Page 196«..1020..195196197198..210220..»

Quantzig Empowers Businesses with Advanced Marketing Data Mining Solutions – PR Newswire

NEW YORK, May 15, 2024 /PRNewswire/ -- In an era where data reigns supreme, businesses across industries are increasingly turning to advanced analytics to drive growth and stay ahead of the curve. Quantzig, a leading analytics and advisory firm, is at the forefront of this revolution, empowering organizations with cutting-edge marketing data mining solutions.

The modern business landscape is defined by data - its collection, analysis, and interpretation. In this context, marketing data mining emerges as a powerful tool, enabling businesses to extract valuable insights from vast datasets and translate them into actionable strategies. Quantzig's latest offering in this domain promises to revolutionize the way businesses harness the power of data to fuel growth and innovation.

Feel free to request a complimentary demo of our Marketing Analytics dashboard solutions.

Unleashing the Potential of Marketing Data Mining

Quantzig's marketing data mining solutions are designed to unlock the full potential of customer data, providing businesses with a comprehensive understanding of consumer behavior, preferences, and trends. By leveraging advanced analytics techniques such as predictive modeling, segmentation analysis, and pattern recognition, Quantzig helps businesses identify hidden patterns and correlations within their marketing data, paving the way for targeted marketing campaigns, personalized customer experiences, and enhanced ROI.

Transformative Impact on Business Performance

The impact of Quantzig's marketing data mining solutions on business performance is nothing short of transformative. By harnessing the power of data, businesses can optimize their marketing efforts, streamline operations, and drive revenue growth. Quantzig's solutions have been instrumental in helping clients across industries achieve their business objectives, from increasing customer acquisition and retention to maximizing marketing ROI and driving competitive advantage.

Key Features and Benefits

Customer Success Stories

Quantzig's marketing data mining solutions have delivered tangible results for clients across various industries. From retail and e-commerce to healthcare and finance, businesses have leveraged Quantzig's expertise to drive growth, improve operational efficiency, and gain a competitive edge in the market. Some notable success stories include:

AboutQuantzig

Quantzig is a leading analytics and advisory firm with a proven track record of helping clients harness the power of data to drive business growth and innovation. With a team of experienced analysts and data scientists, Quantzig delivers cutting-edge analytics solutions that empower organizations to make informed decisions and stay ahead of the competition.

For more information about marketing data mining solutions and how they can help your business drive growth and success, visit Quantzig's website

Quantzig US: +1 630 538 7144 Canada: +1 647 800 8550 UK: +44 208 629 1455 India: +91 806 191 4606 Website: http://www.quantzig.com

SOURCE Quantzig

Visit link:

Quantzig Empowers Businesses with Advanced Marketing Data Mining Solutions - PR Newswire

Read More..

A Cost-Effective Encryption Strategy Starts With Key Management – Dark Reading

Companies have a problem with encryption: While many businesses duly encrypt sensitive data, there is no standard strategy for deploying and managing a key-management infrastructure.

Every organization needs to make a large number of decisions in designing a key-management policy that works for their business, Karen Reinhardt, principal engineer for cryptographic services at Home Depot, told attendees at the RSA Conference in San Francisco last week.

"One size does not fit all," she said.

Some cloud-native startups can manage much, if not all, of their encryption keys in the cloud, while large enterprises with legacy technology likely need a locally hosted system and hybrid infrastructure. Some groups, such as developers, may be able to manage their own infrastructure, while general employees need their keys managed for them. Finally, every company needs to take into account the post-quantum future, Reinhardt said.

Encryption is a necessary technology for securing data and systems, but there is more to data security than just encrypting the data. Perhaps the most complex part of any encryption infrastructure is managing the keys needed to decrypt data. If the attacker has access to the keys, they have access to the encrypted data; defenders who lose access to the keys lose access to data.

Reinhardt outlined five points enterprise security teams should consider to "keep everybody from putting their proverbial key under their doormat, which is a problem I see all the time."

The first lesson for companies is that encryption keys are critical perhaps more critical than proper encryption. Data is unusable if you can't decrypt it, so knowing where the decryption keys are is often much more important than knowing the location of the encryption keys, said Reinhardt.

Organizations should always have a controlled archive of decryption keys, she said.

"The thing about identity is you can always replace it OK, you lost your driver's license. Let me get you a new one," Reinhardt said. "But if you have data that's encrypted with something, you can only decrypt it one way."

