Page 3,807«..1020..3,8063,8073,8083,809..3,8203,830..»

Managed Hybrid Cloud Hosting Market- Global Business Growing Strategies, Technological Innovation And Emerging Trends Of Outlook To 2026 – Feed Road

The market intelligence report about Managed Hybrid Cloud Hosting Market gives a detailed analysis about the growth of market. It has presented an in-depth study of different factors effecting various aspects of the market growth during 2020 2026. The study has considered several drivers and on-going trends that is shaping the Managed Hybrid Cloud Hosting Market. Besides, the report gives CAGR with which the market will expand during forecast period. After considering the CAGR, the report gives the projected market value by the end of forecast period. One of the sections of the report talks about is the segments bringing positive changes. It provides demographic analysis of Managed Hybrid Cloud Hosting Market.

Further, the study provides insights about technological developments brought by competitors to set foothold in the Managed Hybrid Cloud Hosting Market. Some of the key players in the Managed Hybrid Cloud Hosting Market are:- Amazon Web Services (AWS), Microsoft, Tata Communications, Rackspace, Datapipe, Sify, NTT Communications, NxtGen, BT, CtrlS Datacenters, CenturyLink, Dimension Data (NTT Communications), Fujitsu, Singtel, Telstra

Get Free Sample PDF (including full TOC, Tables and Figures) of Managed Hybrid Cloud Hosting Market @ https://www.researchmoz.us/enquiry.php?type=S&repid2604061

Later, the report gives detailed analysis about the major factors fuelling the expansion of Managed Hybrid Cloud Hosting Market in the coming years. Some of the major factors driving the growth of Managed Hybrid Cloud Hosting Market are-

Market Revenue By Region:-

Moving forward, the researched report gives details about the strategies applied by companies as well as new entrants to expand its presence in the market.Do You Have Any Query Or Specific Requirement? Ask to Our Industry [emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid2604061On the basis on the end users/applications,this report focuses on the status and outlook for major applications/end users, sales volume, Managed Hybrid Cloud Hosting market share and growth rate of Managed Hybrid Cloud Hosting foreach application, including-

On the basis of product,this report displays the sales volume, revenue (Million USD), product price, Managed Hybrid Cloud Hosting market share and growth rate ofeach type, primarily split into-

The market study report also fragments the market on basis regions and sub regions. Furthermore, discusses the contribution of major regions that are likely to influence the market in the coming years.

Key Questions Answered in the Report:-

For More Information Kindly Contact: ResearchMozMr. Nachiket Ghumare,90 State Street,Albany NY,United States 12207Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email: [emailprotected]Follow us on LinkedIn @ http://bit.ly/1TBmnVGFollow me on : https://businessadvertisingservices.blogspot.com/

See the original post here:
Managed Hybrid Cloud Hosting Market- Global Business Growing Strategies, Technological Innovation And Emerging Trends Of Outlook To 2026 - Feed Road

Read More..

Personal/Private Cloud Market by Revenue (Direct and Indirect), Hosting (User and Provider) and Deployment (Individuals, Small businesses and Medium…

The New Report Personal/Private Cloud Market published by Premium Market Insights, covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.

Personal cloud is a cloud storage platform that enables the customers to access, synchronize and share stored data across various mobile devices such as smartphones and tablets. In this era of digitalization, there is an increasing need of storing and sharing personal data or professional data. The rapidly increasing tech-savvy population has led to the growing demand of cloud computing services in the recent years. The increasing use of camera-equipped devices, such as smartphones and tablets, has created a huge demand for a secure platform to store digital content. Faster and convenient access to stored data and sharing of information would define new standards for the personal cloud industry to create lucrative opportunities for the market players. The world personal cloud market is forecast to generate a revenue of $89.9 billion by 2020, registering a CAGR of 33.1% during the forecast period.

Top Companies Covered in this Report:Apple Inc., Google Inc., Microsoft Corp., Amazon Web Services, Dropbox, Inc, Egnyte, Copy, SpiderOak, Box, Inc. and Buffalo Inc.

Get sample copy of Personal/Private Cloud Market at: https://www.premiummarketinsights.com/sample/AMR00012685

Bring-Your-Own-Device (BYOD) is gaining increasing acceptance, particularly among small and medium enterprises due to benefits of improved productivity, work flexibility and reduced infrastructure costs. Personal cloud services would facilitate file storage and sharing among the employees and enterprises who have adopted the BYOD trend. However, the issues of privacy and security of stored data would hinder the market growth.

World personal cloud market is segmented based on type of deployment, revenue type and type of hosting. The deployment type is categorized into individual customers, small businesses and medium businesses. Type of hosting divides the market into user hosting and provider hosting. While revenue type segments the market into direct revenue and indirect revenue. Geographically, the market is segmented into North America, Europe, Asia Pacific and LAMEA (Latin America, Middle East and Africa).

KEY BENEFITSThis report provides an in-depth analysis of the Personal/Private Cloud equipment market to elucidate the potential investment pockets.The current trends and future scenarios are outlined to determine the overall market potential and single out profitable trends to gain a stronger foothold in the market.This report provides information regarding key drivers, restraints, and opportunities along with their detailed impact analysis.Quantitative analysis of the current market trends and estimations for the period 2014-2022 are provided to indicate its financial competency.Porters Five Forces Model of the industry illustrate the potency of buyers and suppliers.

