Page 2,844«..1020..2,8432,8442,8452,846..2,8502,860..»

Exclusive Report on Business Cloud Storage Market Analysis Report 2021 and Forecast to 2029 with different segments, Key players The Manomet Current…

The world is becoming more data-centric with growing penetration of digital technologies through fast speed internet connection, smartphones, connected devices and others. These technologies result in high amount of data generation. For instance, in April 2019 World Economic Forum (WEF) stated in its press release that the total data across the globe is anticipated to reach 44 zeta bytes by end of 2020. The high amounts of data is used by enterprises to analyse consumer behaviour, their consumption pattern and accordingly draft future growth strategies. But storing, managing and analysing this data is complicated with traditional business storage applications. This creates a demand for cloud storage data centers which are dedicated for storing and syncing this business data through an online server. As the data are stored in cloud, rather than a local drive, the data can be accessed by any device with an internet connection. This enables remote workforce of an enterprise to access, modify and share this data from any location. It replaces workarounds like emailing yourself documents. Cloud storage can also act as a backup system for your hard drive. In 2017, Accenture has migrated to cloud solutions of Microsoft under its strategy of digital worker, with 40% of its cloud footprint in Azure. Thus, the migration of enterprises on cloud to cater the changing dynamics of data generation and workforce culture is driving the global business cloud storage market.

Global business cloud storage market was valued at US$ 47.0 Billion in 2019 and is anticipated to grow at a CAGR of 23.2% over the forecast period to reach US$ 249.8 Billion in 2027. Increasing demand for backup of growing business datasets coupled with need for making this data available to employees working remotely is driving the demand for cloud storage solutions and services.

Get Sample Copy of this Report @

https://www.absolutemarketsinsights.com/request_sample.php?id=623

This market research report on the Business Cloud Storage Market is an all-inclusive study of the business sectors up-to-date outlines, industry enhancement drivers, and manacles. It provides market projections for the coming years. It contains an analysis of late augmentations in innovation, Porters five force model analysis and progressive profiles of hand-picked industry competitors. The report additionally formulates a survey of minor and full-scale factors charging for the new applicants in the market and the ones as of now in the market along with a systematic value chain exploration.

Top Key Players:

Some of the players operating in the business cloud storage market are Alibaba Cloud, Amazon Web Services, Inc., Box, Carbonite, Inc., Citrix Systems, Inc., Code42 Software, Inc., Dell Inc., Dropbox, Egnyte, Inc., FUJITSU, Gigalis, Google LLC, Hewlett Packard Enterprise Development LP, IBM Corporation, IDrive Inc., JUNGLE DISK, LLC, JustCloud.com, Livedrive Internet Ltd., MEGA, Microsoft, OpenDrive, Oracle, pCloud AG, Rackspace US, Inc., SpiderOak Inc., Tencent Cloud, VMware, Inc., Wasabi Technologies, Inc., and Zoolz amongst others.

Global Business Cloud Storage Market Research Report and accelerates a wide-ranging and focused look into this market. Market size is concluded through detailed study and examination through subordinate research. The report is an in-depth study of the key dynamics of the Global Market. The report includes primary research alongside comprehensive investigation of subjective as well as quantitative perspectives by different industry specialists, key supposition pioneers to gain profound understanding and industry execution.

Global Business Cloud Storage Market Report delivers a complete study on Global Market, providing detailed market information and penetrating insights. No matter the consumer is industry insider, potential entrant or investor, the report will provide valuable data and information about Global Market.

Enquiry before Buying:

https://www.absolutemarketsinsights.com/enquiry_before_buying.php?id=623

The report answers important questions that companies may have when operating in the global Business Cloud Storage market. Some of the questions are given below:

What will be the size of the global Business Cloud Storage market in 2027? What is the current CAGR of the global Business Cloud Storage market? What products have the highest growth rates? Which application is projected to gain a lions share of the global Business Cloud Storage market? Which region is foretold to create the most number of opportunities in the global Business Cloud Storage market? Which are the top players currently operating in the global Business Cloud Storage market? How will the market situation change over the next few years? What are the common business tactics adopted by players? What is the growth outlook of the global Business Cloud Storage market?