Security controls continue to be expensive to implement, and encryption is no exception. Companies need to measure the cost of creating and managing encryption infrastructure against the cost of a breach to find their "optimum security at minimum cost," Reinhardt said.

"Security does you no good if you bankrupt your company," she said. "Stronger controls almost always equal more money, so [while I'm] not actually against 'encrypt everything,' it's a lot of money, a lot of processing, a lot of extra memory so I'm more of a fan of focus on what really needs to be kept secret."

Companies moving more of their infrastructure to cloud services and platforms are already trying to control data sprawl;cloud-native key management adds key sprawl to the equation as well. Companies need to take stock of not only their critical data what needs to be encrypted but also how each cloud service manages its keys and other secrets and whether the company can centralize management to increase control.

"Where are the keys? Well, a lot of times, they're in a local key store sitting on a system. And in other cases, they can be in a remote store," Reinhardt said. "They could be anywhere these days on-prem, in the cloud, [hosted by] a vendor, or in your own managed cloud."

Smaller companies just starting out with key management can create greenfield key management and take advantage of the latest technologies to simplifying their infrastructure and strengthen control over their data. Yet large companies that already have a variety of key management technologies in place will have to support legacy applications and databases.

"If you're a fairly new company with a greenfield implementation, you might not have the same integration requirements of a company that's been around for 100 years," she said.

Cloud-based encryption infrastructure, such as hardware security modules secure storage for key data and operations can help make implementation simpler and make integration with legacy technology easier.

Finally, every company needs to consider the post-quantum future and make sure that their key infrastructure can generate quantum-safe keys. As quantum-computing technology advances, public-key encryption will need to evolve and use stronger keys generated by more modern algorithms.

"Post-quantum means every asymmetric key has to be replaced, so you need to know where they are," Reinhardt said. "And that is the big advantage of a key management system or any sort of centralized management system. It will make finding your keys, and rotating them, much easier."

Read the rest here:
A Cost-Effective Encryption Strategy Starts With Key Management - Dark Reading

Read More..

Proton Mail provided user data that led to an arrest in Spain – TechSpot

Facepalm: Proton Mail is facing renewed accusations of handing user data over to law enforcement agencies. The Swiss company provides a secure email service with end-to-end encryption, ostensibly to protect its customers' identities from prying eyes. However, recent events suggest otherwise.

Proton Mail recently came under scrutiny for (indirectly) providing Spanish authorities with enough data to identify and arrest a member of the Catalan independence organization Democratic Tsunami. The company claimed it was compelled to cooperate with law enforcement due to Swiss laws. They asserted that the Spanish police's success in apprehending the individual was partly due to the person's lack of a proper Operational Security (OpSec) policy.

Update (May 14): Proton contacted us with some clarification about this story and the data they claim was shared and which wasn't. According to the company, they didn't share any data with a foreign government are bound by Swiss law to cooperate with them once a court order is issued. The below quote from Proton's PR department has been edited for brevity:

Proton responded to a request from the Swiss authorities. The way this (article) is written makes it seem like Proton cooperates or communicates directly with foreign law enforcement which we don't do. It would be illegal to do under Swiss law and the suggestion that we do could be concerning for many users.

Proton's robust encryption helps during these situations. This can be demonstrated by the fact that the Spanish authorities were unable to gather any information from Proton beyond the recovery email as even Proton cannot see files, email contents, or any other personal information related to users' accounts, this information cannot be shared with authorities on request.

The original story follows below:

Proton Mail's primary service is an end-to-end encrypted email platform established in 2013. The platform aims to ensure that email content remains unreadable to both third parties and the company itself. While Proton Mail asserts it cannot access message contents, some user-related data passing through its servers could potentially be used to identify individuals.

In a separate incident in 2021, Proton Mail was required to provide Swiss authorities with the IP address and device details of a French climate activist. This information was subsequently used by French authorities to apprehend the activist. Proton Mail clarified that while email content is encrypted, the company is obligated to comply with lawful access requests for any data passing through its servers in criminal prosecution cases.

In the recent case involving the Spanish police, Proton was seemingly compelled to provide the Apple recovery email address used by a client known as "Xuxo Rondinaire." The customer was suspected of collaborating with Catalonia's police force, the Mossos d'Esquadra, while covertly aiding the independence movement in the region.

Authorities requested additional data from Apple, enabling them to identify the individual behind the pseudonym. Proton CEO Andy Yen confirmed that the personal data used to apprehend the alleged "terrorist" was provided by Apple, not Proton. Yen emphasized that Proton cannot decrypt data, but Swiss courts can mandate the sharing of recovery email addresses in "terror cases."

