Page 273«..1020..272273274275..280290..»

Thomas Viaduct Railroad Bridge Recognized as Landmark : CEG – Construction Equipment Guide

Photo courtesy of The American Society of Civil Engineers

Opened in 1835, the Thomas Viaduct was the first multiple-arch, stone railroad viaduct in the United States.

The American Society of Civil Engineers (ASCE) dedicated a marker recognizing the Thomas Viaduct in Elkridge, Md., as a National Historic Civil Engineering Landmark.

The Thomas Viaduct is the first multiple-arch stone railroad viaduct built on a curving span in the United States. Construction on the Thomas Viaduct started in 1833 and opened in 1835. The 614-ft.-long, 58-ft.-tall span remains a crucial link in Maryland's rail infrastructure today, carrying freight and passenger traffic between Baltimore and Washington, D.C.

The dedication ceremony at Patapsco Valley State Park was led by ASCE's Maryland Section, The Maryland Department of Transportation (MDOT) Transit Administration, CSX Railroad and the B&O Railroad Museum.

ASCE represents more than 160,000 members of the civil engineering profession worldwide. It is the oldest national engineering society in the United States. ASCE recognizes historically significant civil engineering projects, structures, and sites worldwide. More than 270 projects have earned the prestigious title for creativity and innovation; almost all are executed under challenging conditions.

"As civil engineers build the infrastructure of the future, they take inspiration from the projects which helped shape communities today," said Marsia Geldert-Murphey, ASCE president. "The Thomas Viaduct played a huge role in developing rail service on the east coast nearly 200 years ago and remains a vital link every day for freight service, which delivers so many of the items we need to live our lives, along with providing efficient commuter service for thousands of people every day. The work of a civil engineer can impact a community for centuries, which is why it is so important to design projects for the future."

The Thomas Viaduct became necessary as the Baltimore and Ohio (B&O) railroad planned the first rail line into the nation's capital. Civil engineer Benjamin Henry Latrobe Jr. (1806-1878), who served as the railroad's engineer, designed the project. Latrobe faced several challenges in designing the Thomas Viaduct because crossing the Patapsco River required a curved path for the railroad. To achieve this, Latrobe designed the crossing using eight arches and piers in a trapezoid shape.

When it opened, the 63,000-ton granite viaduct was immediately recognized by engineers as an engineering success. It has survived significant floods that damaged other nearby viaducts. During the Civil War, the Thomas Viaduct was on the only rail line in and out of Washington, D.C., and Union troops heavily guarded it to ensure its safety.

The Thomas Viaduct became a National Historic Landmark in 1964, and ASCE first recognized the project as a National Historic Civil Engineering Landmark in 2010. The April 13th event featured the unveiling of a marker to recognize the Thomas Viaduct as a National Historic Civil Engineering Landmark.

For more information about ASCE's Historic Civil Engineering Landmark Program, visit http://www.asce.org/about-civil-engineering/history-and-heritage/historic-landmarks.

See the article here:

Thomas Viaduct Railroad Bridge Recognized as Landmark : CEG - Construction Equipment Guide

Read More..

UMaine College of Engineering and Computing to build new facility on campus The Maine Campus – The Maine Campus

The University of Maine College of Engineering and Computing (MCEC) was granted funding for the construction of a new facility on campus, which will begin in fall 2024. In January 2023, its Dean, Dr. Giovanna Guidoboni, led the establishment and development of the MCEC. The rationale for the college was previously developed by UMaine System leaders and several students, faculty, and staff members across the system with community input.

The new building actually is designed with the goal of enabling the convergence of engineering, computing, humanities, social sciences and so on, Guidoboni said. There will be new spaces where this convergence can actually take place. And also new classes and new programs that will be developed thanks to that.

The bold vision of UMS stems from a desire to collaborate across the system. Every campus has its strengths and serves different types of student populations. For instance, Guidoboni commends the material characterization labs, space applications and electrical circuits at the University of Southern Maine. UMaine Orono is known for its biomedical, computing and mechanical research. Students will achieve similar learning objectives working on their labs and then unite for larger projects.

Engineering and computing are disciplines that together can achieve much more than just the sum of their parts, said Guidoboni. Actually, their application and impact really stem from applied technologies. You could see, for example, in construction or the 3D printing of a boat or a house. Then the two new energy systems like offshore wind or solar panels. And then the design of the materials in them.

Aspects related to the social sciences or humanities will also play an important role in critical consideration of the findings. Questions such as How do you interact in a new workplace where you have people and robots? or How are innovations perceived by users? will be addressed as new technology is introduced to students and faculty. The reason for catalyzing convergence between engineering and computing is not only to intentionally combine disciplines but also to enable impact on a much broader spectrum.

Guidoboni emphasized that while a fundamental knowledge in math, chemistry and physics is true everywhere, exploring possibilities on how to join forces provides more opportunities for students. The objective is to bridge knowledge gaps in math and physics to provide students with an easier entryway into engineering or computing programs.

For the incoming class this year, we will have a Research Learning Experience that is called Charismathic to discover the charisma of math, Guidoboni said. We will have four sections here at UMaine and one section at USM. Students will be guided by different advisors but we will work together to actually show how they will be learning in their introductory classes. It will be impactful for the courses to come, for their research or the things that they could do in the workplace.

Space on the first floor will be accessible from the Collins Center for the Arts parking lot and function as an open environment similar to that of Ferland. A hands-on, immersive lab will be established on the right side. According to Guidoboni, students can learn how to use a printer with robotic arms that are not confined to specific methods or materials. Furthermore, censors will collect real-time data amidst printing for users to identify defects.

The primary purpose is to encourage interaction with the machine and redirect printing. It serves as an integration of mechanical engineering, electrical engineering, material science and computing applying fundamental sciences including chemistry, physics and geometry in controlling the robot.

The second floor will have active learning classrooms, which open opportunities for group projects. Some team members may be downstairs in the lab while others work in classrooms upstairs. Participants can stay connected remotely with a computer to share data or use a commanding pad to communicate with members. Students can gain knowledge and experience upstairs and apply it to innovations downstairs.

In a sense, the innovative technologies that have been developed at ASCC in collaboration with many faculty across campus is driving the vision of the need for convergence of disciplines to lead to groundbreaking innovations, said Guidoboni. And the educational spaces in the new building like the labs and interactive classrooms will enable us to develop programs where students can experience and learn that from year one.

The new printer will scale up efforts for 3D printing regarding the house and boat on campus in contribution to the UMaine BioHome project. From the lab and interactive spaces, there will be an open view for visual connection to the larger printers.

What is really important to me is how we can have in the design process, in our programs and in our industry, a diverse group of people, Guidoboni said. The more perspectives you have, the more likely it is that we come up with solutions that are actually usable and effective and that are adoptable not only by a small segment of the population.

