Page 2,703«..1020..2,7022,7032,7042,705..2,7102,720..»

Facebook is bringing end-to-end encryption to Messenger calls and Instagram DMs – TechCrunch

Facebook has extended the option of using end-to-end encryption for Messenger voice calls and video calls.

End-to-end encryption (E2EE) a security feature that prevents third-parties from eavesdropping on calls and chats has been available for text conversations on Facebooks flagship messaging service since 2016. Although the company has faced pressure from governments to roll back its end-to-end encryption plans, Facebook is now extending this protection to both voice and video calls on Messenger, which means that nobody else, including Facebook, can see or listen to whats sent or said.

End-to-end encryption is already widely used by apps like WhatsApp to keep personal conversations safe from hackers and criminals, Ruth Kricheli, director of product management for Messenger, said in ablog post on Friday. Its becoming the industry standard and works like a lock and key, where just you and the people in the chat or call have access to the conversation.

Facebook has some other E2EE features in the works, too. Its planning to start public tests of end-to-end encryption for group chats and calls in Messenger in the coming weeks and is also planning a limited test of E2EE for Instagram direct messages. Those involved in the trial will be able to opt-in to end-to-end encrypted messages and calls for one-on-one conversations carried out on the photo-sharing platform.

Beyond encryption, the social networking giant is also updating its expiring messages feature, which is similar to the ephemeral messages feature available on Facebook-owned WhatsApp. Its now offering more options for people in the chat to choose the amount of time before all new messages disappear, from as few as five seconds to as long as 24 hours.

People expect their messaging apps to be secure and private, and with these new features, were giving them more control over how private they want their calls and chats to be, Kricheli added.

News of Facebook ramping up its E2EE rollout plans comes just days after the company changed its privacy settings again.

See the rest here:
Facebook is bringing end-to-end encryption to Messenger calls and Instagram DMs - TechCrunch

Read More..

How to encrypt your computer (and why you should) – Mashable

Privacy Please is an ongoing series exploring the ways privacy is violated in the modern world, and what can be done about it.

Computer security and privacy are daunting subjects that call to mind global ransomware gangs, targeted espionage, and data-hungry behemoths. And yet, often overlooked in this roiling digital miasma is the fact that there's one simple step you can take to protect both your privacy and your security: Encrypting your computer.

Cooper Quintin, a security researcher with the Electronic Frontier Foundation, likens encrypting your computer to the most basic of preventative health measures.

"It's a really fantastic bit of basic security hygiene, like washing your hands or wearing a mask, that anyone can do that really gets you a lot of benefits," he explained over the phone.

Encryption is complicated. But you personally don't need to understand all the behind-the-scenes math, as smart and dedicated people have already figured it out for you.

When discussing encrypting data, experts typically talk about two distinct categories: encryption of data in motion, and encryption of data at rest. For the former, think of things like text messaging. Apps like Signal use end-to-end encryption to ensure messages (data in motion) can't be read by third parties. And that's great! For the latter, which is what this piece is focused on, think about the data that lives on people's computers or phones.

Data that, presumably, you want to keep private.

A properly encrypted hard drive is functionally unreadable to anyone who doesn't have the decryption key. When it comes to an encrypted computer, that's usually just the password used to log in. Unlike deleted data, which is often trivial to recover, encrypted data is truly private appearing as a jumbled mess to any unwelcome eyes.

"Even if you've deleted stuff, people can recover the deleted files from your hard drive," emphasized Quintin. "But, if you've encrypted your hard drive, people won't be able to recover those files."

People store a lot of personal data on their computers tax documents, private photos, health records, journal entries, and who knows what else and even if there are no plans to share that information with the world, if your hard drive isn't encrypted, the chances are a lot higher that its contents will get out.

"The most important reason to encrypt your computer or phone, and this may seem obvious, is so that no can read, without your permission, what's on your computer or your phone," added Quintin. "This is really handy, for example, if somebody were to steal your computer or steal your phone or you were to lose your computer, or your phone."

In the scenario that Quintin lays out, even if thieves get their hands on your computer, the files on that computer remain inaccessible to them.

It's a reminder that even supposed experts occasionally need.

In 2009, journalists studying global e-waste stumbled across a computer hard drive loaded with documents tied to U.S. defense contractor Northrop Grumman. The hard drive was unencrypted, and the journalists reportedly found "hundreds and hundreds of documents about government contracts" and files marked "competitive sensitive."

In August of 2021, Jen Easterly, the director of the Cybersecurity and Infrastructure Security Agency, reiterated the importance of strong encryption calling it "absolutely fundamental."

Essentially, encrypting your computer is a vital step. It's one that should be done today, right now, before you lose, sell, or recycle your computer.

Thankfully, these days encrypting both Macs and and PCs is an easy process even if the onus is on you to make it happen.