Have any query? Enquire about report at: https://www.premiummarketinsights.com/discount/AMR00012685

Fundamentals of Table of Content:

1 Report Overview1.1 Study Scope1.2 Key Market Segments1.3 Players Covered1.4 Market Analysis by Type1.5 Market by Application1.6 Study Objectives1.7 Years Considered

2 Global Growth Trends2.1 Personal/Private Cloud Market Size2.2 Personal/Private Cloud Growth Trends by Regions2.3 Industry Trends

3 Market Share by Key Players3.1 Personal/Private Cloud Market Size by Manufacturers3.2 Personal/Private Cloud Key Players Head office and Area Served3.3 Key Players Personal/Private Cloud Product/Solution/Service3.4 Date of Enter into Personal/Private Cloud Market3.5 Mergers & Acquisitions, Expansion Plans

4 Breakdown Data by Product4.1 Global Personal/Private Cloud Sales by Product4.2 Global Personal/Private Cloud Revenue by Product4.3 Personal/Private Cloud Price by Product

5 Breakdown Data by End User5.1 Overview5.2 Global Personal/Private Cloud Breakdown Data by End User

Buy this Report Now at: https://www.premiummarketinsights.com/buy/AMR00012685

Contact Us: Call: +912067274191Email: [emailprotected]

About Premiummarketinsights:

Premiummarketinsights.com is a one stop shop of market research reports and solutions to various companies across the globe. We help our clients in their decision support system by helping them choose most relevant and cost effective research reports and solutions from various publishers. We provide best in class customer service and our customer support team is always available to help you on your research queries.

Original post:
Personal/Private Cloud Market by Revenue (Direct and Indirect), Hosting (User and Provider) and Deployment (Individuals, Small businesses and Medium...

Read More..

ACS transforms disaster recovery with VMware and Routed – TechCentral

Andrew Cruise

ACS, a division of Altron that provides secure data hosting and networking for not only the Altron Group of companies but also external customers across South Africa, has strengthened its partnership with VMware Cloud Provider partner Routed to enhance its current disaster recovery (DR) offering with a more scalable and efficient cloud-based solution.

We provide the secure hosting of transactional data as well as applications which contain a significant amount of private and critical information. Given the sensitivity of this data, it must always be available. Our previous solution required significant granular manual intervention when we needed to switch customers over to DR. It was therefore essential to implement a more cost-effective solution that could cope with the massive amount of data that needed to be transported across to the DR data centre, said Mira Andric, ACS operations and delivery manager.

Andrew Cruise, MD of Routed Hosting, which is the first VMware Cloud Verified Partner (VCPP) in Africa, said the previous ACS DR solution was not only difficult to manage but was manually driven for recovery and tied to their storage resulting in an inflexible environment.

Because ACS runs VMware inside their data centre and they themselves are a VCPP, it made sense to deliver a solution that combines our respective expertise in the VMware ecosystem. They are quite forward-thinking to approach another service provider partner to deliver a best-of-breed offering rather than try do everything themselves, he said.

Andric agreed. We were looking for a VCPP partner that could integrate well with what we already had in place. It was not a case of reinventing the wheel but rather implementing something that could take the business to the next level.

ACS implemented VCloud availability and shipped over 30TB of data within two weeks. The entire project took three months to complete, with ACS now running a full DR-as-a-service (DRaaS) offering incorporating the reliability, availability and security needed.

ACS is providing customers with a self-service portal where they can ensure that the DR systems are available and up and running at a moments notice. Our engagement with Routed has been a partnership and they have been actively involved in setting the systems up with us and our IT teams, she said.

According to Andric, this has allowed ACS to complete the project on time and within budget.

The cost savings have already started coming through. What is most important for us is that Routed has demonstrated that the VCloud offering is running the way it should at a price that is affordable to our customers. Furthermore, the IT teams within our customer environment understand the solution and it is incredibly user-friendly, said Andric.

Running DRaaS is traditionally quite complex as those are the systems that companies do not require daily.

However, Routed guided us on this complex path and empowered us to deliver a self-service platform to our customers. Now, within five clicks, the DR system is up and running. The VMware system is just a pleasure to run when you need it most. It has provided us and our customers with a good nights sleep because they know that when they need it, DR will be done as effectively and securely as possible, she said.

According to Cruise, ACS can deliver this solution to not only Altron Group companies but also external customers.

ACS can provide a suite of services that speak to the security and compliance requirements of the digital age. And all this is delivered with the availability and reliability of a VMware cloud solution, he said.

About RoutedRouted is a true cloud provider. Secure, robust and reliable, the Routed cloud platform is vendor neutral and offers scalable, full or hybrid cloud hosting. Engaging directly or within a channel, Routed delivers cloud and infrastructure solutions to enterprise customers, wholesale partners, resellers and affiliates. It was founded in 2016 in response to a growing demand for data centre hosting solutions following the rapid growth and penetration of fast, reliable connectivity services in South Africa. Routed is led by industry veterans with over 35 years of experience in delivering and managing secure cloud and infrastructure solutions both locally and internationally. Visit Routeds website to learn more.

Read more here:
ACS transforms disaster recovery with VMware and Routed - TechCentral

Read More..

What the 2020 election means for encryption – The Verge

This is a living guide to encryption: what it is, what it isnt, why its controversial, and how it might be changed. This guide will be updated as events warrant.

