Page 406«..1020..405406407408..420430..»

Liferay to showcase cloud-powered digital experience innovations at LEAP 2024 Intelligent CIO Middle East – Intelligent CIO

At LEAP 2024, Liferay, a leading provider of the All-in-One Digital Experience Platform (DXP), will present its cloud-enabled, open-source based unified platform that supports AI-enhanced features.

The comprehensive platform empowers businesses with end-to-end personalized customer journey capabilities in sync with Saudi Arabias Vision 2030, with digital experiences at the forefront of the countrys initiatives.

In alignment with Saudi Arabias Cloud First Policy, which prioritizes cloud computing for accelerated Digital Transformation, Liferays DXP is now available on Google Cloud Marketplace as the only DXP fully available with all its functionalities in the Kingdom. It facilitates a convenient deployment option, leveraging the robust infrastructure of Google Cloud Platform (GCP) in Saudi Arabia, in line with Liferays commitment to scale digital experiences and accelerate Digital Transformation efforts.

Liferay enables rapid solution creation with its comprehensive platform, offering out-of-the-box features for an immediate flexible start with scalable options, low-code customization, and seamless integration with legacy systems through connectors and custom extensions. This enables organizations to innovate, elevate operational efficiencies, ease decision-making and improve customer interactions.

Saudi Arabia holds strategic importance and remains a top priority for Liferay, said Moussalam Dalati, General Manager MEA and France at Liferay.

With steady growth in the region, we remain committed to support organizations in their quest to reshape and tailor digital experiences. Our presence on the Google Cloud Marketplace is a testament to our commitment to continually streamline experiences and elevate customer journeys. LEAP 2024 reaffirms our dedication, leveraging cloud and open-source principles aligned with the Kingdoms vision for innovation and Digital Transformation.

Liferay DXP enables data-driven tailored experiences across diverse stakeholders, including B2B, B2C, B2E, G2G or G2C interactions on digital channels. The platforms adaptability shortens delivery timelines, facilitating swift leverage of its capabilities. Liferay SaaS enables organizations to develop various custom solutions, including customer experiences, employee portals and solutions for suppliers, distributors and retailers.

At LEAP 2023, Liferay will host its regional partners, including Protiviti, Kaartech, Palmira, Link Development and Appswave.

Visit the Liferay booth H1A-550 at LEAP 2024 to learn more about how the company is redefining digital experiences and shaping the future of engagement.

Facebook Twitter LinkedIn Email WhatsApp

Here is the original post:
Liferay to showcase cloud-powered digital experience innovations at LEAP 2024 Intelligent CIO Middle East - Intelligent CIO

Read More..

Introducing Cloud Binary Server – Secure, and Anonymous Cloud Solutions for Decentralized and AI ML Applications – GlobeNewswire

Orleans, France, Feb. 26, 2024 (GLOBE NEWSWIRE) -- Cloud Binary Serverannounces the launch of its cloud-based infrastructure service providing a dedicated and cost-effective server solution for businesses and individuals. The platform offers a simplified process for customers to buy cloud infrastructure through a Telegram bot. This approach eliminates the need for complex procedures and technical knowledge, allowing a broader audience to acquire cloud infrastructure.

Cloud Binary Server aims to revolutionize the tech industry by focusing on privacy, security, and anonymity. Its dedicated server platform offers anonymous cloud server solutions for decentralized applications and AI machine learning. Moreover, it empowers users and democratizes governance with the CBY token.

Cloud Binary Server recognizes the delicate balance between technological advancement and privacy, offering a solution that prioritizes both. The platform provides services such as web hosting, email hosting, and file storage while ensuring high levels of privacy and security.

The platform caters to users who value anonymity by allowing anonymous cryptocurrency payments. Moreover, its end-to-end encryption adds an extra layer of security, making it an ideal choice for those requiring anonymous cloud services.

Lastly, Cloud Binary Server provides free technical support to ensure users have the necessary aid to succeed. This free, 24/7 assistance includes help with installation, configuration, customization, and troubleshooting, ensuring users have a seamless experience on the platform.

Cloud Binary (CBY) Token

The CBY token is the native governance token of Cloud Binary. Holders can use CBY to participate actively in the Cloud Binary ecosystem, vote on governance proposals, benefit from exclusive features, and become an integral part of the Cloud Binary community.

Holding CBY tokens has the following benefits:

CBY holders enjoy complete access to all of Cloud Binarys products.

CBY holders are entitled to discounts on all of Cloud Binary's services, including website hosting, email hosting, and file storage.

CBY holders have the opportunity to earn rewards through three different methods.

The CBY token is a versatile cryptocurrency with multiple purposes. One is for a new project airdrop campaign and staking at our partner's liquidity pools, allowing users to earn rewards for providing liquidity to the platform.