In a written statement, Proton AG clarified that their email service stores "minimal user information" and does not guarantee complete anonymity. Customers seeking enhanced security should implement proper Operational Security (OpSec) measures, such as refraining from using their genuine Apple account as an optional recovery method. While a recovery address is not mandatory for using Proton Mail, the company could be compelled to disclose such information under a Swiss court order.

See more here:
Proton Mail provided user data that led to an arrest in Spain - TechSpot

Read More..

The 6 Best Encryption Software (Updated for 2024) – TechRepublic

Encryption secures information by translating it into computer code thats unreadable to those who dont have the means to access the information. These means of access can include passwords, credentials and authentication of some form. Though encryption could still be broken or cracked, strong encryption is nearly impenetrable.

SEE: Brute Force and Dictionary Attacks: A Guide for IT Leaders (TechRepublic Premium)

Securing data both stored and in-transit through encryption is essential as part of an organizations cybersecurity strategy. There are various encryption options out there. Here are our top picks.

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Any Company Size Any Company Size

Features

Advanced Threat Defense, Full Disk Encryption , Modern Endpoint Protection, Server Security

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Micro (0-49 Employees), Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Micro, Small, Medium, Large, Enterprise

Features

Activity Dashboard, Advanced Threat Analytics, Analytics/Reporting, and more

Employees per Company Size

Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees) Medium, Large, Enterprise

Features

Anomaly Detection, Audit Logs, Compliance Reporting, and more

BitLocker is available on server and business editions and contains various encryption tools. The Redmond solution focuses on encrypting files and drives on a device right out of the box. Likewise, you can set up recovery keys to retrieve data if you get firmware problems or errors. Its an excellent choice for encryption software for Windows.

As a Microsoft product, youll typically need a Microsoft account or will need to link a device to a Windows domain to use it. You can also configure it for a corporate environment using Group Policy. The settings help you decide which drives you want to encrypt and how to distribute your keys (certificates).

Additionally, the computer must have a Trusted Platform Module that can support the encryption process.

We chose BitLocker for its easy integration with Windows environments. This is on top of a user-friendly interface and full disk encryption. For users that are already deep into the Windows ecosystem, or are planning to adopt a Windows-centered environment, BitLocker is the best choice for you.

Free as part of Windows software.

Figure A

VeraCrypt is another free disk encryption software that you can use on Linux, macOS and Windows systems. Its an open-source solution which forks off the TrueCrypt project, adding features to help with secrecy.

VeraCrypt is a prime pick for privacy enthusiasts and tech-savvy consumers. This is largely due to it being open-source, wherein its source code is publicly available for easy spotting of vulnerabilities and points for improvement. Businesses that prioritize transparency and regular code audits in an encryption solution should have VeraCrypt high on its list.

We selected VeraCrypt as a top solution for hidden encryption. Its feature set allows for easy hiding of encrypted data in sight, making internal resources more secure against prying eyes. In addition, it utilizes popular encryption algorithms and has wide support for multiple platforms.

Free.

Figure B

AxCrypt Premium allows users to encrypt files locally using the AES-256 encryption algorithm. Sharing is possible with its key-sharing option. The solution protects classified and sensitive information and provides access to a master password generator.

We selected AxCrypt for users that want to prioritize local storage encryption above all else. It uses the gold standard AES-256 encryption, has file and key-sharing support and works well with the most popular operating systems and platforms.

Theres a one-month trial period across its Password Manager, Premium and Business subscriptions. But for organizations and businesses, AxCrypts Business plan is priced at $10.42 per month, per user, However, customers can get 20% off if they choose annual billing.

Figure C

From popular security provider Nord Security, NordLocker is their take on encrypted file storage.

Aside from file encryption, it offers data syncing, secure file-sharing and file management across numerous devices.

As a cloud-based solution, businesses will be able to easily access their files on their computers or mobile devices. Fans of Nords other security products, such as NordVPN and NordPass, should definitely consider NordLocker as a possible encryption solution.

NordLocker carved its name on this list for being an all-in-one encryption storage solution. Both businesses and individual users looking for a secure and intuitive way to secure their data will find NordLocker as a fine choice.

NordLocker has two tiers: Personal and Business. For Personal, we get three subscription options with a monthly and annual plan. Heres a rundown of the 1-year plans:

For NordLocker Business, we only get one plan option that lasts a year:

Figure E

Advanced Encryption Package (AEP) offers a choice between 20 proven encryption algorithms to protect user data. This includes the industry standard AES encryption, Blowfish, Serpent, GOST, Twofish and many others.