Encryption is the process of scrambling information so only the intended recipients can decipher it. An encrypted message requires a key a series of mathematical values to decrypt it. This protects the message from being read by an unwanted third party. If someone without the key tries to hack in and read the message, theyll see a set of seemingly random characters. Using modern encryption techniques, extracting the original message without the key is nearly impossible.

That basic process is a fundamental building block of network security, ensuring that information can travel over the public internet without being intercepted in transit. Without some form of encryption, it would be impossible to implement basic online services like email, e-commerce, and the SSL system that verifies webpages.

While most uses of encryption are uncontroversial, the wide availability of techniques has opened up new political questions around lawful access. Presented with a warrant for a particular users information, businesses are legally required to turn over all the information they have. But if that information is encrypted and the company doesnt have the key, there may be no way to work back to the original data.

Some products hold copies of user keys and decrypt data when served with a warrant, including Gmail, Facebook pages, and most cloud storage providers. But messaging apps like WhatsApp, Telegram, and Signal do not, and the device encryption used by iOS also makes the phones local data inaccessible. That approach has both privacy and security benefits: since the data is not available outside of the local device, the apps are far more resilient to breaches and centralized attacks.

In 2014, James Comey, the then-director of the FBI, wrote a memo spelling out his concerns about encryption. Those charged with protecting our people arent always able to access the evidence we need to prosecute crime and prevent terrorism even with lawful authority, he wrote.

Comey went on to warn that encryption would make it more difficult for law enforcement to catch suspected criminals. If communications are encrypted by default, he said, the government cant monitor and collect communications, even if a judge allows them to do so. Encryption, he summarized, will have very serious consequences for law enforcement and national security agencies at all levels. Sophisticated criminals will come to count on these means of evading detection. Its the equivalent of a closet that cant be opened. A safe that cant be cracked. And my question is, at what cost?

The governments position on encryption hasnt evolved a whole lot in the intervening years. Attorney General William Barr and Sen. Lindsey Graham (R-SC) argued last year that hardened encryption makes it difficult to figure out when messaging platforms are used to coordinate crimes. If a large-scale terrorist attack is carried out, the government needs to act quickly to understand the national security risks. Hardened encryption could make this discovery process harder.

In 2016, in the wake of the San Bernardino shooting, the FBI asked Apple to hand over information from the suspects iPhone. At first, the company complied, giving the FBI data from the suspects iCloud backup. Then the FBI demanded access to the phones local storage. This would have involved Apple deploying an entirely new version of iOS to the device, which the company refused to do. In a statement, a company spokesperson said: We believed it was wrong and would set a dangerous precedent.

The FBI responded by trying to force Apple to help, citing the All Writs Act of 1789. Just before a hearing on this case, however, the FBI was able to unlock the iPhone using an anonymous third-party company. The phone did not contain much new information the FBI hadnt already had, but the conflict escalated the fight between tech companies and the government over encryption.

In 2019, after the shooting at the Pensacola Naval Air Station, the government again asked for Apples assistance unlocking the suspects iPhone. Apple did not comply, but it did hand over data from the suspects iCloud backups. In response to Apples refusal to unlock the shooters iPhone, President Donald Trump tweeted: We are helping Apple all of the time on TRADE and so many other issues, and yet they refuse to unlock phones used by killers, drug dealers and other violent criminal elements.

A week later, it was revealed that the company had dropped plans to allow users to encrypt their iCloud backups after the FBI argued the move would harm future investigations.

In March 2019, Facebook CEO Mark Zuckerberg published a memo laying out his vision for a new privacy-focused social network. In it, he stated the companys plan to roll out encryption across its various messaging apps. People expect their private communications to be secure and to only be seen by the people theyve sent them to not hackers, criminals, over-reaching governments, or even the people operating the services theyre using, he wrote.

The news set off a firestorm of criticism from certain politicians most notably, AG Barr. In a letter to the company, Barr, along with officials in the United Kingdom and Australia, wrote, Companies should not deliberately design their systems to preclude any form of access to content, even for preventing or investigating the most serious crimes. They added that encryption put people at risk by severely eroding a companys ability to detect and respond to illegal content and activity, such as child sexual exploitation and abuse, terrorism, and foreign adversaries attempts to undermine democratic values and institutions, preventing the prosecution of offenders and safeguarding of victims. They asked Facebook to stop the encryption rollout. Facebook did not comply with this request.

Republicans seem to want US tech companies to comply with law enforcement in the event of a major national security attack. They do not want US tech companies to make accessing user data more complicated through end-to-end encryption. In his letter to Facebook, Barr asked Zuckerberg to allow law enforcement to obtain lawful access to content in a readable and usable format, as reported by The New York Times.

Most Democratic presidential candidates are supportive of end-to-end encryption. When asked whether the government should be able to access Americans encrypted conversations, Sen. Bernie Sanders (I-VT) said: [I] firmly [oppose] the Trump administrations efforts to compel firms to create so-called backdoors to encrypted technologies. Sen. Elizabeth Warren (D-MA) did not answer directly, but she said that the government can enforce the law and protect our security without trampling on Americans privacy. Individuals have a Fourth Amendment right against warrantless searches and seizures, and that should not change in the digital era. During his primary run, former South Bend, Indiana mayor Pete Buttigieg said, End-to-end encryption should be the norm. Former New York City mayor Mike Bloomberg, in an op-ed from 2016, argued against end-to-end encryption and said tech companies shouldnt be above the law in refusing court orders to hand over user data.

