Category Archives: Encryption

A Cost-Effective Encryption Strategy Starts With Key Management – Dark Reading

Companies have a problem with encryption: While many businesses duly encrypt sensitive data, there is no standard strategy for deploying and managing a key-management infrastructure.

Every organization needs to make a large number of decisions in designing a key-management policy that works for their business, Karen Reinhardt, principal engineer for cryptographic services at Home Depot, told attendees at the RSA Conference in San Francisco last week.

"One size does not fit all," she said.

Some cloud-native startups can manage much, if not all, of their encryption keys in the cloud, while large enterprises with legacy technology likely need a locally hosted system and hybrid infrastructure. Some groups, such as developers, may be able to manage their own infrastructure, while general employees need their keys managed for them. Finally, every company needs to take into account the post-quantum future, Reinhardt said.

Encryption is a necessary technology for securing data and systems, but there is more to data security than just encrypting the data. Perhaps the most complex part of any encryption infrastructure is managing the keys needed to decrypt data. If the attacker has access to the keys, they have access to the encrypted data; defenders who lose access to the keys lose access to data.

Reinhardt outlined five points enterprise security teams should consider to "keep everybody from putting their proverbial key under their doormat, which is a problem I see all the time."

The first lesson for companies is that encryption keys are critical perhaps more critical than proper encryption. Data is unusable if you can't decrypt it, so knowing where the decryption keys are is often much more important than knowing the location of the encryption keys, said Reinhardt.

Organizations should always have a controlled archive of decryption keys, she said.

"The thing about identity is you can always replace it OK, you lost your driver's license. Let me get you a new one," Reinhardt said. "But if you have data that's encrypted with something, you can only decrypt it one way."

Security controls continue to be expensive to implement, and encryption is no exception. Companies need to measure the cost of creating and managing encryption infrastructure against the cost of a breach to find their "optimum security at minimum cost," Reinhardt said.

"Security does you no good if you bankrupt your company," she said. "Stronger controls almost always equal more money, so [while I'm] not actually against 'encrypt everything,' it's a lot of money, a lot of processing, a lot of extra memory so I'm more of a fan of focus on what really needs to be kept secret."

Companies moving more of their infrastructure to cloud services and platforms are already trying to control data sprawl;cloud-native key management adds key sprawl to the equation as well. Companies need to take stock of not only their critical data what needs to be encrypted but also how each cloud service manages its keys and other secrets and whether the company can centralize management to increase control.

"Where are the keys? Well, a lot of times, they're in a local key store sitting on a system. And in other cases, they can be in a remote store," Reinhardt said. "They could be anywhere these days on-prem, in the cloud, [hosted by] a vendor, or in your own managed cloud."

Smaller companies just starting out with key management can create greenfield key management and take advantage of the latest technologies to simplifying their infrastructure and strengthen control over their data. Yet large companies that already have a variety of key management technologies in place will have to support legacy applications and databases.

"If you're a fairly new company with a greenfield implementation, you might not have the same integration requirements of a company that's been around for 100 years," she said.

Cloud-based encryption infrastructure, such as hardware security modules secure storage for key data and operations can help make implementation simpler and make integration with legacy technology easier.

Finally, every company needs to consider the post-quantum future and make sure that their key infrastructure can generate quantum-safe keys. As quantum-computing technology advances, public-key encryption will need to evolve and use stronger keys generated by more modern algorithms.

"Post-quantum means every asymmetric key has to be replaced, so you need to know where they are," Reinhardt said. "And that is the big advantage of a key management system or any sort of centralized management system. It will make finding your keys, and rotating them, much easier."

Read the rest here:
A Cost-Effective Encryption Strategy Starts With Key Management - Dark Reading

Data Security & Encryption Tools for Journalists Global Investigative Journalism Network – Global Investigative Journalism Network

Illustration: Sentavio, via Freepik.com

Newsrooms today must confront myriad reporting challenges, from government oppression and digital surveillance to reluctant sources and a deluge of misinformation. But many also face significant internal obstacles related to running their organization, from managing editorial flow and measuring online reach to tracking subscribers and protecting critical data, among others.

As a result, GIJN is publishing a new business tools guide focused on helping news outlets solve their administrative needs. The guide was produced thanks to support from the Google News Initiative. It was researched and written by Talya Cooper, edited by Nikolia Apostolou and Reed Richardson, and illustrated by Sentavio, via Freepik.comwith design by Chafiq Faiz. It includes useful software and applications many of which are free for small newsrooms. Other tools included cover administration, management, communication, file sharing, accounting, SEO, audience engagement, audiovisual, content management, subscriber management, design and data visualization, social media and email marketing, site security, and password management.

As an introduction, weve compiled a list of the tools from across the guide that assist newsrooms with their data security and encryption needs.

This topic is particularly important, since both private companies and repressive regimes are targeting the press more than ever. Everything journalists do from sending emails and text messages to typing in their passwords may be monitored. It may sound elaborate and time-consuming to many, but choosing the right applications and software is crucial to protecting sources as well as journalists themselves.

ProtonMail encrypts emails in transit and when stored on ProtonMails servers. Proton Mail uses Open PGPencryption. Emails are only encrypted when sent between two ProtonMail accounts. However, if you are sending a message externally, you can password protect the message and send the password via other encrypted channels.

Cost: Free individual accounts include 500MB storage.

Languages: 26 languages available.

Element is an open source, end-to-end encrypted messaging and collaboration platform.

Cost: Free for individuals, business tiers begin at $2 per month cost for up to five users.

Languages: 25 current translations.

Jitsi is a free and open source, end-to-end encrypted video chatting service. Without creating an account users can start an in-browser video chat of up to 50 participants. It also allows for advance scheduling, screen sharing, shared note-taking using the Etherpad tool, and integrates with Google and Office 365.

