Page 4,252«..1020..4,2514,2524,2534,254..4,2604,270..»

On Encryption, Archiving, and Accountability – Freedom to Tinker

As Elites Switch to Texting, Watchdogs Fear Loss of Accountability, says a headline in todays New York Times. The story describes a rising concern among rule enforcers and compliance officers:

Secure messaging apps like WhatsApp, Signal and Confide are making inroads among lawmakers, corporate executives and other prominent communicators. Spooked by surveillance and wary of being exposed by hackers, they are switching from phone calls and emails to apps that allow them to send encrypted and self-destructing texts. These apps have obvious benefits, but their use is causing problems in heavily regulated industries, where careful record-keeping is standard procedure.

Among those industries is the government, where laws often require that officials work-related communications be retained, archived, and available to the public under the Freedom of Information Act. The move to secure messaging apps frustrates these goals.

The switch to more secure messaging is happening, and for good reason, because old-school messages are increasingly vulnerable to compromisethe DNC and the Clinton campaign are among the many organizations that have paid a price for underestimating these risks.

The tradeoffs here are real. But this is not just a case of choosing between insecure-and-compliant or secure-and-noncompliant. The new secure apps have three properties that differ from old-school email: they encrypt messages end-to-end from the sender to the receiver; they sometimes delete messages quickly after they are transmitted and read; and they are set up and controlled by the end user rather than the employer.

If the concern is lack of archiving, then the last propertyuser control of the account, rather than employer controlis the main problem. And of course that has been a persistent problem even with email. Public officials using their personal email accounts for public business is typically not allowed (and when it happens by accident, messages are supposed to be forwarded to official accounts so they will be archived), but unreported use of personal accounts has been all too common.

Much of the reporting on this issue (but not the Times article) makes the mistake of conflating the personal-account problem with the fact that these apps use encryption. There is nothing about end-to-end encryption of data in transit that is inconsistent with archiving. The app could record messages and then upload them to an archivewith this upload also protected by end-to-end encryption as a best practice.

The second property of these appsdeleting messages shortly after usehas more complicated security implications. Again, the message becoming unavailable to the user shortly after use need not conflict with archiving. The message could be uploaded securely to an archive before deleting it from the endpoint device.

You might ask why the user should lose access to a message when that message is still stored in an archive. But this makes some sense as a security precaution. Most compromises of communications happen through the users access, for example because an attacker can get the users login credentials by phishing. Taking away the users access, while retaining access in a more carefully guarded archive, is a reasonable security precaution for sensitive messages.

But of course the archive still poses a security risk. Although an archive ought to be more carefully protected than a user account would be, the archive is also a big, high-value target for attackers. The decision to create an archive should not be taken lightly, but it may be justified if the need for accountability is strong enough and the communications are not overly sensitive.

The upshot of all of this is that the most modern, secure approaches to secure communication are not entirely incompatible with the kind of accountability needed for government and some other users. Accountable versions of these types of services could be created. These would be less secure than the current versions, but more secure than old-school communications. The barriers to creating these are institutional, not technical.

View original post here:
On Encryption, Archiving, and Accountability - Freedom to Tinker

Read More..

After Criticism, US Defense Department Will Implement New … – Gizmodo

One year from now, the US Department of Defense (DoD) expects to implement a new infrastructure to increase security around the way it communicates electronically, Gizmodo has learned.

The Defense Information Systems Agency (DISA), which manages the Pentagons email systems, says it intends to adopt, by default, STARTTLS, an encryption protocol designed to prevent the interception of email messages in transit. DISA is actively working an acquisition to upgrade the email gateways that will allow us to take advantage of evolving capabilities for email protection, wrote Maj. Gen. Sarah Zabel, vice director of DISA, in a letter this week addressed to Senator Ron Wyden, Democrat of Oregon.

In late March, Wyden sent a letter to DISA inquiring as to why the Pentagon had not already enabled STARTTLS, as it is widely used by default throughout the federal government and in the private sector to protect email communications. As you may know, the technology industry created STARTTLS fifteen years ago to allow email servers to communicate securely and protect email messages from surveillance as they are transmitted over the internet, Wyden wrote.

