-edge post-quantum encryption technologies to safeguard iMessage conversations from current and future threats.

A sufficiently powerful quantum computer could solve these classical mathematical problems in fundamentally different ways

This statement from Apples blog post on the Apple PQ3 protocol highlights the core vulnerability of traditional encryption. Classical algorithms like RSA and Elliptic Curve Cryptography, while secure against current computers, could succumb to the extraordinary power of quantum computers. PQ3 addresses this proactively.

Attackers can collect large amounts of todays encrypted data and file it all away decrypt it in the future

Apples PQ3 directly counters the Harvest Now, Decrypt Later strategy. By ensuring encryption keys are regularly updated and self-healing, the protocol limits the value of any data an attacker might harvest, even if they one day obtain a powerful quantum computer.

PQ3 is the first messaging protocol to reach what we call Level 3 security providing protocol protections that surpass those in all other widely deployed messaging apps

Apple isnt merely adopting post-quantum cryptography; they are raising the bar for secure messaging. PQ3s Level 3 protection distinguishes it by actively and continuously defending against both current and future attacks.

We rebuilt the iMessage cryptographic protocol from the ground up to introduce post-quantum cryptography and mitigate the impact of key compromises

PQ3 isnt a simple patch. Apple completely redesigned their cryptographic protocol to seamlessly weave in these advanced protections. Key compromises are a reality, so PQ3s ability to self-heal and limit the fallout is crucial.

We then include a periodic post-quantum rekeying mechanism that self-heals from key compromise and protects future messages

This periodic rekeying is at the heart of PQ3s power. By introducing fresh encryption keys on a regular basis, the protocol maintains its security even if an adversary compromises one key.

The fundamental impact of PQ3 is future-proofing iMessage against the threat of quantum computers. Even if powerful quantum machines become capable of cracking traditional encryption, PQ3 will safeguard your conversations.

According to their statements, Apple has carefully designed PQ3 to minimize any impact on the user experience. While increased security often comes with a performance trade-off, Apple aims to make the transition to PQ3 as smooth as possible for users.

Apples implementation of PQ3 puts them at the forefront of secure communication innovation. But one simple question remains: Can iMessage tackle WhatsApp now?

Two of the most popular messaging platforms in the world prioritize the security and privacy of their massive user bases. As technology continues to evolve, the methods used to safeguard our online communication must adapt to meet new and sophisticated threats. Understanding the different security approaches used by these messaging giants can empower users to make informed choices about how they protect their digital lives.

Apple PQ3 protocol introduces a significant change in how the company approaches message encryption. Its rekeying mechanisms and hybrid design aim to provide superior protection against both current and future threats. WhatsApp, also known for its strong security, relies on different methods and has yet to publicly announce a similar shift toward post-quantum cryptography.

WhatsApp prioritizes user transparency and control through its Auditable Key Directory. This feature allows users to manage their encryption keys with more granularity. Apple offers a comparable feature with Contact Key Verification, although it currently has a narrower scope.

Apples bold move to incorporate the Apple PQ3 protocol highlights their commitment to proactive security measures, anticipating the potential of quantum computing to disrupt established encryption. WhatsApp could follow suit in the future, potentially leveraging its centralized infrastructure to streamline the adoption of similar security enhancements.

Lastly, users should note that platform choice matters. WhatsApp functions across both iOS and Android, while iMessage remains exclusive to Apple devices. This compatibility factor, alongside security considerations, will help users determine the messaging platform that best aligns with their needs.

Featured image credit: Volodymyr Hryshchenko/Unsplash.

See the original post:
What Is Apple PQ3 Protocol And How Will It Affect IMessage? - Dataconomy

iMessage gets a major makeover that puts it on equal footing with Signal – Ars Technica

iMessage is getting a major makeover that makes it among the two messaging apps most prepared to withstand the coming advent of quantum computing, largely at parity with Signal or arguably incrementally more hardened.

On Wednesday, Apple said messages sent through iMessage will now be protected by two forms of end-to-end encryption (E2EE), whereas before, it had only one. The encryption being added, known as PQ3, is an implementation of a new algorithm called Kyber that, unlike the algorithms iMessage has used until now, cant be broken with quantum computing. Apple isnt replacing the older quantum-vulnerable algorithm with PQ3it's augmenting it. That means, for the encryption to be broken, an attacker will have to crack both.

iMessage and Signal provide end-to-end encryption, a protection that makes it impossible for anyone other than the sender and recipient of a message to read it in decrypted form. iMessage began offering E2EE with its rollout in 2011. Signal became available in 2014.

One of the biggest looming threats to many forms of encryption is quantum computing. The strength of the algorithms used in virtually all messaging apps relies on mathematical problems that are easy to solve in one direction and extremely hard to solve in the other. Unlike a traditional computer, a quantum computer with sufficient resources can solve these problems in considerably less time.

No one knows how soon that day will come. One common estimate is that a quantum computer with 20 million qubits (a basic unit of measurement) will be able to crack a single 2,048-bit RSA key in about eight hours. The biggest known quantum computer to date has 433 qubits.

Whenever that future arrives, cryptography engineers know its inevitable. They also know that its likely some adversaries will collect and stockpile as much encrypted data now and decrypt it once quantum advances allow for it. The moves by both Apple and Signal aim to defend against that eventuality using Kyber, one of several PQC algorithms currently endorsed by the National Institute of Standards and Technology. Since Kyber is still relatively new, both iMessage and Signal will continue using the more tested algorithms for the time being.

