Page 4,028«..1020..4,0274,0284,0294,030..4,0404,050..»

Michael Hayden Ran The NSA And CIA: Now Warns That Encryption Backdoors Will Harm American Security & Tech Leadership – Techdirt

from the good-for-him dept

There are very few things in life that former NSA and CIA director Michael Hayden and I agree on. For years, he was a leading government champion for trashing the 4th Amendment and conducting widespread surveillance on Americans. He supported the CIA's torture program and (ridiculously) complained that having the US government publicly reckon with that torture program would help terrorists.

But, there is one thing that he and I agree on: putting backdoors into encryption is a horrible, dreadful, terrible idea. He surprised many people by first saying this five years ago, and he's repeated it a bunch since then -- including in a recent Bloomberg piece, entitled: Encryption Backdoors Won't Stop Crime But Will Hurt U.S. Tech. In it, he makes two great points. First, backdooring encryption will make Americans much less safe:

We must also consider how foreign governments could master and exploit built-in encryption vulnerabilities. What would Chinese, Russian and Saudi authorities do with the encrypted-data access that U.S. authorities would compel technology companies to create? How might this affect activists and journalists in those countries? Would U.S. technology companies suffer the fate of some of their Australian counterparts, which saw foreign customers abandon them after Australia passed its own encryption-busting law?

Separately, he points out that backdooring encryption won't even help law enforcement do what it thinks it wants to do with backdoors:

Proposals that law-enforcement agencies be given backdoor access to encrypted data are unlikely to achieve their goals, because even if Congress compels tech firms to comply, it will have no impact on encryption technologies offered by foreign companies or the open-source community. Users will simply migrate to privacy offerings from providers who are not following U.S. mandates.

Indeed, this is the pattern we have seen in Hong Kong over the last six months, where pro-democracy protesters have moved from domestic services to encrypted messaging platforms such as Telegram and Bridgefy, beyond the reach of Chinese authorities. Unless Washington is willing to embrace authoritarian tactics, it is difficult to see how extraordinary-access policies will prevent motivated criminals (and security-minded citizens) from simply adopting uncompromised services from abroad.

None of this is new, but it's at least good to see the former head of various intelligence agencies highlighting these points. At this point, we've seen intelligence agencies highlight the value of encryption, Homeland Security highlight the importance of encryption, the Defense Department highlight the importance of encryption. The only ones still pushing for breaking encryption are a few law enforcement groups and their fans in Congress.

Filed Under: backdoors, encryption, michael hayden

Follow this link:
Michael Hayden Ran The NSA And CIA: Now Warns That Encryption Backdoors Will Harm American Security & Tech Leadership - Techdirt

Read More..

Large, diverse coalition of civil society groups tell the US, UK and Australian governments not to ban working encryption – Boing Boing

Facebook's decision to default to end-to-end encryption for Facebook Messenger prompted the governments of the UK, the USA and Australia to write to Mark Zuckerberg, urging him to delay implementation of the move, warning him that adding working encryption by default would make it harder for spies and cops to do their jobs.

101 civil society groups have written back to the USA, UK and Australia to tell them that there is no such thing as encryption that protects good guys but lets cops spy on bad guys, so anything done to weaken security will put everyone at risk of surveillance -- from hostile foreign powers, criminal gangs, identity thieves, stalkers, domestic abusers, voyeurs, corporate espionage, and other bad actors.

The letter was led by the New America Foundation, and while the signatories include some usual suspects (EFF, ACLU, Amnesty International), it also includes a roster of the world's top security experts, and several trade associations.