The senator added that while the Pentagon uses various other systems to protect classified and unclassified messagessuch as Public Key Infrastructure (PKI), which allows for the encrypted transfer of data at DoD, as well as to and from its defense industry partnersWyden was concerned that DISA is not taking advantage of a basic, widely used, easily-enabled cybersecurity technology. He continued: Indeed, until DISA enables STARTTLS, unclassified email messages sent between the military and other organizations will be needlessly exposed to surveillance and potentially compromised by third parties.

It appears, however, that surveillance was at least one reason why DISA had not enabled STARTTLS already. In a letter acquired by Gizmodo dated April 27, Zabel states that DISA made a deliberate decision not to use STARTTLS because it feared doing so would interfere with its ability to inspect each email it was sent for malicious software, phishing attempts, and other exploits. DISA currently rejects over 85% of all DoD email traffic coming from the Internet on a daily basis due to malicious behavior, Zabel wrote. The remaining 15% of email traffic is also inspected for Zero Day threats that exploit an undisclosed cybersecurity vulnerability.

Added Zabel: We also inspect for advanced, persistent threats using detection methods developed using national level intelligence. Many of these detection methods would be rendered ineffective if STARTTLS were enabled.

However, in a follow-up letter to Wyden this week, the major general clarified that DoD was largely hindered in adopting STARTTLS by its own antiquated technology.

Email remains one of our largest threat vectors, Zabel wrote, continuing: DISA is currently implementing architectural changes, which will allow the use of STARTTLS on a default basis, while still enabling us to apply appropriate safeguards; however, the capacity and throughput of the aging equipment creates limitations in supporting STARTTLS as the default for all mail sessions.

A new email gateway infrastructure will allow the use of STARTTLS by default, the letter said, estimating that DoD would be able to acquire and transition to this new system by July 2018.

The Presidential Advisory Commission on Election Integrity, which is charged with investigating President Trumps unsubstantiated claims of widespread voter fraud during the 2016 election, recently asked state officials to send their voter rolls to the commission using an email address that does not use STARTTLS.

For far too long, many of the unclassified email messages sent and received by members of the military have been left vulnerable to surveillance by foreign governments and hackers, Senator Wyden told Gizmodo. The Pentagon is doing the right thing by encrypting emails as they are sent to and from the militarys servers.

Wyden called DISAs decision a good step, but said there was no reason it should take an entire year to adopt industry-standard cybersecurity technology. Protecting the communications of American servicemen and women should be a priority, so I hope the agency accelerates its timeline, he said.

Kate Conger contributed to this report.

Read the original here:
After Criticism, US Defense Department Will Implement New ... - Gizmodo

Read More..

Encryption thwarting investigators as federal government taps increase – Naked Security

The annual US Wiretap Reportout, covering 2016, and as usual, its packed with intriguing tidbits.

A few key takeaways: the federal government is wiretapping more, states are wiretapping less, drug crimes remain the #1 target, encryption is becoming a somewhat bigger obstacle to investigators, and courts almost always give law enforcement what it wants.

When Congress set detailed rules for wiretapping in 1968, it also instructed the US court system to tell Congress the number and nature of federal and state applications for orders authorizing or approving the interception of wire, oral, or electronic communications. This report excludes intercepts governed by the Foreign Intelligence Surveillance Act of 1978: you wont find data here about espionage or terrorism warrants. These are federal and state warrants related to violent, white-collar and organized crime and above all, drug crime.

According to The Register:

Investigations into just drug dealing made up 61% of all wiretap requests, and that rose to 82% when multiple charges, including drugs, were counted. By comparison, the next most popular cause for wiretaps was conspiracy, which accounted for just 8%, followed by homicide at 5%.

Even so, drug-related wiretaps actually plummeted last year from 3,367 to 1,949. That correlated with an overall 41% drop in warrants requested by state law enforcement, from 2,745 to 1,617, suggesting that state authorities may be de-emphasizing the use of wiretaps in the drug war.

As the San Bernardino Sun reports, more than a third of this national shift can be traced to one county in California: Riverside, where wiretaps dropped from 640 to 106. This followed an expose by USA TODAY and The Desert Sun which raised

questions about the vast wiretapping coming out of Riverside County, which, in 2014, entailed the interception of 2m calls, texts and other forms of communication among 44,000 people [most] approved by a single judge Judge Helios Hernandez.