Cost: Free

Languages: available in 35 languages

Signal an open source end-to-end encrypted messaging service available as an app for mobile and desktop devices. Includes encrypted calls, disappearing messages, groups and files over Signal. Cost: Free.

Languages: Messaging available in all languages.

OnionShare uses Tor Onion Services to tunnel data directly and securely from the senders computer to the recipient.

Cost: Free

Sync encrypts files upon upload; the company cannot view the contents of a file. You can use and view files from a web interface, and you can move files to a folder on your computer that will sync automatically to the backup server.

Cost: 5GB for free; Business plans start at $5 per user per month (two-plus users) with 1TB of storage.

Languages: English only; data storage based in Canada, but available worldwide.

1Password garners high ratings for the transparency around its encryption and its willingness to submit to regular third-party reviews. Significantly, 1Password has a service called 1Password For Journalism, which enables teams of journalists to access the app at no cost.

Cost: Currently free for journalists.

Languages: English, Spanish, German, French, Italian, Japanese, Korean, Portuguese, Russian, and Chinese.

Dashlanes features are comparable to 1Password minus the Travel Mode feature but many users find its interface easier and more intuitive.

Cost: Free plan with up to 50 passwords with no device sharing available; plans begin at $3.99/month for individuals and $5 per user per month for businesses.

Languages: English, French, Spanish, Portuguese, German, Italian, Dutch, Swedish, Chinese, Japanese, and Korean.

KeePassXC is a free and open source password manager. KeePassXC is stored locally on a single users computer. The simple, offline nature of the tool significantly reduces its convenience, but minimizes the risk associated with transferring data across the web.

Cost: Free.

Languages: Dozens.

A cardinal rule of VPN (virtual private network) services: do not use a VPN that does not offer paid tiers. Researchers have found that 100% free VPN services to be secretly logging user data and to be laden with malware. Experts also recommend avoiding US-based VPN services, due to the strictures of the USA PATRIOT Act. Sites like CNet, SafetyDetectives, and Wirecutter maintain current recommendations for VPN.

All pricing below current as of June 24, 2021 and is in US dollars, unless otherwise noted, with VAT not included. Language listed is the language in which the tool itself is available. Where the information was readily available, we have noted any limitations on a tools geographic availability.

GIJN Business Tools Guide for Newsrooms

The GIJN Digital Security Guide

Digital Self-Defense for Journalists: An Introduction

Talya Cooper is an archivist and researcher based in New York. She worked as the archivist of the Edward Snowden archive at The Intercept and as archive manager at StoryCorps. She is the co-author, with Alison Macrina, of Anonymity, a guide to anti-surveillance and privacy technology for librarians.

Excerpt from:
Data Security & Encryption Tools for Journalists Global Investigative Journalism Network - Global Investigative Journalism Network

Ransomware’s Sneaky New Trick: Intermittent Encryption Is Here – CDOTrends

Ransomware is the digital gift that keeps on givingand taking. Its power comes from its simplicity: anyone with a dash of malice can launch an attack. Its strength lies in its simplicity and reliance on social engineering.

Anyone with malicious intent can now easily deploy ransomware, warns Asaf Hecht, security research director at CyberArk Labs. People are often too quick to click and install things on their computers.

The proliferation of Ransomware-as-a-Service (RaaS) on the Dark Web, complete with victim profiling and help desks for bad actors, has only exacerbated the problem. The COVID-19 pandemic further fueled the ransomware explosion as companies rushed to digitize and embrace remote work, leaving them vulnerable to targeted attacks.

If only the ransomware story stopped here. But like everything else in cybersecurity, ransomware has had a major upgrade.

While the end goal (cold, hard cash or ethereal cryptocurrencies) hasn't changed, the methods have.

Ransomware-as-a-Service (RaaS) now comes with a side of victim profiling, letting attackers zero in on high-value prey. And backups? They're not the safety net they used to be.

"Sometimes the backup is done once a week or even if it's once a day," says Hecht. He offered an example where an S&P 500 company can't afford to have a one-hour gap in information. "This is why the organization also paid."

Yes, backup software and techniques have improved over time, as has the detection of mass encryption activities. Companies are also triangulating individual behaviors to see whether they are acting strangely or under duress to stop any activity that smells like denial of availability through encryption.

As companies beef up their defenses, ransomware gangs are getting creative. It's no longer just about locking you out of your datawhats called denial of access.

They now frequently employ a combination of encryption and data exfiltration, threatening to release stolen data publicly if the ransom is not paidoften called denial of confidentiality.

Even more insidious is the rise of intermittent encryption. This technique selectively encrypts parts of files (in uniform blocks), making them unusable but not triggering traditional anti-ransomware measures.

Since only parts of files are encrypted, the attacks are swift and fly under the radar of traditional security tools.

Thats a major headache as it renders many security teams blind.

CyberArk's open-source tool, White Phoenix, offers a glimmer of hope.

It analyzes encrypted files and attempts to recover the original data using various algorithms and techniques. The Python source code is available on GitHub and at getmyfileback.com.

Hecht emphasizes that White Phoenix's primary goal is to help organizations combat intermittent encryption, not profit. CyberArk hopes to foster collaboration and accelerate its evolution by open-sourcing the tool as ransomware continues to adapt.

This tool can analyze encrypted files and attempt to recover the original data using various algorithms and techniques. Depending on the file type, size, and encryption method used by the ransomware, it could potentially restore some of the file content.

So why open source? Hecht takes a more altruistic tone, saying that the primary intent is not profits but helping companies deal with intermittent encryption. At the same time, it allows other companies to use it more effectively and evolve the tool as bad actors innovate further.

White Phoenix isn't a cure-all. It's specific on file types and has been tested on BlackCat/ALPHV, Play, Qilin/Agenda, BianLian, and DarkBit ransomware. The tool supports recovering data from files in formats like PDF, Word, Excel, PowerPoint, and Zip.

