Category Archives: Encryption
Special Google Messages icon for iOS-Android RCS chats has been removed – PhoneArena
With iOS 18 developer beta 2 installed, iPhone users subscribed to AT&T, T-Mobile, or Verizon can start messaging with their Android packing pals, relatives, and co-workers using RCS. This brings features such as read receipts, typing indicators, high-quality images, and videos to chats between iOS and Android users. Some of these features haven't been working yet, typical for a beta release. Apple iPhone-Android RCS messages do not support end-to-end encryption at the moment which had been indicated on Google Messages by a lock icon with a slash through the icon. Google Messages has its own end-to-encryption for one-to-one and group chats that Apple is not supporting. The icon itself was seen underneath each message sent and received over Google Messages when an Android user was chatting to an iPhone user with RCS support. If you're wondering why I'm writing this in the past tense, it's because, as of today, the 'no end-to-end encryption' icon has disappeared from Google Messages.
In the red box on the left is the 'no end-to-end encryption' icon which is removed on the right|Image credit-9to5Mac
Out of all of the improvements that iPhone and Android users will experience with the features available to them with the iOS support of RCS, perhaps the best is the way images and videos sent and received will appear. Previously, when iPhone and Android users had to message each other using SMS and MMS, shared pictures were often blurry and out of focus. Videos were hard to view, too. But that can come to an end right now if you feel like gambling on installing the iOS 18 developer beta.
With the drop in battery life and the typical iOS beta bugs, you might be better served by waiting for the stable version to be released later this year. By then, we might see iOS add Google Messages' end-to-end encryption with its RCS support.
Read more:
Special Google Messages icon for iOS-Android RCS chats has been removed - PhoneArena
Your data could be leaked in five years – here’s why – Tom’s Guide
The invention of quantum computers poses a global threat to internet security. This is because they have the processing power necessary to break the majority of the encryption algorithms that currently protect most of the worlds data. They achieve this by using quantum physics to perform a lot more efficiently than traditional supercomputers.
Before you panic, its worth noting that, as it stands, quantum computers are only being used for research purposes, so youre unlikely to find one outside of a research center, such as a university, research lab, or supercomputer center. But experts are predicting that at some point in the next five years, this will change and quantum computers will start being used to break the encryption that has, up until now, kept most of the sensitive data on the internet from being hacked. This event is referred to as Q-day.
When this happens, everything from photos, private emails, and medical records to government files, business documents, and banking details will be vulnerable. So its likely to have huge and far-reaching consequences, causing political, financial, and social chaos around the world. It will also make it much easier to scam unsuspecting victims, as hackers will be able to use private details to make phishing scams a lot more believable.
Thankfully, there is a way you can protect your data from Q-day. Cyber security experts have already developed a range of post-quantum algorithms that will offer sufficient data protection against quantum computers. This level of security is available now to anyone. All you need to do is sign up for a VPN with post-quantum encryption.
Well use this article to explain the risks in much more detail and recommend VPNs you can get right now that already come future-proofed with robust post-quantum protection. So read on to learn all you need to know.
At the moment, your data should be fairly secure, particularly if you use a reputable VPN to encrypt your traffic. However, it might not stay that way for long, as quantum computers pose a significant cyber security threat to most online data. This is because these machines use quantum physics to make their computations infinitely more efficient than those of a traditional supercomputer.
Referred to as Q-day, experts are predicting that this day will happen at some point in the next five years. So while your data is probably safe for the time being, it probably wont be secure once Q-day happens.
Upgrade your life with a daily dose of the biggest tech news, lifestyle hacks and our curated analysis. Be the first to know about cutting-edge gadgets and the hottest deals.
If you rely on traditional forms of encryption, Q-day will jeopardize all your online information. This includes everything from your documents, photos, and emails to your banking details, work documents, and your internet search history.
However, its important to know that your data doesnt have to be compromised. There are already post-quantum algorithms to protect against attacks from quantum computers. You can get this level of security today by signing up to a VPN that offers post-quantum encryption. Weve recommended our favorite picks further down the page.
While Q-day cant be prevented as such, given that quantum computers will become more powerful and more widely used, the impact of it can be dramatically reduced. To achieve this, experts have been working on post-quantum encryption. As the name suggests, this is a form of cryptography thats powerful enough to protect against hacks from quantum computers.
Q-day is predicted to happen at some point in the next five years. So, while the threat isnt necessarily imminent, its a very sensible idea to prepare for Q-day by securing your data with quantum-resistant encryption. This type of security is already available from a select number of VPN providers, so you can safeguard your data from today.
There are several different types of post-quantum algorithms that can protect your data from quantum computers and prevent your data from Q-day.
The best thing you can do to protect your data from quantum computer attacks that will happen on Q-day and beyond is to use a VPN that comes with post-quantum encryption. These algorithms have been specifically designed to be unbreakable, even by quantum computers, meaning that they can give the required level of protection to guard against Q-day.
But its important to note that not all VPNs (even the best VPNs) offer post-quantum protection. In fact, the majority of providers havent yet built this into their protocols. So even if you use a VPN, its quite possible your data will be vulnerable to attack by quantum computers.
Q-day is predicted to happen at some point in the next five years. So while the threat might not be immediate, its important to protect your data against Q-day, as we dont yet know when its going to happen. So the most prudent thing you can do is sign up for a VPN that offers post-quantum encryption. This is especially important if youre looking to save money by signing up for a long-term subscription. That way, no matter when Q-day happens, your data will be protected.
As we mentioned, there are a select number of VPNs with post-quantum encryption that will future-proof your cyber security. Here, weve compiled a list of reputable ones that will keep your data safe from Q-day. Well also explain what type of encryption each VPN uses to help you make an informed choice.