Encryption is also essential to public safety and protecting vulnerable populations. A common, but problematic, argument law enforcement officials make in favor of encryption backdoors is that we must be willing to compromise the privacy and security protections offered by encryption in order to protect public safety. However, this argument fails to acknowledge that encryption, in fact, plays an essential role in protecting the public from crimes that cause physical injury and death. For instance, Cindy Southworth,the Executive Vice President at the U.S. National Network to End Domestic Violence (NNEDV), recently cautioned against introducing an exceptional access mechanism for law enforcement, in part, because of how it could threaten the safety of victims of domestic and gender-based violence and stalking.Specifically, she explained that she is a proponent of encryption because it allows victims to control when and how they seek help, and that it is critical for protecting sensitive digital records, which have been stolen by abusers.A recent fact sheet from LGBT Tech and the Internet Society states without encryption, LGBTQ+ individuals living in or traveling to [countries where being LGBTQ+ is considered acriminal offense] may not be able to safely and comfortably find communities and outlets forself-expression and would be left vulnerable to prosecution and persecution.

Beyond protecting national security and physical safety, encryption is also essential to reduction of other types of crime. Mobile devices like smartphones and communications services like email providers and messaging apps are increasingly used by people and businesses as a primary means for accessing andcommunicating sensitive and proprietary information like financial data, medical records, and intellectual property, in addition to ordinary personal communications. Whether protecting data at rest or in motion, encryption is central to reducing cybercrime, fraud, data breaches, and device theft. As noted in the 2018 report of the Technological Advisory Council (TAC) Mobile Device Theft Prevention (MDTP) WorkingGroup, a decline in mobile device theft coincides with the deployment of the anti-theft and security measures." If mobile device security was weakened by an encryption backdoor, the negative consequences to the economy and to data security would be unavoidable."

Open letter to the USA, UK and Australia [Access Now et al]

(Thanks, Dad!)

(Image: Facepalm, Brandon Grasley, CC-BY)

A Democract-led U.S. House of Representatives committee on Friday approved charges of abuse of power and obstruction against manifestly unfit U.S. president and obvious Russian puppet Donald Trump.

UK ELECTION RESULTS: Jeremy Corbyn says he will not lead the UKs Labour party in the next general election, as voting results come in and add up to a crushing defeat for Labour at nationwide polls.

The United Kingdoms general election is underway today, with voters headed to the polls across the nation. After years of single-issue deadlock and minority government, Conservative Party leader and lame-duck Prime Minister Boris Johnson hopes to win enough seats to form an effective government and get Brexit done. Despite his obvious shortcomings hes a []

Concerned about your eyesight? You probably should be. And were not just talking about seniors here. Young or old, were all at risk of coming down with vision issues Most of us might get a vision test only once every couple of years or so when we get a new pair of glasses if []

We love our smartphones and tablets, but we also love to write. For a while now, there hasnt been a workable solution. Either hook it up to a keyboard (which defeats the purpose of a portable gadget) or resign ourselves to typing on tiny, unresponsive glass icons. Looks like technology has finally caught up to []

So youve got an iPhone 11 Pro Max. Its an impressive piece of hardware sometimes, too impressive. The more youre compelled to use it, the more an age-old problem pops up: The dreaded low battery warning. Even if youre on the go, perhaps the best solution to this is also pretty unobtrusive. Its the []

Go here to read the rest:
Large, diverse coalition of civil society groups tell the US, UK and Australian governments not to ban working encryption - Boing Boing

Read More..

U.S. Attorney Justin Herdman of Ohio says agents need access encrypted devices, apps for the sake of public s – cleveland.com

CLEVELAND, Ohio U.S. Attorney Justin Herdman is entering the fray on a national debate over law enforcements ability to access encrypted devices and messaging apps, trying to rebuff the sentiments of many tech companies that say such access could leave them vulnerable for exploitation by hackers.

Some experts consider his ideas problematic.

Herdman, in an op-ed published Wednesday on cleveland.com, mostly echoed statements made in recent years by Justice Department officials about the need for law enforcement and tech companies to work together so investigations dont stall. Calling on the need for public safety, he said agents inability to get into the devices hinders investigations into drug dealers, terrorists and sex traffickers.

The piece was directed not only at the public but at companies such as Facebook and Apple, which have spoken about the privacy needs of its customers and the rights they feel their users should enjoy to shield their messages.