The tool works best when only a small portion of the file is encrypted. The tool also relies on finding unencrypted fragments that can be extracted and concatenated to recover the original data.

Of course, the ransomware creators will find new techniques or create new methods that will make it more difficult for White Phoenix in its current form.

However, as Hecht notes, as ransomware creators inevitably develop new techniques, tools like White Phoenix offer a fighting chance in the ongoing battle against this relentless threat. This counts in a ransomware landscape already co-opting AI into its arsenal.

Image credit: iStockphoto/sqback

Read more here:
Ransomware's Sneaky New Trick: Intermittent Encryption Is Here - CDOTrends

Microsoft to Make BitLocker Encryption the Default in Next Windows 11 Build – ExtremeTech

A major change is coming to the next Windows 11 update to make PCs more secure. But it might also cause some equally major headaches. The upcoming Windows 11 24H2 version will reportedly enable BitLocker drive encryption for most computers. This will apply to fresh installs and reinstallations, and disabling BitLocker is a bit of a pain.

Microsoft began pushing BitLocker with the Windows 11 23H2 update, which made BitLocker the default for new installations on supported systems. With 24H2, that setting expands to reinstallations on any system that has run 24H2 or later. The details are still limited as the final software hasn't rolled out, but some Windows 11 Home machines could be spared from the requirement.

The new BitLocker default relies on the UEFI encryption flag. If a PC manufacturer has set that flag, Windows 11 24H2 will require BitLocker. In addition, after installing 24H2, many systems will flip that flag on, meaning all future reinstallations will require BitLocker. A DIY machine should give you control over that flag, so people who build their own systems should be able to avoid BitLocker.

Microsoft first released BitLocker with Windows Vista in 2004, and like most Windows software at the time, it wasn't very good. It was buggy and slow, and it only supported encrypting the system partition. BitLocker has been improved over the years, and you can now encrypt any partition in your PC with relatively little annoyance.

The upshot of BitLocker is that your files remain secure if someone tries to extract your data or even physically removes a storage device and plugs it into another machine. BitLocker also works with Trusted Platform Modules (TPM) to verify data integrity on boot. If Microsoft had been planning to implement BitLocker more widely, that could explain the strict requirement for Windows 11 machines to have a TPM.

You can turn on BitLocker on any Windows 11 machine, but Microsoft is making it a default setting going forward. Credit: Microsoft

This is admittedly a more modern way for users to store data. Android and iOS mobile devices implemented encryption by default several years ago, which made law enforcement none too happy. On the other hand, encryption has a computational cost, mainly when dealing with large volumes and files. Tom's Hardware says BitLocker can reduce SSD performance by up to 45% for some workloads. Modern CPUs have hardware acceleration for AES encryption, but the speed difference could be noticeable depending on your processor and storage device.

BitLocker is not necessarily bad, but it could be a big change for Windows users who are not used to encrypted storage. Your data could be lost if you lose your encryption key or attempt to move an encrypted drive to another system. The original report (in German) suggests using a tool like Rufus to create bootable installation media that has the BitLocker flag turned off. You can also access the command prompt during setup and use Regedit to flip the "PreventDeviceEncryption" key to 1.

View original post here:
Microsoft to Make BitLocker Encryption the Default in Next Windows 11 Build - ExtremeTech

Which is it, RPD? Shooting, Disorderly, Or Encryption and Lies? – Rockford Scanner

Lask Exterior Solutions 815-964-2220

Welcome to RockfordScanner.com

The information posted below is my own personal opinion. For entertainment purposes only. I like to post multiple things such as Parody, Entertainment, News, Satire, Events, Editorials, opinions, reviews, photography, music, educational, etc I like to inform our community on different things and have fun doing so. The information posted is dynamic. And may not be accurate. RockfordScanner@gmail.com for any corrections or updates. Please do your own research and form your own opinion. First Amendment & Fair Use

Our Opinion: What Allegedly Happened Based on the current information, That has been provided tous. Most of the outcomes, are not known or final. Police have chosen to give our community The middle finger with encryption and non-transparency. So, nothing is confirmed. Gotta love police encryption and transparency

Which is it, RPD? Shooting, Disorderly, Or Encryption and Lies?

Sadly, Rockford PD chose to encrypt and remain SILENT.

Sources sent us photos from a major scene on E State st the other night.

Many reported it as a robbery, shooting and a possible murder.

However, RPD continues to push Crime is Down And labeled this call as a Disorderly

Since when does a LOT of police officers respond to a disorderly

MANY times, people call in a disorderly. And RPD REFUSES to respond, saying you have to come in to file a report in person.

Remind you, ROCKFORD PD CLOSED DOWN E STATE st for this call.

Sure, is a lot of police for a disorderly

Feeling lucky? FREE entry, for your chance to win on RockfordScanner.com https://rockfordscanner.com/contest/

Please take a few seconds and follow us, On our social media. Facebook, Youtube, X If you would like to get Near real-time notifications, when we post. Make sure you hit that push notification button above!

REMEMBER: We post everything on our website first, Before posting it to social media. So, check our website here first.

Click on that annoying button on top, to SUBSCRIBE! And you will get almost real time notifications, FREE!

RockfordScanner.com is not affiliated with any police, fire, or medical departments. However, if you would like us to relay some information to any department. We can be that third-party and relay your information and keep you anonymous. CLICK HERE TO CONTACT RS

Checkout one of the best Police scanners on the market!

If you have any information: RockfordScanner@gmail.com

If you see an error. Please let us know right away! Some content is assisted with AI tools. We strive for accuracy.

*** A simple anonymous email saying *** Hey that is not what happened, But this IS what happened Email us at RockfordScanner@gmail.com

Simple communication and transparency, Would eliminate any misinformation or exaggerations.

Our content is for entertainment purposes only. Informative entertainment.