Request For Customization@ https://www.absolutemarketsinsights.com/request_for_customization.php?id=623

About Us:

Absolute Markets Insights assists in providing accurate and latest trends related to consumer demand, consumer behavior, sales, and growth opportunities, for the better understanding of the market, thus helping in product designing, featuring, and demanding forecasts. Our experts provide you the end-products that can provide transparency, actionable data, cross-channel deployment program, performance, accurate testing capabilities and the ability to promote ongoing optimization.

From the in-depth analysis and segregation, we serve our clients to fulfill their immediate as well as ongoing research requirements. Minute analysis impact large decisions and thereby the source of business intelligence (BI) plays an important role, which keeps us upgraded with current and upcoming market scenarios.

Contact Us:

Company: Absolute Markets Insights

Email id: sales@absolutemarketsinsights.com

Phone: +91-740-024-2424

Contact Name: Shreyas Tanna

The Work Lab,

Model Colony, Shivajinagar, Pune, MH, 411016

Website: https://www.absolutemarketsinsights.com/

Read the original post:
Exclusive Report on Business Cloud Storage Market Analysis Report 2021 and Forecast to 2029 with different segments, Key players The Manomet Current...

Read More..

How to auto-store photos and videos with Photo Backup Stick – Cult of Mac

This backup stick protects and stores your photos and videos from virtually all devices.Photo: Cult of Mac Deals

We all go through a similar thought process when our phones, laptops oriPadsbreak, get lost or are stolen. Somewhere between trying to remedy the situation and coming to terms with the loss comes the sharp realization that all your content is gone. Saying goodbye to your photos is never fun, but you can prevent this nightmare from happening by taking precautions now.

Whats better than using cloud storage? Keeping your photo and video content in the palm of your hand. While the cloud can be convenient, thePhoto Backup Stickautomatically backs up pictures and videos without having to rely on an internet connection. It can eliminate the need to pay for monthly cloud-storage fees.

This handy gadget comes in a variety of colors and sizes suitable for a range of Apple devices.Prefer apurple 16GB photo backup stick? Thats an option. Theres also ablack version that holds 32GBof storage, if that suits your needs better.

With this device, duplicate photos and videos wont eat up large amounts of storage space, either. The smart gadget remembers the content youve already backed up, eliminating the need to store unnecessary copies. For example, yourblue 64GB backup stickwill never save repeats, and ditto for thegreen one with 128GB of storage space.

Finally, if youre serious about your content (and have plenty of it), opt for theorange photo backup stick, which gives you 256GBof space. Whether youre saving family photos or need to storeyour video content for work, this innovative gadget is the life hack we all need.

Losing your prized photos and videos is a bummer and also totally avoidable with these easy photo backup sticks. Small, effective and reliable, order yours today and start keeping your content closer to home.

Prices subject to change.

See the article here:
How to auto-store photos and videos with Photo Backup Stick - Cult of Mac

Read More..

Arkansas Man Pleads Guilty To Soliciting And Paying For Videos Of A Child Being Molested – CBS Tampa

JACKSONVILLE, Fla. (CW44 News At 10) Arkansas Man pleads guilty yo using the internet to solicit and pay an individual to molest a 9-year-old child and to creating a video recording depicting this sexual abuse on Wednesday, June 17.

Cody Dillon Hogan, 26, of Leachville, Arkansas faces a mandatory minimum pentalty of 15 years, and up to 30 years, in federal prison and a potential life term of supervised release.

Hogan was arrested on November 9, 2020, at his residence in Arkansas and remains in custody.