"It's a shame that operating systems for laptops and desktops, such as Mac and Windows, are not presenting [encryption] as a default because it's really such a basic step that everyone should take," observed Quinton.

Those looking to take that basic computer hygiene step are in luck, as often there's no additional software or skills required. Most modern computers provide owners a baked-in process (as long as they know where to look).

"The ways that Mac, and Windows, and all of your mobile phones allow you to encrypt your computer are perfectly fine for the vast majority of people," Quintin assured.

Pretty easy.Credit: Screenshot / apple

Click the Apple logo in the upper-left corner of your screen

Select System Preferences > Security & Privacy and then click the FireVault tab

Click the lock icon in the bottom left of the window, then provide the admin name and password (if it's your computer, that's likely just your login info)

Select Turn On FileVault

Chose a recovery method in case you forget your password (Apple explains that part in detail, but a local recovery key is perhaps the most straightforward of the options)

Click Continue, and go about your business as your hard drive encrypts in the background

Sign into your Windows admin account (if it's your computer, that's likely just the account you use day to day)

Click theStartbutton >Settings > Update & Security > Device encryption

If you see the Device encryption option, select Turn on

If you don't see the Device encryption option, then Windows explains that you should search for "Manage BitLocker" using the taskbar, open it up, and then turn the feature on

That's it. You're all done.

Encrypting your hard drive is a great way to protect your personal data from prying eyes. Of course, if you're not careful, it might also protect your data from you.

Unlike with an unencrypted computer, if you lose your password there is not an easy way to retrieve your data. In other words, encryption is like locking your files in a safe forget the combination, and you're in quite the bind.

SEE ALSO: How to blur your house on Google Street View (and why you should)

Thankfully, the EFF's Quintin suggests a few steps you can take to make sure you never get locked out of your newly secure computer system.

For starters, use a password manager to keep a copy of your password. You can also write the password down and give it to a trusted friend or relative, or put it in a safety deposit box.

"Encrypting your hard drive should be the norm," reiterated Quintin.

A norm where all your data is secure and private sure sounds nice. Thankfully, you now know how to make that a reality.

Read more:
How to encrypt your computer (and why you should) - Mashable

Read More..

Apple opens the encryption Pandora’s box – Axios

Apple's plan to scan iPhones for child sexual abuse material (CSAM) provoked immediate criticism that it was opening a door to much broader efforts by governments seeking a way into citizens' devices.

Between the lines: That debate is important, but Apple is also laying out a technical approach that's worthy of the industry's attention.

Driving the news: Apple last week announced its plan to begin scanning iPhones in the U.S. to see if they contain material that has been flagged as illegal by the National Center for Missing and Exploited Children. A separate change would allow parents to be notified if children under 13 are sent nude images.

The big picture: Much of the debate mirrors past encryption controversies, in which encryption proponents have argued that any kind of exception or back door creates vulnerabilities that will be exploited by bad actors, so you might as well not bother using encryption at all.

Indeed, critics of Apple's approach here say that once it starts scanning devices on the client side, it really won't be offering end-to-end encryption at all.

My thought bubble: The immediate blowback suggests that Apple either didn't get the balance right in this instance, or did a bad job of communicating its system, or both.

Apple has explored this in other areas as well including the system that it created with Google to notify users of potential COVID-19 exposure. A mix of information on a device and in the cloud ensured that only a narrow amount of new data about users' health and location was created, and even less was shared.

Even those who criticize Apple over its new CSAM detection feature acknowledge there is some benefit to Apple's approach.

See the rest here:
Apple opens the encryption Pandora's box - Axios

Read More..

Protects User Privacy With Encryption and Authentication – Security Magazine

Protects User Privacy With Encryption and Authentication | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.

Go here to read the rest:
Protects User Privacy With Encryption and Authentication - Security Magazine

Read More..

Facebook introduces end-to-end encryption for its voice & video call features – Techstory

Source: WIRED

Facebook Inc., the social media conglomerate introduces end-to-end encryption for its Messenger app for voice and video calls alongside advanced controls for its disappearing messages feature.

The company owns the top four social media apps including WhatsApp, Instagram, Messenger, and its core Facebook app making the social media giant liable for the security and privacy of billions of people across the globe. Facebook first introduced end-to-end encryption in its messenger app for text messages when the company added a secret conversation feature to its app back in 2016.

However, seeing the current scenario where peoples interest in voice and video calls is increasing each day, Facebook has decided to add this feature to its Messenger saying that the app now sees more than a hundred and fifty million video calls a day.

It is a common understanding these days that privacy in any form is a must and that too when it is in regards to the safety of more than a billion users online.

Furthermore, Facebooks chat-oriented app WhatsApp is already offering this feature of end-to-end encryption or E2EE for quite a long time now preventing anybody but the sender and the receiver from seeing the chats between them and everything else is stored in the form of encrypted data in the apps databases.