If youve read any of our other VPN guides, youll be used to seeing ExpressVPNs name being mentioned as one of the very best VPNs. This is largely because of its ability to deliver market-leading security, along with fast speeds, and a great user experience. But, unlike a lot of its direct competitors, ExpressVPN stands out by offering quantum-resistant encryption, thereby giving users much more sophisticated protection than youd find on most other providers.
As with most VPNs, ExpressVPN uses AES 256-bit encryption, which is sufficient to protect against attacks from classical computers. But it also goes a step further with its very own open-source Lightway protocol, which has built-in post-quantum algorithms. These are too powerful to be broken by quantum computers.
If this isnt enough to put your mind at ease, the Lightway protocol has undergone independent auditing twice in the last couple of years by Cure53. It passed both with flying colors, therefore proving that its every bit as secure as ExpressVPN has claimed.
You might be concerned that such sophisticated encryption might slow down any traffic using the Lightway protocol. But actually, it performed really well in our speed tests, coming in at 410 Mbps. This speed will be more than fast enough for anything youd want to do online, including streaming, online gaming, and video editing.
But the Lightway protocol isnt the only reason why ExpressVPN comes so highly recommended. It also delivers everything else you could want from a VPN, including the ability to unblock region-restricted content with ease, as well as helpful customer support, and a fleet of strong servers.
QSTVPN has integrated post-quantum encryption into its VPN connections to protect user data from quantum computers, as well as classical computers. So its a great choice if youre looking to keep your data safe now and into the future.
Despite its additional security, QSTVPN delivers fast and reliable speeds that will lead to a smooth online experience.
If youre concerned about cyber security in a post-Q-day world, QAL VPN could be the perfect solution to protect your business from hackers. It offers a number of post-quantum algorithms to provide plenty of protection against quantum machines. The provider utilizes three lattice-based algorithms, as well as its SPHINCS+ cryptography, which uses hash-based functions. So its definitely one of the most future-proofed business options around.
However, because its a VPN designed for large businesses, its probably not the ideal solution if you want one for individual use. But if youre looking for something to protect your organization from the ramifications of Q-day, it could be the ideal choice for you.
If youre primarily a desktop user, Mullvad will provide you with sophisticated post-quantum encryption for your Windows, MAC, or Linux machine. It does this by incorporating quantum-resistant tunnels in all its WireGuard protocols for its desktop app with Kyber and Classic McEliece post-quantum algorithms.
If youre concerned about leaving your other devices vulnerable, dont worry because Mullvad is already working on rolling out this level of security for its iOS and Android apps. Customers signing up for a Mullvad subscription should have post-quantum protection across all their devices long before Q-day happens.
Mullvads encryption shares a secret in a way thats too sophisticated for a quantum computer to be able to decipher. Once this has been shared, that tunnel will be disconnected and a new one will be opened with the new shared secret.
You wont go far wrong with Mullvad as your VPN provider because, in addition to its post-quantum algorithms, it also delivers fast speeds and total customer anonymity.
Windscribe is a strong VPN with plenty of security features, fast speeds, and content-unblocking capabilities. On top of this, it also uses the WireGuard protocol to generate unique pre-shared keys for each user that are quantum-resistant.
Even if a quantum computer were able to decrypt these keys, which is extremely unlikely, it would be unable to interpret the traffic. Therefore, it will keep your data hidden from any hacks past Q-day.
Quantum computers pose a potentially catastrophic threat to online security. Once these machines are powerful enough and begin being used outside of research labs, they will have the power and the capability to break the encryption that protects most of the data on the internet. This event is known as Q-day and experts are predicting that this could happen at any time in the next five years.
Luckily, there are already some post-quantum algorithms that are strong enough to protect your data against this threat. All you need to do is sign up for a VPN that offers this level of security, such as ExpressVPN, Windscribe, or Mullvad.
Post-quantum encryption is a form of cyber security thats powerful enough to protect your data from attacks by quantum computers. There are a few different types of post-quantum cryptography that are currently available, such as lattice-based, hash-based, and code-based algorithms. If you want this level of protection, use a VPN that has built it into its protocols, such as Mullvad, ExpressVPN, or Windscribe.
Although quantum computers dont currently pose a security threat, as theyre only being used in research labs right now, there will come a day when theyre strong enough to break most of the worlds encryption.
Referred to as Q-day, this event will wreak havoc across the world and could effectively render VPNs obsolete, as theyll no longer be able to protect user data. That is unless VPNs incorporate post-quantum encryption into their protocols. Some VPNs have already done this, such as ExpressVPN, Mullvad, and Windscribe. If other providers follow suit, quantum computers wont be able to decrypt the protection offered, meaning that they can no longer pose a threat to VPNs.
Read more:
Your data could be leaked in five years - here's why - Tom's Guide
SandboxAQ Joins the FIDO Alliance to Further Drive the Use of Secure Protocols instead of Passwords – IT Security Guru
SandboxAQ has announced its membership in the FIDO Alliance, an open industry consortium focused on minimizing the worlds dependence on passwordsa prevalent source of security and usability problems. By joining forces with prominent FIDO Alliance members such as Amazon, Apple, Google, Intel, Microsoft, RSA, VISA, Yubico, and others, SandboxAQ aims to enhance and advance the FIDO2 protocol.
At SandboxAQ, we recognize the intrinsic connection between Modern Cryptography Management and contemporary user authentication protocols like FIDO. The FIDO Alliance champions the creation and adoption of open standards for user authentication that rely on cryptographic keys and protocols, rather than traditional passwords.