About Cloud Binary Server

Cloud Binary Server launched in 2024 as a cloud infrastructure platform providing robust and flexible solutions for hosting and computing needs. The company aims to meet the demands of individuals and businesses with a versatile offer of secure and anonymous services, including web hosting, email hosting, file storage, and more.

Overall, Cloud Binary Server offers affordability, accessibility, and reliable customer support to emerge as a viable solution for users seeking a dedicated, easy-to-use cloud infrastructure service.

Official Website|Telegram|Twitter|Medium|YouTube

See the original post here:
Introducing Cloud Binary Server - Secure, and Anonymous Cloud Solutions for Decentralized and AI ML Applications - GlobeNewswire

Read More..

Technical debt and cloud issues are the biggest barriers to digital transformation for many companies – TechRadar

Technical debt is the biggest barrier to digital transformation for businesses across Europe, the Middle East and Africa, new research has claimed.

A report from Red Hat found that one in four (28%) businesses across EMEA had their digital transformation hampered by technical debt that has accumulated over time.

With the stark reality of companies pasts preventing them from developing, cloud management is set to be the biggest investment priority in the region over the next 12 months, says Red Hat.

This study aligns with others in its finding of a broad array of infrastructure landscapes its not the first to reveal that on-prem applications come out on top (at 47%). A further 40% of businesses had adopted hybrid cloud environments, leaving just 12% in the public cloud.

The respondents confirmed that data privacy and security were among the top reasons for choosing to run at least some of their applications on-premises, however cloud environments remain attractive for their cost benefits.

Besides the complexities surrounding the decision to go fully cloud, on-prem, or a hybrid of the two, managers also noted that manual processes and IT operations, as well as skillset and talent gaps, are leading to poor digital transformation results.

In terms of funding priorities for the year ahead, network security, threat intelligence, detection and response, and vulnerability management all look to be key focus areas.

Despite the barriers to digital transformation, the report finds that automation across security and cloud services is gaining traction. The insights also suggest that cloud will account for a larger proportion of business operations, with the sector set for a spending boost this year.

The rest is here:
Technical debt and cloud issues are the biggest barriers to digital transformation for many companies - TechRadar

Read More..

AI vendor finds opportunity amid AI computing problem – TechTarget

With the growth of generative AI, a big problem enterprises and vendors are concerned with is computing power.

Generative AI systems such as ChatGPT suck up large amounts of compute to train and run, making them costly.

One AI vendor trying to address the massive need for compute is Lambda.

The GPU cloud vendor, which provides cloud services including GPU compute as well as hardware systems, revealed it had achieved a valuation of more than $1.5 billion valuation after raising $320 million in a Series C funding round.

The vendor was founded in 2012 and has focused on building AI infrastructure at scale.

As a provider of cloud services based on H100 Tensor Core GPUs from its partner Nvidia, Lambda gives AI developers access to architectures for training, fine-tuning, and inferencing generative AI and large language models (LLMs).

One of the early investors and a participator in the latest funding round is Gradient Ventures.

Gradient Ventures first invested in the AI vendor in 2018 and then did so again in 2022.

The investment fund became interested in Lambda during a time when the vendor faced the challenge of trying to build AI models without having the workstation and infrastructure it needed. This led Lambda to start building AI hardware that researchers can use.

"That's why we were excited is that we saw this sort of challenge to the development," said Zachary Bratun-Glennon, general partner at Gradient Ventures. "Since then, we've been excited as the product has developed."

Lambda grew from building workstations to hosting servers for customers that had bigger compute needs and budgets and then to offering a cloud service with which users can point and click on their own desktop without needing to buy a specialized workstation.

"Our excitement is just seeing them meet the developer and the researcher where they are with what they need," Bratun-Glennon said.

Lambda's current fundraising success comes as the vendor continues to take advantage of the demand for computing in the age of generative AI, Futurum Group research director Mark Beccue said.

"I really think the fundraise ... has got to do with that opportunistic idea that AI compute is in high demand, and they're going to jump on it," he said.

As a vendor with experience building on-premises GPU hardware for data centers, Lambda appeals to investors because of the options it brings to enterprises, he added.

Lambda also enables enterprises to get up and running quickly with their generative AI projects, Constellation Research founder R "Ray" Wang said.

"GenAI on demand is the best way to look at it," Wang said. "Lambda labs basically says, 'Hey, we've got the fastest, the best, and not necessarily the cheapest but a reasonably priced ability to actually get LLMs on demand.'"

"What people are rushing to deliver is the ability to give you your compute power when you need it," he continued.

However, as generative AI evolves, the compute problem could ease somewhat.