Its an easy-to-use data encryption solution that enables users to create a password to access files and choose their own encryption algorithm. Decryption is easy as well. Right now, AEP is available for Windows 10 and 11.

We chose Advanced Encryption Package for its ease of use in terms of selecting an encryption algorithm for specific files and folders. The fact that it puts an emphasis on user-friendliness is a big plus for encryption software a product category that may be intimidating for some users to tackle.

Figure F

Algorithm selection in AEP. Image: Advanced Encryption Package

When choosing encryption software, you should focus on these key features:

You want an easy-to-use interface so that you can manage and access the encrypted data easily. With encryption software, more novice users may find it daunting to implement and use. But an intuitive and user-friendly software experience will encourage users to encrypt more of their data, and in turn, increase their datas security.

Ideally, an encryption tool should automatically backup encrypted files. Theres no point in encrypting data thats at risk of being lost after a single wipe or crash. Having automatic backup functionality provides another layer of protection in case important user or business data is damaged or lost.

At the very least, encryption should support the Advanced Encryption Standard (AES) 256-bit algorithm which is military-grade security. This is the standard encryption algorithm thats widely recognized as the strongest in the world, with many banks and government agencies utilizing it for added protection. Other algorithms include RSA, Blowfish, Twofish, and DES.

Encryption software should accommodate a wide range of devices and platforms. Organizations with hundreds to thousands of users may use their own devices to work, or have their own operating system (OS) preferences, which means that encryption should support as many devices as possible.

Having wide device support will allow higher adoption of encryption software, and consequently, a higher level of security being implemented in a business.

Solid and multiple support options are ideal. Encryption software providers should have quality customer support in place to help users that may not be familiar with how to implement such products.

This can come in a variety of forms: online guides and tutorials, community forums, support tickets, email and phone correspondence and many more. The more options an individual user or business has for customer support, the better.

We used market research to determine the top encryption software. This research involved studying industry rankings, discussions and product reviews. Finally, we narrowed the list to the most appropriate candidates, choosing based on features like how well the software protects sensitive data, its integration capabilities and the pricing in comparison to the features each offer.

Looking at the list of products above, youll find bundles, free options and some with trial versions. So its easy to try them all out and choose the right file encryption program that meets your needs.

BitLocker could be ideal for those who want files encrypted throughout their network and dont want a huge learning curve to use. However, VeraCrypt and AxCrypt may be better if the focus is on protecting individual files without sharing.

Trend Micro is more of an enterprise focused tool because of its business-focused feature set. Meanwhile, NordLocker and AEP may benefit less tech-savvy users or organizations.

Additionally, you should look for vendors with free product trials and transparent pricing.

Go here to see the original:
The 6 Best Encryption Software (Updated for 2024) - TechRepublic

Read More..

Data Security & Encryption Tools for Journalists Global Investigative Journalism Network – Global Investigative Journalism Network

Illustration: Sentavio, via Freepik.com

Newsrooms today must confront myriad reporting challenges, from government oppression and digital surveillance to reluctant sources and a deluge of misinformation. But many also face significant internal obstacles related to running their organization, from managing editorial flow and measuring online reach to tracking subscribers and protecting critical data, among others.

As a result, GIJN is publishing a new business tools guide focused on helping news outlets solve their administrative needs. The guide was produced thanks to support from the Google News Initiative. It was researched and written by Talya Cooper, edited by Nikolia Apostolou and Reed Richardson, and illustrated by Sentavio, via Freepik.comwith design by Chafiq Faiz. It includes useful software and applications many of which are free for small newsrooms. Other tools included cover administration, management, communication, file sharing, accounting, SEO, audience engagement, audiovisual, content management, subscriber management, design and data visualization, social media and email marketing, site security, and password management.

As an introduction, weve compiled a list of the tools from across the guide that assist newsrooms with their data security and encryption needs.

This topic is particularly important, since both private companies and repressive regimes are targeting the press more than ever. Everything journalists do from sending emails and text messages to typing in their passwords may be monitored. It may sound elaborate and time-consuming to many, but choosing the right applications and software is crucial to protecting sources as well as journalists themselves.

ProtonMail encrypts emails in transit and when stored on ProtonMails servers. Proton Mail uses Open PGPencryption. Emails are only encrypted when sent between two ProtonMail accounts. However, if you are sending a message externally, you can password protect the message and send the password via other encrypted channels.