Having said that, not just WhatsApp and Facebook but many other video calling applications like Apples Facetime and Zoom categorizes and commonly agree upon making end-to-end encryption as industry standards across all messaging apps.

According to rumours, it is anticipated that Facebook will roll out a unified version of the E2EE messaging system across all of its apps but that hasnt happened so far. In addition to this, text chats are also getting a small update for disappearing messages with a few more options for the setting, now allowing users to choose between five seconds and 24 hours as to when the messages in their chats disappear. Originally the feature was offered with 1 minute, fifteen minutes, and 24-hour options.

Engadget notes, the social media giant is also working on a few other features in its beta test offering end-to-end encryption in group chats and calls between family and friends. Not just that, Instagram will also now offer a limited test allowing users to choose if they want E2EE for their direct messages as well.

In conclusion, I think it is a great step forward towards a new and safer social media existence for billions of users using apps for communicating with their family and friends.

View original post here:
Facebook introduces end-to-end encryption for its voice & video call features - Techstory

Read More..

An Overview of Blockchain in Supply Chain: Whats the Link? – JD Supra

Blockchain in Supply Chain: Article 1

Managing the supply chain is one of the biggest challenges faced by modern-day global companies. These companies devote a tremendous amount of resources to investigating inefficiencies and identifying areas of cost reduction.

Forward-thinking companies are now investigating blockchain as a technology that could potentially revolutionize supply chain as we know it. Analysts predict that blockchain technology is capable of improving the contemporary supply chain structure by increasing supply chain trust, efficiency, and transparency.1

Increasingly, supply chain leaders are recognizing that the future of supply chain may lie in blockchain solutions. In 2019, a survey performed by PwC revealed that 24% of industrial manufacturing CEOs were planning, piloting, or implementing blockchain technology.2 Then, in 2020, Deloittes Global Blockchain Survey revealed that 55% of its senior executive and practitioner respondents viewed blockchain as a top priority.3 In 2021, Business Wire reported that the market for blockchain in supply chain is predicted to grow from $253 million in 2020 to over $3 billion by 2026.4

Blockchain is often equated with cryptocurrency, but in fact, blockchain technology has many applications beyond functioning as a virtual currency platform. To understand how blockchain fulfills a need in supply chain, it is first necessary to understand how blockchain works.

A blockchain is a string of encrypted data blocks. Lets break that down: The blocks of the blockchain can be conceptualized like a file containing information (the data), and that information is locked so that only those with the key can access the information (the encryption).

Many files (or blocks) are linked one after another into a chain. Each file (or block) of data includes the following types of information a timestamp to indicate when it was created, historical information about the blocks that precede it in the chain, and information that is new to that block. All the blocks together make up the blockchain.

Computers, laptops, servers, or other computer devices connected to the internet are needed to access the blockchain. When these devices are connected together, they are called nodes of the blockchain. The nodes store the blockchain (and the users of the nodes may be anybody in the world as in permissionless blockchains or may be limited to certain users as in permissioned blockchains, which will be discussed further in a future article in this Blockchain in Supply Chain series).

The storing of the blockchain across the nodes creates a type of distributed ledger, which is a system in which data is stored and shared across multiple sites, countries, or institutions. A distributed ledger can be contrasted with a traditional database in which all the digital data is stored in a centralized location. In the case of blockchain, the different nodes typically store identical data.

In order to add a new block of data to the blockchain, a node must send out a transaction request with the new data to other nodes on the blockchain network, triggering the creation of a block. Before the new block is added to the chain, a select number of nodes must first agree that the addition of the new block to the blockchain is valid. When validating the new block, the nodes confirm that the block is correctly formatted and that it does not contain duplicate transactions. After the block is validated, the encrypted block is added to the string of existing blocks and stored by the other nodes on the blockchain network.

Because blockchain is encrypted and in a distributed ledger format, the data on the blockchain are thought to be virtually unhackable, thereby lending trust and confidence in the data stored on the blockchain.

Although we do not know whether blockchain will revolutionize supply chain any more than we know whether bitcoin will be the currency of the future, several prominent companies are testing blockchain solutions and investigating blockchain uses for their supply chains. By 2023, it is projected that 30% of manufacturing companies with more than $5 billion in revenue will be engaging blockchain technologies.5 To name a few:

In the upcoming articles in this Blockchain in Supply Chain series, we will discuss the above programs in more detail.

Future articles in this Blockchain in Supply Chain series will address the following topics:

1 Building a Transparent Supply Chain, Harvard Business Review (May-June 2020), https://hbr.org/2020/05/building-a-transparent-supply-chain; An Integrated Impact of Blockchain on Supply Chain Applications, Logistics (2021), https://www.mdpi.com/2305-6290/5/2/33/htm.