Guidoboni emphasized women in particular must feel that it is also a space for them. There will be a multipurpose room on the second floor to host activities for middle and high schoolers, such as workshops for girls in particular to show that engineering, computing and discovery-driven learning is for everyone.

Developers are in a position to alter plans as new advancements in technology and design arise throughout the next two years. One of the questions to be addressed is How can we build something that is not just for what we know now but for what could be in the future? It is one of the drivers of the design of the building. Guidoboni believes that technological advancements will originate from the building itself.

Should new technologies come along, we can twitch them, or we can upgrade them, Guidoboni said. The important thing, though, that will not change is that the space is open, it is inclusive, it is flexible, and you can access it both physically and visually.

UMaine facilities, including Boardman, Crosby, the Advanced Manufacturing Center and Geness will undergo a re-envisioning to make the spaces conducive to the MCEC vision of openness, collaboration and inclusivity. Guidoboni encourages students to share their wishes to help fuel capital plans. All perspectives are welcome.

I would like to emphasize how amazed I am by the enthusiasm and the passion and the energy of studentsAs I talk about the plans and the visions for the college and also for the building, what I find is eagerness for this to come and the many opportunities that we have in front of us, said Guidoboni.

Excerpt from:

UMaine College of Engineering and Computing to build new facility on campus The Maine Campus - The Maine Campus

Read More..

Full educational programme for Smart Manufacturing & Engineering Week announced – The Manufacturer

The education programme for Smart Manufacturing & Engineering Week has been announced, with nearly 150 free-to-attend sessions taking place across eight solutions theatres during the live events on 5-6 June 2024 at Birminghams NEC.

The full programme of keynote presentations and other sessions is available at: http://www.mandeweek.co.uk/educational-content-2024. Visitors are encouraged to plan their programme in advance, and this can be easily done using the individual theatre exploration tools available on the website. There are eight solution theatres in total covering the topics of: Digital Transformation, IIoT & Connectivity, Industrial Data & AI, Innovation, Maintenance, Drives & Technology, Air-Tech Solutions, Fluid Power & Systems.

Highlights from the keynote presentations include Neelofar Ansari, Senior Manufacturing Engineer, BAE Systems, who is presenting on the intriguing topic of Human Augmentation: Connecting with Manufacturing Environments in the IIoT and Connectivity Theatre on day one. Additionally, Daniel Smalley from Siemens, along with Ian Clarke from InControl Systems, will talk about Demystifying Digitalisation and Growth on day two.

Meanwhile, in the Design & Innovation Theatre, Sam Tilley from Omron will be joined by Carl Diver from Manchester Metropolitan University to give a presentation on day one entitled How does the Skills Gap Affect the Future Technology Sector. Also, Roy Haworth, Head of Digital Mock Up Process and Implementation, Airbus Defence & Space will be talking about Using CAD data to drive data fusion and 3D visualisation on day two.

Elsewhere in the Drives & Technology Theatre, David Santos, Head of Manufacturing Engineering & Automation, Chelton will be talking about SMEs and Automation: Overcoming complexity and challenges during and after implementation whereas Krishna Mistry, VP of Series Engineering, Verge Motorcycles will be covering Agile Engineering Cycles: Optimising Design, Development, and Deployment in Manufacturing.

Also appearing in the Drives & Technology Theatre is David Barret-Hague from Schneider who will be joined by Grant Coffin from Rockwell Automation to give a presentation on day one entitled Industrial Automation Trends, Past Present and Future. This is followed on day two by Patrick Dion-Fehily from Mitsubishi Electrics who will be joined by Martyn Williams from COPA DATA to present The Importance of Sustainable Manufacturing.

Visitors to the Digital Transformation Theatre will be able to take in a presentation from Ian Kingstone, UK Director Strategy & Change, Columbus entitled: Turning Green into Gold: How manufacturers must harness ESG for both the planet and the bottom line.

Also happening in the Industrial Data and AI Theatre is a technical discussion that will include real data from robot applications including welding, aerospace drilling and additive manufacturing. Entitled How IONA improves robot performance and why this is essential for modern-day manufacturing and presented by Craig Davey, COO INSPHERE this session is suitable for anyone working within robots and automation.

Bringing together many of the common headaches in the maintenance sector is a presentation from Lewis Bratcher of ERIKS Industrial Services in the Maintenance Theatre entitled Improving productivity by changing the MRO supply chain dynamics. This presentation presents the findings of the 2023 Indirect Supply Chain Survey and the subsequent report, The MRO Supply Chain that was produced in association with the IET.

Meanwhile, in the Air-Tech Theatre Alice Quinn, Senior Manufacturing Technology Engineer, 3M will be talking about Why IT/OT Projects Fail whereas Ioana Hera, Head of Improvement, Rolls Royce will be presenting on Harmonising People, Skills, and Technology: The Path to Manufacturing Innovation and Efficiency.

Additionally, in the Fluid Power Theatre Colin Guttridge, Principal Manufacturing Engineer, Baker Hughes will be talking about Navigating the People and Skills Landscape in Manufacturing and Engineering whereas Dale Crow, Electricity & Automation Leader, Nestle will be covering Leveraging Technology to Maximise Functionality and Performance.

As well as the free to attend educational content there are also two summits that run alongside the exhibitions namely the Industrial Data and AI Summit and the Manufacturing Digitalisation Summit. Now in its 7th year the Industrial Data & AI Summit takes place on 5 June and focuses on Data Management and Data Insights. The structure of the summit includes four keynote presentations, a panel discussion and two 60-minute roundtable discussion sessions. The summit allows senior leaders to hear from the sectors most respected experts as well as to share their knowledge and experiences with their peers. The roundtable sessions offer a unique opportunity for in-depth discussions on topics ranging from Data Integration and Management to Developing a Data Driven Business to Generative AI.

Taking place on both the 5th and 6th June is The Manufacturing Digitalisation Summit. This summit includes eight keynote presentations, two panel discussions and four 60-minute roundtable discussion sessions. The Summit focuses on how digitalisation is changing the way in which products are designed, produced, used and maintained as well as transforming the operations, processes and energy footprints of factories and supply chains. This summit is broken down into two streams: the Enterprise stream is for those working within businesses with revenues more than 100m, while the Growth stream is for those less than 100m.

As well as the two summits, the Automation & Robotics Accelerator Symposium, taking place on 6 June, is intended for manufacturing executives interested in leveraging automation and robotics within their organisations. This half-day event, organised by The Manufacturer, focuses on the implementation and optimisation of automation to drive business growth. Its an essential event for those at any stage of automation integration, offering insights into best practices, technology deep dives, and the impact of automation on the workforce. Attendees will benefit from discussions on a range of sectors including aerospace, automotive, and FMCG.