Since then, a new local district attorney has taken greater responsibility for personally reviewing wiretap requests, demanding that they have a clearer connection to the county. Meanwhile, the US Drug Enforcement Agency ordered its agents to check in with federal prosecutors before pursuing wiretaps.

Riversides case points to vast disparities in the numbers of wiretaps authorized in different US jurisdictions. According to an official report summary:

Six states (California, New York, Nevada, New Jersey, Colorado, and Florida) accounted for 82% of all state wiretap applications. California alone accounted for 35%.

A more detailed analysis by the Electronic Frontier Federation found that California investigators captured 7.8m communications from 181,000 people at a cost of nearly $30m. Of those, 19% were considered incriminating.

Only two of 3,170 federal and state wiretap requests were turned down by courts last year but thats up from a whopping zero in 2015. (In the past 11 years, only nine warrant requests have been turned down.)

Of course, a courts rejection isnt the only way to thwart law enforcement. For years, authorities have loudly complained that encryption would prevent access to crucial information for prosecuting dangerous offenders. But the actual data seemed to raise serious questions about this argument.In 2015, for example, the number of wiretaps in which encryption was encountered actually dropped from 22 to just seven.

This year, however, that number spiked to 57, and investigators couldnt overcome encryption in 48 of these cases. While, even in 2016, encryption interfered with fewer than 2% of wiretaps its wider availability and awareness might finally be having an impact.

With or without encryption, wiretapping got a lot more expensive in 2016, averaging $74,949 per tap, up 78% from 2015. In the past, wiretappings high cost has been viewed as a key reason for its disproportionate use in drug cases. As ACLU lead technologist Christopher Soghoian told Wired:

When agencies bust a drug dealer and get $5m and a kilo of coke, they keep the money. In many ways, the drug cases subsidize the surveillance technology.

When you combine those incentives with the Trump-era Justice Department re-emphasis on fierce enforcement of even lower-level drug offenses, next years numbers could prove even more interesting than usual.

Read the original:
Encryption thwarting investigators as federal government taps increase - Naked Security

Read More..

Voorhees: Bitcoin Will Probably Be Replaced If Scaling Resolution Not Found This Summer – Bitcoin Magazine

Bitcoin has always been seen as the king of the world of cryptocurrency due to its network effects and first-mover advantage, but ShapeShift CEO Erik Voorhees thinks bitcoin could be replaced as the top dog if a scaling resolution is not found this summer. Voorhees shared this point of view on the most recent episode of Epicenter with co-hosts Brian Fabian Crain and Sbastien Couture.

The debate over scaling Bitcoin has been the main topic of conversation in the ecosystem for the past two years, but it appears that the network will get the long-awaited Segregated Witness (SegWit) upgrade by August 1st.

During his appearance on Epicenter, Voorhees discussed his support for the SegWit2x proposal, his impression that many Bitcoin users arent paying attention to the scaling debate and whether Bitcoin needs an improved system of governance.

SegWit2x, which is supported by a large number of Bitcoin companies and miners, is a proposal for adding SegWit and a hard-forking increase to the block size limit to Bitcoin. Voorhees described himself as a big proponent of the proposal during his appearance on Epicenter, saying that its the only viable, actual option to moving Bitcoin forward.

I want SegWit on Bitcoin as soon as possible, said Voorhees. I also want a hard fork to a larger base block size as soon as possible, and SegWit2x hopefully will make those things happen.

Voorhees said that he is also bullish on the possible success of SegWit2x due to the declared support of the proposal from over 80 percent of the network hashrate.

According to Voorhees, the activation of SegWit2x will move Bitcoin out of a trough of misery that he believes the digital cash system has been in for the past two years, though he also believes the deployment of these changes has the potential to cause some volatility in the near term.

This stagnation has been really horrible for Bitcoin, said Voorhees.

In Voorheess view, the activation of SegWit2x on the Bitcoin network will lead to a rally in the bitcoin price that will be unlike anything that people have ever seen before. He also believes the activation of the scaling proposal will allow everyone in the ecosystem to refocus on building on top of Bitcoin rather than debating over the base protocol.

At one point during his Epicenter interview, Voorhees admitted that he almost doesnt care which scaling proposal is activated on the network.

I just want something to happen, said Voorhees. If this summer fails to find some kind of resolution to this debate, then Im pretty bearish on bitcoin, and I think itll probably be replaced.