We are excited to join the FIDO Alliance in its mission to provide secure user authentication. We look forward to applying our research and expertise to evolve the specifications and ensure continued security in the quantum era, said Carlos Aguilar Melchor, Chief Scientist of cybersecurity at SandboxAQ.
The FIDO Alliance welcomes SandboxAQ to its growing roster of identity cybersecurity experts dedicated to protecting the worlds most sensitive data through the use of stronger authentication solutions that eliminate reliance on passwords, said Andrew Shikiar, CEO of the FIDO Alliance. Contributions of SandboxAQs expertise in encryption management and post-quantum security stand to help the FIDO Alliance ensure web authentication remains secure against current and future cyber threats, including those posed by quantum computers.
SandboxAQ is committed to modernizing cryptography management through its AQtive Guard platform. This platform enables enterprises to identify and manage vulnerable cryptographic algorithms and keys with unprecedented scale and precision across their entire IT infrastructure, leveraging AI techniques and modern monitoring and deployment frameworks. Cryptography management often involves hardware components that are harder to upgrade and less agile than software solutions.
The FIDO2 protocol exemplifies this hardware dependency, offering secure, passwordless authentication for web applications using hardware tokens with cryptographic credentials. While these tokens provide high security, they cannot be easily updated with newer hardware. FIDO solutions are extensively used by large organizations like Google and Cloudflare for employee authentication and are available to consumers for secure access to services on platforms such as Apple, Google, and Microsoft. The FIDO2 protocol is also used for secure access to health services, government services, and financial applications.
A recent FIDO Alliance white paper on addressing the quantum threat outlines two primary objectives: selecting the most appropriate post-quantum cryptographic algorithms and ensuring a seamless transition to post-quantum security. The R&D team at SandboxAQs Cybersecurity Group has made significant contributions in this area, analyzing the (post-quantum) security and privacy of the FIDO2 protocol and its attestation modes and open-sourcing the first end-to-end post-quantum secure FIDO2 implementation. SandboxAQ is enthusiastic about collaborating with the FIDO Alliance to ensure web authentication remains secure in the face of quantum computing threats.
See the original post here:
SandboxAQ Joins the FIDO Alliance to Further Drive the Use of Secure Protocols instead of Passwords - IT Security Guru
Information encoding and encryption in acoustic analogues of qubits | Scientific Reports – Nature.com
A logical phi-bit was generated by replicating the experimental arrangement described in10, the setup consisted of three aluminum rods, approximately 60cm long, arranged in a linear array with a lateral gap of 2mm filled with epoxy. Transducers were used to drive and detect the acoustic field at the ends of the rods. The waveguides are labeled 1, 2, and 3, where waveguide 2 is sandwiched between waveguides 1 and 3. Two driving transducers located on waveguide 1 and waveguide 2 were excited with sinusoidal signals at the primary frequencies ({f}_{1}) and ({f}_{2}), respectively. The third waveguide was not driven. The driving transducers were connected to different function generators and amplifiers and were driven with the same peak-to-peak voltage of 80V. Three detecting transducers were connected to an oscilloscope to measure the voltage (displacement field) generated at the other ends of the waveguides. The detected temporal signals are fast Fourier transformed (FFT) to produce a power spectrum. In the spectral domain, we observed strong peaks associated with the primary frequencies as well as weaker peaks associated with nonlinear vibrational modes supported by the inherently nonlinear system. A logical phi-bit,i, is defined as a nonlinear mode in which frequency can be written as a linear combination of the primary frequencies:
$${F}^{(i)}=p{f}_{1}+q{f}_{2}$$
(1)
where p and q are integer coefficients.
A single logical phi-bit i is characterized by its frequency but also the corresponding relative phases between the acoustic waveguides. The relative phases between waveguides 1 and 2 and between waveguides 1 and 3 at the phi-bit frequency, ({F}^{(i)}), are written as the phase difference ({varphi }_{12}^{(i)}={varphi }_{2}^{(i)}-{varphi }_{1}^{(i)}) and ({varphi }_{13}^{(i)}={varphi }_{3}^{(i)}-{varphi }_{1}^{left(iright)}), respectively. Here, the phase of the nonlinear mode at the end of waveguide 1 is used as a reference.
The two-phase differences serve as degrees of freedom for representing a logical phi-bit as a two-level system that may be characterized as a 21 vector with complex components. Within this representation, a logical phi-bit is analogous to a qubit. Notably, logical phi-bits co-exist in the same physical space, that is, the space of the physical system. Since logical phi-bits are nonlinear vibrational modes generated from the same driving frequencies, their associated phase differences are correlated to each other. Subsequently, the two-level system representations of multiple phi-bits are also strongly correlated and can be simultaneously manipulated by tuning the driving conditions of the system. Effectively, the state of N logical phi-bits may be represented as a 2N1 complex vector spanning an exponentially scaling space (i.e., a Hilbert space). The representation of the N phi-bit state depends on the choice of the basis of the Hilbert space. The strong nonlinear coupling between the phi-bits enables manipulation of the component of this large complex vector in a parallel manner by changing the driving conditions. Furthermore, the components of the large multi-phi-bit state vector can be used to encode information. Parallel manipulation of these components can be used to encrypt the encoded information. The inverse manipulation can also be used to decrypt the encrypted information in an efficient manner.
We illustrate this encryption method in the case of a N=5 phi-bit system. For this, the driving frequencies are taken as ({f}_{1}=62,text{kHz}) and ({f}_{2}=66,text{kHz}). We tune ({f}_{1}) by increments of (Delta nu left(nright)=left(n-1right)*50,text{Hz}) with (nin [text{1,81}]), thus spanning a range of frequency of 0 to 4kHz.