In addition to the education programme a myriad of other activities will be taking place at Smart Manufacturing & Engineering Week. The main days are 56 June 2024 with Smart Factory Expo, Design & Engineering Expo and Maintec in Hall 4 at the NEC and Drives & Controls, Fluid Power & Systems and Air-tech in Hall 5.

Other exhibitions are also taking place at the NEC during the week, and these include TCT 3Sixty from Rapid News Group and Subcon from the Mark Allen Group. A single visitor registration to Smart Manufacturing & Engineering Week 2024 provides access to these co-located expos.

To register for a free pass, please visit: http://www.mandeweek.co.uk

For more articles like this, visit our Leadership channel

See original here:

Full educational programme for Smart Manufacturing & Engineering Week announced - The Manufacturer

Read More..

Tesla’s SVP of Engineering Drew Baglino and VP Rohan Patel leave the company amid news of 10% layoffs – Tesla Oracle – Elon Musk, Tesla, SpaceX News

Tesla (TSLA) is facing a big loss of two top executives leaving the company today. This has happened amid news that the electric automaker is laying off 10% of its global workforce.

Teslas SVP of Powertrain and Energy Engineering Drew Baglino announced on X (Twitter) yesterday that he is leaving the company. For the last few years, Drew has been Elon Musks top guy in battery technology.

Drew Baglino left Tesla after an 18-year-long career at Tesla. He joined the company as an Electrical/Firmware in March 2006. It was a time when Tesla was just a small company and the 1st-generation Roadster was in its development phase. He helped build multiple components and firmware of the original Roadster during his first role at Tesla. He described his early achievements at Tesla on his LinkedIn profile as:

Part of a small group who completely re-architected the control electronics and firmware of the Roadster power electronics module. Led firmware development for motor, traction, and driveline control for the Roadster.

I made the difficult decision to move on from Tesla after 18 years yesterday, Drew Baglino posted on X (Twitter). I am so thankful to have worked with and learned from the countless incredibly talented people at Tesla over the years, he added.

After Drew, Teslas Vice President, Public Policy and Business Development Rohan Patel also posted his leaving note on X (Twitter). The past 8 years at Tesla have been filled with every emotion but the feeling I have today is utmost gratitude, Rohan wrote in his post.

Thanks for everything youve done for Tesla. Much appreciated, Elon Musk replied to Rohans post on X.

Tesla has lost two of its top performers in two different areas of the company. Drew Baglino was a powerhouse in its engineering and battery technology development and Rohan Patel was doing great on the business development side.

Rohan Patel joined Tesla in January 2017. This was a very difficult period at Tesa as the automaker was struggling with ramping up production of its newly-launched Tesla Model 3 midsize electric sedan. The years 2017 and 2018 are known at Tesla as Production Hell.

Rohan and Drew were both at Tesla during the Production Hell era and helped the company recover from it when the majority of Wall Street analysts were predicting the companys doom soon.

Tesla CEO Elon Musk sent the following email to all Tesla employees globally. A screenshot of which leaked on X through the Chinese social media.

Elon Musks email specifically mentions that the company is laying off 10% of its global workforce. According to Musk, the primary reason for these layoffs is cost reductions and increasing productivity.

Laying off 10% of the Tesla workforce equates to around 14,000 employees out of 140,473 total. Musk wrote to employees:

Over the years, we have grown rapidly with multiple factories scaling around the globe. With this rapid growth there has been duplication of roles and job functions in certain areas. As we prepare the company for our next phase of growth, it is extremely important to look at every aspect of the company for cost reductions and increasing productivity.

As part of this effort, we have done a thorough review of the organization and made the difficult decision to reduce our headcount by more than 10% globally. There is nothing I hate more, but it must be done. This will enable us to be lean, innovative and hungry for the next growth phase cycle.

I would like to thank everyone who is departing Tesla for their hard work over the years. Im deeply grateful for your many contributions to our mission and we wish you well in your future opportunities.It is very difficult to say goodbye.

For those remaining, I would like to thank you in advance for the difficult job that remains ahead. We are developing some of the most revolutionary technologies in auto, energy and artificial intelligence. As we prepare the company for the next phase of growth, your resolve will make a huge difference in getting us there.

Thanks, Elon

This was a general email sent to the entire company yesterday. The next emails were to be sent to employees who were laid off. One of such employees at the companys Fremont factory shared the following screenshot on Reddit.

The Tesla employee who posted the above email screenshot shared his experience on Reddit after getting the emails. According to him, at least 2 associates from every department and 1 supervisor from each shop at the Fremont factory were laid off.

I work at the Fremont Factory, and we got this email around 11:40 PM. Workers that got two emails instead of one, when it got sent, had got laid off. 2 Associate Per Department (From what we experienced) 1 Supervisor from all shops. We are all shocked, nervous, and scared; hoping we didnt get a second email. No one saw it coming, you knew because you didnt have access to the Tesla Systems, and you couldnt badge in through security.

Laid-off employees will be offered severance packages and benefits the same way it happened at Twitter in 2022. Elon Musk had already predicted earlier this year that 2024 will be a slow year for Tesla in terms of growth.

Teslas vehicle delivery numbers dropped by 20% QoQ in Q1 2024. However, this is not the case with Tesla alone, the US EV-makers archrival BYD from China lost 40% of its sales in the 1st quarter of 2024. With the rest of the year ahead, Tesla is adjusting itself for the next phase of growth. This also means that employees who havent been laid off will have to perform even better to meet Elon Musks standards.

Tesla (TSLA) share price has already dropped by more than 50% as of this writing. A Tesla share is trading at $162.26 (15 Apr, 3:06pm GMT-4).

Stay tuned for constant Tesla updates, follow us on: Google News|Flipboard|RSS (Feedly).

The rest is here:

Tesla's SVP of Engineering Drew Baglino and VP Rohan Patel leave the company amid news of 10% layoffs - Tesla Oracle - Elon Musk, Tesla, SpaceX News

Read More..

Why quantum computing is a threat to encryption, and what to do about it – New Hampshire Business Review

Impacts of quantum computing threats of tomorrow will change how we use encryption today

Our business and personal lives depend on many things we do not often think about including encryption. Normally this area evolves under its own steam without most business decision-makers having to pay attention, but over the next few years that has to change or else you might inadvertently cede your secrets to adversaries both known and unknown.

A lot has been made of how quantum computing will change the world, but most of these pronouncements are long on hyperbole and short on actual details.

Quantum computing does have a great deal of promise and will eventually change the world in areas such as material science. The more immediate impact of a medium-scale quantum computer is the threat it and those that come after it will pose to how we all use encryption today. To make sense of this, and therefore understand how to mitigate the risk now, we have to back up and define some things.