Voorhees also discussed the Bitcoin community as a whole during his appearance on Epicenter, and he noted that Bitcoins userbase is much larger than some may realize.

The community is so much larger than Reddit, and people that live on Reddit dont realize this, said Voorhees.

While the /r/Bitcoin subreddit is still a main hub of the community, Voorhees pointed out that both Blockchain and Coinbase have 10 million users each. By comparison, /r/Bitcoin has roughly 250,000 subscribers.

Voorhees then told a story of going to a recent Bitcoin meetup in Berlin, Germany, where Blockchain CEO Peter Smith asked the audience how many of them had heard of the SegWit2x proposal. According to Voorhees, about 5 percent of the crowd raised their hands.

Voorheess story about the Berlin meetup eventually turned into a broader conversation of how changes should be made to the Bitcoin protocol. Crain pointed out that some of the newer altcoins coming onto the market, such as Tezos, are heavily focused on the issue of network governance.

Its a slippery slope, said Voorhees. When you start having structured governance, you start moving toward an organization that can be compromised. As difficult as Bitcoin has been in making progress on this one debate, it also is showing immense resilience to change, which is good and bad it depends what the issue at hand is. You have to be careful if you want something like a blockchain project to turn into a more traditional-looking organization with a hierarchical structure and certain people who make key decisions. Thats not necessarily the best way that a blockchain should exist.

Voorhees then admitted that he does not know the best governance model for a blockchain, but he thinks its great that there is so much experimentation taking place in this area right now.

Watch the whole episode here in which Voorhees also talks about investment in the crypto space, the future of Shapeshift and its new Prism platform:

Originally posted here:
Voorhees: Bitcoin Will Probably Be Replaced If Scaling Resolution Not Found This Summer - Bitcoin Magazine

Read More..

Bitcoin’s central appeal could also be its biggest weakness – Phys.Org

July 7, 2017 by Corina Sas, The Conversation Credit: Shutterstock

Bitcoin reached a huge new peak in value in June 2017, when one unit of the virtual currency was worth US$2,851 (2,208), up from around US$600 just a year earlier. More than 10m people worldwide are now thought to own bitcoin and more than 100,000 merchants accept it for goods (not counting all those using it to sell drugs and other illegal items on the black market).

Part of bitcoin's appeal for many of its users is the lack of centralised control or regulation by any government or bank. Instead it relies on a technology known as blockchain to underpin and secure transactions. But research my colleagues and I have conducted suggests that the lack of any social trust in the way blockchain operates poses a challenge for bitcoin's further spread.

Blockchain is a public database that records digital transactions. These are validated by computers working within a worldwide network that solve complex coded problems. Whereas traditional bank transactions are authorised by financial institutions and controlled by governments through taxation and contracts between parties with known identities, blockchain is decentralised, unregulated and anonymous.

In our studies of blockchain's users we found that these features appeal to bitcoin users because of increasing distrust of financial institutions and governments. The technology empowers people to regain control over their money, with no restrictions over where and when they can send it.

But our findings also indicate that two core aspects of blockchain's design the fact that transactions are anonymous and irreversible pose significant challenges to the social trust among its users. Anonymity has an obvious appeal for people looking to avoid government control. And irreversible transactions were built into blockchain's original design as a positive feature to address banks' privilege of reversing transactions, even when the contract states that they were final.

But in practice, these features are a problem for many people. Most people are used to relying on the reputation of a seller to decide whether or not to buy from them and the ability of the financial and legal system to help them if something goes wrong. But neither of these things are possible through blockchain.

Paper trails have their advantages

Most transactions don't just involve moving bitcoin from one electronic wallet to another. In practice, they are often part of a larger, two-way transactions where both parties send and receive assets such as bitcoins, real world currency or physical goods.

The issue is that the blockchain only records the movement of bitcoin, not the movement of other currencies or goods. Because there is no authority to complain to, this raises a major risk that users could fall prey to dishonest traders who fail to deliver their side of the deal.

In our latest study, we interviewed 20 bitcoin users recruited from five online groups from Malaysia, most of them with more than two years experience of using bitcoins. Our research indicates that more than 50% of participants would prefer blockchain's transactions to be regulated and identifiable, so that transactions can be either reversed or the dishonest trader legally sanctioned.