Cost: Free individual accounts include 500MB storage.

Languages: 26 languages available.

Element is an open source, end-to-end encrypted messaging and collaboration platform.

Cost: Free for individuals, business tiers begin at $2 per month cost for up to five users.

Languages: 25 current translations.

Jitsi is a free and open source, end-to-end encrypted video chatting service. Without creating an account users can start an in-browser video chat of up to 50 participants. It also allows for advance scheduling, screen sharing, shared note-taking using the Etherpad tool, and integrates with Google and Office 365.

Cost: Free

Languages: available in 35 languages

Signal an open source end-to-end encrypted messaging service available as an app for mobile and desktop devices. Includes encrypted calls, disappearing messages, groups and files over Signal. Cost: Free.

Languages: Messaging available in all languages.

OnionShare uses Tor Onion Services to tunnel data directly and securely from the senders computer to the recipient.

Cost: Free

Sync encrypts files upon upload; the company cannot view the contents of a file. You can use and view files from a web interface, and you can move files to a folder on your computer that will sync automatically to the backup server.

Cost: 5GB for free; Business plans start at $5 per user per month (two-plus users) with 1TB of storage.

Languages: English only; data storage based in Canada, but available worldwide.

1Password garners high ratings for the transparency around its encryption and its willingness to submit to regular third-party reviews. Significantly, 1Password has a service called 1Password For Journalism, which enables teams of journalists to access the app at no cost.

Cost: Currently free for journalists.

Languages: English, Spanish, German, French, Italian, Japanese, Korean, Portuguese, Russian, and Chinese.

Dashlanes features are comparable to 1Password minus the Travel Mode feature but many users find its interface easier and more intuitive.

Cost: Free plan with up to 50 passwords with no device sharing available; plans begin at $3.99/month for individuals and $5 per user per month for businesses.

Languages: English, French, Spanish, Portuguese, German, Italian, Dutch, Swedish, Chinese, Japanese, and Korean.

KeePassXC is a free and open source password manager. KeePassXC is stored locally on a single users computer. The simple, offline nature of the tool significantly reduces its convenience, but minimizes the risk associated with transferring data across the web.

Cost: Free.

Languages: Dozens.

A cardinal rule of VPN (virtual private network) services: do not use a VPN that does not offer paid tiers. Researchers have found that 100% free VPN services to be secretly logging user data and to be laden with malware. Experts also recommend avoiding US-based VPN services, due to the strictures of the USA PATRIOT Act. Sites like CNet, SafetyDetectives, and Wirecutter maintain current recommendations for VPN.

All pricing below current as of June 24, 2021 and is in US dollars, unless otherwise noted, with VAT not included. Language listed is the language in which the tool itself is available. Where the information was readily available, we have noted any limitations on a tools geographic availability.

GIJN Business Tools Guide for Newsrooms

The GIJN Digital Security Guide

Digital Self-Defense for Journalists: An Introduction

Talya Cooper is an archivist and researcher based in New York. She worked as the archivist of the Edward Snowden archive at The Intercept and as archive manager at StoryCorps. She is the co-author, with Alison Macrina, of Anonymity, a guide to anti-surveillance and privacy technology for librarians.

Excerpt from:
Data Security & Encryption Tools for Journalists Global Investigative Journalism Network - Global Investigative Journalism Network

Read More..

Ransomware’s Sneaky New Trick: Intermittent Encryption Is Here – CDOTrends

Ransomware is the digital gift that keeps on givingand taking. Its power comes from its simplicity: anyone with a dash of malice can launch an attack. Its strength lies in its simplicity and reliance on social engineering.

Anyone with malicious intent can now easily deploy ransomware, warns Asaf Hecht, security research director at CyberArk Labs. People are often too quick to click and install things on their computers.

The proliferation of Ransomware-as-a-Service (RaaS) on the Dark Web, complete with victim profiling and help desks for bad actors, has only exacerbated the problem. The COVID-19 pandemic further fueled the ransomware explosion as companies rushed to digitize and embrace remote work, leaving them vulnerable to targeted attacks.

If only the ransomware story stopped here. But like everything else in cybersecurity, ransomware has had a major upgrade.

While the end goal (cold, hard cash or ethereal cryptocurrencies) hasn't changed, the methods have.

Ransomware-as-a-Service (RaaS) now comes with a side of victim profiling, letting attackers zero in on high-value prey. And backups? They're not the safety net they used to be.