Section 230 of the Communications Decency Act protects websites from lawsuits if a user posts something illegal. Theres been a large debate about whether companies should continue to have these protections, with various lawmakers proposing plans to change or amend Section 230.

In January, one proposed change called Eliminating Abusive and Rampant Neglect of Interactive Technologies Act (EARN IT) sought to strip tech companies of their Section 230 protections if they didnt comply with new rules for finding and removing content related to child exploitation. And while the bill, titled the National Strategy for Child Exploitation Prevention, didnt lay out many specifics, complying with these rules would likely mean not encrypting some user data.

Apple has taken the lead on the issue so far, and it has been careful to valorize law enforcement and lawful access provisions, while firmly opposing a backdoor. As CEO Tim Cook framed it in an open letter at the start of the San Bernardino case, Apple is willing to do everything it can including turning over iCloud logs and other user data but unlocking device encryption is a step too far. Up to this point, we have done everything that is both within our power and within the law to help [the FBI], Cook wrote. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.

For the most part, other tech companies have lined up behind Google with the Facebook-owned WhatsApp leading the way. In response to Barrs letter in 2019, Will Cathcart, head of WhatsApp, and Stan Chudnovsky, who works on Messenger, said the company was not prepared to build the government a backdoor in order to access user messages. Cybersecurity experts have repeatedly proven that when you weaken any part of an encrypted system, you weaken it for everyone, everywhere, they wrote. It is simply impossible to create such a backdoor for one purpose and not expect others to try and open it.

Still, many tech companies that rely on government contracts have had to walk a more politically delicate line. Microsoft supported Apple publicly during the San Bernardino case, but more recent statements from Microsoft CEO Satya Nadella have taken a softer line. In January 2020, Nadella expressed opposition to backdoors but optimism about legislative or other technical solutions, saying, We cant take hard positions on all sides.

As tech companies like Facebook continue to move forward with large-scale encryption projects, more major changes could come in the form of legislation aimed at helping or hurting large-scale encryption initiatives. In 2019, Rep. Ted Lieu (D-CA) reintroduced a 2016 bill called the Ensuring National Constitutional Rights for Your Private Telecommunications Act (ENCRYPT), which would create a national standard for encrypted technology. Rep. Zoe Lofgren (D-CA), along with a bipartisan coalition, also introduced the Secure Data Act, which would stop federal agencies from forcing tech companies to build backdoors into their products, thereby weakening encryption. Finally, theres still the draft of the National Strategy for Child Exploitation Prevention, which would make it much harder for tech companies to encrypt their products.

See the original post here:
What the 2020 election means for encryption - The Verge

Read More..

Our guide to the 2020 election including Section 230 and encryption – The Verge

The 2020 presidential election is going to kick off a firestorm of change for our country and the networks that connect us all.The internet and information economy is at an inflection point: the disruptors are no longer upstarts, but have become the new giants, in every sense of the word. Those giants often operate in fields where there is little regulation to protect consumers, like data and advertising, or bump up against the authority of the government in uncomfortable ways, like law enforcement and encryption.At The Verge, weve always paid attention to how simple things like the price of broadband are deeply connected to complicated tech policy debates. And weve been closely watching the collision between social networks and democracy Casey Newton has been writing a daily newsletter called The Interface tracking that subject since 2017. So for the 2020 election cycle, we want to give you a central place to learn about the main tech policy issues were following, see the latest news, and feel like you have a guide through it all. Well be focused on a few main areas: speech and moderation on internet platforms; data and privacy; broadband access; antitrust and corporate behavior; and climate change.

Read this article:
Our guide to the 2020 election including Section 230 and encryption - The Verge

Read More..

Research: IT Managers Regard Encrypted Traffic as a Source of Cyberthreats, But Their Defenses Are Inadequate – Yahoo Finance

BRNO, Czech Republic, March 3, 2020 /PRNewswire/ -- New research from Flowmon and IDG Connect shows 99% of IT managers recognize encrypted network traffic as a source of security risks, but two-thirds of businesses fail to protect their assets from both internal and external threats misusing SSL/TLS.

Bringing NetOps and SecOps together to address the menace of encrypted network traffic threats; Flowmon and IDG Connect, 2020

Flowmon Networks, an actionable network intelligence company, today published the results of a survey mapping organisations' defense strategies in addressing the threats in encrypted traffic. Conducted on behalf of the company by IDG Connect, the survey of over 100 IT managers explores their experiences facingthis rapidly growing attack vector.

Throughout IT history, new technologies have been co-opted by bad actors and abused for malicious activities. And there can be no doubt that encryption is any different. Though SecOps teams deploy it as a default security countermeasure, it also opens up space for threat actors to hide their activities in what is considered to be safe traffic. A large number of companies have been exposed not just to attacks exploiting SSL/TLS vulnerabilities, but also attacks that employ SSL/TLS to mask movement over the network and to attack applications. Without a proper toolset that covers all attack vectors, dealing with encrypted threats is a significant challenge.

"The study shows that the vast majority of investments go to traffic decryption on the perimeter, leaving the organization vulnerable to many common forms of attack such as ransomware, botnets obscuring communication with Command & Control servers or browser exploits. Only 36% of respondents have both perimeter and network protection deployed together," says Mark Burton, Managing Director at IDG Connect.