Over the past year and a half, generative AI systems have evolved from large models that run on up to 40 billion parameters to smaller models that run on as few as 2 billion parameters, Beccue said.

"The smaller the language models are, the less compute you have to use," he said.

Moreover, while Nvidia is known for providing powerful AI accelerators like GPUs, competitors including Intel and AMD have also released similar offerings in the last few months, Beccue added.

For example, Intel's Gaudi2 is a deep-learning processor comparable to Nvidia's H100.

In December, AMD introduced MI300X Accelerators. The chips are designed for generative AI workloads and rival Nvidia H100s in performance.

"The models are getting better, and the chips are getting better and we're getting more of them," Beccue said. "It's a short-term issue."

For Lambda, the challenge will be how to extend beyond solving the current AI computing challenge.

"They're not necessarily going to be competing head-to-head with the cloud compute people," Beccue said. He noted that the major cloud computing vendors -- the tech giants -- are deep-pocketed and have vast financial resources. "I'm sure what they're thinking about is, 'Okay, right now, there's kind of a capacity issue that we can fill. How do we extend over time?'"

As an investor in AI companies, Bratun-Glennon said he thinks generative AI will produce thousands of language models, requiring different amounts of compute.

"Even if there are models that have lower compute requirements, the more use cases people will find to apply them to, the lower the cost that creates so the more ubiquitous that becomes," he said. "Even as models get more efficient, and more companies can use them that expands the amount of compute that is required."

AI compute is also a big market, helping Lambda serve developers -- a different audience than what other cloud providers target, he added. Hyper-scale cloud providers focus on selling to large enterprises and getting large workloads.

"Lambda is the AI training and inference cloud," Bratun-Glennon said. "The thing that has carried through the six years I've been working with them is the AI developer mindset."

Lambda is not the only vendor working to meet the demand of AI compute.

On February 20, AI inference vendor Recogni revealed it raised $102 million in series C funding co-led by Celesta Capital and GreatPoint Ventures. Recogni develops AI inference systems to address AI compute.

The latest Lambda round was led by Thomas Tull's U.S. Innovative Technology fund, with participation, in addition to Gradient Ventures, from SK Telecom, Crescent Cove and Bloomberg Beta.

Esther Ajao is a TechTarget Editorial news writer covering artificial intelligence software and systems.

Link:
AI vendor finds opportunity amid AI computing problem - TechTarget

Read More..

Science ministry to invest 121.9 bln won in cloud computing industry – Yonhap News Agency

SEOUL, Feb. 26 (Yonhap) -- The science ministry said Monday it will invest 121.9 billion won (US$91.5 million) to bolster the local cloud computing industry this year.

The budget marked a 17.2 billion won increase from the previous year's allocation, according to the Ministry of Science and ICT.

The ministry said cloud technology plays a key role in advancing artificial intelligence (AI) as it provides high performance computing capacity and massive data storage capabilities.

In detail, the ministry plans to inject 24 billion won into the development and commercialization of innovative cloud services, 7 billion won into cloud-based software as a service (SaaS), and 8 billion won into the transformation of software to SaaS.

Around 20 billion won is set aside to create an innovation fund for SaaS.

"We will foster cloud technology across industries and society and support the innovative growth of local cloud companies, including SaaS, in the era of AI sparked by Chat GPT," a science ministry official said.

An image illustrating cloud computing technology (Yonhap)

nyway@yna.co.kr (END)

Here is the original post:
Science ministry to invest 121.9 bln won in cloud computing industry - Yonhap News Agency

Read More..

Craig Dellicarpini of Massachusetts on The Role of Encryption in Securing Data: How It Works and Why It’s Important – OCNJ Daily

In todays world, where cyber threats and data breaches are becoming more frequent, protecting sensitive information is crucial. Encryption is a powerful tool in the cybersecurity arsenal that offers a robust defense against unauthorized access and data theft. Craig Dellicarpini from Massachusetts has written an article to explore the role of encryption in securing data. The article explains how encryption works and why its essential for protecting digital assets in our interconnected world.

In todays digital age, where businesses and individuals rely heavily on the internet and technology, safeguarding sensitive information has become more critical than ever. Cyber threats and data breaches have become common, leading to a growing need for robust cybersecurity measures.

Encryption is one of the most powerful tools available in the fight against cybercrime. Encryption is converting plain text into a coded message that can only be decoded with a secret key. This technology ensures that sensitive data remains secure, even if it falls into the wrong hands.

Craig Dellicarpini, a cybersecurity expert from Massachusetts, has written an article that explores the role of encryption in securing data. The article delves into the technical details of how encryption works and why its essential for protecting digital assets in our interconnected world.