According to court documents, in December 2019, an undercover FBI agent in Jacksonville, who was posing as a parent of a 9-year-old child, made contact with Hogan in a particular online chat application. During an online session, Hogan, using the online name stonetelephone, sent the undercover agent a photo of his own genitalia and asked for naughty photos of the purported 9-year-old child.

Hogan offered to pay the parent to create and send him a video of the child being sexually abused. Hogan gave specific instructions as to how he wanted to see the child molested in the video, and he sent the agent a $50 gift card as payment for the requested video.

For several weeks, Hogan continued to solicit the undercover agent to produce and send him a video of the 9-year-old child being molested, and he provided advice on various ways to send it to him over the internet using group sharing accounts and online cloud storage. During one particular online chat, Hogan stated, After I see this video there could be all kinds of money and requests coming your way lol.

According to reports, FBI agents and other law enforcement officers executed a federal search warrant at Hogans residence in Arkansas and placed him under arrest. During an interview with FBI agents, Hogan admitted that he had engaged in online conversations with the mother of a 9-year-old child about producing and sending him a pornographic video of the child.

He also stated that he had successfully solicited at least three other children to produce and send him sexually explicit photos of themselves. A search of Hogans cellphone and his homemade computer revealed that these devices contained hundreds of videos and images depicting the sexual abuse of young children, including sadistic and masochistic conduct.

More:
Arkansas Man Pleads Guilty To Soliciting And Paying For Videos Of A Child Being Molested - CBS Tampa

Read More..

Hitachi Vantara and Redington Gulf: Storage Solutions Must Meet Today’s Challenges and Tomorrow’s Business Objectives – PRNewswire

As a consequence, data storage has become a key component for businesses around the world. One of the current trends in the data storage market is that it is widely popular and in-demand due to the rising storage capacity in terms of Terabyte and Petabyte of Big Data generated by organisations.

According to a recent report from IndustryARC, "The market for Data Storage is forecast to reach $4.2 billion by 2026, growing at a CAGR of 32.3% from 2021 to 2026 due to the rapid increase in consumer and machine data developments. The market will be driven by the increasing need for smartphones, Laptops, PCs, and online storage software in small and large enterprises. The Data Storage Market is expected to grow due to the high adoption of cloud storage technology and external data storage devices."

In the Middle East and Africa region, a similar surge in demand for storage technology products is being witnessed. According to Sanjay Naithani, General Manager MEP & Africa for Hitachi Vantara, "The mission of Hitachi since its establishment in 1910 has been to develop cutting-edge technology for social infrastructures to improve quality of life and contribute to society. We aim to provide solutions that help solve our growing global challenges in a rapidly changing market because this will bring the company closer to the customers and in line with society's needs. In the Middle East, we keep investing in resources and efforts and follow the same strategy, staying close to our valued customers and partners."

Hitachi Vantara storage solutions are the gold standard for high-performance data storage and trusted by top financial institutions and Fortune 500 companies. IDC data shows that the average knowledge worker spends 2.5 hours a day, roughly 30% of their time, searching for information. With 80% of corporate data being unstructured and growing by over 50% a year, it is the main reason why organisations need a fast and robust object storage architecture. Hitachi's object storage architecture for handling large amounts of unstructured data using metadata algorithms is the USP of its' data storage solutions.

Some of the top reasons why organisations prefer the Hitachi Vantara solutions are:

1. Accelerated Project DeliveryGo to market faster with modern data storage that increases operational efficiency, accelerates the adoption of new business processes, and improves customer experiences.

2. Confidently Protect Your DataKeep your data properly safeguarded with software and services that ensure continuous availability and adherence to compliance requirements.

3. Optimize Your ResourcesDrive long-term business agility with scalable data storage that helps keep management costs under control while supporting a diverse range of data types and workloads.

4. 'Set-and-Forget' ReliabilitySpend less time and money on maintenance, upgrades, and skills training, knowing that intelligent operations and reliable reporting will keep you and your data center up to speed.