Two biggest obstacles of deploying network traffic decryption by using an SSL proxy are the fear of breaching data privacy (36%) and concerns over performance degradation (29%).

Network Defenders Need to Team up to Repel All Encrypted Traffic Threats

The survey's findings highlight the importance of deploying Network Traffic Analysis(NTA) and SSL decryption together to provide equal protection against external and internal threats.

Respondents recognize NTA tools as a way to bring together network and security operations teams, to share a single version of the truth (49% rank this as a number 1 capability of such tools), and to improve prevention and accelerate detection and response.

"Most organizations are unable to inspect SSL/TLS traffic at scale and cybercriminals are aware of this. Decryption is powerful but also expensive and resource-intensive. Therefore, it makes tactical sense to use Encrypted Traffic Analysis (ETA), which is lightweight and covers the most cases, to monitor the network holistically and reserve the use of decryption for critical services only,"says Artur Kane, Head of Product Marketing at Flowmon Networks.

The full report is available at: link https://www.flowmon.com/en/idg-research-encrypted-traffic-threats

Survey Methodology

IDG Connect conducted the survey on behalf of Flowmon Networks to study the network security landscape and network encryption across the US, Canada and Europe. In late 2019, IDG Connect surveyed over 100 respondents via an online questionnaire. The audience came from across sectors including 27% from the technology vertical. All respondents had IT management titles with 40% in C-suite roles. All came from companies with at least 500 staff, with the highest number (39%) coming from companies with 1,000 to 4,999 staff.

Story continues

Continued here:
Research: IT Managers Regard Encrypted Traffic as a Source of Cyberthreats, But Their Defenses Are Inadequate - Yahoo Finance

Read More..

Encryption Foes in Washington Won’t Give Up – Reason

It's impossible to overstate just how much governments hate not being able to read your mail, listen to your phone calls, and peruse your text messages. When all that snoopy officials can pull up is scrambled gobbledygook, they just know they're missing out on the good stuff, like little kids bristling at whispered adult conversations.

That explains the U.S. government's decades-long war against private cryptography and its most recent manifestation in the crusade against "warrant-proof encryption."

No matter how much government officials stamp their feet and hold their breath, it'd be a bad idea to give them the access they want to our data. And they do keep stamping their feet.

"By enabling dangerous criminals to cloak their communications and activities behind an essentially impenetrable digital shield, the deployment of warrant-proof encryption is already imposing huge costs on society," Attorney General Bill Barr huffed last summer when he delivered the keynote address at the International Conference on Cyber Security in New York City. "It seriously degrades the ability of law enforcement to detect and prevent crime before it occurs. And, after crimes are committed, it thwarts law enforcement's ability to identify those responsible or to successfully prosecute the guilty parties."

If that sounds familiar, it's because it's essentially a rephrasing of former FBI Director James Comey's 2014 argument that "those charged with protecting our people aren't always able to access the evidence we need to prosecute crime and prevent terrorism even with lawful authority. We have the legal authority to intercept and access communications and information pursuant to court order, but we often lack the technical ability to do so."

In turn, Comey barely rewarmed the Clinton White House's overwrought 1994 warnings that "the same encryption technology that can help Americans protect business secrets and personal privacy can also be used by terrorists, drug dealers, and other criminals."

The encryption technology that gets officials so hot and bothered year after year grows increasingly widespread for the simple reason that it satisfies a very real demand. Barr may worry about privacy-minded terrorists and drug sellers, but most people are more concerned about hackers, identity thieves, and nosy busybodies. In response, tech companies build end-to-end encryption into a host of products so that regular people can benefit without memorizing a user's manual.

In response, Barr and company argue that all they want is a "back door" built into communications services so that they can gain access when necessaryand only after they jump through all the legal niceties, we're assured.

But weakened, government-accessible encryption isn't a magic solution that will be used only to catch bad guys. It will be weakened encryption, period.

"The problem with backdoors is knownany alternate channel devoted to access by one party will undoubtedly be discovered, accessed, and abused by another," notes David Ruiz, a writer with the internet security firm Malwarebytes Labs. "Cybersecurity researchers have repeatedly argued for years that, when it comes to encryption technology, the risk of weakening the security of countless individuals is too high."

"Encryption is one of the few security techniques that mostly works. We can't afford to mess it up," cautions Matt Blaze, a cybersecurity expert at the University of Pennsylvania. "As someone who's been working on securing the 'net for going on three decades now, having to repeatedly engage with this 'why can't you just weaken the one tool you have that actually works' nonsense is utterly exhausting."

How can we know that the critics are right? Because the U.S. government itself claims that a Chinese company has, for years, been misusing exactly such back doors.

"U.S. officials say Huawei Technologies Co. can covertly access mobile-phone networks around the world through 'back doors' designed for use by law enforcement, as Washington tries to persuade allies to exclude the Chinese company from their networks," the Wall Street Journal reported on February 12.

Well, it's only fair. For half a century, the CIA and German intelligence spied on international communications courtesy of back doors they built into the products of Crypto AG, a company the agencies co-owned.

The CIA and its German partner kept that arrangement secret for a long time, but mandated access to everybody's messaging apps would be public knowledge and serious hacker-bait. It might even be a target for bad actors wielding the hacking tools that were stolen in 2017 from the National Security Agencyan exploit generally considered among the most significant events in cybersecurity.