Encryption provides a robust defense against unauthorized access and data theft by making reading or understanding the encrypted message almost impossible without the correct key. This technology has become increasingly necessary as cybercriminals continue to become more sophisticated and creative in their attack methods.

Encryption is a technique used to protect sensitive information from unauthorized access. It involves converting plain text data into unreadable code, called ciphertext. This is done using mathematical algorithms designed to be highly complex and challenging to reverse-engineer without the corresponding decryption key.

When data is encrypted, it can only be read by those who have the necessary key to decipher it. This ensures that if the data is intercepted or stolen, it remains incomprehensible and, therefore, useless to attackers. Encryption is widely used in online banking, e-commerce, and communication to ensure the confidentiality and integrity of sensitive information.

Various types of encryption techniques are available, such as symmetric encryption, asymmetric encryption, and hashing. Each of these methods has its unique strengths and weaknesses, and the choice of encryption technique depends on the specific use case and security requirements. Overall, encryption is a crucial aspect of modern security practices, helping to protect data from unauthorized access and ensuring privacy and confidentiality.

Encryption is crucial in protecting data privacy, confidentiality, and integrity across various domains, including communication, storage, and transmission. Here are several vital reasons why encryption is essential in securing data:

In todays fast-paced world, where data is considered valuable, encryption has emerged as a fundamental and indispensable pillar of cybersecurity. With cyber threats constantly evolving and becoming more sophisticated, it has become increasingly important for organizations to protect sensitive information from unauthorized access, misuse, and theft. Encryption converts plaintext or data into cipher text, which can only be deciphered using a unique key. It is an effective way to secure and protect data from prying eyes.

Organizations that utilize encryption technology can ensure that their sensitive data is protected from external threats and comply with regulatory requirements. Encryption helps businesses maintain their datas privacy and confidentiality and mitigate the risk of data breaches. It has become a critical tool for safeguarding data and preserving trust in the digital world.

As we embrace digital transformation and navigate the complexities of the modern threat landscape, Craig Dellicarpini of Massachusetts believes that encryption remains indispensable for securing data and preserving trust in the digital world. With the growing importance of data privacy and security, encryption has become a crucial component of any organizations cybersecurity strategy, and it will continue to play a vital role in protecting sensitive information in the future.

Excerpt from:
Craig Dellicarpini of Massachusetts on The Role of Encryption in Securing Data: How It Works and Why It's Important - OCNJ Daily

Read More..

What Is An SSL Certificate? Everything You Need To Know – Forbes

Table of Contents

Show more Show less

Nothing turns potential customers away from a website faster than a label that reads not secure. Or worse, a screen with a large pop-up that warns, This website might not be secure. Protecting your website with a secure sockets layer (SSL) certificate is the easiest way to prevent this. SSL certificates ensure that the information coming to and from your website is secure.

Featured Partners

1

Namcheap SSL Certificate

Starting Price

Around $5.99/Year (INR 499) onwards

Encryption Level

256-bit or 128-bit encryption

Features

Activate in 4 easy steps and Top-Tier Support

On Namecheap's secure website

An SSL (secure sockets layer) certificate verifies the identity of a website and secures a connection between a web page and a web browser. If you run an e-commerce site and are asking people to input information such as their credit card number, or collect other sensitive information, an SSL certificate ensures that information transmitted to and from your website is encrypted.

Youll know that a website has an SSL certificate installed when HTTPS (Hypertext Transfer Protocol Secure) appears in front of a URL (i.e., https://www.forbes.com/advisor/). Many browsers help you determine if a website has an SSL certificate by displaying a small image of a lock by the URL.

On the other hand, if a website does not encrypt its data youll see a warning sign and the words not secure.

Related: Best Web Hosting Services

The short answer is yes. If you own a website, you should have an SSL certificate. If you are asking users to enter a login username and password, or are collecting private information such as credit card numbers, health data or financial accounts, you need an SSL certificate to ensure the transmission of this data is secure.

Many website owners choose to have an SSL certificate even if they are not collecting sensitive information (such as credit card numbers) because Googles algorithm rewards websites that have them. An SSL certificate also communicates to viewers that their sensitive information (such as credit cards and passwords) is protected on your website. These days, most websites have an SSL certificate.

Its relatively easy to get an SSL certificate and many of the best website builders and web hosting providers even offer them for free. Hosting providers such as GoDaddy and Bluehost offer the ability to buy an SSL directly on their website.

If your site doesnt already have one, you can also use a third-party certificate authority. To research some of the most reliable options with the best prices, read our list of the best SSL certificate services.

There are three different types of SSL certificates: domain validated (DV), organization validation (OV) and extended validation (EV). The one best suited for you will depend on your website and how much security you need.

DV SSL is best for personal project websites and is the least expensive option. It requires that the website owner verify that the domain is registered to the domain owner, which is done through the WHOIS database.