View original post here:
iMessage gets a major makeover that puts it on equal footing with Signal - Ars Technica

Quantum computer-proof encryption: Apple completely changes the security of iMessage – Softonic EN

Apple has made a before and after in the history of cybersecurity with the announcement of PQ3, its new post-quantum cryptography protocol specifically designed for iMessage. A significant breakthrough in the protection of digital communications that sets a new security standard, surpassing by far all other existing protocols in commercial messaging applications.

With the slow but inexorable arrival of the enormous potential of quantum computers, conventional cryptographic protocols based on complex mathematical problems could be compromised. These future computers promise exponentially greater computing power than even supercomputers can currently provide, making them capable of breaking cryptographic measures that are considered practically indestructible with current machines.

This is where Apples PQ3 protocol comes into play. Designed to be resistant to attacks from future quantum computers, PQ3 anticipates and protects iMessage communications against the attack known as Harvest now, decrypt later. This type of attack is based on the collection and storage of large volumes of encrypted data, currently inaccessible, with the hope of decrypting it in the future, once quantum computers become available. According to Apple, given the reduction in data storage costs, this threat is more real than we might imagine.

Apple describes PQ3 as the messaging protocol with the most robust security properties in the world, capable of guaranteeing security both in the initial key establishment and in the continuous exchange of messages. With it, iMessage will not only be invulnerable to current attacks, but also to future ones.

The implementation of PQ3 will gradually begin in March, with the updates of iOS 17.4, iPadOS 17.4, macOS 14.4, and watchOS 10.4, and it is already present in the latest beta versions of these updates. Apple plans to completely replace the current cryptographic protocol of iMessage with PQ3 in all compatible conversations throughout the year. However, this requires that all devices in the conversation are updated, at least, to the mentioned software versions.

Apples move towards post-quantum cryptography with PQ3 is undoubtedly great news. At a time when privacy and security of digital communications are becoming increasingly critical, initiatives like these partly made possible by the fact that DMA will not affect iMessage are essential to protect personal and corporate information that passes through these services. Although quantum computers are still mainly in the theoretical realm, preparing against their potential threats is a prudent maneuver. One that not only secures the present of iMessage, but also safeguards its future, marking a milestone in the evolution of security in our communications.

Read more here:
Quantum computer-proof encryption: Apple completely changes the security of iMessage - Softonic EN

Unlocking the Airwaves: Illinois Bill Seeks Media Access to Encrypted Police Scanners – WspyNews

SPRINGFIELDIllinois state Rep. LaShawn K. Ford (D-Chicago) has introduced legislation which would require any law enforcement agency in Illinois which encrypts police scanner transmissions to provide real time access to those transmissions to accredited media in the state.

House Bill 4339amends the Public Records Act to require that any law enforcement agency that encrypts radio transmissions provide, by license or otherwise, access to those transmissions to FCC licensed broadcasters and accredited newspapers as defined in the Act.

Under the administration of former Chicago Mayor Lori Lightfoot, the Chicago Police Department instituted a program designed to encrypt police scanner transmissions across all police districts in the city.

I understand the desire to prevent members of the public from using real time police scanner information to commit crimes or to evade law enforcement, Rep. Ford said. However, the media has an obligation to report on events in a timely manner and its use of real time information from police scanners is essential.Blocking accredited media from real time access is counter to governmental transparency and does not lend itself to the original stated purpose of the encryption program.

Rep. Ford noted that his proposed legislation would apply to jurisdictions across Illinois.Several downstate law enforcement departments have also instituted encryption programs.

The Illinois Press Association and Illinois Broadcasters Association support the passage of the bill.

Continue reading here:
Unlocking the Airwaves: Illinois Bill Seeks Media Access to Encrypted Police Scanners - WspyNews

Self-destructing USB flash drive set to go on sale and while it comes without encryption, at least there’s no finger … – TechRadar

If you're the sort of person who needs to carry sensitive data around with you and worry about it falling into the wrong hands, you might be interested in a new USB flash drive with a self-destruct feature which is set to go on sale later this year.

The Ovrdrive USB, developed by Ryan Walker of Interrupt Labs, is a unique device that heats its flash chip to over 212 degrees Fahrenheit (100 degrees Celsius) as a security measure.

The first version of the Ovrdrive USB required wet fingers to activate the drive, a feature that has thankfully since been removed. It now instead requires a secret three-insertion process to unlock the data safely. If this process is not followed, the drive's partition remains hidden, making it appear broken (the drive was originally designed to self-destruct instead, but this proved too challenging for mass production).

Ovrdrive USB's self-destruct mechanism reverses the voltage supplied to the device, heating it to around 100 degrees Celsius. While this may not be hot enough to destroy the flash chips, users can add a compound (not supplied for obvious reasons) to ensure complete self-destruction.

Unlike other security-focused flash drives, the Ovrdrive USB does not encrypt its contents by default, making it legal in countries where encryption is banned. If you need added protection, you can easily encrypt the USB drive yourself using Windows' BitLocker or the open-source VeraCrypt.

The Ovrdrive USB is currently being crowdfunded on Crowd Supply, with a release date set for August 2024. It is priced at $69 with free US domestic shipping (or $12 international shipping) and is currently 104% funded with 22 days of the campaign remaining.

While the Ovrdrive USB is not a replacement for the security offered by cryptographic encryption, it is undeniably very cool, with a unique physical security feature that wouldn't look out of place in a Mission Impossible movie.

Go here to read the rest:
Self-destructing USB flash drive set to go on sale and while it comes without encryption, at least there's no finger ... - TechRadar