Thus far, several tech companies have expressed an unwillingness to provide law enforcement a way to access either encrypted devices or messaging app systems such as WhatsApp and Signal. Other concerns raised involve defendants Fourth and Fifth Amendment rights.

Former American Civil Liberties Union attorney Alex Abdo, whose work at the organization involved issues surrounding tech and security, said many people in Silicon Valley argue that it is almost impossible to build a backdoor system for law enforcement that could not be accessed by hackers or, say, authoritarian governments in other countries that would seek information through their own legal systems on dissidents.

Still, Herdman said in an interview from Washington, D.C., that Im not convinced, nor is the department convinced, that theres not a technological solution to this. He also said that law enforcement accesses these devices for narrow purposes approved by a judge.

The U.S. attorney wrote in the op-ed that the companies are within their rights to offer privacy and cybersecurity to prospective customers as well they should, because these are important values.

But they shouldnt do so at the expense of public safety, Herdman continued. And these same industry professionals certainly know that warrant-proof encryption is protecting the criminals amongst us.

He took it a step farther in the interview, saying officials are committed to working with the companies but that forcing them to grant access could happen through the courts or new laws.

We cannot live in a world where pedophiles and drug traffickers and terrorists are able to communicate freely without law enforcement being able to lawfully intervene, he said.

The encryption issue was spotlighted in 2016, when the FBI sought Apples help to unlock an encrypted iPhone used by an extremist shooter who, along with another shooter, gunned down 14 people and injured 22 others in San Bernardino, California. Apple refused to help, citing privacy concerns.

The FBI sought outside help and was able to open the phone.

Herdmans op-ed was published two days after executives at Facebook wrote a letter snubbing overtures made by Attorney General William Barr to give law enforcement backdoor access to their systems. Facebook plans to enable end-to-end encryption on all of its messaging platforms, a system that locks messages so that not even the company can read them, according to The Associated Press.

Barr and other Justice Department officials have made statements directed toward tech companies to allow access. He said in a speech Tuesday that the encryption fight was one of our highest priorities and described an increasing number of horror stories about how people are dying, or being molested or whatever, but we cannot get in, the AP reported.

Herdman, in his op-ed, cited two examples from Ohio to support his argument that law enforcement needs more access.

He said agents were unable to get into the cellphone of a 25-year-old man arrested in a hotel outside Canton this summer on suspicion of trafficking a 16-year-old girl for sex. Agents have a search warrant but additional information that could build a case against the man is locked away because the phones manufacturer wont provide a way to get in the phone, the U.S. attorney said.

The result: Evil prevails and innocent children are still being victimized, Herdman wrote. First Assistant U.S. Attorney Bridget Brennan later declined to identify the man.

The other involved a wiretap that went cold when the target of an investigation, who was talking to a drug supplier in Mexico, switched to using an encrypted messaging app and the agents could not access the messages.

Brennan identified the target as Ismael Acosta, a Cleveland Heights man now serving a prison sentence of more than 15 years for trafficking drugs and money laundering following an investigation into a large operation by the Drug Enforcement Administration.

Herdman, who has been U.S. attorney since 2017, said in the interview that its very common for law enforcement to come across encryption. Such technology emerged near the end of his first stint at the U.S. Attorneys Office between 2006 and 2013, and he recalls discussions about it in meetings when he was in the offices national security unit.

Case Western Reserve University criminal law instructor Michael Benza said that having third parties, i.e. big tech companies, give access to apps or devices poses problems. If an agent gets a warrant to search a house, and they get someone else to kick in the door for them, thats unacceptable, he said.

Its not as simple as this is a bad guy, we know its a bad guy, so give us the access,'" Benza said.

Abdo, now the litigation director at the Knight First Amendment Institute at Columbia University, also said the government, even in the absence of encrypted information, has more information about people than ever before, because there are digital traces left every time someone uses a device or accesses the internet.

The existence of that information has caused some to say were living in a golden age of surveillance, he said.