5. Build a Foundation for the FutureGet enterprise-like features and functionality based on the needs and resources of today. With linear scale capabilities, you will get the full value of your investment.

The Hitachi Vantara midrange solutions are available in the Middle East and Africa region through their official distributor, Redington Gulf FZE based in Dubai.

Contact:

Hitachi Vantara805 Business Central Tower ADubai Internet City DubaiUnited Arab EmiratesTel: +971(0) 55 501 2962

Redington Gulf7th FloorH Hotel Business TowerSheikh Zayed RoadDubaiUnited Arab Emirates

Photo: https://mma.prnewswire.com/media/1531578/Hitachi_Vantara_Redington_Gulf.jpg

SOURCE Hitachi Vantara; Redington Gulf

See original here:
Hitachi Vantara and Redington Gulf: Storage Solutions Must Meet Today's Challenges and Tomorrow's Business Objectives - PRNewswire

Read More..

Quantum computers are already detangling natures mysteries – Wired.co.uk

THE LITHIUM-ION BATTERY is the unsung hero of the modern world. Since it was first commercialised in the early 1990s, it has transformed the technology industry with its ability to store huge amounts of energy in a relatively small amount of space. Without lithium, there would be no iPhone or Tesla and your laptop would be a lot bigger and heavier.

But the world is running out of this precious metal and it could prove to be a huge bottleneck in the development of electric vehicles, and the energy storage solutions well need to switch to renewables. Some of the worlds top scientists are engaged in a frantic race to find new battery technologies that can replace lithium-ion with something cleaner, cheaper and more plentiful. Quantum computers could be their secret weapon.

Its a similar story in agriculture, where up to five per cent of the worlds consumption of natural gas is used in the Haber-Bosch process, a century-old method for turning nitrogen in the air into ammonia-based fertiliser for crops. Its hugely important helping sustain about 40 per cent of the worlds population but also incredibly inefficient compared to natures own methods. Again, quantum computers could provide the answer.

So far, researchers have been working on these problems with blunt tools. They can perform increasingly powerful simulations using classical devices, but the more complicated the reactions get, the harder they become for supercomputers to handle. This means that right now, scientists are limited to looking only at very small problems, or they are forced to sacrifice accuracy for speed.

A hydrogen atom, for instance, has one positively charged proton and one electron and is easy to simulate on a laptop you could even work out its chemistry by hand. Helium, next step along on the periodic table, has two protons, orbited by two negatively charged electrons but its more challenging to simulate, because the electrons are entangled, so the state of one is linked to the state of the other, which means they all need to be calculated simultaneously.

By the time you get to thulium which has 69 orbiting electrons, all entangled with each other youre far beyond the capability of classical computers. If you wrote down one of each of the possible states of thulium per second it would take 20 trillion years more than a thousand times the age of the universe. In his 2013 book Schrdingers Killer App, John Dowling calculates that to simulate thulium on a classical computer, you would need to buy up Intels entire worldwide production of chips for the next 1.5 million years, at a cost of some $600 trillion.

A much quicker alternative would be to simply measure the atom directly. Classical computers seem to experience an exponential slowdown when put to simulating entangled quantum systems, Dowling writes.

Yet, that same entangled quantum system shows no exponential slowdown when simulating itself. The entangled quantum system acts like a computer that is exponentially more powerful than any classical computer. Although weve known all the equations we need to simulate chemistry since the 1930s, weve never had the computing power available to do it. This means that often, when dealing with complex simulations that are intractable for classical computers, the best approach is still to simply try lots of different things in the real world and draw conclusions from observation and experiment.

We cant really predict how electrons are going to behave right now, says Zapatas Christopher Savoie. If we can get into a world where were simulating it on a computer, we can be more predictive and do fewer actual laboratory experiments. It is, he says, as if Airbus were still testing planes by building small-scale models and throwing them into the sky. You cannot simulate chemical processes that youre interested in, says Googles Sergio Boixo. With a lot of the low-level materials science and engineering, youre kind of blind.