Whoopsies. It's almost like you really shouldn't trust government types with the ability to peruse your communications and paw through your data.

Despite that history, Senators Lindsey Graham (R-S.C.) and Richard Blumenthal (D-Conn.) are floating a bill that would make tech companies "earn" Section 230 protection against liability for other people's communications that pass through their platforms by adopting "best practices" that satisfy amorphous government standards.

"The AG could single-handedly rewrite the 'best practices' to state that any provider that offers end-to-end encryption is categorically excluded from taking advantage of this safe-harbor option," writes Riana Pfefferkorn, associate director of surveillance and cybersecurity at Stanford Law School. "Or he could simply refuse to certify a set of best practices that aren't sufficiently condemnatory of encryption. If the AG doesn't finalize a set of best practices, then this entire safe-harbor option just vanishes."

The whole thing is cloaked in the language of "child sex-abuse material" so that privacy advocates have to argue against a measure nominally aimed at kiddy porn in order to protect strong encryption protection for everybody's communications. Yes, once again, government officials pretend that the terrible things they want to do are all about protecting the children.

Meanwhile, any back doors forced into our encrypted communications are likely to affect harmless people more than they inconvenience criminals and terrorists.

"Short of a form of government intervention in technology that appears contemplated by no one outside of the most despotic regimes, communication channels resistant to surveillance will always exist," states a 2016 report from the Berkman Center for Internet and Society at Harvard University.

Unwilling to rely on commercial products that may or may not keep their secrets, criminals and terrorists develop their own encryption productsincluding secure phones. They're very unlikely to comply with law enforcement demands for back doors.

"I think there's no way we solve this entire problem," the FBI's Comey admitted to the U.S. Senate Judiciary Committee in 2015. "Encryption is always going to be available to the sophisticated user."

But what about the rest of us? Despite all the evidence of the foolishness of their efforts, government officials keep trying to make us expose our data to them and the criminals who ride on their coattails.

Originally posted here:
Encryption Foes in Washington Won't Give Up - Reason

Read More..

BestCrypt by Jetico expands cross-platform protection to computers with T2 chip – Help Net Security

Jetico, long-trusted pioneer in data encryption, announced support for Mac computers with a T2 security chip. With this update, BestCrypt Volume Encryption Enterprise Edition becomes the industrys most comprehensive enterprise encryption software for Windows and macOS.

Native OS encryption tools might be an easy way to get started with data protection. Yet theres a critical limitation. Their security is bound to only some versions of a single operating system, states Jetico CEO, Michael Waksman.

BestCrypt is already proven to run on more Windows versions than native BitLocker. Now we expand our cross-platform protection to all editions of Mac.

The latest version of BestCrypt Volume Encryption applies FileVault, macOS native encryption, for Apple File System (APFS) volumes on computers with a T2 chip. Jetico offers the worlds only OS agnostic encryption tool, still used for all other volumes to ensure cross compatibility, especially when handling removable drives.

Waksman continues, Lost and stolen removable drives is one of the main causes of data breaches. Encryption overcomes this risk. Yet managing and accessing encrypted data on USB drives can be challenging available computers dont always support the same encryption tool.

Waksman focuses on the user benefit claiming, With this BestCrypt update, Jetico proudly delivers an independent solution to improve security while also boosting productivity. As always, our goal is to provide painless encryption that works the way you do.

Jetico Central Manager (JCM), part of BestCrypt Volume Encryption Enterprise Edition, also includes:

For added convenience, BestCrypt Volume Encryption Enterprise Edition can also run in the cloud, empowering Admins to control all disk encryption activities from anywhere without needing to configure and maintain a dedicated server.

See the rest here:
BestCrypt by Jetico expands cross-platform protection to computers with T2 chip - Help Net Security

Read More..

Barr’s Motives, Encryption and Protecting Children; DOJ 230 Workshop Review, Part III – Techdirt

from the don't-break-the-internet dept

In Part I of this series on the Department of Justices February 19 workshop, Section 230 Nurturing Innovation or Fostering Unaccountability? (archived video and agenda), we covered why Section 230 is important, how it works, and how panelists proposed to amend it. Part II explored Section 230s intersection with criminal law.

Here, we ask what DOJs real objective with this workshop was. The answer to us seems clear: use Section 230 as a backdoor for banning encryption a backdoor to a backdoor in the name of stamping out child sexual abuse material (CSAM) while, conveniently, distracting attention from DOJs appalling failures to enforce existing laws against CSAM. We conclude by explaining how to get tough on CSAM to protect kids without amending Section 230 or banning encryption.

Banning Encryption

In a blistering speech, Trumps embattled Attorney General, Bill Barr, blamed the 1996 law for a host of ills, especially the spread of child sexual abuse material (CSAM). But he began the speech as follows:

[Our] interest in Section 230 arose in the course of our broader review of market-leading online platforms, which we announced last summer. While our efforts to ensure competitive markets through antitrust enforcement and policy are critical, we recognize that not all the concerns raised about online platforms squarely fall within antitrust. Because the concerns raised about online platforms are often complex and multi-dimensional, we are taking a holistic approach in considering how the department should act in protecting our citizens and society in this sphere.