To Herdman, such privacy concerns are vastly outweighed by the need for safety.

I dont think theres a really coherent argument on the tech side to not offering law enforcement access to devices and communications, he said.

Read more:

Child predators must not be able to hide behind warrant-proof encryption: Justin Herdman

Twenty charged in multi-state drug ring that brought heroin, fentanyl, cocaine to Cleveland

FBI works with outside party to unlock iPhone; hearing with Apple canceled

Continued here:
U.S. Attorney Justin Herdman of Ohio says agents need access encrypted devices, apps for the sake of public s - cleveland.com

Read More..

Google makes it safer to text on Android phones, but end-to-end encryption is still MIA – PCWorld

Google makes it safer to text on Android phones, but end-to-end encryption is still MIA | PCWorld ');consent.ads.queue.push(function(){ try { IDG.GPT.addDisplayedAd("gpt-superstitial", "true"); $('#gpt-superstitial').responsiveAd({screenSize:'971 1115', scriptTags: []}); IDG.GPT.log("Creating ad: gpt-superstitial [971 1115]"); }catch (exception) {console.log("Error with IDG.GPT: " + exception);} }); Verified SMS and spam protection rolling out now.

Today's Best Tech Deals

Picked by PCWorld's Editors

Top Deals On Great Products

Picked by Techconnect's Editors

As part of its year-end push to bring Android Messages up to speed, Google is rolling out two new features today: Verified SMS and spam protection. Together, they will help make sure your conversations arent taken over by people you dont want to talk to.

Like the phone app, Google wont automatically filter out suspected spam messages, but it will warn you when it suspects one has arrived. Youll be able to let Google know whether it got it right and also report spam texts, all of which will be used to improve the detection engine.

In addition to flagging spam, Google will also verify whether youre indeed chatting with the brand you think youre chatting with. If so, Google will add a verification badge alongside the business name and logo in the conversation. Google says 1-800-Flowers,Banco Bradesco,Kayak,Payback, andSoFiare among the first brands to send messages with Verified SMS, with more being added daily.

While both of these features are certainly excellent additions to Android Messagesespecially on the heels of the recent launch of RCSit also underscores the biggest security safeguard thats still MIA: end-to-end encryption. While messages are indeed encrypted while being sent, theres no guarantee that theyre encrypted by the carrier, which means someone could be reading or intercepting messages along the way. Google promises that it doesnt save messages, but most providers make no such claims, making it difficult to fully trust that your messages are for-your-eyes-only.

But at least youll know that theyre coming from verified sources, which is a step in the right direction. Verified SMS is rolling out in nine countries, , starting in the U.S., India, Mexico, Brazil, the UK, France, Philippines, Spain and Canada, while spam protection is rolling out in the U.S. following a broader launch earlier this year.

Michael Simon covers all things mobile for PCWorld and Macworld. You can usually find him with his nose buried in a screen. The best way to yell at him is on Twitter.

Go here to read the rest:
Google makes it safer to text on Android phones, but end-to-end encryption is still MIA - PCWorld

Read More..

Priti Patel bids to create end-to-end encryption apps’ back door – The National

AN international outcry has erupted after the UK Home Secretary, Priti Patel, joined her US counterparts in demanding that internet companies weaken encryption for users and design digital back doors in messaging services to allow security services easier access.

Dozens of concerned groups, including Amnesty International, Index on Censorship, Reporters Without Borders and Open Rights Group (ORG), have raised their concerns in an open letter to the UK, US and Australian governments.

READ MORE:Time Person of the Year prize for activist Greta Thunberg

The UK government suggested that stronger capabilities to monitor private messages would aid the fight against terrorism and child abuse.

However, the ORG said that alternative approaches must be used as the proposed measures would weaken security for every internet user.

It said this attack on encryption formed a pattern of attacks on digital privacy and security by the UK government, after documents leaked last week showed that it wanted to give the US access to NHS records and other personal information, in a free flow of data between the two countries.