Encryption today

As of this writing, there are two general types of encryption in use today: symmetric and asymmetric encryption. Symmetric encryption is when the sender and receiver both have the key that is used to encrypt and decrypt the protected data. This is used almost everywhere, but it is often enabled by the use of asymmetric encryption to exchange that key, given many parties need secure communications without meeting. The latter type is where quantum computers expose a major weakness.

Quantum computing

To make sense of this next part, your understanding of quantum computing does not have to go too deep, but you have to accept some strange truths in exchange. The best way to get through this is to remember the last superhero movie you saw and recall that to enjoy the film you had to suspend disbelief and not question how that person is flying or shooting lasers from body parts in ways that defy logic.

Quantum computing leverages the strange world of quantum mechanics, which fails to make sense when held to our day-to-day experiences. The bit to grasp is that a quantum calculation can evaluate all possible values at once rather than having to walk through each possible value one at a time the way a classical computer would have to approach a problem.

A brilliant mathematician at MIT named Peter Shor created an algorithm that could use this quantum weirdness to enable a sufficiently powerful quantum computer to break the hard math problem that lies at the heart of all mainstream asymmetric encryption in use today. We are all awaiting the day (or year) when a sufficient quantum computer breaks our encryption and guts our current security.

Post quantum encryption

Rather than just waiting for the end, the U.S. government has been busy evaluating replacement encryption mechanisms that can replace the soon-to-be vulnerable asymmetric mechanisms in use today. The National Institute of Standards and Technology (NIST) is just about to crown Crystals Kyber and Crystals Dilithium (very geeky names indeed) as the heirs.

Swapping out your encryption is no easy task and will take time. The first step is to dig in and understand where you are using encryption in the first place, and then differentiating where the asymmetric encryption is employed. While not easy, this is likely the easiest part. Once you have completed this inventory, you have to make some complicated changes to code, ensure your vendors make these changes, or change solutions to a vendor who has, or soon will, make these changes.

Many pundits are assuring all who will listen that we have a long time before this threat becomes real, but that is, at best, wishful thinking and, at worst, a disaster in the making. The truth is we do not know. It could be 30 years, but many concede that it could be just a few years. It is not today or tomorrow, but it is so close that it is widely accepted that some threat actors are already storing encrypted data in anticipation of being able to use a future quantum computer to decrypt it. They are betting that this threat will come home to roost sooner rather than later. How will you bet?

Patrick Hynds is the CEO of DTS, a cybersecurity solutions provider in Derry.

Link:
Why quantum computing is a threat to encryption, and what to do about it - New Hampshire Business Review

Read More..

Encryption shield installed to protect Chinese quantum computer from attack – South China Morning Post

The new methods are to replace the conventional public-key cryptography system, which could be vulnerable in the face of quantum computers with powerful computing capabilities.

01:58

China denies accusations of state-sponsored hacking from US, UK and New Zealand

China denies accusations of state-sponsored hacking from US, UK and New Zealand

The report quoted Dou Menghan, deputy director of the Anhui Quantum Computing Engineering Research Centre, as saying the anti-quantum attack shield was developed and used for the first time by Origin Quantum, the developer of the computer named after the Monkey King of Chinese mythology.

This shows that Chinas home-grown superconducting quantum computer can play both offence and defence in the field of quantum computing, he said.

This is also an important exploration of the application of new data security technologies in China.

The third-generation Wukong is powered by a 72-qubit home-grown superconducting quantum chip, also known as the Wukong chip.

In January, the superfast computer opened remote access to the world, attracting global users from countries such as the US, Bulgaria, Singapore, Japan, Russia and Canada to perform quantum computing tasks.

In traditional computing, a bit is the basic unit of information that represents either zero or one. A quantum bit, or qubit, takes it a step further by being able to represent zero, one, or both simultaneously.

Lawmaker urges China to safeguard tech production chain for a quantum edge

Because quantum computers can simultaneously represent multiple possibilities, they hold theoretical potential for significantly faster and more powerful computation compared to the everyday computers we use now.

But the subatomic particles central to this technology are fragile, short-lived and prone to errors if exposed to minor disturbances from the surroundings. Most quantum computers operate in highly isolated and extremely cold environments to avoid disruption.

The normal operating temperature of the Wukong chip is close to absolute zero, or minus 273.15 degrees Celsius. It is stored in a special fridge before being installed in a vacuum environment for operation.

Link:
Encryption shield installed to protect Chinese quantum computer from attack - South China Morning Post

Read More..

The best encrypted messaging apps in 2024 – Tom’s Guide

The best encrypted messaging apps are ideal to protect your messages from any prying eyes, and even preserve your privacy against the very companies that make them.

That's because these apps come with encryption methods so heavy that even government agencies can't bust into them. The most common method is end-to-end encryption, which is used by Signal, Threema, WhatsApp and others meaning only the sender and recipient of a message can see its contents.

Apples iMessage protocol uses end-to-end encryption as well but its Messages app which is used to view encrypted messages also handles unencrypted SMS text messages. This makes it easy to get confused which is why youre better off using one of the best encrypted messaging apps instead if you want to ensure that all of your chats are secure. It's worth noting that Google's Messages app can also use end-to-end encryption but both people need to have RCS chats turned on.

These are the best encrypted messaging apps available right now for Android and iOS.

The best encrypted messaging app for most people

Cost: Free

Platforms: Android, iOS

Open source and encrypted

Disappearing messages

Can secure the app with a password

Phone number required for sign up

Signal is a fantastic messaging solution for security-conscious mobile users. It's a free all-in-one messaging, voice-call and group-chat solution that uses its own end-to-end encryption protocol.

You can send text messages, voice calls, group messages, media and attachments to your phone contacts, all without having to mess with PIN codes or special login credentials. Updates to the app have added user-friendly features such as custom wallpapers and animated stickers, and Signal group video chats can now have up to 40 participants.

All Signal messages can be set to self-destruct after a certain amount of time while a Chrome browser plugin lets you use Signal from your desktop as well. You can transfer Signal accounts from one Android phone to another and from one iOS device to another. In fact, you can even change phone numbers while keeping Signal account data as long as you're staying on the same device.

Signal's encryption protocol is so strong that WhatsApp and Facebook Messenger use it too. But unlike Facebook, Signal's parent company is a non-profit foundation created by an anarchist cryptographer and one of the founders of WhatsApp.

Ease of use and strong, open-source, regularly audited encryption makes Signal a favorite of the security-conscious, with accolades from Edward Snowden and other privacy advocates. User-friendliness without compromising on security makes Signal a fantastic option for users looking for an encrypted messaging and calling app. Here's our guide on how to use Signal.