In other words, the DOJ is under intense political pressure to do something about Big Tech most of all from Republicans, who have increasingly fixated on the idea that Big Tech is the new Liberal Media out to get them. Theyve proposed a flurry of bills to amend Section 230 either to roll back its protections or to hold companies hostage, forcing them to do things that really have nothing to do with Section 230, like be "politically neutral" (the Hawley bill) or ban encryption (the Graham-Blumenthal bill), because websites and Internet services simply cant operate without Section 230s protections.

Multiple news reports have confirmed our hypothesis going into the workshop: that its purpose was to tie Section 230 to encryption. Even more importantly, the closed-door roundtable after the workshop (to which we were, not surprisingly, not invited) reportedly concluded with a heated discussion of encryption, after the DOJ showed participants draft amendments making Section 230 immunity contingent on compromising encryption by offering a backdoor to the U.S. government. Barrs speech said essentially what we predicted he would say right before the workshop:

Technology has changed in ways that no one, including the drafters of Section 230, could have imagined. These changes have been accompanied by an expansive interpretation of Section 230 by the courts, seemingly stretching beyond the statutes text and original purpose. For example, defamation is Section 230s paradigmatic application, but Section 230 immunity has been extended to a host of additional conduct from selling illegal or faulty products to connecting terrorists to facilitating child exploitation. Online services also have invoked immunity even where they solicited or encouraged unlawful conduct, shared in illegal proceeds, or helped perpetrators hide from law enforcement. ...

Finally, and importantly, Section 230 immunity is relevant to our efforts to combat lawless spaces online. We are concerned that internet services, under the guise of Section 230, can not only block access to law enforcement even when officials have secured a court-authorized warrant but also prevent victims from civil recovery. This would leave victims of child exploitation, terrorism, human trafficking, and other predatory conduct without any legal recourse. Giving broad immunity to platforms that purposefully blind themselves and law enforcers to illegal conduct on their services does not create incentives to make the online world safer for children. In fact, it may do just the opposite.

Barr clearly wants to stop online services from going dark through Section 230 even though Section 230 has little (if any) direct connection to encryption. His argument was clear: Section 230 protections shouldn't apply to services that use strong encryption. Thats precisely what the Graham-Blumenthal EARN IT Act would do: greatly lower the bar for enforcement of existing criminal laws governing child sexual abuse material (CSAM), allow state prosecutions, and civil lawsuits (under a lower burden of proof), but then allow Internet services to earn back their Section 230 protection against this increased liability by doing whatever a commission convened and controllled by the Attorney General tells them to do.

Those two Senators are expected to formally introduce their bill in the coming weeks. Undoubtedly, theyll refer back to Barrs speech, claiming that law enforcement needs their bill passed ASAP to protect the children.

Barrs speech on encryption last July didnt mention 230 but went much further in condemning strong encryption. If you read it carefully, you can see where Graham and Blumenthal got their idea of lowering the standard of existing federal law on CSAM from actual knowledge to recklessness, which would allow the DOJ to sue websites that offer stronger encryption than the DOJ thinks is really necessary. Specifically, Barr said:

The Department has made clear what we are seeking. We believe that when technology providers deploy encryption in their products, services, and platforms they need to maintain an appropriate mechanism for lawful access. This means a way for government entities, when they have appropriate legal authority, to access data securely, promptly, and in an intelligible format, whether it is stored on a device or in transmission. We do not seek to prescribe any particular solution. ...

We are confident that there are technical solutions that will allow lawful access to encrypted data and communications by law enforcement without materially weakening the security provided by encryption. Such encryption regimes already exist. For example, providers design their products to allow access for software updates using centrally managed security keys. We know of no instance where encryption has been defeated by compromise of those provider-maintained keys. Providers have been able to protect them. ...

Some object that requiring providers to design their products to allow for lawful access is incompatible with some companies business models. But what is the business objective of the company? Is it A to sell encryption that provides the best protection against unauthorized intrusion by bad actors? Or is it B to sell encryption that assures that law enforcement will not be able to gain lawful access? I hope we can all agree that if the aim is explicitly B that is, if the purpose is to block lawful access by law enforcement, whether or not this is necessary to achieve the best protection against bad actors then such a business model, from societys standpoint, is illegitimate, and so is any demand for that product. The product jeopardizes the publics safety, with no countervailing utility. ...

The real question is whether the residual risk of vulnerability resulting from incorporating a lawful access mechanism is materially greater than those already in the unmodified product. The Department does not believe this can be demonstrated.

In other words, companies choosing to offer encryption should have to justify their decision to do so, given the risks created by denying law enforcement access to user communications. Thats pretty close to a recklessness standard.

Again, for more on this, read Berins previous Techdirt piece. According to the most recently leaked version of the Graham-Blumenthal bill, the Attorney General would no longer be able to rewrite the best practices recommended by the Commission. But he would gain greater ability to steer the commission by continually vetoing its recommendations until it does what he wants. If the commission doesnt make a recommendation, the safe harbor offered by complying with the best practices doesnt go into effect but the rest of the law still would. Specifically, website and Internet service operators would still face vague new criminal and civil liability for reckless product design. The commission and its recommendations are a red herring; the truly coercive aspects of the bill will happen regardless of what the commission does. If the DOJ signals that failing to offer a backdoor (or retain user data) will lead to legal liability, companies will do it even absent any formalized best practices.

The Real Scandal: DOJs Inattention to Child Sexual Abuse

As if trying to compromise the security of all Internet services and the privacy of all users werent bad enough, we suspect Barr had an even more devious motive: covering his own ass, politically.