OV SSL is best for business or nonprofit websites, and requires a higher level of verification, so is therefore considered more secure. The SSL certificate issuer verifies the address and location of the owner.

EV SSL is best for e-commerce businesses and businesses exchanging financial data as it offers the most amount of protection. In addition, these certificates offer the highest monetary warranties to any website viewers affected by an SSL failure

If you click on the small image of a lock that appears next to any website with an SSL certificate, youll be able to view some key information about its SSL certificate. Youll see the name of the certificate holder, who it was issued by and the expiration date.

An SSL certificate also contains some details about the issuer of the certificate, a copy of the issuers public key and a digital signature of the certificate issuer.

Featured Partners

1

Namcheap SSL Certificate

Starting Price

Around $5.99/Year (INR 499) onwards

Encryption Level

256-bit or 128-bit encryption

Features

Activate in 4 easy steps and Top-Tier Support

On Namecheap's secure website

An SSL certificate is a digital certificate that encrypts online communication. When a visitor tries to access your website through their web browser, the SSL certificate signals to the browser that your website is secure.

Some website hosting providers offer free SSL certificates. While any SSL certificate is better than none, free SSL certificates typically offer the lowest security level (DV). Additionally, paid SSL certificates often offer a warranty to protect your site visitors against any potential SSL-related security threats, while free versions generally do not.

The price you pay for an SSL certificate will depend on the level of security you need (DV, OV or EV) and whether you need to certify one domain or many. In our list of the best SSL certificate services, prices range from INR 550 per year for DV SSL (for a five-year plan) to INR 18,000 per year (for a six-year plan) for OV SSL. If youre looking to pay per year, you can expect to pay between INR 4,000 and INR 20,000 per year for a DV SSL.

Read more:
What Is An SSL Certificate? Everything You Need To Know - Forbes

Read More..

PQ3 protocol: Apple iMessage unrivaled security upgrade – Tech Wire Asia

Apple is upgrading its iMessage platform to enhance protection against forthcoming encryption-breaking technologies. Photo: NEW YORK, NEW YORK FEBRUARY 01: People walk by an Apple store in a shopping mall in lower Manhattan on February 01, 2024 in New York City. Apple will report earnings Thursday afternoon after the close of the Closing Bell. The iPhone maker, which is to release its Vision Pro mixed-reality headset on Friday, has seen revenue decline for each of its past four reported quarters. Spencer Platt/Getty Images/AFP (Photo by SPENCER PLATT / GETTY IMAGES NORTH AMERICA / Getty Images via AFP)

In an era where digital privacy is paramount, Apple is integrating PQ3 into iMessage. This announcement marks a watershed moment in messaging security, propelling iMessage to unprecedented heights of protection. As the first widely deployed messaging app to achieve Level 3 security, what does the announcement mean for iPhone users, and why should they care?

At the heart of Apples PQ3 integration lies a revolutionary cryptographic protocol designed to withstand the challenges posed byquantum computing. Unlike traditional encryption methods, which may be vulnerable to future quantum attacks, PQ3 provides robust protection against even the most sophisticated adversaries. Using advanced cryptographic techniques, PQ3 ensures that iMessage conversations remain secure and private, regardless of the evolving threat landscape.

To our knowledge, PQ3 has the strongest security properties of any at-scale messaging protocol in the world, Apples Security Engineering and Architecture (SEAR) team stated in ablog posta week ago.

The new state of the art in quantum-secure messaging at scale. Source: Apple.

Traditionally, messaging platforms rely on classical public key cryptography like RSA, elliptic curve signatures, and Diffie-Hellman key exchange for secure end-to-end encryption. These algorithms are based on complex mathematical problems deemed computationally intensive for conventional computers, even with Moores law in play. However, the advent of quantum computingposes a new challenge.

A powerful enough quantum computer could solve these mathematical problems in novel ways, potentially jeopardizing the security of end-to-end encrypted communications. While quantum computers capable of decryption arent yet available, well-funded attackers can prepare by exploiting cheaper data storage. They accumulate encrypted data now, planning to decrypt it later with future quantum technologya tactic termed harvest now, decrypt later.

When iMessage launched in 2011, it became the first widely available messaging app with default end-to-end encryption. Over the years, Apple has continually enhanced its security features. In 2019, the iPhone maker bolstered its cryptographic protocol by transitioning from RSA to elliptic curve cryptography (ECC) and safeguarding encryption keys within the secure enclave, increasing protection against sophisticated attacks.

Additionally, we implemented a periodic rekey mechanism for cryptographic self-healing in case of key compromise. These advancements underwent rigorous formal verification, ensuring the robustness ofour security measures, the blog post reads. The cryptographic community has been developing post-quantum cryptography (PQC) to address the threat of future quantum computers. These new public key algorithms can run on todays classical computers without requiring quantum technology.