The rest is here:
Quantum computers are already detangling natures mysteries - Wired.co.uk

Read More..

What Are the Quantum Computing Threats to Security? – Design and Reuse – Design and Reuse

There are very few words used more right now in tech publications than the word quantum. There are also very few words that are more difficult to understand. Quantum can refer to several things. How do quantum mechanics relate to quantum effects or quantum computers? What is quantum computing, when will it be available, and is it the security threat many say it is?

It seems like quantum is the buzzword in tech these days with big companies and governments investing billions in research into quantum technology and its applications. But understanding the goal of all these investments and what the current state-of-the-art of quantum technology is, is far from trivial.

For starters, there are many aspects to the field of quantum technology. It all starts with quantum mechanics that cause quantum effects, which are used to create quantum computers that can run quantum algorithms. And it doesnt get any simpler from there. Do you know the difference between quantum crypto and post-quantum crypto? No need to worry if you dont, because few people do.

Needless to say, combining the hype of everything quantum with the confusion around all different aspects of an immensely complex technology is leading to very creative and misleading marketing activities. If you believe everything you find online, there is no way your company will be able to survive without investing in some kind of security against quantum attacks right now. And who are you to say that this is not true? Do you understand the intricacies of something as complicated as quantum technology? So, you must rely on the statements of these experts, right? Maybe you do, but maybe not. One thing you should do is at least try to sort out what is real and what is not from all the hype making the rounds.

For example, be aware that there is no clear timeline on when these quantum computers will actually become useful. Some early-stage quantum computers exist in high-end research laboratories, but this does not mean that they can be used for running algorithms that are changing the world as we know it not yet. There have been breakthroughs in the field of quantum computing since as early as the 1990s, but as of today, a usable quantum computer still does not exist. Yes, research is speeding up with those billions of dollars in investments, but that does not mean our world will be turned upside down tomorrow. And this is only one of many aspects that is probably less of a worry for you than you might have expected, given what you may have read or heard.

To provide some help in these confusing times, PUF Cafe, the online community about Physical Unclonable Functions or PUF technology, is organizing a webinar to shine a light on some of the different aspects of quantum technology and the impact this technology will have on cryptographic security. If you want to learn more about the relationship between quantum and crypto and the threats posed to the current security state-of-the-art, you can sign up here to attend this free webinar live on June 30th, or become a member of the PUF Cafe community (also free) and enjoy access to the PUF Cafe database of webinars available on replay.

This webinar is the fifth episode in the PUF Cafe Episodes, a web series about security challenges and PUF technology.

The webinar will discuss:

Who should attend:

See the original post here:
What Are the Quantum Computing Threats to Security? - Design and Reuse - Design and Reuse

Read More..

Cutting-edge research into quantum computing: BMW Group and Technical University of Munich agree to create an endowed chair in Quantum Algorithms and…

The BMW Group will in future be supporting research into quantum computing at the Technical University of Munich (TUM). Today, Prof. Thomas F. Hofmann, President of TUM, Frank Weber, Member of the Board of Management of BMW AG, Development, and Alexander Buresch, CIO of BMW AG, signed an agreement to establish an endowed chair in Quantum Algorithms and Applications. Over a period of six years, the BMW Group will make a fund of 5.1 million available to TUM for a professorship, equipment and personnel. By taking this step, the BMW Group and TUM are seeking to bridge the gap between the outstanding basic research carried out in Germany and its specific application in industry. The holder of the chair will conduct applied research into specific problems and issues in the field of quantum computing at the same time as establishing an ongoing exchange of knowledge and findings between TUM and the BMW Group.