"Sometimes the backup is done once a week or even if it's once a day," says Hecht. He offered an example where an S&P 500 company can't afford to have a one-hour gap in information. "This is why the organization also paid."

Yes, backup software and techniques have improved over time, as has the detection of mass encryption activities. Companies are also triangulating individual behaviors to see whether they are acting strangely or under duress to stop any activity that smells like denial of availability through encryption.

As companies beef up their defenses, ransomware gangs are getting creative. It's no longer just about locking you out of your datawhats called denial of access.

They now frequently employ a combination of encryption and data exfiltration, threatening to release stolen data publicly if the ransom is not paidoften called denial of confidentiality.

Even more insidious is the rise of intermittent encryption. This technique selectively encrypts parts of files (in uniform blocks), making them unusable but not triggering traditional anti-ransomware measures.

Since only parts of files are encrypted, the attacks are swift and fly under the radar of traditional security tools.

Thats a major headache as it renders many security teams blind.

CyberArk's open-source tool, White Phoenix, offers a glimmer of hope.

It analyzes encrypted files and attempts to recover the original data using various algorithms and techniques. The Python source code is available on GitHub and at getmyfileback.com.

Hecht emphasizes that White Phoenix's primary goal is to help organizations combat intermittent encryption, not profit. CyberArk hopes to foster collaboration and accelerate its evolution by open-sourcing the tool as ransomware continues to adapt.

This tool can analyze encrypted files and attempt to recover the original data using various algorithms and techniques. Depending on the file type, size, and encryption method used by the ransomware, it could potentially restore some of the file content.

So why open source? Hecht takes a more altruistic tone, saying that the primary intent is not profits but helping companies deal with intermittent encryption. At the same time, it allows other companies to use it more effectively and evolve the tool as bad actors innovate further.

White Phoenix isn't a cure-all. It's specific on file types and has been tested on BlackCat/ALPHV, Play, Qilin/Agenda, BianLian, and DarkBit ransomware. The tool supports recovering data from files in formats like PDF, Word, Excel, PowerPoint, and Zip.

The tool works best when only a small portion of the file is encrypted. The tool also relies on finding unencrypted fragments that can be extracted and concatenated to recover the original data.

Of course, the ransomware creators will find new techniques or create new methods that will make it more difficult for White Phoenix in its current form.

However, as Hecht notes, as ransomware creators inevitably develop new techniques, tools like White Phoenix offer a fighting chance in the ongoing battle against this relentless threat. This counts in a ransomware landscape already co-opting AI into its arsenal.

Image credit: iStockphoto/sqback

Read more here:
Ransomware's Sneaky New Trick: Intermittent Encryption Is Here - CDOTrends

Read More..

Microsoft to Make BitLocker Encryption the Default in Next Windows 11 Build – ExtremeTech

A major change is coming to the next Windows 11 update to make PCs more secure. But it might also cause some equally major headaches. The upcoming Windows 11 24H2 version will reportedly enable BitLocker drive encryption for most computers. This will apply to fresh installs and reinstallations, and disabling BitLocker is a bit of a pain.

Microsoft began pushing BitLocker with the Windows 11 23H2 update, which made BitLocker the default for new installations on supported systems. With 24H2, that setting expands to reinstallations on any system that has run 24H2 or later. The details are still limited as the final software hasn't rolled out, but some Windows 11 Home machines could be spared from the requirement.

The new BitLocker default relies on the UEFI encryption flag. If a PC manufacturer has set that flag, Windows 11 24H2 will require BitLocker. In addition, after installing 24H2, many systems will flip that flag on, meaning all future reinstallations will require BitLocker. A DIY machine should give you control over that flag, so people who build their own systems should be able to avoid BitLocker.

Microsoft first released BitLocker with Windows Vista in 2004, and like most Windows software at the time, it wasn't very good. It was buggy and slow, and it only supported encrypting the system partition. BitLocker has been improved over the years, and you can now encrypt any partition in your PC with relatively little annoyance.

The upshot of BitLocker is that your files remain secure if someone tries to extract your data or even physically removes a storage device and plugs it into another machine. BitLocker also works with Trusted Platform Modules (TPM) to verify data integrity on boot. If Microsoft had been planning to implement BitLocker more widely, that could explain the strict requirement for Windows 11 machines to have a TPM.