2 How can blockchain power industrial manufacturing? PwC, https://www.pwc.com/us/en/industries/industrial-products/library/blockchain-industrial-manufacturing.html (last retrieved July 6, 2021).

3 Deloittes 2020 Global Blockchain Survey: From Promise to Reality, Deloitte Insights (2020), https://www2.deloitte.com/content/dam/insights/us/articles/6608_2020-global-blockchain-survey/DI_CIR%202020%20global%20blockchain%20survey.pdf.

4 The Worldwide Blockchain Supply Chain Industry is Expected to Reach $3+ Billion by 2026 ResearchAndMarkets.com. Businesswire (March 16, 2021), https://www.businesswire.com/news/home/20210316005759/en/The-Worldwide-Blockchain-Supply-Chain-Industry-is-Expected-to-Reach-3-Billion-by-2026---ResearchAndMarkets.com.

5 Dimitrov, Biser. How Walmart and Others Are Riding a Blockchain Wave to Supply Chain Paradise, Forbes (December 5, 2019), https://www.forbes.com/sites/biserdimitrov/2019/12/05/how-walmart-and-others-are-riding-a-blockchain-wave-to-supply-chain-paradise/?sh=2c6b6ff47791.

6 Kemp, Leanne, Everledgers Pioneering Blockchain Work for Diamonds, IBM (May 23, 2018), https://www.ibm.com/blogs/think/2018/05/everledger/; Everledger, Forbes (February 12, 2020), https://www.forbes.com/companies/everledger/?sh=5368e9d5bb05.

7 Our Industry Solutions, Everledger, https://everledger.io/industry-solutions/ (last retrieved July 14, 2021).

8 Dimitrov, supra note 5; IBM Food Trust. A New Era for the Worlds Food Supply, IBM, https://www.ibm.com/blockchain/solutions/food-trust (last retrieved July 6, 2021).

9 Amazon Managed Blockchain Now Supports Hyperledger Fabric v.1.4, AWS (September 15, 2020), https://aws.amazon.com/about-aws/whats-new/2020/09/amazon-managed-blockchain-now-supports-hyperledger-fabric-v1-4/; Supply Chain Management, AWS, https://aws.amazon.com/industrial/supply-chain-management/ (last retrieved July 6, 2021); What is Hyperledger? Hyperledger, https://www.hyperledger.org/about (last retrieved July 11, 2021).

[View source.]

Continued here:
An Overview of Blockchain in Supply Chain: Whats the Link? - JD Supra

Read More..

Hardware Encryption Devices Market Research Report 2021 Elaborate Analysis With Growth Forecast To 2027 Intel, Toshiba, Micron Technology Inc,…

This report elaborates the market size, market characteristics, and market growth of the Hardware Encryption Devices industry, and breaks down according to the type, application, and consumption area of Hardware Encryption Devices. The report also conducted a PESTEL analysis of the industry to study the main influencing factors and entry barriers of the industry.

A2Z Market Research announces the release of the Hardware Encryption Devices Market research report. The global Hardware Encryption Devices market research is predicted to record a substantial CAGR during the review period 2021-2027.

The Hardware Encryption Devices study deals with an extensive evaluation of market procurements, contributions, unifications, collaboration, and new product launches during the forecast period. The research includes a detailed evaluation of meticulous customers, power consumption, and production capacity, utilization volume to benefit business owners. Additionally, the Heavy Industry industry report encompasses important data on distribution channels, supply chain management across various geographics through tables, charts, and infographics.

Get Sample Report with Latest Industry Trends Analysis: http://www.a2zmarketresearch.com/sample?reportId=529726

The top companies in this report include:

Intel, Toshiba, Micron Technology Inc, Seagate Technology PLC, Kanguru Solutions, Gemalto (Thales), Western Digital Corp, Samsung Electronics, Certes Networks Inc., Kingston Technology Corp

The global Hardware Encryption Devices market research report is expected to witness a steady market growth during the forecast period owing to the rising adoption of updated technologies, growing urbanization, and increasing per capita expenditure worldwide. Furthermore, the product enhancements to increase its shelf life, durability, and updated versions are further propelling the growth of the global Hardware Encryption Devices market in upcoming years. Also, the report highlights the effect of the market on the environment and the government guidelines.

Report Coverage

The research study of the Hardware Encryption Devices market covers Introduction, product scope, market outline, market openings, market hazard, significant market-main thrust alongside the top makers and examinations their business, sales, and value choices for the term 2021 and 2027. Also, the report presents the cutthroat idea of the market by talking about the opposition among the main makers. The report investigations the market with the assistance of deals, income, and share information for 2021 and 2027.