CLICK HERE TO READ OUR DISCLAIMER & TERMS

Read the rest here:
Which is it, RPD? Shooting, Disorderly, Or Encryption and Lies? - Rockford Scanner

Apple and encryption services Wire and Proton have provided information on activists at the request of police – GIGAZINE

May 14, 2024 14:00:00

It has been revealed that Spanish police have obtained personal information from encryption services Wire and Proton, as well as Apple, in an effort to identify independence activists in the Spanish region of Catalonia.

Encrypted services Apple, Proton and Wire helped Spanish police identity activist | TechCrunch

According to technology media TechCrunch, the Spanish police agency

Wire provided the activist's email address, and Proton provided the activist's iCloud email address for recovery to Guardia Civil, who then requested further information from Apple, obtaining two addresses and the associated Gmail account.

In addition, Wire and Proton (PDF file) Apple , Wire and Proton all state in their company policies that they will 'respond to requests from law enforcement agencies if necessary.'

According to technology media TechCrunch, the Spanish police, Guardia Civil, has requested, through judicial authorities, that Wire and Proton disclose information about the activists, and both companies have complied.

Wire provided the activist's email address, and Proton provided the activist's iCloud email address for recovery to Guardia Civil, which then requested information from Apple, obtaining two addresses and the associated Gmail account.

This information apparently helped Guardia Civil track down 'the perpetrators of the street riots in Catalonia in 2019.'

Encryption services protect communications by encrypting them with a key that is normally only held by the user. Wire emphasized that communications are protected, stating, 'We have only provided basic account information, and we cannot view or disclose the contents of data sent within the service.' Proton similarly stated, 'We can only confirm minimal account information,' and explained that this time, the activists themselves had set up an unencrypted recovery address, so they provided it as information that could be disclosed.

Apple, Guardia Civil and Swiss judicial authorities did not provide further details.

Read more:
Apple and encryption services Wire and Proton have provided information on activists at the request of police - GIGAZINE

Encryption shield installed to protect Chinese quantum computer from attack – South China Morning Post

The new methods are to replace the conventional public-key cryptography system, which could be vulnerable in the face of quantum computers with powerful computing capabilities.

01:58

China denies accusations of state-sponsored hacking from US, UK and New Zealand

China denies accusations of state-sponsored hacking from US, UK and New Zealand

The report quoted Dou Menghan, deputy director of the Anhui Quantum Computing Engineering Research Centre, as saying the anti-quantum attack shield was developed and used for the first time by Origin Quantum, the developer of the computer named after the Monkey King of Chinese mythology.

This shows that Chinas home-grown superconducting quantum computer can play both offence and defence in the field of quantum computing, he said.

This is also an important exploration of the application of new data security technologies in China.

The third-generation Wukong is powered by a 72-qubit home-grown superconducting quantum chip, also known as the Wukong chip.

In January, the superfast computer opened remote access to the world, attracting global users from countries such as the US, Bulgaria, Singapore, Japan, Russia and Canada to perform quantum computing tasks.

In traditional computing, a bit is the basic unit of information that represents either zero or one. A quantum bit, or qubit, takes it a step further by being able to represent zero, one, or both simultaneously.

Lawmaker urges China to safeguard tech production chain for a quantum edge

Because quantum computers can simultaneously represent multiple possibilities, they hold theoretical potential for significantly faster and more powerful computation compared to the everyday computers we use now.

But the subatomic particles central to this technology are fragile, short-lived and prone to errors if exposed to minor disturbances from the surroundings. Most quantum computers operate in highly isolated and extremely cold environments to avoid disruption.

The normal operating temperature of the Wukong chip is close to absolute zero, or minus 273.15 degrees Celsius. It is stored in a special fridge before being installed in a vacuum environment for operation.

Link:
Encryption shield installed to protect Chinese quantum computer from attack - South China Morning Post

Why quantum computing is a threat to encryption, and what to do about it – New Hampshire Business Review

Impacts of quantum computing threats of tomorrow will change how we use encryption today

Our business and personal lives depend on many things we do not often think about including encryption. Normally this area evolves under its own steam without most business decision-makers having to pay attention, but over the next few years that has to change or else you might inadvertently cede your secrets to adversaries both known and unknown.

A lot has been made of how quantum computing will change the world, but most of these pronouncements are long on hyperbole and short on actual details.

Quantum computing does have a great deal of promise and will eventually change the world in areas such as material science. The more immediate impact of a medium-scale quantum computer is the threat it and those that come after it will pose to how we all use encryption today. To make sense of this, and therefore understand how to mitigate the risk now, we have to back up and define some things.

Encryption today

As of this writing, there are two general types of encryption in use today: symmetric and asymmetric encryption. Symmetric encryption is when the sender and receiver both have the key that is used to encrypt and decrypt the protected data. This is used almost everywhere, but it is often enabled by the use of asymmetric encryption to exchange that key, given many parties need secure communications without meeting. The latter type is where quantum computers expose a major weakness.

Quantum computing

To make sense of this next part, your understanding of quantum computing does not have to go too deep, but you have to accept some strange truths in exchange. The best way to get through this is to remember the last superhero movie you saw and recall that to enjoy the film you had to suspend disbelief and not question how that person is flying or shooting lasers from body parts in ways that defy logic.

Quantum computing leverages the strange world of quantum mechanics, which fails to make sense when held to our day-to-day experiences. The bit to grasp is that a quantum calculation can evaluate all possible values at once rather than having to walk through each possible value one at a time the way a classical computer would have to approach a problem.

A brilliant mathematician at MIT named Peter Shor created an algorithm that could use this quantum weirdness to enable a sufficiently powerful quantum computer to break the hard math problem that lies at the heart of all mainstream asymmetric encryption in use today. We are all awaiting the day (or year) when a sufficient quantum computer breaks our encryption and guts our current security.