You can turn on BitLocker on any Windows 11 machine, but Microsoft is making it a default setting going forward. Credit: Microsoft

This is admittedly a more modern way for users to store data. Android and iOS mobile devices implemented encryption by default several years ago, which made law enforcement none too happy. On the other hand, encryption has a computational cost, mainly when dealing with large volumes and files. Tom's Hardware says BitLocker can reduce SSD performance by up to 45% for some workloads. Modern CPUs have hardware acceleration for AES encryption, but the speed difference could be noticeable depending on your processor and storage device.

BitLocker is not necessarily bad, but it could be a big change for Windows users who are not used to encrypted storage. Your data could be lost if you lose your encryption key or attempt to move an encrypted drive to another system. The original report (in German) suggests using a tool like Rufus to create bootable installation media that has the BitLocker flag turned off. You can also access the command prompt during setup and use Regedit to flip the "PreventDeviceEncryption" key to 1.

View original post here:
Microsoft to Make BitLocker Encryption the Default in Next Windows 11 Build - ExtremeTech

Read More..

Which is it, RPD? Shooting, Disorderly, Or Encryption and Lies? – Rockford Scanner

Lask Exterior Solutions 815-964-2220

Welcome to RockfordScanner.com

The information posted below is my own personal opinion. For entertainment purposes only. I like to post multiple things such as Parody, Entertainment, News, Satire, Events, Editorials, opinions, reviews, photography, music, educational, etc I like to inform our community on different things and have fun doing so. The information posted is dynamic. And may not be accurate. RockfordScanner@gmail.com for any corrections or updates. Please do your own research and form your own opinion. First Amendment & Fair Use

Our Opinion: What Allegedly Happened Based on the current information, That has been provided tous. Most of the outcomes, are not known or final. Police have chosen to give our community The middle finger with encryption and non-transparency. So, nothing is confirmed. Gotta love police encryption and transparency

Which is it, RPD? Shooting, Disorderly, Or Encryption and Lies?

Sadly, Rockford PD chose to encrypt and remain SILENT.

Sources sent us photos from a major scene on E State st the other night.

Many reported it as a robbery, shooting and a possible murder.

However, RPD continues to push Crime is Down And labeled this call as a Disorderly

Since when does a LOT of police officers respond to a disorderly

MANY times, people call in a disorderly. And RPD REFUSES to respond, saying you have to come in to file a report in person.

Remind you, ROCKFORD PD CLOSED DOWN E STATE st for this call.

Sure, is a lot of police for a disorderly

Feeling lucky? FREE entry, for your chance to win on RockfordScanner.com https://rockfordscanner.com/contest/

Please take a few seconds and follow us, On our social media. Facebook, Youtube, X If you would like to get Near real-time notifications, when we post. Make sure you hit that push notification button above!

REMEMBER: We post everything on our website first, Before posting it to social media. So, check our website here first.

Click on that annoying button on top, to SUBSCRIBE! And you will get almost real time notifications, FREE!

RockfordScanner.com is not affiliated with any police, fire, or medical departments. However, if you would like us to relay some information to any department. We can be that third-party and relay your information and keep you anonymous. CLICK HERE TO CONTACT RS

Checkout one of the best Police scanners on the market!

If you have any information: RockfordScanner@gmail.com

If you see an error. Please let us know right away! Some content is assisted with AI tools. We strive for accuracy.

*** A simple anonymous email saying *** Hey that is not what happened, But this IS what happened Email us at RockfordScanner@gmail.com

Simple communication and transparency, Would eliminate any misinformation or exaggerations.

Our content is for entertainment purposes only. Informative entertainment.

CLICK HERE TO READ OUR DISCLAIMER & TERMS

Read the rest here:
Which is it, RPD? Shooting, Disorderly, Or Encryption and Lies? - Rockford Scanner

Read More..

Apple and encryption services Wire and Proton have provided information on activists at the request of police – GIGAZINE

May 14, 2024 14:00:00

It has been revealed that Spanish police have obtained personal information from encryption services Wire and Proton, as well as Apple, in an effort to identify independence activists in the Spanish region of Catalonia.

Encrypted services Apple, Proton and Wire helped Spanish police identity activist | TechCrunch

According to technology media TechCrunch, the Spanish police agency

Wire provided the activist's email address, and Proton provided the activist's iCloud email address for recovery to Guardia Civil, who then requested further information from Apple, obtaining two addresses and the associated Gmail account.

In addition, Wire and Proton (PDF file) Apple , Wire and Proton all state in their company policies that they will 'respond to requests from law enforcement agencies if necessary.'