Designing PQ3 involved rebuilding the iMessage cryptographic protocol to enhance end-to-end encryption, meeting specific goals:

According to Apple, PQ3 introduces a new post-quantum encryption key during iMessage registration, using Kyber post-quantum public keys. These keys facilitate the initial critical establishment, enabling sender devices to generate post-quantum encryption keys for the first message, even if the receiver is offline.

Furthermore, PQ3 implements a periodic post-quantum rekeying mechanism within conversations to self-heal from crucial compromise and protect future messages. This mechanism creates fresh message encryption keys, preventing adversaries from computing them from past keys.

The protocol utilizes a hybrid design, combining elliptic curve cryptography with post-quantum encryption during initial critical establishment and rekeying. Rekeying involves transmitting fresh public key material in line with encrypted messages, with the frequency of rekeying balanced to preserve user experience and server infrastructure capacity.

PQ3 continues to rely on classical cryptographic algorithms for sender authentication and essential verification to thwartpotential quantum computer attacks. These attacks require contemporaneous access to a quantum computer and cannot be performed retroactively. But Apple noted that future assessments will evaluate the need for post-quantum authentication as quantum computing threats evolve.

A man uses an Apple iPhone in Beijing on September 12, 2023. (Photo by Pedro PARDO/AFP).

Integrating PQ3 into iMessage signifies a huge leap forward in privacy and securityfor iPhone users. With the exponential growth of data and the looming specter of quantum computing, traditional encryption methods face unprecedented challenges. PQ3 mitigates these risks by providing quantum-resistant protection, ensuring that your conversations remain shielded from future threats.

PQ3s implementation in iMessage demonstrates Apples interest in safeguarding user privacy and staying ahead of emerging security threats. Beyond its robust encryption capabilities, PQ3 introduces a host of additional security features designed to enhance the overall integrity of iMessage. These include secure fundamental establishment mechanisms, cryptographic self-healing protocols, and real-time threat detection capabilities.

By incorporating these advanced security measures, Apple hopes to ensure that iMessage remains a bastion of privacy in an increasingly interconnected world.

Support for PQ3 will begin with the public releases of iOS 17.4, iPadOS 17.4, macOS 14.4, and watchOS 10.4. Already available in developer previews and beta releases, PQ3 will automatically elevate the security of iMessage conversations between devices that support the protocol. As Apple gains operational experience with PQ3 globally, it will gradually replace the existing protocol within all sustained conversations throughout the year.

Follow this link:
PQ3 protocol: Apple iMessage unrivaled security upgrade - Tech Wire Asia

Read More..

NYPD extends radio encryption to Staten Island, blocking public and media access – amNY

Sign up for our amNewYork email newsletter to get news, updates, and local insights delivered straight to your inbox!

The NYPD began encrypting police radio transmissions in Staten Island on Thursday, thereby blocking the public and media from listening to radio transmissions.

The move to block the public from listening to NYPD police radio on Staten Islandthrough encryptionrepresents a continuation of a policy that began in July, when several precincts in Brooklyn went silent. In its latest round, radio transmissions have been encrypted across the four Staten Island precincts including the 123, 122, 121 and 120.

The move to start encrypting calls began last year after the public and press had access to police radio chatter for 90 years. The NYPD says that it has decided to encrypt its radio transmissions as a means to keep the bad guys from listening to its communications. The news industry, however, argues that it will lose access to vital information that is used to keep the public informed about crime and major incidents.

Eight local, state and federal press organizations, led by the New York Media Consortium, have been waging a campaign to compel the NYPD to provide access to police communications, but have received only tacit assurances from officials that access would be explored after encryption is completed in 2025. In the meantime, areas of Brooklyn and the entire borough of Staten Island will be silent in terms of radio transmissions, with police news primarily controlled by the NYPD or obtained through questionable social media sources.

The NYPD issued a statement regarding the implementation of the Staten Island encryption policy.

Currently Staten Island radio zones are being upgraded off dated infrastructure and onto new digital infrastructure. Once completed the Staten Island radio frequencies will be encrypted.

All Staten Island frequencies have now been fully encrypted with the radios updated last week, according to high-placed NYPD sources who are on Staten Island.

The news outlet most dependent on the NYPD radio communications on Staten Island is the Staten Island Advance, with the publicationsExecutive Editor Brian Laline issuing a statement.

We understand the NYPDs need to upgrade a system so many decades old. But to trash the publics right to know in the process is wrong and dangerous. Transparency is essential if the NYPD expects to maintain trust of New Yorkers. Mayor Adams says the bad guys monitor transmissions in the pursuit of doing bad things. That is probably true. But other cities have discovered ways that the good guys continue access to the transmissions in order to keep the public informed about what the bad guys are up to.