Additionally, the report shows the worldwide market by geographics and the proportionate size of each market locale-dependent on deals, while recovering the key market impetuses forming the headways of the Hardware Encryption Devices market the researchers likewise concentrate on the development of the client base in different agricultural nations. Additionally, the income and share of the worldwide Hardware Encryption Devices market for the audit time frame 2021-2027 are remembered for the report. Additionally, the detailed investigation of the significant geographics alongside deals, sales and portion of the overall industry by key nations in these locales are remembered for the report. Further, the report discusses the market division, for example, application and kinds of Hardware Encryption Devices market utilizing a similar arrangement of information for the time of 2021-2027. The market figure by districts, types, and applications utilizing deals and sales data for the projected time frame 2021-2027.

Request For Customized Report: http://www.a2zmarketresearch.com/enquiry?reportId=529726

Market Segmentation

The latest research on the global Hardware Encryption Devices market for the review period, 2021 to 2027 categorizes the market into various segments in terms of the product type, end-use, and application. Nevertheless, these segments are examined in detail along with market evaluations at both the regional and country level. This market segmentation is advantageous to stakeholders, business owners, and marketing personnel to obtain knowledge of the growth areas and potential opportunities for the Hardware Encryption Devices market. The market research report further includes the competitive insights of the market across the various region.

Segment By Type

Encrypted Hard Disk Drives, Encrypted Solid-State Drives, Hardware Security Module, Others

Segment By Application

IT & Telecom, BFSI, Government & Public Utilities, Manufacturing Enterprise, Others

The research report of the global Hardware Encryption Devices market provides answers to the following key questions:

Buy Exclusive Report: http://www.a2zmarketresearch.com/buy?reportId=529726

Contact Us:

Roger Smith

1887 WHITNEY MESA DR HENDERSON, NV 89014

[emailprotected]tresearch.com

+1 775 237 4147

See more here:
Hardware Encryption Devices Market Research Report 2021 Elaborate Analysis With Growth Forecast To 2027 Intel, Toshiba, Micron Technology Inc,...

Read More..

If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World – EFF

Apples new program for scanning images sent on iMessage steps back from the companys prior support for the privacy and security of encrypted messages. The program, initially limited to the United States, narrows the understanding of end-to-end encryption to allow for client-side scanning. While Apple aims at the scourge of child exploitation and abuse, the company has created an infrastructure that is all too easy to redirect to greater surveillance and censorship. The program will undermine Apples defense that it cant comply with the broader demands.

For years, countries around the world have asked for access to and control over encrypted messages, asking technology companies to nerd harder when faced with the pushback that access to messages in the clear was incompatible with strong encryption. The Apple child safety message scanning program is currently being rolled out only in the United States.

The United States has not been shy about seeking access to encrypted communications, pressuring the companies to make it easier to obtain data with warrants and to voluntarily turn over data. However, the U.S. faces serious constitutional issues if it wanted to pass a law that required warrantless screening and reporting of content. Even if conducted by a private party, a search ordered by the government is subject to the Fourth Amendments protections. Any warrant issued for suspicionless mass surveillance would be an unconstitutional general warrant. As the Ninth Circuit Court of Appeals has explained, "Search warrants . . . are fundamentally offensive to the underlying principles of the Fourth Amendment when they are so bountiful and expansive in their language that they constitute a virtual, all-encompassing dragnet[.]" With this new program, Apple has failed to hold a strong policy line against U.S. laws undermining encryption, but there remains a constitutional backstop to some of the worst excesses. But U.S constitutional protection may not necessarily be replicated in every country.

Apple is a global company, with phones and computers in use all over the world, and many governments pressure that comes along with that. Apple has promised it will refuse government demands to build and deploy government-mandated changes that degrade the privacy of users. It is good that Apple says it will not, but this is not nearly as strong a protection as saying it cannot, which could not honestly be said about any system of this type. Moreover, if it implements this change, Apple will need to not just fight for privacy, but win in legislatures and courts around the world. To keep its promise, Apple will have to resist the pressure to expand the iMessage scanning program to new countries, to scan for new types of content and to report outside parent-child relationships.

It is no surprise that authoritarian countries demand companies provide access and control to encrypted messages, often the last best hope for dissidents to organize and communicate. For example, Citizen Labs research shows thatright nowChinas unencrypted WeChat service already surveils images and files shared by users, and uses them to train censorship algorithms. When a message is sent from one WeChat user to another, it passes through a server managed by Tencent (WeChats parent company) that detects if the message includes blacklisted keywords before a message is sent to the recipient. As the Stanford Internet Observatorys Riana Pfefferkorn explains, this type of technology is a roadmap showing how a client-side scanning system originally built only for CSAM [Child Sexual Abuse Material] could and would be suborned for censorship and political persecution. As Apple has found, China, with the worlds biggest market, can be hard to refuse. Other countries are not shy about applying extreme pressure on companies, including arresting local employees of the tech companies.