According to technology media TechCrunch, the Spanish police, Guardia Civil, has requested, through judicial authorities, that Wire and Proton disclose information about the activists, and both companies have complied.

Wire provided the activist's email address, and Proton provided the activist's iCloud email address for recovery to Guardia Civil, which then requested information from Apple, obtaining two addresses and the associated Gmail account.

This information apparently helped Guardia Civil track down 'the perpetrators of the street riots in Catalonia in 2019.'

Encryption services protect communications by encrypting them with a key that is normally only held by the user. Wire emphasized that communications are protected, stating, 'We have only provided basic account information, and we cannot view or disclose the contents of data sent within the service.' Proton similarly stated, 'We can only confirm minimal account information,' and explained that this time, the activists themselves had set up an unencrypted recovery address, so they provided it as information that could be disclosed.

Apple, Guardia Civil and Swiss judicial authorities did not provide further details.

Read more:
Apple and encryption services Wire and Proton have provided information on activists at the request of police - GIGAZINE

Read More..

How AI-powered smart contracts shape the future of social networks – Cointelegraph

ICX, a blockchain-based social network, is poised to address social networks fundamental problems through enhanced privacy and user ownership by integrating AI into smart contracts.

Data reveals that 62% of the global population has at least one social media account. However, social networks face challenges such as privacy concerns, misinformation distribution and algorithmic biases.

It is a known fact that centralized social networks make money by selling their users' data. On the other hand, the monopolization of the social media space by a few dominant companies such as Facebook, Twitter and YouTube is another hot topic.

The good news is that blockchain and artificial intelligence (AI) technologies can potentially relieve social networks pain points. Blockchains encryption capabilities can address privacy issues, and AI technologies can tackle the remaining challenges.

ICX, a decentralized social network, aims to facilitate online social interactions and the exchange of information among users via blockchain-based innovations. The platforms primary goal is to advance communication models featuring enhanced privacy, ownership and community-driven governance.

All user data on the network, including posts, images and videos, is stored on-chain. Therefore, users have full ownership and control over their data in accordance with the fundamental principles of privacy and user autonomy.

ICX is being developed on the Internet Computer (ICP) blockchain, a decentralized computing platform that allows software to run without traditional web servers. By leveraging the capabilities of the IC blockchain, ICX is set to embed AI within smart contracts self-executing agreement codes.

The Web3 social network is also planning to integrate large language models (LLMs) AI programs that can recognize and generate humanlike text to provide users with features like digital clones.

In addition to AI-driven innovations, ICX wants to differentiate itself from traditional social platforms by giving its community approval power. In the upcoming release, ICX will be governed by a decentralized autonomous organization (DAO) a structure run by member votes without central authority.

ICX developers suggest the DAO model will allow advanced crypto features to be used

With the DAO model, any significant updates or changes to ICX's decentralized application (DApp) will occur following a voting process. Users who want to participate in governance also called neurons need to lock their ICX tokens into the network to gain voting rights.

The democratic governance framework will also enable sophisticated features such as ragequitting. Ragequitting is a feature that enables DAO members to exit the DAO by burning tokens and withdrawing their share of the treasury.

As part of the development phases, ICX is preparing to release proof of concept, which is a preliminary demonstration used to confirm that certain theories have the potential to be developed.

In the first release, the platform will leverage AI to test new forms of social interaction. ICX's goal, which will evaluate initial reactions and feedback from users, is to determine the feasibility and effectiveness of AI in improving social networking experiences.

How integrating AI into social communication works. Source: ICX

Once the proof of concept receives positive feedback, the platform will move all its functionality on-chain and become fully decentralized, adhering to the principles of the Internet Computer blockchain protocol.

Aiming to transform the way people interact both online and offline, ICX argues that a better future can be built on the basis of AI-supported social networks. "We envision a future free from endless social feed scrolling, where humans connect more in the real world," ICX founder Marcio says, adding: "I believe robots and AI can guide us towards this paradise."

As traditional models come under increasing scrutiny for invading privacy and commoditizing data, the application of decentralized technologies presents a promising alternative. While the digital landscape evolves, the fusion of blockchain and AI may well redefine the foundational structures of social networking, steering it toward a more secure and user-centric future.

Disclaimer. Cointelegraph does not endorse any content or product on this page. While we aim at providing you with all important information that we could obtain in this sponsored article, readers should do their own research before taking any actions related to the company and carry full responsibility for their decisions, nor can this article be considered as investment advice.

See more here:

How AI-powered smart contracts shape the future of social networks - Cointelegraph

Read More..