The letter, co-ordinated by the US-based Open Technology Institute, came after a joint letter from the authorities to Facebook described encrypted communications tools as lawless spaces, and urged the company to remove or delay the deployment of end-to-end encryption protections on their messaging platforms.

In their letter, concerned bodies warned: Fulfilling this request would endanger the security and privacy of billions of internet users around the world.

Proponents of exceptional access have argued that it is possible to build backdoors into encrypted consumer products that somehow let good actors gain surreptitious access to encrypted communications, while simultaneously stopping bad actors from intercepting those same communications. This technology does not exist. To the contrary, technology companies could not give governments backdoor access to encrypted communications without also weakening the security of critical infrastructure, and the devices and services upon which the national security and intelligence communities themselves rely.

ORG policy director, Javier Ruiz Diaz, said: The Home Secretary wants to be able to access our private messages in WhatsApp and similar apps, demanding that companies remove the technical protections that keep out fraudsters and other criminals. This is wrong and will make the internet less safe.

Surveillance measures should be targeted and not built into the apps used by millions of people to talk to their friends and family.

Originally posted here:
Priti Patel bids to create end-to-end encryption apps' back door - The National

Read More..

Encryption can’t put tech giants beyond the reach of the law, Minister says – The Age

Communications Minister Paul Fletcher has declared tech companies cannot be above the law, challenging Facebook's plans to encrypt all its messaging services despite the objections of law enforcement agencies globally.

Facebook doubled down on encryption on Wednesday, warning demands from the Australian, United States and British governments for "backdoors" in messaging services would undermine system security and endanger innocent people.

Communications Minister Paul Fletcher. Credit:AAP

Following the release of a letter to the governments from Facebook executives in charge of the company's WhatsApp and Messenger products, Mr Fletcher said Australia had a "clear set of expectations" of internet platforms around online safety and cooperation with law enforcement.

"It goes to that principle ... that 20 years ago, 25 years ago, there were some arguing that the internet should in some way be beyond the reach of the law. That is not a sustainable position," Mr Fletcher said on Wednesday. "Whether you are operating online or offline, you need to comply with the law."

Read more:
Encryption can't put tech giants beyond the reach of the law, Minister says - The Age

Read More..

Chrome 79 includes anti-phishing and hacked password protection – Naked Security

Version 79 of Chrome is out, and it promises to do a better job of protecting you against phishing sites and credential stuffing attacks.

Since 2017, Chrome has protected users against phishing by checking the sites you enter your Google credentials into against a list of known phishing sites. It keeps these as part of its Safe Browsing initiative. Google synchronises its list of bad sites with the browser every 30 minutes, but because sites change so quickly, that means users might fall victim to new sites that had come online just minutes earlier.

Chrome 79, released on Tuesday 10 December, now performs that phishing protection in real-time, even for users with the synchronisation feature turned off. The company says this will protect users in 30% more cases. The protection has also been extended to include all the passwords stored in the Chrome password manager rather than just Google accounts. You can turn it on by enabling the Make searches and browsing better option in Chrome.

The browser also now includes some other protections. It will now show you more clearly which profile the browser is currently using, which is handy for those sharing a browser and using different profiles. Theres also a feature that Google has been testing out for months: a built-in check for hacked passwords during site logins.

The feature began as a Chrome extension called Password Checkup that warned users their login credentials had been breached. Released in February 2019, it found that 1.5% of all web logins were using breached credentials, according to a Google survey released in August this year. That fuelled Googles next move, in which it folded the feature directly into Chromes password manager. The service still didnt check your credentials against hacked logins whenever you logged into a website. Instead, it would run the passwords youd stored in the password manager service periodically to see if it found a match.

The version of Password Checkup integrated into Chrome 79 goes a step further. Now, it runs the check whenever you log into a site. Google is at pains to avoid any suggestion of creepiness or spying as part of this move, so its been pretty clever about how it performs the check. It wants to be clear that it doesnt get to see your login credentials.