We are considering phi-bits 1 through 5 with corresponding values p and q of (5, 4), (4, 3), (1, 2), (1, 1), and (4, 1), respectively. The phi-bits are selected at random which indicates randomness of the p and q values. In Fig.1a, we report experimentally measured ({varphi }_{12}^{left(iright)}(Delta nu )) and ({varphi }_{13}^{left(iright)}(Delta nu )) for the five selected phi-bits. We note that the phase differences exhibit two different behaviors. The first behavior is associated with a common monotonous variation of the phase differences. The second behavior which is only occurring in the case of phi-bits 4 and 5 takes the form of sharp 180 ((pi)) jumps. The possible physical origin of these two behaviors has been discussed at length in references14. Here we focus on the first behavior by correcting the phase differences by the (pi) jumps to obtain continuous variations for all phi-bits. Moreover, in the case of the first behavior we have shown in15 that the phase differences of the phi-bits relate to the phase differences at the primary frequencies in a linear manner. Indeed, we can write.
$${varphi }_{12}^{left(iright)}left({f}_{1}+Delta nu ,{f}_{2}right)=p{varphi }_{12}left({f}_{1}+Delta nu right)+q{varphi }_{12}left({f}_{2}right)$$
(2a)
$${varphi }_{13}^{left(iright)}left({f}_{1}+Delta nu ,{f}_{2}right)=p{varphi }_{13}left({f}_{1}+Delta nu right)+q{varphi }_{13}left({f}_{2}right)$$
(2b)
where p and q are the same coefficients as in Eq.(1).
(a) Experimentally measured ({varphi }_{12}^{left(iright)}(Delta nu )) and ({varphi }_{13}^{left(iright)}(Delta nu )) for the five phi-bits i=1,5. (b) Rescaled and corrected ({varphi }_{12}^{left(iright)}(Delta nu )) and ({varphi }_{13}^{left(iright)}(Delta nu )). See text for details.
In Fig.1b, we rescale the corrected phase differences of the phi-bits by the factor p only, since the ({varphi }_{12}left({f}_{2}right)) and ({varphi }_{13}left({f}_{2}right)) remain constant. The rescaled and corrected phase differences of the five phi-bits behave simultaneously in the same manner. The vertical offset is simply due to the constant ({qvarphi }_{12}left({f}_{2}right)) and ({qvarphi }_{13}left({f}_{2}right)).
Each phi-bit, i, is represented in a two-dimensional Hilbert space, taking the form reminiscent of a Bloch sphere representation:
$$V^{left( i right)} = left( {begin{array}{*{20}c} {sin left( {beta^{left( i right)} } right)} \ {e^{{igamma^{left( i right)} }} cos left( {beta^{left( i right)} } right)} \ end{array} } right).$$
(3)
In that representation, for the sake of simplicity, we assume (gamma^{left( i right)} = 0), and
$$beta^{left( i right)} left( {Delta nu left( n right)} right) = Kleft( {varphi_{12}^{left( i right)} left( {Delta nu left( n right)} right) - varphi_{12}^{left( i right)} left( {Delta nu left( {n = 1} right)} right)} right) + frac{3pi }{4}$$
(4)
To address the offset in the rescaled and corrected phases of Fig.1b we use ({varphi }_{12}^{(i)}left(Delta nu left(n=1right)right)) as origins as well as the reference for encoding information. In Eq.(4), K is a scaling factor to amplify the range spanned by ({varphi }_{12}^{(i)}). For the sake of simplicity, we have made ({beta }^{left(iright)}) a function of ({varphi }_{12}^{(i)}) only, other forms could be defined as function of ({varphi }_{12}^{(i)}) and ({varphi }_{13}^{(i)}) offering an extra degree of freedom in the manipulation of the phi-bit state vector. At the driving frequency ({f}_{1}=62,text{kHz} ,,text{and},, n=1), ({beta }^{left(iright)}=frac{3pi }{4}) and
$$V^{left( i right)} = frac{1}{sqrt 2 }left( {begin{array}{*{20}c} 1 \ { - 1} \ end{array} } right).$$
(5)
Let us consider a system made of five phi-bits, we can define the state of the system as the tensor product of the phi-bits:
$$V = V^{left( 1 right)} otimes V^{left( 2 right)} otimes V^{left( 3 right)} otimes V^{left( 4 right)} otimes V^{left( 5 right)} .$$
(6)
This tensor product evaluated at the reference driving frequency takes the form:
$$V^{T} = frac{1}{{2^{5/2} }}left[ {1,, - 1,,- 1,,1,,- 1,,1,,1,,- 1,,- 1,,1,,1,,- 1,,1,,- 1,,- 1,,1,,- 1,,1,,1,,- 1,,1,,- 1,,- 1,,1,,1,,- 1,,- 1,,1,,- 1,,1,,1,,- 1} right].$$
(7)
We now consider a new representation of the five phi-bit state vector,
$$widehat{V}= frac{left(1+ {V}^{{prime}T}right)}{2}= left[1,,0,,0,,1,,0,,1,,1,,0,,0,,1,,1,,0,,1,,0,,0,,1,,0,,1,,1,,0,,1,,0,,0,,1,,1,,0,,0,,1,,0,,1,,1 0right]$$
(8)
where ({V}^{{prime}T}={{2}^{5/2}V}^{T}).