This shows there is a tension between the freedom and empowerment of blockchain's unregulated nature, and the lack of security that most people are accustomed to receiving from traditional financial institutions. If this is not addressed, such tension may limit the spread of bitcoin beyond its current base. It could even reduce the number of bitcoin users involved in such two-way transactions, as more people become aware of the risks of dishonest traders. In contrast, the use of blockchain for one-way transactions such as remittance payments will continue to grow, as they are less affected by dishonest traders.

What can be done?

Even bitcoin's current users still operate largely under the traditional mindset of centralised and regulated currencies. Bitcoin advocates may need to find ways to encourage users to develop a new mental approach to unregulated blockchain technology.

But developers could also build tools to address some of bitcoin users' concerns. For example, there may be a way to record whether the real-world elements of bitcoin transactions are also verified, authorised and stored on the public ledger. Electronic wallets could be linked to a reputation file that users could view before agreeing to a deal, much like sites such as eBay allow consumers to rate sellers. And new mechanisms built on top of the irreversible blockchain protocol could enable individual two-way transactions to be reversed.

Without doing something to tackle these challenges, the very thing that caught people's attention about bitcoin in the first place could end up stifling its growth and eventually consigning it to history.

Explore further: Bitcoin's popular design is being exploited for theft and fraud

This article was originally published on The Conversation. Read the original article.

Google parent Alphabet is spinning off a little-known unit working on geothermal power called Dandelion, which will begin offering residential energy services.

Elon Musk's Tesla will build what the maverick entrepreneur claims is the world's largest lithium ion battery within 100 days, making good on a Twitter promise to ease South Australia's energy woes.

Qualcomm on Thursday escalated its legal battle with Apple, filing a patent infringement lawsuit and requesting a ban on the importation of some iPhones, claiming unlawful and unfair use of the chipmaker's technology.

France will end sales of petrol and diesel vehicles by 2040 as part of an ambitious plan to meet its targets under the Paris climate accord, new Ecology Minister Nicolas Hulot announced Thursday.

Japanese designer Yuima Nakazato claimed Wednesday that he has cracked a digital technique which could revolutionise fashion with mass made-to-measure clothes.

Volvo plans to build only electric and hybrid vehicles starting in 2019, making it the first major automaker to abandon cars and SUVs powered solely by the internal combustion engine.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

See the rest here:
Bitcoin's central appeal could also be its biggest weakness - Phys.Org

Read More..

What is an Altcoin? Bitcoin Magazine

Using our handy guide, you may have already familiarized yourself with the ins and outs of Bitcoin. But aside from bitcoin, there are hundreds of other digital currencies out there. These are known as altcoins, or alternatives to bitcoin; for example, ether, ripple, zcash, monero and dash, to name just a few.

Altcoins can differ from Bitcoin in a range of ways. Some have a different economic model or a different coin-distribution method, like altcoins that were given away to all citizens of a country. Others employ different proof-of-work mining algorithms, perhaps to resist specialized mining hardware or maybe they dont even rely on proof of work at all. Several altcoins offer a more versatile programming language to build applications on top of, while yet others offer more privacy compared to Bitcoin. And there are also altcoins that serve very specific, non-monetary use cases, like domain name registry or data storage pointers.

However, there are also many altcoins that dont do much interesting at all. The vast majority of altcoins simply tweak some parameters that dont matter much, or offer something that may sound useful but isnt. If, for example, an altcoin has a greater total amount of coins, it just means each individual coin is worth less. If an altcoin finds blocks faster, it only means that a transaction requires more confirmations for a similar level of security.

As such, most altcoins offer no benefit over Bitcoin at all. Plus, they have less hash power securing them, involve fewer developers improving them and are usually less useful due to smaller network effects. And while many altcoins promise useful features, upon closer inspection many of these promises are just that: promises.

This also means that altcoins are typically riskier than Bitcoin. Their exchange rates are often more volatile, and over the years virtually no altcoins have maintained their value against bitcoin; most have come and gone. On top of that, many altcoins can be considered outright scams, mainly created to enrich its inventors and early adopters.

While some altcoins out there can and do perform useful tasks (for example acting in a testnet capacity or offering greater anonymity than bitcoin) and may have a future, many others are exclusively driven by speculation or worse. So make sure to do your research, and buyer beware!