Download Signal: Android, iOS

An increasingly popular cloud-based, secure messaging app

Cost: Free

Platforms: Android, iOS

Intuitive interface

Syncs seamlessly

End-to-end encryption isn't enabled by default

Like Signal and WhatsApp, Telegram lets users link their phone number to a Telegram account to send fast, encrypted messaging over the internet, with client-server encryption for standard chats.

But Telegram is much more than just a messaging service. It has grown into a worldwide social-media platform, with huge user groups and broadcasts that let accounts reach millions of followers in an instant. It has uses far beyond secure messaging.

However, end-to-end encryption is not enabled by default on Telegram. To get it, you'll have to switch to Secret Chat mode. You can set messages to self-destruct, share videos and documents and participate in group chats of up to 200,000 users.(Yes, Telegram really does support group chats that large.) However, chats with more than two participants won't be end-to-end encrypted.

A caveat? Telegram uses its own custom MTProto encryption rather than a more proven system. Here's our guide on how to use Telegram.

Download Telegram: Android, iOS

A secure messaging app many of your contacts likely already use

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Messages and images can self destruct

Widely used

Requires phone number

Owned by Facebook

The world's most popular stand-alone chat and call app, WhatsApp has used Signal's end-to-end encryption protocol on all messages since 2016.

Its developers are continuously adding tweaks to the app's security and privacy features, such as fine-tuned group invitations and controls so that you're always aware who is reading your group chats.

The app is also testing transfers of chat history when switching between iOS and Android phones and using a single account on four different devices at once. Updates to WhatsApp have made it possible to have end-to-end-encrypted backups and have added the ability to make disappearing chats the default. You can also transfer your chat history from iPhone to Android, and the iOS beta suggests an Android-to-iPhone transfer feature is coming soon.

In 2014, WhatsApp was bought by Facebook, which later broke its promise that it wouldn't "monetize" the service which led its founders to leave and one of them co-founded Signal. Some WhatsApp user behavioral data is now shared with Facebook, which has created more demand for WhatsApp alternatives, but the messages remain entirely walled-off.

No matter who owns it, WhatsApp remains one of the easiest ways for anyone to use end-to-end encrypted messaging. If you're not comfortable with Facebook's presence, there are plenty of other options on this page.

Users who want to be absolutely sure about their security can verify each chat's 60-digit security-verification code or QR code that you can compare with a contact to ensure that your conversation is encrypted.You'll also want to make sure your messages are backed up with WhatsApp itself and not with Apple's iCloud.

Combined with WhatsApp's ubiquity, ease of use and the ability to send voice messages, photos, and video messages, and conduct group chats, makes for a robust and fully encrypted mobile-messaging app.

Download WhatsApp: Android, iOS

A private messaging app worth paying for

Cost: $3.99

Platforms: Android, iOS

End-to-end encryption

Private chats

No phone number or email required

Not free

Few advanced features

Threema is a very secure end-to-end encrypted messaging app that uses the NaCl cryptography library to protect your communications.

When you fire up the app, it generates a unique Threema ID key, allowing you to use the app completely anonymously no names required. Otherwise, you can associate your account with an email address or phone number, which makes it easier for other Threema users to find you.

You'll also get a scannable QR code that you can present to other Threema users if you meet in person but don't want to exchange names.

In addition to the usual raft of messaging features such as encrypted text, voice, picture, and video messaging, the app also includes file sharing (20MB per file), emojis, group messaging and a polling system for getting feedback from friends and contacts.

While some other secure-messaging apps that haven't reached WhatsApp or Telegram adoption levels have pivoted toward the enterprise market to stay afloat, Threema still has one foot planted firmly in the consumer market. Charging a few bucks for the app makes that financially possible.

So what's the downside? Threema hasn't really caught on in the English-speaking world, so you may have a hard time finding other users unless you speak German. But its impeccable security is well worth spending $4 for.

Download Threema: Android, iOS

Secure messaging and collaboration for businesses

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Independently audited

Easy to use

Email or phone number required

No two-factor authentication (2FA)

Wire features end-to-end encryption for instant messages, voice and video calls, with support for GIFs, audio and video clips, and sketches, and local and Dropbox file sharing. The app also offers multiplatform cross-device syncing and support for multiple accounts, allowing you to separate personal and work communications.

Wire uses its own Proteus encryption protocol based on the Signal protocol, and its code is open-source and subject to external security audits. The mobile and web versions of the app are free, with a premium tier available for businesses.

The parent company, Wire Swiss, was originally founded and run out of Switzerland which is famous for its privacy laws. The holding company moved to the United States in 2019, which alarmed some users, but then moved to Berlin in early 2021.

Like Silent Circle and Wickr, the company seems to have retooled its website to appeal primarily to business users. But you can still get Wire's free consumer desktop software from the "Download" link at the bottom of the site's main page, and its mobile apps on the Play Store or App Store.

Download Wire: Android, iOS

Secure messaging, voice and video calls all in one place

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Disappearing messages

Hidden chats

Syncs across desktop and mobile

Not as popular as it used to be

Viber offers end-to-end encryption on all platforms.Originally developed in Israel, the app is now owned and operated by Japanese e-commerce giant Rakuten. It offers many of the same bells and whistles as Telegram, including stickers and communities, and, most recently, augmented-reality filters to jazz up selfies.

A neat feature for Viber is a color-coded lock icon to quickly show users how protected a conversation is (gray for encrypted communications, green for encrypted communications with a trusted contact, and red in the event that there is an issue with the authentication key). Viber has self-destructing Secret Chats, included in group chats and on its desktop app, plus a Hidden Chats feature for hiding chatrooms on a shared device.

All of this is in addition to Viber's solid mobile-messaging feature set which includes text, voice, and group messaging all tied to your phone number. The app and communications with other Viber users are free, but you'll have to pay a bit for calls to non-Viber users.

Download Viber: Android, iOS

Encrypted messaging from the social media giant

Cost: Free

Platforms: Android, iOS

End-to-end encryption

Disappearing messages

Hugely popular

Familiar interface

Sending encrypted messages could be more intuitive

The near-ubiquitous Facebook Messenger may not be the first app you think of when it comes to encrypted messaging, but the mobile versions of the app include end-to-end encrypted communication options in the form of Secret Conversations.

See original here:
The best encrypted messaging apps in 2024 - Tom's Guide

Read More..

Best Free VPN: Top 7 Free VPNs in April 2024 – VPNOverview.com

Short on time? Click here for a summary!

The Best Free VPN in 2024: Our Top 8 Recommendations

The best free VPNs offer powerful online security without a premium price tag. We tested dozens of free VPNs to present you our best free VPNs for 2024.

These VPN providers offer excellent protection at zero cost. Our extensive research has taught us that many free VPNs are dangerous, as they log and sell your data or simply dont work as a VPN is expected to.