It is clear to the BMW Group that quantum computing is a pioneering technology that holds great potential for a multitude of applications from materials research to battery cell chemistry and the future of automated driving using quantum machine learning,says Frank Weber. This technology is at an early stage of development and we want to provide the best possible support for cutting-edge research and its transfer into industrial applications.

Thanks to this collaboration, the BMW-TUM axis is set to further strengthen Munich Quantum Valleys reputation as Germanys leading ecosystem for quantum technologies, commentsProf. Thomas F. Hofmann. Quantum computing could hold the key to solving the sort of complex tasks that are beyond even todays supercomputers. The new endowed chair will focus on developing quantum algorithms for this and on trialling areas of application. The generous funding from the BMW Group will create the leverage needed to transfer the findings of quantum physics to industrial applications.

Close collaboration between research, industry and the startup landscape is a prerequisite for cost-effective implementation of our specific use cases,explains Alexander Buresch. The purpose of this is to relay the requirements of industrial applications so that they can be incorporated into the development of quantum computing demonstrators. Our team of experts is looking forward to joining forces with TUM and driving forward this important field of research while focusing on its practical application.

The creation of the endowed chair underlines how the BMW Group is endeavouring to further the sustained development of the Munich region as a high-tech industrial base and is also a key building block forMunich Quantum Valley, whose various initiatives have received 300 million in funding from the Bavarian state authorities.

TUM and the BMW Group already collaborate closely on a wide variety of other topics, with notable examples including battery research, circular economy, automated driving, artificial intelligence in production and mobility research. On the teaching side, the BMW Group helps to boost the practical relevance of courses with various guest lectures and project work, while the company also enjoys a close partnership with the TUM Institute for Lifelong Learning.

At the BMW Group, high-performance computers handle some 2,000 computing tasks a day such as high-end visualisations and crash/flow simulations for approximately 3,000 users from R&D. The bulk of the computing operations are processed on servers in Iceland and Sweden that run on hydroelectric and geothermal green energy, reducing CO2emissions by around 5,900 tonnes annually. Once a certain level of computational complexity is reached, however, even todays high-performance computers hit their limit, as they process information using a binary system, just as a laptop or smartphone would. Bits a contraction of binary digits have a value of 0 or 1. In the case of quantum computers, the smallest unit of information is called a quantum bit, or qubit for short. Qubits can be far more than simply 0 or 1. Phenomena of quantum mechanics, such as the tunnelling effect, quantum entanglement and quantum interference, are used to put qubits in superposition, a state in which they can also assume values between 0 and 1 and, theoretically, an infinite number of such values at the same time.

The BMW Group recognised the importance of quantum computing as a pioneering technology for the future back in 2017, prompting it to set up an interdisciplinary, cross-departmental project team with the task of identifying potential uses.

One of the BMW Groups first research projects involved calculating the optimum circuit to be followed by a robot sealing welding seams on a vehicle. The existence of highly complex parameters means that even the latest high-performance computers would take years to find the optimum solution. Quantum computers are capable of computing all the possible permutations in just a few seconds.

The high level of complexity in the automotive value chain gives rise to various multi-faceted optimisation problems in areas such as production, parts logistics and vehicle development. It will be possible to use quantum computers in materials research to simulate the behaviour of material compositions at a whole new level, for example when researching new types of battery.

Another field of research that is growing in importance is quantum machine learning, where quantum computers are used to speed up specific processes of traditional machine learning. These innovative learning processes for artificial intelligence could be particularly useful for automated driving, too.

SOURCE: BMW Group

Visit link:
Cutting-edge research into quantum computing: BMW Group and Technical University of Munich agree to create an endowed chair in Quantum Algorithms and...

Read More..

Is quantum computing about to change the world? – BroadbandDeals

Quantum computing potential extends beyond simply processing things faster, offering scope to create entire new consumer services and product offerings

Neil Cumins Thursday, 17 June, 2021

Its common for new technologies to be treated with a healthy degree of scepticism when theyre first unveiled.

From the internet to social media, it often takes a while for potential to become reality.