Post quantum encryption

Rather than just waiting for the end, the U.S. government has been busy evaluating replacement encryption mechanisms that can replace the soon-to-be vulnerable asymmetric mechanisms in use today. The National Institute of Standards and Technology (NIST) is just about to crown Crystals Kyber and Crystals Dilithium (very geeky names indeed) as the heirs.

Swapping out your encryption is no easy task and will take time. The first step is to dig in and understand where you are using encryption in the first place, and then differentiating where the asymmetric encryption is employed. While not easy, this is likely the easiest part. Once you have completed this inventory, you have to make some complicated changes to code, ensure your vendors make these changes, or change solutions to a vendor who has, or soon will, make these changes.

Many pundits are assuring all who will listen that we have a long time before this threat becomes real, but that is, at best, wishful thinking and, at worst, a disaster in the making. The truth is we do not know. It could be 30 years, but many concede that it could be just a few years. It is not today or tomorrow, but it is so close that it is widely accepted that some threat actors are already storing encrypted data in anticipation of being able to use a future quantum computer to decrypt it. They are betting that this threat will come home to roost sooner rather than later. How will you bet?

Patrick Hynds is the CEO of DTS, a cybersecurity solutions provider in Derry.

Link:
Why quantum computing is a threat to encryption, and what to do about it - New Hampshire Business Review

The best encrypted messaging apps in 2024 – Tom’s Guide

The best encrypted messaging apps are ideal to protect your messages from any prying eyes, and even preserve your privacy against the very companies that make them.

That's because these apps come with encryption methods so heavy that even government agencies can't bust into them. The most common method is end-to-end encryption, which is used by Signal, Threema, WhatsApp and others meaning only the sender and recipient of a message can see its contents.

Apples iMessage protocol uses end-to-end encryption as well but its Messages app which is used to view encrypted messages also handles unencrypted SMS text messages. This makes it easy to get confused which is why youre better off using one of the best encrypted messaging apps instead if you want to ensure that all of your chats are secure. It's worth noting that Google's Messages app can also use end-to-end encryption but both people need to have RCS chats turned on.

These are the best encrypted messaging apps available right now for Android and iOS.

The best encrypted messaging app for most people

Cost: Free

Platforms: Android, iOS

Open source and encrypted

Disappearing messages

Can secure the app with a password

Phone number required for sign up

Signal is a fantastic messaging solution for security-conscious mobile users. It's a free all-in-one messaging, voice-call and group-chat solution that uses its own end-to-end encryption protocol.

You can send text messages, voice calls, group messages, media and attachments to your phone contacts, all without having to mess with PIN codes or special login credentials. Updates to the app have added user-friendly features such as custom wallpapers and animated stickers, and Signal group video chats can now have up to 40 participants.

All Signal messages can be set to self-destruct after a certain amount of time while a Chrome browser plugin lets you use Signal from your desktop as well. You can transfer Signal accounts from one Android phone to another and from one iOS device to another. In fact, you can even change phone numbers while keeping Signal account data as long as you're staying on the same device.

Signal's encryption protocol is so strong that WhatsApp and Facebook Messenger use it too. But unlike Facebook, Signal's parent company is a non-profit foundation created by an anarchist cryptographer and one of the founders of WhatsApp.

Ease of use and strong, open-source, regularly audited encryption makes Signal a favorite of the security-conscious, with accolades from Edward Snowden and other privacy advocates. User-friendliness without compromising on security makes Signal a fantastic option for users looking for an encrypted messaging and calling app. Here's our guide on how to use Signal.

Download Signal: Android, iOS

An increasingly popular cloud-based, secure messaging app

Cost: Free

Platforms: Android, iOS

Intuitive interface

Syncs seamlessly

End-to-end encryption isn't enabled by default

Like Signal and WhatsApp, Telegram lets users link their phone number to a Telegram account to send fast, encrypted messaging over the internet, with client-server encryption for standard chats.

But Telegram is much more than just a messaging service. It has grown into a worldwide social-media platform, with huge user groups and broadcasts that let accounts reach millions of followers in an instant. It has uses far beyond secure messaging.

However, end-to-end encryption is not enabled by default on Telegram. To get it, you'll have to switch to Secret Chat mode. You can set messages to self-destruct, share videos and documents and participate in group chats of up to 200,000 users.(Yes, Telegram really does support group chats that large.) However, chats with more than two participants won't be end-to-end encrypted.

A caveat? Telegram uses its own custom MTProto encryption rather than a more proven system. Here's our guide on how to use Telegram.

Download Telegram: Android, iOS

A secure messaging app many of your contacts likely already use

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Messages and images can self destruct

Widely used

Requires phone number

Owned by Facebook

The world's most popular stand-alone chat and call app, WhatsApp has used Signal's end-to-end encryption protocol on all messages since 2016.

Its developers are continuously adding tweaks to the app's security and privacy features, such as fine-tuned group invitations and controls so that you're always aware who is reading your group chats.

The app is also testing transfers of chat history when switching between iOS and Android phones and using a single account on four different devices at once. Updates to WhatsApp have made it possible to have end-to-end-encrypted backups and have added the ability to make disappearing chats the default. You can also transfer your chat history from iPhone to Android, and the iOS beta suggests an Android-to-iPhone transfer feature is coming soon.

In 2014, WhatsApp was bought by Facebook, which later broke its promise that it wouldn't "monetize" the service which led its founders to leave and one of them co-founded Signal. Some WhatsApp user behavioral data is now shared with Facebook, which has created more demand for WhatsApp alternatives, but the messages remain entirely walled-off.

No matter who owns it, WhatsApp remains one of the easiest ways for anyone to use end-to-end encrypted messaging. If you're not comfortable with Facebook's presence, there are plenty of other options on this page.

Users who want to be absolutely sure about their security can verify each chat's 60-digit security-verification code or QR code that you can compare with a contact to ensure that your conversation is encrypted.You'll also want to make sure your messages are backed up with WhatsApp itself and not with Apple's iCloud.