If you need an affordable, trustworthy VPN without any restrictions or limitations, we recommend Surfshark. This is one of the few premium VPNs that offer a free trial and a 30-day money-back guarantee! Surfshark is fast, secure, and great for streaming.

If you want a completely free VPN and youre not sure which provider is best for you, well help you decide. Check out your options below!

Free VPNs provide secure VPN connections and encrypted data at zero cost. The best free VPNs ensure that your data, online activities, and browsing history remain private.

However, most free VPN services come with limitations, including data and speed caps. Youll also have to vet for security vulnerabilities that may put your private data at risk or expose you to malicious software.

Dont want the hassle? Choose a cheap, premium provider like Surfshark. Surfsharks best plan costs only $ 2.49 per month. It also offers a free trial and a 30-day money-back guarantee.

Want a truly free VPN instead? PrivadoVPN is our editors choice; it came out on top in our tests to discover the best free VPNs. Keep reading for a review of every free VPN service we tested.

Free products usually have hidden costs. This is certainly the case for free virtual private networks, which might log your data or leave your IP address exposed.

Here are some of the biggest risks and limitations associated with free VPNs:

Besides these security risks, free VPNs may also hinder your user experience by capping your data and offering only a limited amount of servers.

We like saving money as much as the next person. However, we dont recommend free VPNs for the reasons stated above.

If you dont want to pay for a VPN service, youre better off taking advantage of a VPN free trial or money-back guarantee. Surfshark currently has a 7-day free trial for new users! Have a look to see how it compares to the best free VPN providers.

You can also use Surfshark for 30 days if you want more time to make a decision. Not satisfied? No harm! You can easily get a full refund.

If a totally free VPN is what youre looking for, we rounded up the most reliable options in one list. You dont even have to provide your payment information or make use of a money-back guarantee.Free really means free with these VPN providers.

Our in-depth tests revealed the strengths and weaknesses of each of these free VPNs. Read on to find out which one fits your needs best.

Privado is the best free VPN on the market and our editors choice. It keeps your identity safe and is especially suited for PC and Mac users, with an easy-to-navigate interface and solid security features.

PrivadoVPN also has apps for iOS, Android, and Android TV. Theres even a Fire TV Stick app, which is pretty great for a free VPN!

Privacy and security: When testing this VPN, we were impressed by its features. PrivadoVPN offers a high level of privacy thanks to its strict zero-logs policy. The VPN does not collect or store any data. Plus, its headquarters is in Switzerland, which has favorable privacy laws!

On top of that, PrivadoVPN offers highly secure VPN protocols like WireGuard and OpenVPN, as well as AES 256-bit encryption. For a free VPN, it also offers advanced security features, including an automatic kill switch and a split-tunneling feature called SmartRoute.

Server network: Privado offers free servers in 10 locations, namely:

At start-up, Privado will automatically suggest the best server location for you. This means you can get a secure VPN connection in a matter of seconds.

Streaming and torrenting: Privado does wonders for streaming! We connected to the UK server easily and had no trouble unblocking BBC iPlayer. We could access various Netflix libraries and watch shows on HBO Max, Disney Plus, and Amazon Prime Video without issues.

While the 10 GB data limit is restrictive, Privado is one of the best free Netflix VPNs. You can always reduce the playback quality to save some data.

Torrenting enthusiasts will be happy to know that PrivadoVPN allows for P2P file sharing. We tried downloading some torrents and didnt encounter any throttling.

Limits on speed and data: PrivadoVPN offers unlimited speeds as long as you stay within the monthly 10 GB data limit. When testing, we noticed that the speeds on Privados free servers are a lot lower than that of premium VPNs like Surfshark.

Privado will only provide you with a 1 Mbps speed once youve exceeded your 10 GB monthly data cap. And, as you may know, agonizingly slow internet is very frustrating, especially when streaming.

Good to know: Besides the 10 GB data cap, Privado has no dedicated Linux app. On top of that, you can only use PrivadoVPNs free version on one device at a time. Of course, youre free to create multiple accounts to get around this, but it will be a hassle.

PrivadoVPN has a beautiful and user-friendly app. Its currently the best free VPN out there, especially for Windows and Mac users.

Overall, PrivadoVPN performed exceptionally well in our tests and has several impressive features you wouldnt expect from a free service. Have a look for yourself!

Check out the results of our tests on the premium version of Privado to learn more about this service.

Proton VPN is one of the most well-known free VPNs. As one of the only unlimited free plan options, this provider is ideal if you need unlimited data to browse the internet for as long as you like.

The VPN works well on almost all devices. Weve tried it on Mac, Windows, Android, Android TV, iOS, Linux, Chromebook, and even on some routers.

Privacy and security: Proton VPN doesnt keep any logs of user data. As long as your VPN connection is active, youre safe and anonymous online.

Besides a kill switch, Proton VPN offers secure VPN protocols, including OpenVPN, WireGuard, and IKEv2. It even has a Stealth protocol to overcome censorship and bypass geo-restrictions. This protocol masks the fact that youre using a VPN.

Note:

Proton VPN is one of the few open-source VPN apps, which means that a community of developers works to improve the software. This process makes Proton VPN safer and more transparent. Proton VPN apps are also audited by cybersecurity expert to guarantee the safety of users.

Server network: Unfortunately, free users are not spoiled for choice when it comes to Protons server location. There are only three countries with free servers: the United States (22 servers), the Netherlands (38 servers), and Japan (8 servers).

In comparison, a VPN like Surfshark provides you with 3200+ servers across 100 countries. For only a few dollars per month, you wont have any limitations.

Streaming and torrenting: Unfortunately, Proton VPN free doesnt support torrenting. Even the best torrent sites are not accessible with this VPN unless you upgrade to the premium version.

In terms of streaming, the results were mixed. We tried to access Netflix using Proton but got an error message about using a VPN/proxy. The same happened for Amazon Prime Video. At other times, however, weve had no issues streaming with Proton VPN.

Limits on speed and data: Proton VPN Free has no data or speed limits. Thats a huge thing for us Proton is the only reliable, fully free VPN that offers uncapped data.

Having said that, we found that the free version of Proton VPN can be quite slow at times. This makes sense, considering the large volume of free users using a limited amount of servers.

Note:

The Proton website openly advertises the speed of their free VPN as medium, while their paid subscriptions all have high speeds.

Good to know: You can use Proton for free on one device at a time. Want to protect different devices? You can use different email addresses to create multiple accounts.

Proton account gives you access to a wide range of security services, including:

If you choose to upgrade to Proton VPN premium, youll get upgrades for all these services, making it a great all-in-one solution for online privacy

Proton VPN is one of the best free VPNs currently available, thanks to its security features and unlimited bandwidth. Its just not the best choice for streaming or gaming.