This new representation of the five phi-bit state corresponds to a change of basis of the Hilbert space. While the vector V is separable, the vector (widehat{V}) is not separable into a tensor product of single phi-bit states. In quantum information science non-separability of multiple qubit states is necessary for establishing quantum correlations between the qubits. In the case of phi-bit based information science, the components of a multi-phi-bit state vector such as Eq.(7) are correlated via the nonlinearity of the physical system. The string of correlated ones and zeros in (widehat{V}) can therefore be employed to encode a message as well as encrypt that message by applying a unitary transformation on (widehat{V}). Here we illustrate this encryption process in the case of a short message encoded using 5 phi-bits. In general, the state vector (widehat{V}) of a N phi-bit system is a 2Nx1 vector with 1 and 0 elements providing sufficient bits for encoding very long messages when N is large. For instance, when N=50 the number of bits available for encoding a message is on the order of 1015. The encryption of a message encoded on this large number of bits would only require a change in the driving condition of the array of waveguides to achieve the encrypting unitary transformation. Such an operation takes approximately a millisecond on the physical system used here, since the speed of sound in the constitutive materials is on the order of a few thousand meters per second.
Odaseva nabs $54M for its Salesforce data protection platform – SiliconANGLE News
Odaseva Technologies SAS, a startup with a platform that helps enterprises encrypt and back up the data they keep in Salesforce, has closed a $54 million funding round.
The company detailed in its announcement of the raise today that Silver Lake Waterman was the lead investor. F-Prime, Eight Roads, Serena Capital, Eurazeo and Crescent Cove chipped in as well. The round, a Series D investment, brings Odasevas total outside funding to more than $90 million.
This round of funding will help to accelerate our growth into new markets and keep us at the forefront of innovation in the space, said Odaseva founder and Chief Executive Officer Sovan Bin.
Companies use Salesforces flagship customer relationship management platform to store information about current and potential buyers. Alongside its CRM platform, the software-as-a-service giant provides several other applications for tasks such as managing marketing campaigns and processing support tickets. Those applications likewise store sensitive customer data.
San Francisco-based Odaseva has developed a platform that promises to help enterprises secure that data. The companys software encrypts information stored in Salesforce to make it unreadable for any hackers who may try to gain access. According to Odaseva, records are scrambled using an internally developed technology dubbed five-layer encryption.
The companys servers secure the Salesforce data they process using the encryption features of both their disk drives and operating system. Information is also scrambled before its sent over the network to block eavesdropping attempts. Separately, each file and database column in a Salesforce environment is encrypted with a cryptographic key provided by the customer, which means Odaseva cant read the data.
The company provides its cybersecurity features alongside a set of tools designed for other data management tasks.
One tool, Backup & Restore, allows enterprises to create a backup copy of their Salesforce data every quarter-hour. If an employee accidentally deletes an important customer record, administrators can restore it through a relatively simple sequence of steps. In the event of broader data loss, the tool can restore the entire contents of a Salesforce environment from the most recent backup.
Salesforce places limits on the amount of data that organizations can keep in its platform. To help customers avoid reaching those limits, Odaseva provides a tool called Data Archiver. It can automatically move infrequently used records from Salesforce to Amazon S3 based on rules defined by administrators. Furthermore, the company offers a second data movement tool that eases the task of streaming Salesforce records to analytics applications.
The platforms feature set is rounded out by a set of regulatory compliance capabilities.Before using customer records from Salesforce to train an artificial intelligence model, companies can leverage Odasevas software to anonymize them. Removing personally identifiable information makes it easier to comply with privacy laws. The platform also eases the task of fulfilling requests from consumers to delete the data that a company stores about them in Salesforce.
Odaseva counts Schneider Electric SE, Michelin and other large enterprises among its customers. The company says that its platform helps those companies secure the data of more than 100 million users. It will use its newly raised funding to expand the platforms feature set.
THANK YOU
The rest is here:
Odaseva nabs $54M for its Salesforce data protection platform - SiliconANGLE News
Garda criticise the use of encryption by social media platforms – The Irish Times
The use of end-to-end encryption by social media companies is making it increasingly difficult for garda to investigate hateful or abusive disinformation, according to a senior officer.
Encryption means law enforcement and prosecutors are unable to gain access to vital evidence while investigating offences, Assistant Commissioner Cliona Richardson said.
She said social media companies place a focus on privacy, meaning, the perpetrator of crime is afforded more protection than the victim; with a ready-made platform to pursue their activity or spread disinformation, with significant access barriers created for them to hide behind, she said.
The use of end-to-end encryption is one of several issues faced by garda while investigating the spread of hateful and abusive disinformation on social media, Ms Richardson told the Joint Oireachtas Committee on Tourism, Culture, Arts, Sport and Media which was holding hearings on online disinformation.
End-to-end encryption is now automatic on various social media platforms, including Facebook and Instagram, making it all but impossible for authorities to gain access to the content of potentially criminal messages, even with a court order.
Garda Commissioner Drew Harris has previously criticised the roll-out of encryption, arguing it makes it much more difficult to investigate cases of online child sexual abuse.
In her opening statement to the committee on Wednesday, Ms Richardson said it is not realistic nor defensible for social media platforms to cite privacy and freedom of expression as justification for abusive and misleading content.
She said it is incumbent on social media companies to ensure material is appropriate for its recipient audience and has been effectively considered for accuracy.
On the subject of online disinformation and misinformation, the assistant commissioner said there has been increase in false information regarding the accommodation of migrants in certain locations. On occasion, this false information has led to criminality, she said.
Most recent examples include false claims that properties are to be used as accommodation centres and are subsequently targeted in arson attacks.
She said garda are continuing to investigate a number of arson and criminal damage incidents on accommodation rumoured, falsely or otherwise, to be used for immigrants.
In recent years there have been at least 20 such attacks, although they have become less frequent in recent months.
On occasion, garda have had to issue public statements to counter the false information, Ms Richardon said.
In one recent example, false rumours spread online that a child had been the subject of sexual assault by several men in a residential property in Kildare. These false rumours were widely circulated and also shared by a number of agitators, Ms Richardson said.