See the article here:
What is an Altcoin? Bitcoin Magazine

Read More..

Payza Commits to Cryptocurrency: Unveils Full Bitcoin Services, Introduces Altcoin Exchanges – CoinDesk

The global online payment processor launches comprehensive Bitcoin services and altcoin funding options for more than 50 Bitcoin alternatives

Payza, the award-winning global online payment platform, announced a new range of unique cryptocurrency features to the online payment processing and international remittance space. Payza e-wallets are now fully functional as a Bitcoin wallet, providing members the option to buy, sell, exchange, send, receive, and hold Bitcoin all within a Payza account. Additionally, the Payza platform allows for over 50 altcoins to be exchanged to fiat currency, letting members easily sell Ethereum, Ripple, Litecoin and dozens of other cryptocurrencies.

"We were among the first online payment platforms and e-wallet providers to embrace Bitcoin back in 2014," said Firoz Patel, Payza global executive vice president. "Even then we recognized the important role Bitcoin was set to play in e-commerce and international remittances. The ultimate goal was to provide our members a secure option to store their bitcoins in their Payza accounts. So we mapped out a set of incremental steps to accomplish that goal. Today, we have fulfilled our promise to our members and are now able to treat Bitcoin like any other currency we deal with."

Merchants who use Payza to process online payments now also have the option to receive Bitcoin as payment for their products and hold Bitcoin in their accounts, or to receive Bitcoin payments that are automatically converted to fiat currencies, such as US Dollars, Euros and Pounds.

Were very excited about these new features because it positions Payza as one of the best options for Bitcoin neophytes who are ready to experiment with cryptocurrencies, explains Firoz Patel, Payzas CEO. We wanted to provide a worry-free way for our members to exchange and hold Bitcoin, so we developed this service specifically for people who are interested in Bitcoin but are intimidated by the security risks and technical knowledge seemingly required to use them.

Along with these complete Bitcoin services, Payza is also turning their attention to other cryptocurrencies. The company now accepts more than 50 altcoins for exchange. Alongside Ethereum, Ripple, and Litecoin, Payza members can sell dozens of other popular Bitcoin alternatives, such as Dash, Monero, and Steem, with proceeds settling as US Dollars within their accounts.

Adding altcoin deposit options sets us on track to launch full cryptocurrency exchange services. Current and future crypto-enthusiasts will be able to exchange dozens of cryptocurrencies, not just Bitcoin, within their Payza accounts. We will also be enhancing our Payza Card service to enable Payza members a one-step process to use Bitcoin and other cryptocurrencies to instantly load their prepaid cards, said Patel.

The next offering expected from Payza is a streamlined Payza Card loading process for Bitcoin and altcoin. Under the current set up, members can already load their Payza Cards with funds received by selling Bitcoin or altcoins, but they must wait for those funds to settle and then manually load the cards. The new process will eliminate this step and direct those funds directly onto the Payza Card.

The Payza Card is a MasterCard branded prepaid card that can be loaded with US Dollars. Payza Cards are accepted online, in-stores, and at most ATMs. The one-step loading option will make the Payza Card one of the fastest and most convenient ways to convert Bitcoin and other cryptocurrencies into spendable cash.

About Payza Payza is an award-winning payments technology company. The highly secure platform provides businesses and consumers around the world with practical solutions for processing online payments. Payza supports 26 currencies and serves over 13 million members in more than 190 countries.

Payza serves traditional and emerging markets, providing a wide range of built-in tools including: Online payment processing, online global money transfers, fraud screening, subscription billing, transaction dispute resolution, cryptocurrency exchange services, and global payouts.

The publication of a press release on this page should not be viewed as an endorsement by CoinDesk. Customers should do their own research before investing funds in any company.

See the original post:
Payza Commits to Cryptocurrency: Unveils Full Bitcoin Services, Introduces Altcoin Exchanges - CoinDesk

Read More..

Cubic Subsidiary Gets NSA Clearance for Cloud Servers With Aruba Virtual Mobility Controller – ExecutiveBiz (blog)

ACubicsubsidiary has secured clearance from the National Security Agency to offer its cloud servers with Aruba Networks virtual mobility controller as a certified component under the Commercial Solutions for Classified program.