When you log into a website, Chrome will now send a hashed copy of your login credentials to Google. A hash creates a unique and reproducible string of text using whichever data you give to it, which identifies the data without revealing it. This data is encrypted in the browser using an encryption key to which only you have access.

Google already used its own key to encrypt the list of hacked login credentials that it sniffed from various sources online. It does the same thing with the credentials that Chrome sends it, encrypting them a second time.

This double encryption is part of a technique called private set intersection with blinding. It tries to match the login credentials you entered against Googles database of hacked usernames and passwords.

For your privacy, Google doesnt do this matching itself. Instead, it sends a small part of its encrypted hacked credentials database back to Chrome, along with your double-encrypted login credentials (which youll remember have now been encrypted twice). Chrome removes the encryption it applied to your login credentials using your own key, leaving only Googles encryption in place. It then tries to match those hashed encrypted credentials against the small subset of the database that it received from Google. If it finds one, then your credentials have been hacked.

Google knows which small subset of the database to send back because your browser also creates a hash of the username you tried to enter into the website. It sends part of that hash to Google along with the other data. Google uses that snippet of your hashed username to select the part of its database including the same snippet in the index.

Its an ingenious system, and as long as you feel you can trust the encryption (and Google), then it looks like a good way to automate hacked password detection. It will alert you that your credentials have been pwned at the point in time when youre most likely to do something about it when youre trying to log into the site.

As with all password breaches, you should change your password if Chrome does discover a match, and turn on multi-factor authentication if the hacked site makes it available, to prevent a possible attack. You should also avoid reusing passwords across multiple sites so that attackers wont be able to unlock your other accounts with a hacked password. You can make that easier by using a password manager with a built-in password generator.

Read more from the original source:
Chrome 79 includes anti-phishing and hacked password protection - Naked Security

Read More..

Hardware Encryption Technology Market : Analysis and In-depth study on market Size Trends, Emerging Growth Factors and Forecasts to 2027 – Downey…

The Hardware Encryption Technology Market research report added by Market Study Report, LLC, provides a succinct analysis on the recent market trends. In addition, the report offers a thorough abstract on the statistics, market estimates and revenue forecasts, which further highlights its position in the industry, in tandem with the growth strategies adopted by leading industry players.

The Hardware Encryption Technology market study is a well-researched report encompassing a detailed analysis of this industry with respect to certain parameters such as the product capacity as well as the overall market remuneration. The report enumerates details about production and consumption patterns in the business as well, in addition to the current scenario of the Hardware Encryption Technology market and the trends that will prevail in this industry.

Request Sample Report @ https://www.researchmoz.com/enquiry.php?type=S&repid=2571829&source=atm

What pointers are covered in the Hardware Encryption Technology market research study?

The Hardware Encryption Technology market report Elucidated with regards to the regional landscape of the industry:

The geographical reach of the Hardware Encryption Technology market has been meticulously segmented into United States, China, Europe, Japan, Southeast Asia & India, according to the report.

The research enumerates the consumption market share of every region in minute detail, in conjunction with the production market share and revenue.

Also, the report is inclusive of the growth rate that each region is projected to register over the estimated period.

The Hardware Encryption Technology market report Elucidated with regards to the competitive landscape of the industry:

The competitive expanse of this business has been flawlessly categorized into companies such as

Western Digital CorpSeagate Technology PLCSamsung ElectronicsThalesMicron Technology IncNetAppKingston Technology CorpToshibaGemaltoCertes Networks Inc.Kanguru SolutionsIBM CorporationImationMaxim Integrated ProductsSanDisk Corporation

Segment by RegionsNorth AmericaEuropeChinaJapanSoutheast AsiaIndia

Segment by TypeEncrypted Hard Disk DrivesEncrypted Solid-State DrivesHardware Security ModuleOthers

Segment by ApplicationIT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthers

Make An EnquiryAbout This Report @ https://www.researchmoz.com/enquiry.php?type=E&repid=2571829&source=atm

Exclusive details pertaining to the contribution that every firm has made to the industry have been outlined in the study. Not to mention, a brief gist of the company description has been provided as well.