A group of protesters then gathered at a hotel housing migrants in Kildare. During the incident garda were verbally abused while also being targeted with fireworks and other missiles, she said.
Go here to read the rest:
Garda criticise the use of encryption by social media platforms - The Irish Times
Cloud Encryption Software Market to witness Huge Growth by CipherCloud, Sophos, Tresorit, Micro Focus – openPR
Cloud Encryption Software Market
Free Sample Report + All Related Graphs & Charts @: https://www.advancemarketanalytics.com/sample-report/17069-global-cloud-encryption-software-market?utm_source=OpenPR&utm_medium=tanuja
Some of the key players profiled in the study are Cryptomathic (Denmark), Thales e-Security (France), Bitdefender (Romania), Stormshield (France), CipherCloud (United States)., Sophos (United Kingdom), Tresorit (Switzerland), Micro Focus (United Kingdom), Microsoft (United States), Symantec (United States)
Market Overview of Cloud Encryption Software Over the past few years, the increasing awareness about serious threats to digital security, the importance of a diluted authentication process, and the increasing need for protecting data computerization is booming the demand for cloud-based encryption software. Cloud encryption software is a service provided by cloud storage providers where data is transformed using different encryption techniques using algorithms and then store on cloud storage. Encryption use has increase piercingly in the past few years and is organized in a huge number of ways, from encrypting data in databases and file systems to data being transferred over public and internal networks increasing use of encryption software for protecting data has risen up sharply is booming the demand for it in the market.
Market Trends The Demand for in Built Cloud Encryption Solutions
Drivers Increasing Concern Pertaining To Loss Of Critical Data Stringent Regulatory Principles And Data Privacy Compliances Growing Number Of Data Violate And Cyber Thefts The Cloud Encryption Software Market Is Expected To Grow Further.
Challenges Complexity In Effective Management And Usage Of The Encryption Key
Opportunities Rise In Demand For Integrated Data Protection Solutions Among SMEs Cloud Technologies Are Integrated Into The Core Levels Of The IT And Telecom Industry is Boosting the Opportunities of Growth in the Market
If you are involved in the Cloud Encryption Software industry or aim to be, then this study will provide you inclusive point of view. It's vital you keep your market knowledge up to date segmented by major players. If you have a different set of players/manufacturers according to geography or needs regional or country segmented reports we can provide customization according to your requirement.
For Early Buyers | Get Up to 10-25% Discount on Premium Version of this Report: https://www.advancemarketanalytics.com/request-discount/17069-global-cloud-encryption-software-market?utm_source=OpenPR&utm_medium=tanuja
The Cloud Encryption Software Market segments and Market Data Break Down are illuminated below: by Application (Disk Encryption, File/Folder Encryption, Database Encryption, Communication Encryption, Cloud Encryption), Deployment Mode (Cloud, On Premise), Services (Professional, Managed), Industry Verticles (BFSI, Manufacturing, Healthcare, Government, Others), Enterprises size (Small and Medium-sized Enterprises (SMEs), Large Enterprises), Component (Software, Services)
Regions Covered in the Global Cloud Encryption Software Market: The Middle East and Africa (South Africa, Saudi Arabia, UAE, Israel, Egypt, etc.) North America (United States, Mexico & Canada) South America (Brazil, Venezuela, Argentina, Ecuador, Peru, Colombia, etc.) Europe (Turkey, Spain, Turkey, Netherlands Denmark, Belgium, Switzerland, Germany, Russia UK, Italy, France, etc.) Asia-Pacific (Taiwan, Hong Kong, Singapore, Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia).
Important Features that are under offering & key highlights of the report: - Market Data Segmentation with production, consumption, revenue (million USD), and Price Analysis - Detailed overview of Cloud Encryption Software market - Changing market dynamics of the industry and Impact of Influencing Factors - In-depth market segmentation by Type, Application and other major segments etc. - To analyse and forecast the Cloud Encryption Software market, in terms of value and volume. - Which segment has the potential to gain the highest market share? - To help decision maker from new offer perspective and benchmark existing marketing strategy. - Correlate cost structure historical data with key business segments. - Analyse marketing contribution and customer acquisition by up-selling and cross selling. - Identifying Influencing factors keeping Cloud Encryption Software Market Intense, factored with periodic analysis of CR4 & CR8 concentration ratio & HHI Index.
Major Highlights of TOC: Chapter One: Market Overview 1.1. Introduction 1.2. Scope/Objective of the Study
Chapter Two: Executive Summary 2.1. Introduction
Chapter Three: Market Dynamics 3.1. Introduction 3.2. Market Drivers, Trends, Challenges, Opportunities
Chapter Four: Market Factor Analysis 4.1. Porters Five Forces 4.2. Supply/Value Chain 4.3. PESTEL analysis 4.4. Market Entropy Chapter Nine: Methodology and Data Source
Get More Information & Customization: https://www.advancemarketanalytics.com/enquiry-before-buy/17069-global-cloud-encryption-software-market?utm_source=OpenPR&utm_medium=tanuja
Customization Service of the Report:- AMA Research provides customization of reports as per your need. This report can be personalized to meet your requirements. Get in touch with our sales team, who will guarantee you to get a report that suits your necessities.
Thanks for reading this article; you can also get individual chapter wise section or region wise report version like North America, West Europe or Southeast Asia.