Combined with WhatsApp's ubiquity, ease of use and the ability to send voice messages, photos, and video messages, and conduct group chats, makes for a robust and fully encrypted mobile-messaging app.

Download WhatsApp: Android, iOS

A private messaging app worth paying for

Cost: $3.99

Platforms: Android, iOS

End-to-end encryption

Private chats

No phone number or email required

Not free

Few advanced features

Threema is a very secure end-to-end encrypted messaging app that uses the NaCl cryptography library to protect your communications.

When you fire up the app, it generates a unique Threema ID key, allowing you to use the app completely anonymously no names required. Otherwise, you can associate your account with an email address or phone number, which makes it easier for other Threema users to find you.

You'll also get a scannable QR code that you can present to other Threema users if you meet in person but don't want to exchange names.

In addition to the usual raft of messaging features such as encrypted text, voice, picture, and video messaging, the app also includes file sharing (20MB per file), emojis, group messaging and a polling system for getting feedback from friends and contacts.

While some other secure-messaging apps that haven't reached WhatsApp or Telegram adoption levels have pivoted toward the enterprise market to stay afloat, Threema still has one foot planted firmly in the consumer market. Charging a few bucks for the app makes that financially possible.

So what's the downside? Threema hasn't really caught on in the English-speaking world, so you may have a hard time finding other users unless you speak German. But its impeccable security is well worth spending $4 for.

Download Threema: Android, iOS

Secure messaging and collaboration for businesses

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Independently audited

Easy to use

Email or phone number required

No two-factor authentication (2FA)

Wire features end-to-end encryption for instant messages, voice and video calls, with support for GIFs, audio and video clips, and sketches, and local and Dropbox file sharing. The app also offers multiplatform cross-device syncing and support for multiple accounts, allowing you to separate personal and work communications.

Wire uses its own Proteus encryption protocol based on the Signal protocol, and its code is open-source and subject to external security audits. The mobile and web versions of the app are free, with a premium tier available for businesses.

The parent company, Wire Swiss, was originally founded and run out of Switzerland which is famous for its privacy laws. The holding company moved to the United States in 2019, which alarmed some users, but then moved to Berlin in early 2021.

Like Silent Circle and Wickr, the company seems to have retooled its website to appeal primarily to business users. But you can still get Wire's free consumer desktop software from the "Download" link at the bottom of the site's main page, and its mobile apps on the Play Store or App Store.

Download Wire: Android, iOS

Secure messaging, voice and video calls all in one place

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Disappearing messages

Hidden chats

Syncs across desktop and mobile

Not as popular as it used to be

Viber offers end-to-end encryption on all platforms.Originally developed in Israel, the app is now owned and operated by Japanese e-commerce giant Rakuten. It offers many of the same bells and whistles as Telegram, including stickers and communities, and, most recently, augmented-reality filters to jazz up selfies.

A neat feature for Viber is a color-coded lock icon to quickly show users how protected a conversation is (gray for encrypted communications, green for encrypted communications with a trusted contact, and red in the event that there is an issue with the authentication key). Viber has self-destructing Secret Chats, included in group chats and on its desktop app, plus a Hidden Chats feature for hiding chatrooms on a shared device.

All of this is in addition to Viber's solid mobile-messaging feature set which includes text, voice, and group messaging all tied to your phone number. The app and communications with other Viber users are free, but you'll have to pay a bit for calls to non-Viber users.

Download Viber: Android, iOS

Encrypted messaging from the social media giant

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Disappearing messages

Hugely popular

Familiar interface

Sending encrypted messages could be more intuitive

The near-ubiquitous Facebook Messenger may not be the first app you think of when it comes to encrypted messaging, but the mobile versions of the app include end-to-end encrypted communication options in the form of Secret Conversations.

See original here:
The best encrypted messaging apps in 2024 - Tom's Guide

Best Free VPN: Top 7 Free VPNs in April 2024 – VPNOverview.com

Short on time? Click here for a summary!

The Best Free VPN in 2024: Our Top 8 Recommendations

The best free VPNs offer powerful online security without a premium price tag. We tested dozens of free VPNs to present you our best free VPNs for 2024.

These VPN providers offer excellent protection at zero cost. Our extensive research has taught us that many free VPNs are dangerous, as they log and sell your data or simply dont work as a VPN is expected to.

If you need an affordable, trustworthy VPN without any restrictions or limitations, we recommend Surfshark. This is one of the few premium VPNs that offer a free trial and a 30-day money-back guarantee! Surfshark is fast, secure, and great for streaming.

If you want a completely free VPN and youre not sure which provider is best for you, well help you decide. Check out your options below!

Free VPNs provide secure VPN connections and encrypted data at zero cost. The best free VPNs ensure that your data, online activities, and browsing history remain private.

However, most free VPN services come with limitations, including data and speed caps. Youll also have to vet for security vulnerabilities that may put your private data at risk or expose you to malicious software.

Dont want the hassle? Choose a cheap, premium provider like Surfshark. Surfsharks best plan costs only $ 2.49 per month. It also offers a free trial and a 30-day money-back guarantee.

Want a truly free VPN instead? PrivadoVPN is our editors choice; it came out on top in our tests to discover the best free VPNs. Keep reading for a review of every free VPN service we tested.

Free products usually have hidden costs. This is certainly the case for free virtual private networks, which might log your data or leave your IP address exposed.

Here are some of the biggest risks and limitations associated with free VPNs:

Besides these security risks, free VPNs may also hinder your user experience by capping your data and offering only a limited amount of servers.

We like saving money as much as the next person. However, we dont recommend free VPNs for the reasons stated above.

If you dont want to pay for a VPN service, youre better off taking advantage of a VPN free trial or money-back guarantee. Surfshark currently has a 7-day free trial for new users! Have a look to see how it compares to the best free VPN providers.