Diane Kennedy, president of the New York News Publishers Association of which the Advance is a member, agreed and said encryption is a loss for Staten Island residents and the public as a whole.

It is important for journalists to be able to inform the public of dangerous situations as they are happening and the safety of journalists rushing to cover breaking news events [as to the] risks that lie ahead of them, said Kennedy, whos organization is also part of the Consortium. Many families call Staten Island home and its important that they are afforded accurate immediate information about public safety risks in their neighborhoods.

The New York City Council held a hearing in November where councilmembers criticized the NYPD of its policy to block media access to radio transmissions. NYPD Chief Ruben Beltran, who has presided over the implementation of the program, told the council that media access would not be considered until after the entire city is encrypted, which wont be until at least 2025. Police officials have said any access in the future will be with a delay of up to 30 minutes, eliminating real-time reporting.

Encryption has become a trend throughout the country, with some jurisdictions blocking media access entirely, while others implementing a 1530-minute delayed access.

The Consortium has been calling on the city council to compel the NYPD to provide access to radio transmissions without success. Staten Island councilmembers, including Councilmember Kamillah Hanks who chaired the November hearing, did not respond for comment. The new chair of the Public Safety Committee, Yusef Salaam, an avid police radio listener, did not respond.

A spokesperson for Council Speaker Adrienne Adams, however, issued a statement.

Transparency is key to public safety. Journalists, volunteer first responders, and other key entities across diverse neighborhoods rely on the publicly available radio system to help keep people safe and deliver important information. At a Council hearing on the issue, the NYPD did not specify a plan to integrate stakeholders in their rollout of encrypted radio frequencies, which raises serious public safety and policy concerns.

Queens state Sen. Michael Gianaris introduced legislation in November that would compel all police departments in the Empire State, including the NYPD, to provide real-time unencrypted police radio communications to credentialed members of the media. While press members would get a real-time feed, the general public would have access to a 10-minute delayed broadcast of police communications. An Assembly sponsor has not yet stepped forward to introduce the bill in that chamber.

Preserving access to law enforcement radio is critical for a free press, use by violence interrupters, and the freedoms and protections afforded by the public availability of this information, said Gianaris. As encrypted radio usage grows, my legislation would strike the proper balance between legitimate enforcement needs and the rights and interests of New Yorkers.

Media organizations blasted the latest encryption of police frequencies.

Its a shame that the police department is not informing us, and its wearing away transparency that will result in a reduction in trust from the community, said Bruce Cotler, president of the New York Press Photographers Association and a member of the Consortium. We continue to request that the NYPD find a solution in a timely fashion to allow the press to continue to have access to their communications as we have had for the past 90 years.

Reporters in the field remain the loudest critics of the NYPD encryption policy.

Adam West Balhetchet of Loudlabs News, which provides video and photos to news organizations city-wide, said the elimination of Brooklyn and now Staten Island police radio transmissions will cripple news operations and may even lead to job losses.

So far, weve not had any concrete assurances that the media will be provided access, said Balhetchet. We still dont have access to north Brooklyn frequencies. We do not have access to Staten Islands newly encrypted frequencies. There are alternative ways to get news but none of them are as reliable and consistent as good old-fashioned scanner listening.

Balhetchet lamented not only will the public be left in the dark, but the media industry will be damaged.

My message to anyone who depends on this and does it for a living: Be prepared, have exit strategies and prepare to find work immediately should things go dark, he said.

Visit link:
NYPD extends radio encryption to Staten Island, blocking public and media access - amNY

Read More..

Fortifying iMessage: Apple’s defense against quantum threats – TechHQ

The imperative for impregnable security measures has reached a crescendo in the ever-accelerating march toward quantum computing dominance. Today, as the quantum supremacy specter looms, the clamor for steadfast cryptographic shields has amplified. So, in a groundbreaking move, Apple has unveiled PQ3, a cutting-edge post-quantum cryptographic protocol tailored for iMessage. Touted by the tech giant as possessing unparalleled security features, PQ3 represents a paradigm shift in communication security.

At the heart of Applesembrace of post-quantum cryptography(PQC) lies a deep understanding of the evolving threat landscape. Simply put, as quantum computing advances, traditional cryptographic methods face unprecedented challenges, making the integration of PQC imperative for safeguarding sensitive data and preserving user privacy.

For context, with their exponential computational power, quantum computers can potentially render existing encryption algorithms obsolete, posing significant risks to data security. Recognizing this, Apple has proactively invested in research and development to pioneer cryptographic solutions capable of withstanding quantum attacks.