This popular provider from Switzerland offers user-friendly software, an array of free security tools, and high-level encryption.

Want to know more? Read our full Proton VPN review to see our testing results!

Hide.me is a trustworthy VPN that allows P2P file sharing and has excellent free customer support. If youre a beginner to VPNs and want to torrent safely, we think that this is the best free option for you.

The VPN has an app for most major operating systems, including Windows, iOS, macOS, Android, Linux, and even Fire TV Stick.

Privacy and security: Hide.me is a zero-logs VPN that has been independently certified. The provider doesnt store any information about your internet activities, which is good news for privacy-conscious users.

Hide.me is based in Malaysia, which is outside of the Eyes Alliance, so you wont have to deal with invasive privacy legislation.

In terms of VPN protocols, you have a wide variety to choose from:

Server network: The free version of Hide.me only gives you access to servers in eight countries: Canada, France, Germany, Netherlands, Singapore, Spain, United Kingdom, United States.

From our experience, this is not impressive, but its about average for a free provider.

Streaming and torrenting: In the past, Hide.me didnt allow free users to download torrents. Luckily, the provider changed this policy, and free users can now download safely via torrent sites.

Unfortunately, we had issues streaming with this VPN. Hide.me does not work with Netflix US. We tested this ourselves and werent able to unblock any geo-restricted shows or movies on Netflix.

Limits on speed and data: The free version of Hide.me has a data cap of 10 GB per month. If you want to stream or download something, youll reach this limit easily. When testing the VPN, we also found that speeds varied quite a bit.

If you dont want to deal with these restrictions, have a look at our best VPNs for streaming.

Good to know: During the first week of your free membership, youll be able to use Hide.me Premium with a seven-day free trial. After that, youll be limited to the free features. You can use Hide.me on one device at a time.

We did find that Hide.mes upsell campaign is quite invasive. Theres always a button urging you to switch to the premium version, which can be annoying.

On a positive note, we found Hide.mes customer support is very responsive and supportive!

While Hide.me is not the best free VPN out there, it definitely has its merits. We recommend this VPN for anyone who wants to torrent without paying for a VPN subscription.

Hide.me has a few advantages over other VPNs, mainly its variety of VPN protocols and torrenting capabilities.

Weve tested all of Hide.mes features. Read our Hide.me review to learn more about what this VPN can offer.

TunnelBear is a practical VPN with many servers. It also offers a cheeky design thats easy to use! While TunnelBears free version has a small data limit, its great for users looking for plenty of server locations and a well-designed app.

Another great benefit is that you can use TunnelBear Free on unlimited devices.

Privacy and security: TunnelBears security and privacy features are very solid. In comparison to other free VPN services, we noted some great extra features, like a kill switch (VigilantBear) and obfuscation technology to hide the fact youre using a VPN (GhostBear).

Thanks to these features, we could unblock more streaming services with TunnelBear than with many other free VPNs.

In terms of privacy, TunnelBear has a no-logs policy. The provider is located in Canada, however, which is part of the Eyes Alliance. Have a look at our best VPNs outside the 14 Eyes for alternative options.

Server network: Thanks to its huge server list, TunnelBear is one of the best free VPNs out there. Even with the free version, TunnelBear allows you to choose from all of its available servers in 42 countries, including the United States, United Kingdom, and many more.

These servers give you the same experience as the Premium TunnelBear servers, which is unique among free VPNs.

Streaming and torrenting: We tested TunnelBear to see if it could unblock online streaming sites, and the results were a resounding success. TunnelBear was able to circumvent geo-restrictions on sites like Hulu, BBC iPlayer, and Netflix.

Unfortunately, there are torrenting restrictions. TunnelBear doesnt allow P2P traffic on its servers.

Limits on speed and data: With such good test results, what is TunnelBears catch? While we didnt experience any speed throttling, theres one major drawback.

The biggest disadvantage we found when using TunnelBear is the data limit you only get 500 MB per month. You can add another 1 GB of free data if you tweet about TunnelBear, but thats not ideal for people looking for more online privacy.

Good to know: Who said VPNs are boring? TunnelBear is one of the most fun VPN apps to use! The visual style is unique and engaging, and the software is full of bear-related puns.

It is worth noting that customer support is limited for free users, since premium users get priority.

The free version of TunnelBear is high quality, and we love the casual, flashy interface. But its only suitable if you dont mind the tight data restrictions.

TunnelBear Free is available for Windows, Mac, Android, and iOS and can be used on unlimited devices simultaneously.

You can find more details and our personal testing experience in our TunnelBear review.

Windscribe is a popular free VPN that works on almost all operating systems and devices, including Linux. It also offers fast servers and a reasonable data limit.

You can get unlimited simultaneous connections with Windscribe, which is also a plus!

Privacy and security: Windscribe offers world-class security features, including a kill switch, an ad blocker, and a split-tunneling option. You rarely see this many security features in a free VPN. Previous software hiccups have been overcome, and the provider has a tight no-logging policy.

As privacy-conscious internet surfers, we appreciate that Windscribe offers multiple strong security protocols:

Server network: The free version of Windscribe has fewer options than the paid package. For free users, Windscribe only provides servers in a handful of countries.

Paying customers have access to global servers in as many as 63 countries. However, for a free plan, the number of server locations is still surprisingly high.

Streaming and torrenting: We were able to unblock and stream content from many different streaming platforms with Windscribe. Unfortunately, we were unable to access Netflix with Windscribe.

While this is a downside, it is rare to see a free VPN that can unblock Netflix without any issues these days. Of course you can easily watch Netflix with a VPN offered by premium providers.

Torrenting is entirely possible with Windscribe, a benefit for P2P fans!

Limits on speed and data: Windscribe is the fastest free VPN we tested. The secure servers maintained good speeds when we used them for browsing, even while we downloaded a file in the background.

There is a data limit of 2 GB per month. However, if you choose to share your email address with Windscribe and verify your account, you get 10 GB a month. Unfortunately, Windscribe may use this data for marketing, so we recommend using a throwaway email address.

Good to know: Windscribe is not as easy to use as some of the other free VPN providers listed above. Most of the buttons in the software take you to your account page.

We would prefer it if you could change your account settings in the VPN application itself.

Windscribes free VPN package is really solid, especially if youre a Linux user. The speeds are great, though bear in mind that the data limits are strict and it cant unblock Netflix.

Originally posted here:
Best Free VPN: Top 7 Free VPNs in April 2024 - VPNOverview.com

Read More..

Insta’s AI finds nudes in encrypted DMs – iTnews

Instagram nudes sent or received by under-18s will be detected and blurred with device-based software able to scan end-to-end encrypted (E2EE) direct messages (DMs).