Today, theres excitable talk about the blockchains potential, or how light-powered LiFi may supplant WiFi in the nations homes. Talk, but not much action as yet.

Quantum computing potential may be unmatched in terms of transforming our world even more so than the Internet of Things, or fully automated robotics.

And while you dont need a degree in quantum physics to understand quantum computing, its important to appreciate the basics of this highly complex (and unstable) technology.

Regardless of what theyre being asked to do, electronic devices only understand binary inputs. Zero or one, on or off. Thats it.

Every FIFA tournament, CAD package, Netflix marathon and email is composed of immense strings of zeroes and ones the binary data bits computers can process and interpret.

Quantum computing potentially subverts this by allowing bits to be both zeroes and ones at the same time.

This status fluidity involves holding data in whats called a superposition state a coin spinning on its side rather than landing heads-up or tails-up.

Superpositions grant a single bit far more potential, offering exponentially more processing power than a modern (classical) computer can deliver.

Quantum computers are theoretically capable of achieving feats todays hardware couldnt manage in a hundred lifetimes.

Google claims to own a quantum computer which can perform tasks 100,000,000 times faster than its most powerful classical computer.

Indeed, computer scientists have already demonstrated that quantum processing can encrypt data in such a way it becomes impossible to hack.

This alone could transform online security, rendering spyware and most modern malware redundant, while ensuring a far safer world for consumers and businesses.

Quantum computing may be able to process the vast repositories of digital information being generated by billions of AI devices, which would otherwise result in huge data siloes.

It could unlock the secrets of our universe, helping us to achieve nuclear fusion or test drugs in ways wed never be able to accomplish with classical computing and brainpower alone.

Unfortunately, there are certain obstacles in the way of achieving full quantum computing potential.

The molecular instability involved in superpositions requires processors to be stored at cryogenic temperatures as close to absolute zero (-273C) as possible.

Devices need to be stored and handled with exceptional care, which in turn makes them incredibly expensive and unsuitable for domestic deployment.

And while the ability to develop uncrackable encryption algorithms is appealing, a quantum processor could also unlock almost any existing encryption method.

The havoc that could wreak in the wrong hands doesnt bear thinking about, and scientists are struggling to develop quantum-resistant algorithms for classical computers.

Like all emerging technologies, quantum computing has some way to go before it achieves mainstream adoption and acceptance.

When it does, the world will be a very different place.

Read more here:
Is quantum computing about to change the world? - BroadbandDeals

Read More..

Google enables end-to-end encryption for Androids default SMS/RCS app – Ars Technica

Enlarge / If you and your chatting partner are both on Google Messages and both have RCS enabled, you'll see these lock icons to show that encryption is on.

Google

Google has announced that end-to-end encryption is rolling out to users of Google Messages, Android's default SMS and RCS app. The feature has been in testing for months, and now it's coming to everyone.

Encryption in Google Messages works only if both users are on the service. Both users must also be in a 1:1 chat (no group chats allowed), and they both must have RCS turned on. RCS was supposed to be a replacement for SMSan on-by-default, carrier-driven text messaging standard. RCS was cooked up in 2008, and it adds 2008-level features to carrier messaging, likeuser presence, typing status, read receipts, and location sharing.

Text messaging used to be a cash cow for carriers, but with the advent of unlimited texting and the commoditization of carrier messaging, there's no clear revenue motivation for carriers to release RCS. The result is that the RCS rollout has amounted to nothing but false promises and delays. The carriers nixed a joint venture called the "Cross-Carrier Messaging Initiative" in April, pretty much killing any hopes that RCS will ever hit SMS-like ubiquity. Apple executives havealso indicated internally that they view easy messaging with Android as a threat to iOS ecosystem lock-in, so it would take a significant change of heart for Apple to support RCS.