The NSA clearance seeks to demonstrate that DTECH Labs tactical cloud servers with Aruba VMC met the Common Criteria Protection Profiles requirements for operation as a virtual private network gateway and as a traffic filtering firewall, Cubic said Wednesday.

The CSfC initiative seeks to facilitate the use of commercial products in layered platforms in an effort to safeguard classified data in National Security Systems.

We are pleased to partner with Aruba Networks to offer its Aruba VMC in a tactical, small-form factor,said Mike Barthlow, vice president of secure networking at Cubic Mission Solutions.

Barthlow added that the NSA approval would help DTECH to continue to provide capabilities for communications and networking operations.

Go here to see the original:
Cubic Subsidiary Gets NSA Clearance for Cloud Servers With Aruba Virtual Mobility Controller - ExecutiveBiz (blog)

Read More..

Data Center Security: How Cloud Services Keep Your Files Safe – Cloudwards

Cloud technology has changed the way we use computers, moving our software and data to the cloud instead of installed on our own devices. We worry less about our files knowing they are stored safely in a data center, encrypted and secure, spread across multiple drives for redundancy.

But what about the data centers themselves? Many people are concerned about privacy ever since Edward Snowden lifted the veil on NSA spying, let alone the threat of cybercrime, so how are cloud services protecting your data?

To answer that question, lets first take a look at what data centers are. You probably imagine a room full of computers and though thats not incorrect, its likely a little different than you might imagine.

Thats one of Googles many data centers. The company is very transparent when it comes to their data centers, revealing as much as they can without compromising security. They have such centers across the world to both ensure redundancy in the case of an outage and also to provide reliable connections to users irrespective of geographical location.

A data center is a centralized location for IT infrastructure, whether privately owned, for a companys internal IT needs, or whether it provides public services and infrastructure, such as Amazons Web Services. As you can imagine, centralizing all this equipment is risky without the proper precautions.

Data centers typically require at least the following to keep data safe:

Environmental controls: these are necessary to keep equipment cool, since a room full of high-powered technology generates an incredible amount of heat. Excess heat can lead to equipment failures and shorten the lifespan of server components.

Uninterruptible Power Supplies (UPS): in the event of a power outage, servers and other equipment must keep running to meet the data centers SLA, or service-level agreement. UPS units and backup generators can keep servers running until power is restored.

Security systems: to ensure the security and privacy of customers, data centers employ a wide range of security measures to prevent unauthorized access, including biometric access measures, locked server cages, surveillance systems, multiple forms of identification and some go so far as using mantraps a small room that connects an unsecured area to the secure data center.

Though those first two are worthy of their own respective articles, let us focus on security for now.

Though compiling a full list is practically impossible, these are the most common security measures you can find in any given secure data center.

One of the first lines of defense in any security plan is adequate surveillance. For starters, cameras installed around the perimeter of a data center are used to watch for suspicious activity. Inside, video surveillance acts as a record in the event of a security incident, while metal detectors ensure that hardware is not snuck into or out of the facility.

Most data centers will employ security guards inside the facility, but some such as Google and Apple have security guards that routinely patrol both the interior and exterior of their facilities.

Though it is unlikely that anyone will try and take a data center by storm, some companies arm their guards, further securing the premises.

Data centers are typically one of two styles depending on function and the needed security: single-purpose, or multipurpose. Multipurpose data centers are less secure, as they have other employees on site besides those responsible for the data center itself. They may contain adjacent offices for the business and arent usually used for sensitive data or infrastructure.

Secure data centers are built strictly for the purpose of housing IT infrastructure and are designed accordingly. Typically they are removed from the road, keeping a buffer zone around the site, including crash-proof barriers and security patrols.

Most do not have exterior windows and if they do they are typically made of bulletproof glass. Fire exits open strictly to the outside and there are a limited number of entry points, usually a front entrance and a loading area.

The interior is designed to separate the main data center area from any other rooms, such as a break room, entrance lobby or restrooms. Security increases the closer you get to the heart of the data center, requiring multiple forms of identification or access control.

Only authorized personnel should be allowed in these secured areas, where the servers, routers and other equipment live. To prevent unauthorized individuals from waltzing in and out with customer data or installing malicious hardware, data centers employ a wide array of access controls throughout a data center.

Google, for example, uses custom-designed electronic access cards and the closer you get to the data center floor the more sophisticated the authorization protocols get. The heart of the data center is only accessible via a security corridor that uses multifactor access control with badges and biometrics, with less than one percent of Google employees ever stepping foot inside the data center.