But many times potent pressure to access encrypted data also comes from democratic countries that strive to uphold the rule of law, at least at first. If companies fail to hold the line in such countries, the changes made to undermine encryption can easily be replicated by countries with weaker democratic institutions and poor human rights recordsoften using similar legal language, but with different ideas about public order and state security, as well as what constitutes impermissible content, from obscenity to indecency to political speech. This is very dangerous. These countries, with poor human rights records, will nevertheless contend that they are no different. They are sovereign nations, and will see their public-order needs as equally urgent. They will contend that if Apple is providing access to any nation-state under that states local laws, Apple must also provide access to other countries, at least, under the same terms.

For example, the Five Eyesan alliance of the intelligence services of Canada, New Zealand, Australia, the United Kingdom, and the United Stateswarned in 2018 that they will pursue technological, enforcement, legislative or other measures to achieve lawful access solutions if the companies didnt voluntarily provide access to encrypted messages. More recently, the Five Eyes have pivoted from terrorism to the prevention of CSAM as the justification, but the demand for unencrypted access remains the same, and the Five Eyes are unlikely to be satisfied without changes to assist terrorism and criminal investigations too.

The United Kingdoms Investigatory Powers Act, following through on the Five Eyes threat, allows their Secretary of State to issue technical capacity notices, which oblige telecommunications operators to make the technical ability of providing assistance in giving effect to an interception warrant, equipment interference warrant, or a warrant or authorisation for obtaining communications data. As the UK Parliament considered the IPA, we warned that a company could be compelled to distribute an update in order to facilitate the execution of an equipment interference warrant, and ordered to refrain from notifying their customers.

Under the IPA, the Secretary of State must consider the technical feasibility of complying with the notice. But the infrastructure needed to roll out Apples proposed changes makes it harder to say that additional surveillance is not technically feasible. With Apples new program, we worry that the UK might try to compel an update that would expand the current functionality of the iMessage scanning program, with different algorithmic targets and wider reporting. As the iMessage communication safety feature is entirely Apples own invention, Apple can all too easily change its own criteria for what will be flagged for reporting. Apple may receive an order to adopt its hash matching program for iPhoto into the message pre-screening. Likewise, the criteria for which accounts will apply this scanning, and where positive hits get reported, are wholly within Apples control.

Australia followed suit with its Assistance and Access Act, which likewise allows for requirements to provide technical assistance and capabilities, with the disturbing potential to undermine encryption. While the Act contains some safeguards, a coalition of civil society organizations, tech companies, and trade associations, including EFF andwait for itApple, explained that they were insufficient.

Indeed, in Apples own submission to the Australian government, Apple warned the government may seek to compel providers to install or test software or equipment, facilitate access to customer equipment, turn over source code, remove forms of electronic protection, modify characteristics of a service, or substitute a service, among other things. If only Apple would remember that these very techniques could also be used in an attempt to mandate or change the scope of Apples scanning program.

While Canada has yet to adopt an explicit requirement for plain text access, the Canadian government is actively pursuing filtering obligations for various online platforms, which raise the spectre of a more aggressive set of obligations targeting private messaging applications.

For the Five Eyes, the ask is mostly for surveillance capabilities, but India and Indonesia are already down the slippery slope to content censorship. The Indian governments new Intermediary Guidelines and Digital Media Ethics Code (2021 Rules), in effect earlier this year, directly imposes dangerous requirements for platforms to pre-screen content. Rule 4(4) compels content filtering, requiring that providers endeavor to deploy technology-based measures, including automated tools or other mechanisms, to proactively identify information that has been forbidden under the Rules.

Indias defense of the 2021 rules, written in response to the criticism from three UN Special Rapporteurs, was to highlight the very real dangers to children, and skips over the much broader mandate of the scanning and censorship rules. The 2021 Rules impose proactive and automatic enforcement of its content takedown provisions, requiring the proactive blocking of material previously held to be forbidden under Indian law. These laws broadly include those protecting the sovereignty and integrity of India; security of the State; friendly relations with foreign States; public order; decency or morality. This is no hypothetical slippery slopeits not hard to see how this language could be dangerous to freedom of expression and political dissent. Indeed, Indias track record on its Unlawful Activities Prevention Act, which has reportedly been used to arrest academics, writers and poets for leading rallies and posting political messages on social media, highlight this danger.

It would be no surprise if India claimed that Apples scanning program was a great start towards compliance, with a few more tweaks needed to address the 2021 Rules wider mandate. Apple has promised to protest any expansion, and could argue in court, as WhatsApp and others have, that the 2021 Rules should be struck down, or that Apple does not fit the definition of a social media intermediary regulated under these 2021 Rules. But the Indian rules illustrate both the governmental desire and the legal backing for pre-screening encrypted content, and Apples changes makes it all the easier to slip into this dystopia.