Contact Us: Craig Francis (PR & Marketing Manager) AMA Research & Media LLP Unit No. 429, Parsonage Road Edison, NJ New Jersey USA - 08837 Phone: +1(201) 7937323, +1(201) 7937193 sales@advancemarketanalytics.com
Advance Market Analytics is Global leaders of Market Research Industry provides the quantified B2B research to Fortune 500 companies on high growth emerging opportunities which will impact more than 80% of worldwide companies' revenues. Our Analyst is tracking high growth study with detailed statistical and in-depth analysis of market trends & dynamics that provide a complete overview of the industry. We follow an extensive research methodology coupled with critical insights related industry factors and market forces to generate the best value for our clients. We Provides reliable primary and secondary data sources, our analysts and consultants derive informative and usable data suited for our clients business needs. The research study enables clients to meet varied market objectives a from global footprint expansion to supply chain optimization and from competitor profiling to M&As.
This release was published on openPR.
View original post here:
Cloud Encryption Software Market to witness Huge Growth by CipherCloud, Sophos, Tresorit, Micro Focus - openPR
Proton Drive: Encrypted automatic iPhone photo backup – BGR
Losing my iPhone or having my iPhone stolen is a nightmare of mine. I hope it never happens. Thats why I try to prepare for the eventuality of having all my data gone in an instant. I back up my iPhone routinely, and I know what I would do if it vanished.
Starting Thursday, I have another way to back up some of the iPhone data I care most about and do it in a secure way. Proton announced that its cloud storage product, Proton Drive, supports automatic, end-to-end encrypted iPhone photo backups.
Proton Drive is a good alternative to Google Drive, iCloud, Microsoft OneNote, Dropbox, and any other cloud storage service. Protons advantage over some of its rivals is that it offers end-to-end encryption for the data you store in the cloud.
Proton Drive is available as a separate app on iPhone. Thats how youll start backing up your iPhones to Protons cloud. Proton says in a blog post that it encrypts both the photos and the metadata on the device before theyre synced to the cloud. As long as you dont forget your password, youll be the only person able to access the cloud files.
Sign up for the most interesting tech & entertainment news out there.
By signing up, I agree to the Terms of Use and have reviewed the Privacy Notice.
To start backing up iPhone photos to Proton Drive, youll need to download the Proton Drive app for iOS. Then, enable automatic camera uploads, let the app access your photos, and youre done. After that, Proton Drive will keep grabbing all your pictures and organize them by date and month. You can manage the photos in Proton Drive and delete the ones you dont actually want to keep.
Youll get a free Proton Drive account if you create a Proton account. This also gives you access to other apps from the Swiss developer. Mail, VPN, Calendar, and Proton Pass are part of Protons offering, in addition to Drive. Proton Pass is also one of my favorites, a password manager app I use about as much as 1Password these days.
However, the free Proton Drive account only has 5GB of cloud data, which is probably insufficient to back up your entire iPhone photo gallery. Premium plans start as low as $3.49 per month for 200GB of data, assuming you go for a two-year contract. If you choose the monthly option, youll have to pay $4.99 per month.
Meanwhile, 200GB of iCloud Plus cloud storage costs $2.99 per month. That might be a more natural way for iPhone users to back up photos. Youd also back up your entire iPhone. iCloud also offers end-to-end encryption for data backups.
Google Photos is another alternative for backing up iPhone photos, but it doesnt get end-to-end encryption like Proton Drive and iCloud.
Continued here:
Proton Drive: Encrypted automatic iPhone photo backup - BGR
Winners and losers: The Instax Wide gets a long-awaited update as the EU votes on chat encryption – TrustedReviews
Its been a busy week in tech with Nvidia being named the worlds most valuable company, Nintendo announced more exciting titles coming to the Switch during its Nintendo Direct stream, and Apple ditching its Pay Later loan scheme less than a year after it was announced.
In mobile news, Motorola unveiled a new flagship phone and Oppo announced the Oppo Reno 12 Pro 5G, while Lenovo showcased a tablet with a built-in JBL Bluetooth speaker.
Meanwhile, Nikon unveiled its mid-range Z6 III mirrorless camera and Fujifilm announced a minor but much-needed update to the 5-year-old Instax Mini LiPlay.
Keep reading to learn who we named our winner and loser this week.
While the Mini LiPlay refresh was certainly great news, it wasnt actually the biggest Instax update Fujifilm announced this week. On Tuesday, the company unveiled an update to its Wide line of instant cameras for the first time in 10 years.
The Instax Wide 400 is the name of the long-awaited follow-up to the Instax Wide 300, a camera that has been Fujifilms Wide film go-to since 2014.
Not only does the Wide 400 bring with it a slightly smaller, more modern design, but it also includes some useful new features.
Take the self-timer, for example, which makes it possible for everyone to squeeze into the group shots without asking a stranger to snap the photo. The self-timer allows you to choose between 2, 4, 6, 8 and 10 seconds, giving you ample time to get into position and ready your pose.
The Instax Wide 400 also comes with a new strap which ties onto the side of the camera and features two small blocks that can be used to prop up the camera on any flat surface and tilt it at the perfect angle.
If youve been looking for a way to capture large instant photos with the whole gang, youll definitely want to get your hands on this Instax camera.
The EU might not be a tech company, but it has been directing some major changes in tech by mandating them in Europe, especially these last few years.
While some laws have had a largely positive effect (Apple finally adopting USB-C ports in its iPhones, for example), others could end up doing more harm than good. The most recent example of this is the Chat Control law which has drawn backlash from privacy experts worldwide.
The Chat Control law would require users of messaging apps like WhatsApp, Signal and iMessage to agree to new terms and conditions that allow images and URLs in their chats to be scanned by the app to detect child sexual abuse.
As many privacy experts and some experts alike have stated, if passed this law could seriously compromise the security of chats. Not only would it undermine end-to-end encryption in messages, but it would require apps to build a backdoor that could potentially be exploited by others.