The launch of the client-side feature coincides with Facebook Messengers current, and Instagrams planned, global rollout of E2EE, which police and regulators have opposed.

E2EE is not interoperable with the server-based software Meta currently uses to detect, remove and report child sexual exploitation material (CSEM).

Following pushback against mandatory E2EE backdoors, online safety watchdogs in the UK and Australia have more recently pitched scanning communications from users devices, or from government-owned, intermediary servers, as an alternative method of detecting and removing illegal content.

However, unlike the device-based content scanning technology that UK and Australian regulators are pushing E2EE providers to deploy, Instagrams Nudity Protection feature does not block illicit material.

The settings, default for teens and available to adults, warn users of the dangers of sexual exploitation scams and revenge porn, but still allows them to unblur detected nudes.

Meta wont have access to these images unless someone chooses to report them to us, the company, which, in the last financial year, handed 5054 users data to various Australian law enforcement and regulatory bodies, said in a statement.

Acting eSafety Commissioner Toby Dagg told iTnews that he welcomes the feature, but would also welcome further information from Meta about the long-term efficacy and uptake of these tools over time.

Scanning platforms for crime

Dagg said that eSafetys transparency notices to 29 services, including those owned by tech giants Apple, Meta, Microsoft and Google had mapped out the use of language analysis processing to detect child grooming, which Xbox Live, Facebook, Instagram, TikTok and Twitch currently use.

Reports to our investigators show that the criminals behind these [sexual extortion] scams initially make contact posing as an attractive young woman on social media services, with Instagram and Snapchat the most frequently targeted.

When unencrypted, Facebook, Instagram, TikTok, Twitch, Google Chat, Twitter, TikTok, Snapchat, Xbox Live, and Discord messages are scanned for verified CSEM, reports eSafety released in 2022 [pdf] and 2023 [pdf] revealed.

Instagram, Facebook, YouTube, Discord and Twitch also use AI trained on verified CSEM to detect new CSEM.

Automate detect and block regime

Dagg said that eSafetys transparency powers to evaluate platforms detection software work hand in hand with new mandatory codes which require providers of online products and services in Australia to do more to address the risk of harmful material, including child sexual exploitation material and grooming.

In the UK and Australia, Meta, Apple, Signal and other E2EE providers are pushing back against their inclusion in industry codes that could mandate solutions that scan, detect and block content before encryption when the regulator deems it "technically feasible" for the provider in question.

Technical feasibility depends on whether it is reasonable for service providers to incur the costs of taking action, having regard to the level of risk to the online safety of end-users.

eSafety has said that scanning communications from a device or government-owned server would not amount to mandating companies to design systematic vulnerabilities or weaknesses into any of their end-to-end encrypted services.

Metas submission [pdf] to eSafety said that, unless the industry codes explicitly defined technically feasibility to exclude solutions that could render methods of encryption less effective, they could force providers to design systematic vulnerabilities or weaknesses.

Like Apples similar, device-side child safety features for iMessage, Metas nudity protection feature is likely aimed at demonstrating to authorities that harmful E2EE material can be reduced without third-parties directly blocking or reporting it.

eSafetys Updated Position Statement on End-to-end encryption [pdf], released in October, said Apples child safety feature demonstrates at scale that device side tools can be used alongside E2EE, without weakening encryption and while protecting privacy.

It adds, however, that Apples intervention is limited in that it does not prevent the sharing of illegal material or activity, or enable accounts to be banned by the service.

eSafety was more supportive of Apples iCloud solution [pdf], which Apple discontinued after a backlash from privacy advocates.

The iCloud solution would have scanned content from users' devices before it was uploaded to their backup; police would have been alerted when illegal material was detected.

Apple's director of user privacy and child safety Erik Neuenschwander said in an email [pdf] obtained by Wired that the project was ditched over concerns it could create new threat vectors for data thieves to find and exploit" and lead to authoritarian surveillance through function creep.

How can users be assured that a tool for one type of surveillance has not been reconfigured to surveil for other content such as political activity or religious persecution? the email - sent to a child rights group that supported Apple readopting the solution - said in August.

See the original post:
Insta's AI finds nudes in encrypted DMs - iTnews

Read More..

Over and out? Public Advocate Jumaane Williams says keeping public access to NYPD radios more critical in wake of … – amNY

Public Advocate Jumaane Williams.

Photo by Dean Moses

Weeks after 19-year-old Win Rozario was shot to death by police during a mental health crisis, Public Advocate Jumaane Williams and other elected officials told amNewYork Metro that it is imperative that the press have access to NYPD radio chatter.

Those comments come as the NYPD continues a methodical plan to eventually encrypt all police radio communications, shutting out journalists and the public from chatter in a purported effort to block out criminals who could use the frequencies to their advantage.

Journalists descended on Rozarios Ozone Park home on March 27 after it was reported that he was gunned down while wielding scissors shortly after he himself dialed 911. Members of the media were able to get the news of the shooting out rapidly thanks to having heard the incident unfold in real time via police radio communication.

But should the NYPD stay on course with its encryption plan it already locked out communications in northern Brooklyn and Staten Island for all of New York City, it will make such independent reporting on police incidents almost impossible. Thats something which deeply concerns Williams and others in city government.

Its really disturbing, Public Advocate Williams told amNewYork Metro regarding police encryption plans. This administration has a pattern of trying to be less transparent. This seems to be in that modality.

Williams indicated that he and fellow elected officials have put forward ideas in order to ensure the media could maintain access, yet he says the brainstorming has fallen on deaf ears.

Police say the encryption process, which is expected to be completed in 2025, is intended to keep criminals from listening in to their response and planning it. When the NYPD first announced that some radio channels would be going dark, they also stated that they were mulling over how exactly to give media access on a timed delay. Yet as time wore on and more police channels were taken offline, the NYPD has come no closer to providing media access.

Elected leaders like Williams believe it is a necessity and in the public interest for the press to maintain access to police chatter, in real time.

Its one hundred percent needed for the media to be able to have access, Williams said. Going dark completely for the public and the media unfortunately follows the pattern that we have seen of this administration, and I am concerned about it.

Bronx Council Member Pierina Sanchez also weighed in on the debate, going as far as to say that locking press out of radios is dangerous.

I think complete and total and complete encryption of NYPD radios is dangerous to public safety. It is bad for accountability, It is bad for transparency for the public, Sanchez told amNewYork Metro.

The Councilmember conceded that certain aspects of police radios should be taken off the airwaves, such as specific investigation information. However,she said that should be the expectation and not the norm.

I think public transparency is really the most important and access to the media is a really important component of keeping New York City safe, Sanchez noted.

Link:
Over and out? Public Advocate Jumaane Williams says keeping public access to NYPD radios more critical in wake of ... - amNY

Read More..