Thats where the latest addition to Apples cryptographic arsenal, the PQ3 protocol, represents a paradigm shift in communication security. By introducing a new post-quantum encryption key within the iMessage registration process, Apple ensures that data exchanged through its platform remains protected against future quantum threats. PQ3 also incorporates advanced security features, such as a rekeying mechanism within iMessage conversations, designed to mitigate the impact of critical compromises and bolster overall resilience.

To our knowledge, PQ3 has the strongest security properties of any at-scale messaging protocol in the world, Apples Security Engineering and Architecture (SEAR) team stated in ablog posta week ago.

PQ3 for iMessage integrates post-quantum key establishment and ongoing self-healing ratchets. Source: Apple

Traditionally, messaging platforms rely on classical public key cryptography like RSA, elliptic curve signatures, and Diffie-Hellman key exchange for secure end-to-end encryption. These algorithms are based on complex mathematical problems deemed computationally intensive for conventional computers, even with Moores law in play. But the advent of quantum computingposes a new challenge.

A powerful enough quantum computer could solve these mathematical problems in novel ways, potentially jeopardizing the security of end-to-end encrypted communications. While quantum computers capable of decryption arent yet available (as far as we know, supervillains notwithstanding), well-funded attackers can prepare by exploiting cheaper data storage. They accumulate encrypted data now, planning to decrypt it later with future quantum technologya tactic called harvest now, decrypt later.

When iMessage launched in 2011, it became the first widely available messaging app with default end-to-end encryption. Over the years, Apple has continually enhanced its security features. In 2019, the iPhone maker bolstered the cryptographic protocol by transitioning from RSA to elliptic curve cryptography (ECC) and safeguarding encryption keys within the secure enclave, increasing protection against sophisticated attacks.

Additionally, we implemented a periodic rekey mechanism for cryptographic self-healing in case of key compromise. These advancements underwent rigorous formal verification, ensuring the robustness ofour security measures, the blog post reads. So, the cryptographic community has been developing post-quantum cryptography (PQC) to address the threat of future quantum computers. These new public key algorithms can run on todays classical computers without requiring quantum technology.

Designing PQ3 involved rebuilding the iMessage cryptographic protocol to enhance end-to-end encryption, meeting specific goals:

According to Apple, PQ3 introduces a new post-quantum encryption key during iMessage registration, using Kyber post-quantum public keys. These keys facilitate the initial critical establishment, enabling sender devices to generate post-quantum encryption keys for the first message, even if the receiver is offline.

PQ3 also implements a periodic post-quantum rekeying mechanism within conversations to self-heal from crucial compromise and protect future messages. This mechanism creates fresh message encryption keys, preventing adversaries from computing them from past keys.

The protocol utilizes a hybrid design, combining elliptic curve cryptography with post-quantum encryption during initial critical establishment and rekeying. Rekeying involves transmitting fresh public key material in line with encrypted messages, with the frequency of rekeying balanced to preserve user experience and server infrastructure capacity.

PQ3 continues to rely on classical cryptographic algorithms for sender authentication and essential verification to thwartpotential quantum computer attacks. These attacks require contemporaneous access to a quantum computer and cannot be performed retroactively. However, Apple noted that future assessments will evaluate the need for post-quantum authentication asquantum computing threats evolve.

Apple iPhone 15 series devices are displayed for sale at The Grove Apple retail store on release day in Los Angeles, California, on September 22, 2023. (Photo by Patrick T. Fallon / AFP)

Integrating PQ3 into iMessage signifies a monumental leap forward inprivacy and securityfor iPhone users. With the exponential growth of data and the looming specter of quantum computing, traditional encryption methods face unprecedented challenges. PQ3 mitigates these risks by providing quantum-resistant protection, ensuring that your conversations remain shielded from future threats.

In essence, PQ3s implementation in iMessage demonstrates Apples interest in safeguarding user privacy and staying ahead of emerging security threats. Beyond its robust encryption capabilities, PQ3 introduces a host of additional security features designed to enhance the overall integrity of iMessage. These include secure fundamental establishment mechanisms, cryptographic self-healing protocols, and real-time threat detection capabilities.

By incorporating these advanced security measures, Apple ensures that iMessage remains a bastion of privacy in an increasingly interconnected world.

Support for PQ3 will begin with the public releases of iOS 17.4, iPadOS 17.4, macOS 14.4, and watchOS 10.4. Already available in developer previews and beta releases, PQ3 will automatically elevate the security of iMessage conversations between devices that support the protocol. As Apple gains operational experience with PQ3 globally, it will gradually replace the existing protocol within all sustained conversations throughout the year.

See the original post:
Fortifying iMessage: Apple's defense against quantum threats - TechHQ

Read More..