You can also use Surfshark for 30 days if you want more time to make a decision. Not satisfied? No harm! You can easily get a full refund.

If a totally free VPN is what youre looking for, we rounded up the most reliable options in one list. You dont even have to provide your payment information or make use of a money-back guarantee.Free really means free with these VPN providers.

Our in-depth tests revealed the strengths and weaknesses of each of these free VPNs. Read on to find out which one fits your needs best.

Privado is the best free VPN on the market and our editors choice. It keeps your identity safe and is especially suited for PC and Mac users, with an easy-to-navigate interface and solid security features.

PrivadoVPN also has apps for iOS, Android, and Android TV. Theres even a Fire TV Stick app, which is pretty great for a free VPN!

Privacy and security: When testing this VPN, we were impressed by its features. PrivadoVPN offers a high level of privacy thanks to its strict zero-logs policy. The VPN does not collect or store any data. Plus, its headquarters is in Switzerland, which has favorable privacy laws!

On top of that, PrivadoVPN offers highly secure VPN protocols like WireGuard and OpenVPN, as well as AES 256-bit encryption. For a free VPN, it also offers advanced security features, including an automatic kill switch and a split-tunneling feature called SmartRoute.

Server network: Privado offers free servers in 10 locations, namely:

At start-up, Privado will automatically suggest the best server location for you. This means you can get a secure VPN connection in a matter of seconds.

Streaming and torrenting: Privado does wonders for streaming! We connected to the UK server easily and had no trouble unblocking BBC iPlayer. We could access various Netflix libraries and watch shows on HBO Max, Disney Plus, and Amazon Prime Video without issues.

While the 10 GB data limit is restrictive, Privado is one of the best free Netflix VPNs. You can always reduce the playback quality to save some data.

Torrenting enthusiasts will be happy to know that PrivadoVPN allows for P2P file sharing. We tried downloading some torrents and didnt encounter any throttling.

Limits on speed and data: PrivadoVPN offers unlimited speeds as long as you stay within the monthly 10 GB data limit. When testing, we noticed that the speeds on Privados free servers are a lot lower than that of premium VPNs like Surfshark.

Privado will only provide you with a 1 Mbps speed once youve exceeded your 10 GB monthly data cap. And, as you may know, agonizingly slow internet is very frustrating, especially when streaming.

Good to know: Besides the 10 GB data cap, Privado has no dedicated Linux app. On top of that, you can only use PrivadoVPNs free version on one device at a time. Of course, youre free to create multiple accounts to get around this, but it will be a hassle.

PrivadoVPN has a beautiful and user-friendly app. Its currently the best free VPN out there, especially for Windows and Mac users.

Overall, PrivadoVPN performed exceptionally well in our tests and has several impressive features you wouldnt expect from a free service. Have a look for yourself!

Check out the results of our tests on the premium version of Privado to learn more about this service.

Proton VPN is one of the most well-known free VPNs. As one of the only unlimited free plan options, this provider is ideal if you need unlimited data to browse the internet for as long as you like.

The VPN works well on almost all devices. Weve tried it on Mac, Windows, Android, Android TV, iOS, Linux, Chromebook, and even on some routers.

Privacy and security: Proton VPN doesnt keep any logs of user data. As long as your VPN connection is active, youre safe and anonymous online.

Besides a kill switch, Proton VPN offers secure VPN protocols, including OpenVPN, WireGuard, and IKEv2. It even has a Stealth protocol to overcome censorship and bypass geo-restrictions. This protocol masks the fact that youre using a VPN.

Note:

Proton VPN is one of the few open-source VPN apps, which means that a community of developers works to improve the software. This process makes Proton VPN safer and more transparent. Proton VPN apps are also audited by cybersecurity expert to guarantee the safety of users.

Server network: Unfortunately, free users are not spoiled for choice when it comes to Protons server location. There are only three countries with free servers: the United States (22 servers), the Netherlands (38 servers), and Japan (8 servers).

In comparison, a VPN like Surfshark provides you with 3200+ servers across 100 countries. For only a few dollars per month, you wont have any limitations.

Streaming and torrenting: Unfortunately, Proton VPN free doesnt support torrenting. Even the best torrent sites are not accessible with this VPN unless you upgrade to the premium version.

In terms of streaming, the results were mixed. We tried to access Netflix using Proton but got an error message about using a VPN/proxy. The same happened for Amazon Prime Video. At other times, however, weve had no issues streaming with Proton VPN.

Limits on speed and data: Proton VPN Free has no data or speed limits. Thats a huge thing for us Proton is the only reliable, fully free VPN that offers uncapped data.

Having said that, we found that the free version of Proton VPN can be quite slow at times. This makes sense, considering the large volume of free users using a limited amount of servers.

Note:

The Proton website openly advertises the speed of their free VPN as medium, while their paid subscriptions all have high speeds.

Good to know: You can use Proton for free on one device at a time. Want to protect different devices? You can use different email addresses to create multiple accounts.

Proton account gives you access to a wide range of security services, including:

If you choose to upgrade to Proton VPN premium, youll get upgrades for all these services, making it a great all-in-one solution for online privacy

Proton VPN is one of the best free VPNs currently available, thanks to its security features and unlimited bandwidth. Its just not the best choice for streaming or gaming.

This popular provider from Switzerland offers user-friendly software, an array of free security tools, and high-level encryption.

Want to know more? Read our full Proton VPN review to see our testing results!

Hide.me is a trustworthy VPN that allows P2P file sharing and has excellent free customer support. If youre a beginner to VPNs and want to torrent safely, we think that this is the best free option for you.

The VPN has an app for most major operating systems, including Windows, iOS, macOS, Android, Linux, and even Fire TV Stick.

Privacy and security: Hide.me is a zero-logs VPN that has been independently certified. The provider doesnt store any information about your internet activities, which is good news for privacy-conscious users.