Blaming tech companies generally and encryption in particular for the continued spread of CSAM kills two birds with one stone. Not only does it offer them a new way to ban encryption, it also deflects attention from the real scandal that should appall us all: the collective failure of Congress, the Trump Administration, and the Department of Justice to prioritize the fight against the sexual exploitation of children.

The Daily, The New York Times podcast, ran part one of a two-part series on this topic on Wednesday. Reporters Michael Keller and Gabriel Dance summarized a lengthy investigative report they published back in September, but which hasnt received the attention it deserves. Heres the key part:

The law Congress passed in 2008 foresaw many of todays problems, but The Times found that the federal government had not fulfilled major aspects of the legislation.

The Justice Department has produced just two of six required reports that are meant to compile data about internet crimes against children and set goals to eliminate them, and there has been a constant churn of short-term appointees leading the departments efforts. The first person to hold the position, Francey Hakes, said it was clear from the outset that no one felt like the position was as important as it was written by Congress to be.

The federal government has also not lived up to the laws funding goals, severely crippling efforts to stamp out the activity.

Congress has regularly allocated about half of the $60 million in yearly funding for state and local law enforcement efforts. Separately, the Department of Homeland Security this year diverted nearly $6 million from its cybercrimes units to immigration enforcement depleting 40 percent of the units discretionary budget until the final month of the fiscal year.

So, to summarize:

Let that sink in. In a better, saner world, Congress would be holding hearings to demand explanations from Barr. But they havent, and the workshop will allow Barr to claim hes getting tough on CSAM without actually doing anything about it while also laying the groundwork for legislation that would essentially allow him to ban encryption.

Even for Bill Barr, thats pretty low.

Filed Under: cda 230, congress, csam, doj, encryption, funding, section 230, william barr

Here is the original post:
Barr's Motives, Encryption and Protecting Children; DOJ 230 Workshop Review, Part III - Techdirt

Read More..

Comment: Its time for governments to learn how end-to-end encryption works – 9to5Mac

Theres an emerging health crisis at the moment, besides coronavirus: the head injuries caused by techies banging their heads on their desks at each piece of evidence that governments dont understand how end-to-end encryption works.

The latest example of this, reported in the Guardian, was the head of Britains domestic counterintelligence and security agency, MI5, calling on tech companies like Apple and Facebook to continue to offer end-to-end encryption, but to provide MI5 access on an exceptional basis

MI5, short for Military Intelligence, Section 5, is responsible for detecting planned terrorist attacks and preventing them before they can be carried out. It also assists other law enforcement agencies in the investigation of other serious crimes.

The Guardian quotes from an interview broadcast on British television channel ITV.

Parker called on the tech firms to use the brilliant technologists youve got to answer a question: Can you provide end-to-end encryption but on an exceptional basis exceptional basis where there is a legal warrant and a compelling case to do it, provide access to stop the most serious forms of harm happening?

The entire point of end-to-end encryption is that only an intended recipient of a message is able to decrypt it. When I send you an iMessage, nobody else is able to read it not even Apple because only a device authenticated by your Apple ID and password has the decryption key.

Technically, you can argue that Parkers question isnt quite as dumb as it sounds, as there is one potential workaround that would work with some end-to-end encrypted chat services known as the ghost proposal.

Its relatively easy for a service provider to silently add a law enforcement participant to a group chat or call. The service provider usually controls the identity system and so really decides whos who and which devices are involved theyre usually involved in introducing the parties to a chat or call. In a solution like this, were normally talking about suppressing a notification on a targets device and possibly those they communicate with.

In short, Apple or any other company that allows people to privately chat would be forced to allow the government to join those chats as a silent, invisible eavesdropper.

Unlike other proposals for compromising end-to-end encryption, that one at least has the virtue of being technically possible. It effectively takes advantage of the way that Apple allows you to begin an iMessage conversation on your iPhone then continue it on your iPad or Mac. Apple could effectively create a fake virtual device, authenticated as you, which would receive all your messages.

However, that would only be possible because it would break authentication of participants in the chat, which is a key component of end-to-end encrypted messaging. If you take an end-to-end encrypted messaging service and compromise the authentication process, you no longer have an end-to-end encrypted messaging service. Thewhole point of end-to-end encryption is that only authorized participants can decrypt it.

So, heres my open letter to governments:

Dear governments,

If you want to ban end-to-end encryption, as some of you have said, please understand what this means. Like the end of e-banking and online shopping.

If you instead want to ban the use of end-to-end encryption in messaging, you might first want to check whether many military, government, and law enforcement agency messaging services use it.

You now want to ban only the civilian use of end-to-end encrypted messaging, you say? Think about the impact on journalism. Think about the massive criminal opportunities you would be creating for identity theft and other forms of fraud. Above all, please think about the fact that you are telling your citizens they are no longer entitled to have private conversations using any electronic means, nor to privately share their photos with their partner, friends, or family. Think about what kind of regime wants that.

If you then decide, as MI5 apparently has, that you want to allow end-to-end encryption in messaging, but create a backdoor for governments, what you need to know is this: You cant. Because compromised end-to-end encryption isnt end-to-end encryption.

I hope that helps.

Love, Ben

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Continued here:
Comment: Its time for governments to learn how end-to-end encryption works - 9to5Mac

Read More..