This is, unfortunately, an ever-growing trend. Indonesia, too, has adopted Ministerial Regulation MR5 to require service providers (including instant messaging providers) to ensure that their system does not contain any prohibited [information]; and [...] does not facilitate the dissemination of prohibited [information]. MR5 defines prohibited information as anything that violates any provision of Indonesias laws and regulations, or creates community anxiety or disturbance in public order. MR5 also imposes disproportionate sanctions, including a general blocking of systems for those who fail to ensure there is no prohibited content and information in their systems. Indonesia may also see the iMessage scanning functionality as a tool for compliance with Regulation MR5, and pressure Apple to adopt a broader and more invasive version in their country.

The pressure to expand Apples program to more countries and more types of content will only continue. In fall of 2020, in the European Union, a series of leaked documents from the European Commission foreshadowed an anti-encryption law to the European Parliament, perhaps this year. Fortunately, there is a backstop in the EU. Under the e-commerce directive, EU Member States are not allowed to impose a general obligation to monitor the information that users transmit or store, as stated in the Article 15 of the e-Commerce Directive (2000/31/EC). Indeed, the Court of Justice of the European Union (CJEU) has stated explicitly that intermediaries may not be obliged to monitor their services in a general manner in order to detect and prevent illegal activity of their users. Such an obligation will be incompatible with fairness and proportionality. Despite this, in a leaked internal document published by Politico, the European Commission committed itself to an action plan for mandatory detection of CSAM by relevant online service providers (expected in December 2021) that pointed to client-side scanning as the solution, which can potentially apply to secure private messaging apps, and seizing upon the notion that it preserves the protection of end-to-end encryption.

For governmental policymakers who have been urging companies to nerd harder, wordsmithing harder is just as good. The end result of access to unencrypted communication is the goal, and if that can be achieved in a way that arguably leaves a more narrowly defined end-to-end encryption in place, all the better for them.

All it would take to widen the narrow backdoor that Apple is building is an expansion of the machine learning parameters to look for additional types of content, the adoption of the iPhoto hash matching to iMessage, or a tweak of the configuration flags to scan, not just childrens, but anyones accounts. Apple has a fully built system just waiting for external pressure to make the necessary changes. China and doubtless other countries already have hashes and content classifiers to identify messages impermissible under their laws, even if they are protected by international human rights law. The abuse cases are easy to imagine: governments that outlaw homosexuality might require a classifier to be trained to restrict apparent LGBTQ+ content, or an authoritarian regime might demand a classifier able to spot popular satirical images or protest flyers.

Now that Apple has built it, they will come. With good intentions, Apple has paved the road to mandated security weakness around the world, enabling and reinforcing the arguments that, should the intentions be good enough, scanning through your personal life and private communications is acceptable. We urge Apple to reconsider and return to the mantra Apple so memorably emblazoned on a billboard at 2019s CES conference in Las Vegas: What happens on your iPhone, stays on your iPhone.

See the article here:
If You Build It, They Will Come: Apple Has Opened the Backdoor to Increased Surveillance and Censorship Around the World - EFF

Read More..

Encryption Software Market Report 2021-26: Size, Growth, Size, Share and Forecast IMARC Group – The Market Writeuo – The Market Writeuo

According to the latest report by IMARC Group, titled Encryption Software Market: Global Industry Trends, Share, Size, Growth, Opportunity and Forecast 2021-2026, the globalencryption software marketexhibited strong growth during 2015-2020. Looking forward, IMARC Group expects the market to grow at a CAGR of around 15% during 2021-2026.

We are regularly tracking the direct effect of COVID-19 on the market, along with the indirect influence of associated industries. These observations will be integrated into the report.

Request Free Report Sample:

https://www.imarcgroup.com/encryption-software-market/requestsample

Encryption software is a program that protects sensitive data in transit or at rest using data encryption algorithms. It enables encryption of data objects, files, networks, applications, laptops, tablets, etc. Encryption software aids in providing complete data protection, maintaining integrity, providing security across various devices, ensuring safe data transfer, etc. It also assists in streamlining the operations of an organizations applications and workflows.

The increasing adoption of the Internet of Things (IoT) and Bring Your Own Device (BYOD) among enterprises is leading to rising data security concerns towards data breaches, theft, cyberattacks, commercial espionage, losses, etc. This represents one of the primary factors driving the encryption software market. Moreover, the growing penetration of cloud computing solutions is also propelling the need to safeguard data. This, along with the increasing usage of high-speed internet and elevating smartphone sales, are augmenting the growth of the market. Besides this, several industry verticals, such as the healthcare and BSFI sectors, are complying with numerous regulations, such as the Health Insurance Portability and Accountability Act (HIPPA) and Payment Card Industry Data Security Standard (PCI DSS). These regulations require the application of a data security solution, which is further contributing to the product demand. Additionally, the continuous advancements in the telecommunication sector and expanding network infrastructures are anticipated to fuel the encryption software market over the forecasted period.