Hide.me is based in Malaysia, which is outside of the Eyes Alliance, so you wont have to deal with invasive privacy legislation.

In terms of VPN protocols, you have a wide variety to choose from:

Server network: The free version of Hide.me only gives you access to servers in eight countries: Canada, France, Germany, Netherlands, Singapore, Spain, United Kingdom, United States.

From our experience, this is not impressive, but its about average for a free provider.

Streaming and torrenting: In the past, Hide.me didnt allow free users to download torrents. Luckily, the provider changed this policy, and free users can now download safely via torrent sites.

Unfortunately, we had issues streaming with this VPN. Hide.me does not work with Netflix US. We tested this ourselves and werent able to unblock any geo-restricted shows or movies on Netflix.

Limits on speed and data: The free version of Hide.me has a data cap of 10 GB per month. If you want to stream or download something, youll reach this limit easily. When testing the VPN, we also found that speeds varied quite a bit.

If you dont want to deal with these restrictions, have a look at our best VPNs for streaming.

Good to know: During the first week of your free membership, youll be able to use Hide.me Premium with a seven-day free trial. After that, youll be limited to the free features. You can use Hide.me on one device at a time.

We did find that Hide.mes upsell campaign is quite invasive. Theres always a button urging you to switch to the premium version, which can be annoying.

On a positive note, we found Hide.mes customer support is very responsive and supportive!

While Hide.me is not the best free VPN out there, it definitely has its merits. We recommend this VPN for anyone who wants to torrent without paying for a VPN subscription.

Hide.me has a few advantages over other VPNs, mainly its variety of VPN protocols and torrenting capabilities.

Weve tested all of Hide.mes features. Read our Hide.me review to learn more about what this VPN can offer.

TunnelBear is a practical VPN with many servers. It also offers a cheeky design thats easy to use! While TunnelBears free version has a small data limit, its great for users looking for plenty of server locations and a well-designed app.

Another great benefit is that you can use TunnelBear Free on unlimited devices.

Privacy and security: TunnelBears security and privacy features are very solid. In comparison to other free VPN services, we noted some great extra features, like a kill switch (VigilantBear) and obfuscation technology to hide the fact youre using a VPN (GhostBear).

Thanks to these features, we could unblock more streaming services with TunnelBear than with many other free VPNs.

In terms of privacy, TunnelBear has a no-logs policy. The provider is located in Canada, however, which is part of the Eyes Alliance. Have a look at our best VPNs outside the 14 Eyes for alternative options.

Server network: Thanks to its huge server list, TunnelBear is one of the best free VPNs out there. Even with the free version, TunnelBear allows you to choose from all of its available servers in 42 countries, including the United States, United Kingdom, and many more.

These servers give you the same experience as the Premium TunnelBear servers, which is unique among free VPNs.

Streaming and torrenting: We tested TunnelBear to see if it could unblock online streaming sites, and the results were a resounding success. TunnelBear was able to circumvent geo-restrictions on sites like Hulu, BBC iPlayer, and Netflix.

Unfortunately, there are torrenting restrictions. TunnelBear doesnt allow P2P traffic on its servers.

Limits on speed and data: With such good test results, what is TunnelBears catch? While we didnt experience any speed throttling, theres one major drawback.

The biggest disadvantage we found when using TunnelBear is the data limit you only get 500 MB per month. You can add another 1 GB of free data if you tweet about TunnelBear, but thats not ideal for people looking for more online privacy.

Good to know: Who said VPNs are boring? TunnelBear is one of the most fun VPN apps to use! The visual style is unique and engaging, and the software is full of bear-related puns.

It is worth noting that customer support is limited for free users, since premium users get priority.

The free version of TunnelBear is high quality, and we love the casual, flashy interface. But its only suitable if you dont mind the tight data restrictions.

TunnelBear Free is available for Windows, Mac, Android, and iOS and can be used on unlimited devices simultaneously.

You can find more details and our personal testing experience in our TunnelBear review.

Windscribe is a popular free VPN that works on almost all operating systems and devices, including Linux. It also offers fast servers and a reasonable data limit.

You can get unlimited simultaneous connections with Windscribe, which is also a plus!

Privacy and security: Windscribe offers world-class security features, including a kill switch, an ad blocker, and a split-tunneling option. You rarely see this many security features in a free VPN. Previous software hiccups have been overcome, and the provider has a tight no-logging policy.

As privacy-conscious internet surfers, we appreciate that Windscribe offers multiple strong security protocols:

Server network: The free version of Windscribe has fewer options than the paid package. For free users, Windscribe only provides servers in a handful of countries.

Paying customers have access to global servers in as many as 63 countries. However, for a free plan, the number of server locations is still surprisingly high.

Streaming and torrenting: We were able to unblock and stream content from many different streaming platforms with Windscribe. Unfortunately, we were unable to access Netflix with Windscribe.

While this is a downside, it is rare to see a free VPN that can unblock Netflix without any issues these days. Of course you can easily watch Netflix with a VPN offered by premium providers.

Torrenting is entirely possible with Windscribe, a benefit for P2P fans!

Limits on speed and data: Windscribe is the fastest free VPN we tested. The secure servers maintained good speeds when we used them for browsing, even while we downloaded a file in the background.

There is a data limit of 2 GB per month. However, if you choose to share your email address with Windscribe and verify your account, you get 10 GB a month. Unfortunately, Windscribe may use this data for marketing, so we recommend using a throwaway email address.

Good to know: Windscribe is not as easy to use as some of the other free VPN providers listed above. Most of the buttons in the software take you to your account page.

We would prefer it if you could change your account settings in the VPN application itself.

Windscribes free VPN package is really solid, especially if youre a Linux user. The speeds are great, though bear in mind that the data limits are strict and it cant unblock Netflix.

Originally posted here:
Best Free VPN: Top 7 Free VPNs in April 2024 - VPNOverview.com