Shutter Launches First Threshold Encrypted Mempool for Ethereum-like Networks on Gnosis Chain to Combat US$900 … – Crypto Briefing
Share this article
Mainz, Germany, June 19th, 2024, Chainwire
Shutter, an open-source protocol initially developed by brainbot and focused on preventing malicious maximal extractable value (MEV) attacks, today announced the launch of a new anti-front running solution using mempool encryption to combat the exploitation of nearly US$900 million taken from crypto trades annually. Partnering with Gnosis, the architects of the fully EVM-compatible Layer-1 Gnosis Chain, Shutter will be integrated into the Gnosis Chain to protect end-user transactions from front running and sandwich attacks, shielding traders from malicious MEV activities that can result in significant monetary loss and unfair influence.
Setting a New Standard for MEV Protection with Deep Chain Integration
MEV attacks are transactions by attackers that manipulate the outcome of the target transaction within a blockchain that maximizes financial gain for malicious actors at the expense of traders and end-users. Common malicious MEV activities include sandwich attacks, where an attacker places their transactions both before and after a victims transaction. This manipulates the token price to the attackers advantage, typically driving up the price of the token for the victim.
Despite the growing incidences of such attacks, existing solutions to this problem often fall short of holistically addressing the complexities of MEV attacks. Many traders still remain unaware that they are victims of exploitation until significant losses are incurred. Even once they are made aware, victims have to take extra steps to protect themselves, often relying on centralized systems that can still censor and extract value.
To address this gap, Shutter provides malicious MEV protection and a layer of censorship resistance via the threshold encrypted mempool built into the Gnosis Chain. Distinguishing itself from existing methods of tackling MEV attacks, Shutter integrates its encryption protocol directly into blockchain networks, preventing manipulators from exploiting transactions. This deep integration means block producers must commit to the inclusion and order of transactions while they are still encrypted, making it almost impossible to front run or censor. This also ensures that traders are protected from monetary losses without needing additional measures.
Tackling Unchecked Spread of Malicious MEV Attacks with Decentralized Encryption for Fair Trading
Shutters unique approach is exceptionally critical in todays maturing Web3 landscape where hundreds of millions of dollars are stolen each year on Ethereum alone through MEV tactics. These attacks exploit the public nature of blockchains and remain largely unchecked, consequently reducing market efficiency, diminishing trust in the system, and making it fundamentally unfair.
Shutters encrypted mempool also mitigates real-time censorship, ensuring transactions remain private until included in a block. This prevents malicious actors from selectively excluding transactions, reinforcing the core principles of public blockchainsopenness, neutrality, and accessibility. By increasing information symmetry through Shutters encryption approach, the playing field is leveled. At the same time, the integrity of public blockchains is preserved, providing greater confidence for retail and large institutional investors typically deterred by rampant front running in decentralized finance (DeFi) to enter the space, attracting a broader range of participants in the long run.
A Strategic Integration
Gnosis Chains integration of Shutter directly tackles the rampant issue of malicious MEV through preventive measures as opposed to many other blockchains that continue to struggle to resolve such growing issues, marking a significant milestone for not just the Shutter community, but the industry at large. Charting towards the shared vision of a more equitable blockchain ecosystem, Gnosis Chains relentless focus on decentralization and accessibility harmonizes with Shutters efforts to address contemporary industry challenges impeding the adoption of Web3. Ultimately, Shutter will play a vital role in encouraging safer crypto trades, increasing censorship resistance, and preventing value leakage.
A Vision for the Future
This integration is one of many in the pipeline for Shutter that helps build momentum toward combating malicious MEV attacks across the Ethereum ecosystem. Collectively, Shutter and its partners will shield the users from manipulation, ensuring equitable access and maintaining a neutral base layer.
Luis Bezzenberger, Product Manager at brainbot said: Were incredibly excited to unveil a protocol that can solve one of the most rampant issues in todays decentralized finance landscape. Gnosis Chain is home to one of the most vibrant communities in Web3 and by joining forces, we can strengthen the Web3 ecosystem and provide Gnosis Chains users with a seamless, fair and more profitable trading experience.
Philippe Schommers, Head of Infrastructure at Gnosis said: Were thrilled to join Shutters mission of building a Web3 ecosystem that is transparent, equal, and secure for all. Integrating Shutter, we believe we are empowered to provide the best user experience for our developers and builders and we are dedicated to continuing demonstrating our sustained ecosystem growth through robust integrations and partnerships with promising protocols, dApps, and projects.
Martin Kppelmann, Co-Founder of Gnosis said: Security and fairness remain at the core of everything we do. The integration with Shutter not only bolsters our network resilience and neutrality but will also set an industry gold standard for fortifying safeguards against third-party value extraction from network users, leveling the playing field for the future of Web3 and decentralized finance.
Shutter will be launched on July 11, 2024 on the final day of the Ethereum Community Conference (EthCC), the largest annual European Ethereum event focused on technology and community.
About Shutter
Shutter is a free open-source software designed to protect the crypto community from those manipulating the blockchain for their own gain. Using threshold encryption, Shutter ensures base layer neutrality, information symmetry, and accessibility in trading, voting, and gaming.
About brainbot
brainbot GmbH specializes in the development, distribution, licensing, and operation of software, alongside providing a wide range of related services. As the core developer behind Shutter, brainbot plays a pivotal role in advancing blockchain technology.
About Gnosis
Gnosis is developed by a world-class team of leading forces in blockchain and payments. The Gnosis Chain is architected with community ownership, resilience, and credible neutrality at its core. The highly decentralized network is secured by 200K+ validators and 2K+ nodes, across 70 countries and 5 continents.
Wachsman[emailprotected]
Share this article
Go here to read the rest:
Shutter Launches First Threshold Encrypted Mempool for Ethereum-like Networks on Gnosis Chain to Combat US$900 ... - Crypto Briefing