The result is that Google is the biggest player that cares about RCS, and in 2019, the company started pushing its own carrier-independent RCS system. Users can dig into the Google Messages app settings and turn on "Chat features," which refers to Google's version of RCS. It works if both users have turned on the checkbox, but again, the original goal of a ubiquitous SMS replacement seems to have been lost. This makes Google RCS a bit like any other over-the-top messaging servicebut tied to the slow and out-of-date RCS protocol. For instance, end-to-end encryption isn't part of the RCS spec. Since it's something Google is adding on top of RCS and it's done in software, both users need to be on Google Messages. Other clients aren't supported.

Google releasedawhitepaper detailing the feature's implementation, and there aren't too many surprises. The company uses the Signal protocol for encryption, just like Signal, Whatsapp, and Facebook Messenger. The Google Messages web app works fine since it still relies on an (encrypted) local connection to your phone to send messages. Encrypted messages on Wear OS are not supported yet but will be at some point (hopefully in time for that big revamp). Even though the message text is encrypted, third parties can still see metadata like sent and received phone numbers, timestamps, and approximate message sizes.

If you and your messaging partner have all the settings right, you'll see lock icons next to the send button and the "message sent" status.

Excerpt from:
Google enables end-to-end encryption for Androids default SMS/RCS app - Ars Technica

Read More..

Google open-sources tools to bring fully homomorphic encryption into the mainstream – The Daily Swig

John Leyden16 June 2021 at 13:46 UTC Updated: 16 June 2021 at 15:10 UTC

Cryptographic expertise not needed to enable computations on encrypted data, says tech giant

Google has released a set of coding utilities that allowfully homomorphic encryption (FHE) operations on encrypted data.

The open source collection of libraries and tools allow computational processes to be carried out on encrypted data without first having to decrypt it, offering security and privacy benefits as a result.

Homomorphic encryption and secure multi-party computation are known technologies. Googles release is largely focused on refining and making them suitable for wider deployment, rather than reinventing the basis for the technologies.

Catch up on the latest encryption-related security news and analysis

Our release focuses most on ease of use, cleanly abstracting the various layers of development between design (what the developer is actually trying to do) and implementation (what actually is performed), a Google spokesperson told The Daily Swig.

The transpiler offers a glimpse into all of these layers, allowing the combined expertise of the crypto, hardware, logical optimization and distributed computing communities to come together in one place.

The suite of tools is available on Github.

Use cases for homomorphic encryption range from spell checkers for an email, to updates from wearables, to medical record analysis to, further down the road, things like photo filters or genomic analysis, according to Google.

The more sensitive or identifying the use case might be, the more important it is that a developer is able to provide strong guarantees on data handling, the Google spokesperson added.

No special expertise in cryptography is required to make use of the search giants technology, which is geared towards overcoming a lack of crypto expertise amongst developers that has historically held back wider adoption of such tools.

DONT FORGET TO READComputer Fraud and Abuse Act: What the landmark Van Buren ruling means for security researchers

The trade-off for the privacy benefits of homomorphic encryption is that the mechanism can be more computationally intensive and slower than other methods an issue not immediately addressed in Googles release.

Performance remains a significant barrier (one we continue to work on) and so this wont be a drop-in replacement for all existing cloud services, the Google representative explained.

At the moment, this environment is aimed at well-scoped problems where data sensitivity is critical or where extra compute cost is worth the added privacy benefit.

Google's approach to fully homomorphic encryption in explained in more detail in a recent white paper (PDF).

Professor Alan Woodward, a computer scientist from the University of Surrey, said Googles FHE tools might be useful across a wide range of applications.

What Google appear to be doing is providing tools to enable FHE across a wide range of areas, he explained.

Bottom line is that anything where you want the dataset encrypted when in live use, not just encrypted at rest, then FHE could help.

RELATED GitHub changes policy to welcome security researchers

See the original post here:
Google open-sources tools to bring fully homomorphic encryption into the mainstream - The Daily Swig

Read More..