Substantial information subject to the production patterns of each firm and the area that is catered to, has been elucidated.

The valuation that each company holds, in tandem with the description as well as substantial specifications of the manufactured products have been enumerated in the study as well.

The Hardware Encryption Technology market research study conscientiously mentions a separate section that enumerates details with regards to major parameters like the price fads of key raw material and industrial chain analysis, not to mention, details about the suppliers of the raw material. That said, it is pivotal to mention that the Hardware Encryption Technology market report also expounds an analysis of the industry distribution chain, further advancing on aspects such as important distributors and the customer pool.

The Hardware Encryption Technology market report enumerates information about the industry in terms of market share, market size, revenue forecasts, and regional outlook. The report further illustrates competitive insights of key players in the business vertical followed by an overview of their diverse portfolios and growth strategies.

You can Buy This Report from Here @ https://www.researchmoz.com/checkout?rep_id=2571829&licType=S&source=atm

Some of the Major Highlights of TOC covers:

Link:
Hardware Encryption Technology Market : Analysis and In-depth study on market Size Trends, Emerging Growth Factors and Forecasts to 2027 - Downey...

Read More..

Ether Price Targets $160 as Altcoins Rally and BTC Trades Sideways – Cointelegraph

Altcoins continue to take advantage of Bitcoins sideways trading and traders who take a quick glance at the altcoin-to-Bitcoin pairings at their exchange of choice will notice that many of the altcoins are again posting double-digit gains.

At the time of writing, THETA is up 13.26%, KyberNetwork (KNC) 18% and TomoChain (TOMO) has rallied 16.09%. Ether (ETH) has failed to mirror these results but as the end of the 2019 approaches, the altcoin is still looking to close the year with a 35% gain.

Crypto market weekly performance. Source: Coin360

Since Nov. 27 Ether (ETH) price has tracked closely below the long-term descending trendline, painting lower daily lows. The Dec. 12 drop to $139 marked the fourth time the support has been tested since Nov. 22 and the altcoin remains at risk of falling to the last remaining strong support at $131.61.

Todays uptick in volume shows bulls are keen to defend the $139 support and the price is now attempting to press against the descending trendline at $145.35 which is also aligned with a high volume node on the volume profile visible range indicator (VPVR).

Despite Ethers bearish bias, there is an opportunity for a swing trade that could kick out a 10% to 12% return on investment.

ETH USD daily chart. Source: TradingView

If Ether can break above the descending trendline and clear the resistance at $150, the price could run through the VPVR gap to $160. This would also place Ether price within a few dollars of setting a daily higher high, something not seen since the drop from $163 on Nov. 24.

Ether price is also approaching the moving average of the Bollinger Band indicator at $148 and the upper band is at $155. Traders will notice that the moving average confluence divergence (MACD) histogram shows a steady increase in momentum and the MACD continues to pull away from the signal line.

ETH USD 6-hour chart. Source: TradingView

As shown by the 6-hour chart, Ether struggles to cross above the 12-period exponential moving average and the descending trendline but the Chaikin Money Flow (CMF) oscillator has risen above 0. The MACD appears to be on the verge of a bull cross and the RSI bounced from oversold territory and is en-route to 46.

Ether simply needs an increase in buy volume to push through the high volume node at $146.

ETH BTC daily chart. Source: TradingView

For a change, Ethers set up on the ETH/BTC pair is quite similar to the ETH/USD pair. The price has also been capped between the 12-point EMA and descending trendline at 0.020190 (sats).

Earlier today Ether price briefly popped above the descending trendline and traders will notice the bull cross on the MACD and that the indicators histogram has flipped green and is currently above 0. The relative strength index (RSI) has entered bullish territory and at the time of writing, it is climbing above 53.