Encryption Software Market2021-2026 Competitive Analysis and Segmentation:

Competitive Landscape with Key Players:

The competitive landscape of the global encryption software market has been studied in the report with the detailed profiles of the key players operating in the market.

Some of these key players include:

Key Market Segmentation:

The report has segmented the global encryption software market on the basis of component, deployment model, organization size, function, industry vertical and region.

Breakup byComponent:

Breakup byDeployment Model:

Breakup byOrganization Size:

Breakup byFunction:

Breakup byIndustry Vertical:

Breakup byRegion:

Explore Full Report with TOC & List of Figure:https://www.imarcgroup.com/encryption-software-market

Key highlights of the report:

If you need specific information that is not currently within the scope of the report, we will provide it to you as a part of the customization.

About Us

IMARC Group is a leading market research company that offers management strategy and market research worldwide. We partner with clients in all sectors and regions to identify their highest-value opportunities, address their most critical challenges, and transform their businesses.

IMARCs information products include major market, scientific, economic and technological developments for business leaders in pharmaceutical, industrial, and high technology organizations. Market forecasts and industry analysis for biotechnology, advanced materials, pharmaceuticals, food and beverage, travel and tourism, nanotechnology and novel processing methods are at the top of the companys expertise.

Contact US:

IMARC Group30 N Gould St, Ste RSheridan, WY 82801, USAEmail: [emailprotected]Americas: +1-631-791-1145 | Europe & Africa: +44-753-713-2163 | Asia: +91-120-433-0800

Read the original post:
Encryption Software Market Report 2021-26: Size, Growth, Size, Share and Forecast IMARC Group - The Market Writeuo - The Market Writeuo

Read More..

AES Encryption Software Market Growth in the Forecast Period of 2021 to 2026 With Top Companies: , Dell, Eset, Gemalto, IBM, Mcafee – The Market…

The new report on the Global AES Encryption Software market is wanted to offer information seeing the fundamental colleagues correspondingly as the emerging basic parts in the business space that are attempting to make their space in the business circle. The report further gives data about the customer direct of the business all through ceaseless years and the segments which have gotten essential changes the business spaces over the evaluation years.

Request a sample of this report @ https://www.orbisresearch.com/contacts/request-sample/4215463?utm_source=Rohit

This study covers following key players:

DellEsetGemaltoIBMMcafeeMicrosoftPkwareSophosSymantecThales E-SecurityTrend MicroCryptomathicStormshield

Moreover, the report gives data about the solicitation to the business across the business space equivalently as gives a suspected concerning the regional framework and the evaluation of the business in the coming years. The report additionally helps the affiliations and the business in making their own business strategies and techniques similarly as the models for running the exercises which will wind up being productive all through the going with not very many years.

Further, the report contains data seeing the fundamental centers, for instance, the improvement rate measure additionally as the business part of various affiliations that are having a colossal impact in the business progress. It further gives thought regarding the plausibility of new ventures. The report further gives all out examination of the monetary advancement of various countries and its impact on the market improvement.

Browse the complete report @ https://www.orbisresearch.com/reports/index/global-aes-encryption-software-market-size-status-and-forecast-2020-2026?utm_source=Rohit

Market segment by Type, the product can be split into

On-premisesCloud

Market segment by Application, split into

Disk EncryptionFile/folder EncryptionDatabase EncryptionCommunication EncryptionCloud Encryption

It contains data regarding the enormous challenges looked by the business space all through persistent years in like manner as it gives data concerning the way where the affiliations have change up to these risks and requirements over the earlier years and sometime later kept up the general compensation and the associations turn of events. The report gives information about the essential drivers and key open passageways in the business space. It moreover offers data about the latest examples and happenings in the business space.

The report further offers ways to deal with deal with the monetary crisis especially in the made and making economies across the globe in the coming years. The report further gives a reasonable measure about the hardships the business is required to look all through the going with coming years and furthermore prescribes ways to deal with oversee beat the situation by analyzing the previous data and preparing substitute frameworks for whats to come.

The record in like manner gives information concerning the gigantic unnerving events, for instance, the new scene of the COVID-19 pandemic correspondingly as its impact on the huge length likewise as transient events in various endeavors in the coming years.

Main points given in the report-

For Enquiry before buying report @ https://www.orbisresearch.com/contacts/enquiry-before-buying/4215463?utm_source=Rohit

About Us:Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

Continued here:
AES Encryption Software Market Growth in the Forecast Period of 2021 to 2026 With Top Companies: , Dell, Eset, Gemalto, IBM, Mcafee - The Market...

Read More..