The 0.019577 (sats) support has held well but Ether will have a tough time taking gaining above 0.020829 (sats). Traders might consider waiting for the price to reach 0.021101(sats)or a higher high at 0.021781 (sats) before considering an entry.

The same can be said for the ETH/USD pair. Traders might consider waiting until Ether clears the descending trendline to set a higher high above $152. Alternatively, buying the dip on pullbacks to the $138.57, $131.50 has also proved profitable so traders might consider waiting for less risky entry at either of these supports.

The views and opinions expressed here are solely those of the author (@HorusHughes) and do not necessarily reflect the views of Cointelegraph. Every investment and trading move involves risk. You should conduct your own research when making a decision.

Go here to read the rest:
Ether Price Targets $160 as Altcoins Rally and BTC Trades Sideways - Cointelegraph

Read More..

Ether Eyes $160 As BTC Oscillates And Altcoins Rally – – CryptoVibes

The crypto market has mixed price actions. The altcoins continue to benefit from Bitcoins sideways movement. Most investors and traders who review the altcoin-to-Bitcoin pairings at various exchanges will notice that most of the altcoins are gaining double digits against the flagship token.

At this moment, THETA is up over 11%, KyberNetwork (KNC) 16% and TomoChain (TOMO) has rallied over 15%. However, Ether has failed to replicate these gains but as the end of the year approaches, ETH is still seeking to close 2019 with a 35% gain.

From November 27, the price of Ether has tracked closely just below the long-term descending trendline, registering lower daily lows. The December 12 plunge to $139 registered the fourth time the support has been significantly tested since November 22. The altcoin, however, remains at risk of falling to the last remaining strong support at $131.61.

The December 13 uptick in volume suggests that the bulls are ready to defend the $139 support. Currently, the price is trying to press against the descending trendline at $145.35 that is also aligned with a considerably high volume node on the volume profile visible range indicator (VPVR).

In spite of Ethers bearish bias, there is an interesting opportunity for a swing trade that may kick out a 10-12% return on investment. In the case that Ether can explode above the descending trendline and rise past the resistance at $150, the ETH price may run through the VPVR gap to $160.

This price action can also place Ether within a few dollars of setting a daily higher high. That is something that has not been seen since it plunged from $163 on November 24. Ether is also showing signs of approaching the moving average of the Bollinger Band indicator at $148. The upper band is located at $155.

Traders will also see that the moving average confluence divergence (MACD) histogram has formed a continuous increase in momentum. Also, the MACD continues to pull away from the signal line. As it is evident from the 6-hour chart, ETH is struggling to rise above the descending trendline and the 12-period exponential moving average.

On the other hand, the Chaikin Money Flow (CMF) oscillator has surged above 0. The MACD seems to be on the verge of a bull cross while the RSI bounced from the oversold region and it is not heading to 46. ETH just needs an increase in buy volume to rise through the high volume node at $146.

For just this one time, the Ether set up on the ETH/BTC pair appears to resemble the ETH/USD pair. Moreover, the price has also been limited between the descending trendline at 0.020190 (sats) and the 12-point EMA.

Earlier on December 13, the ETH price popped above the descending trendline briefly. Traders are set to notice the bull cross on the MACD and they will also see that the indicators histogram has flipped green. At the moment the indicator is above 0. The RSI (relative strength index) has gone into the bullish territory and it is climbing towards 60.

Ether will encounter strong challenges while trying to rise above 0.020829 (sats) but the 0.019577 (sats) support has held well. Most of the traders may choose to wait for the price to reach 0.021101(sats) or a higher high at around 0.021781 (sats) before considering any form of entry.

The same scenario can also be said for the ETH/USD pair. Traders may also wait for Ether to clear the descending trendline to set a higher high above $152 before entering the market. On the other hand, buying the dip on pullbacks to the $138.57, $131.50 has also proved highly profitable. Thus, traders may consider waiting for a less risky entry at any of these supports.

See the original post here:
Ether Eyes $160 As BTC Oscillates And Altcoins Rally - - CryptoVibes

Read More..