Mantraps are often employed to limit access to authorized individuals and prevent an criminals from tailgating, the practice of following someone closely to gain unauthorized entry to a secure area. Typically, a mantrap is a set of two doors with an airlock in the middle.

Both doors of a mantrap require authentication, such as a biometric lock or keycard, and only one door can open at a time. The area is kept under surveillance so that guards can identify any issues or stop someone from proceeding further.

Scales are used to measure visitors, and are sensitive enough to weigh someone and determine if someone leaving is heavier than they were upon entering, indicating they might be sneaking out stolen hardware. If the scale detects a difference, the door refuses to open and requires a security guard to bypass the locking mechanism.

For sensitive servers and equipment, separate rooms and cages or cabinets are used to segregate sensitive equipment from non-sensitive servers. Companies such as Iron Mountain allow customers to request CCTV cameras in the cage as well as custom fencing materials and other features, if needed.

This is just a few of the many countermeasures employed by data centers. Google goes so far as to build their own custom servers from the ground up, removing unnecessary hardware or features to reduce the attack surface. No one else has the servers that Google uses.

Other data centers may employ similar custom solutions, and dont disclose other security systems or countermeasures they employ to reduce the possibility of compromise. Security is, after all, serious business.

Hacking, malware and spyware are the obvious threats to your data, but few people stop to think of the physical aspect of IT security. Data centers take security to a whole new level. They are costly businesses to run and their entire purpose is to keep IT infrastructure up and running 24/7, secured from any and all possible threats.

Sign up for our newsletter to get the latest on new releases and more.

Now that you know the measures companies take to protect their servers, you can worry a little less about storing data in the cloud. The biggest weak spot in cloud computing is user errors, so take some time to learn how to create a strong password and learn how to encrypt your data, including texts and emails.

Thank you for reading and please let us know your thoughts in the comments below.

Continued here:
Data Center Security: How Cloud Services Keep Your Files Safe - Cloudwards

Read More..

Evaluating AMD’s Server Market Potential – Seeking Alpha

Advanced Micro Devices (AMD) is on the comeback trail, with a new generation of GPUs for graphics cards and CPUs for personal computers. The stock has come back strongly too, recently hitting a 52-week high of $15.55 after hitting a long-term low of $1.65 back in July of 2015.

A third leg of the AMD comeback could be CPUs for servers, which go mainly into datacenters and cloud farms. This is the least probable comeback. Once a significant second fiddle to Intel (INTC), by 2016 AMD's share of the server CPU market had dropped to less than 1%.

AMD has new Epyc server CPU processors in production that could possibly compete with Intel's. But AMD is essentially entering a new market, which will present difficulties in gaining market share. If you are not aware of these problems, you can find a short review here.

AMD EPYC server chip (source: AMD)

This article will assume that AMD overcomes these re-entry problems and gains significant server market share in the near future. I will examine the scenario where AMD gains 10% market share for three years starting in 2018. Then I will assess the current stock price in that light.

Intel's 100%

Intel releases quarterly figures on revenue from their data center group at each quarter's analyst conference. Here are the figures for 2016, from my notes:

Quarter of 2016

Datacenter segment revenue, $ billions

1

4.00

2

4.00

3

4.54

4

4.67

total

17.21

I'll round to $17.2 billion annual server revenue. I would note that Q4 revenue was up 8% from year earlier. It is not the safest assumption, but I am going to use 8% revenue growth to project the 2018, 2019, and 2020 numbers:

2018 $18.6 billion

2019 $20.1 billion

2020 $21.7 billion

We will also want to know how profitable the Data Center Group was in order to estimate AMD's potential profits under our hypothetical scenarios. From the Intel Q4 2016 transcript I found that...

"The Data Center Group had operating profit of $1.9 billion, down 14% year-over-year. Operating margin was impacted by the two one-time items I referred to earlier and the ramp of 14-nanometer on our server products, which we expect to generate continued cost improvements over time."

That gives a tremendous operating margin for the group of $1.9 / $4.67 = 40.7%. That is one reason why AMD wants to be in the space. In contrast, Intel's operating margin for its personal computers, aka the Client Computing Group, was not stated. But it must be lower, since it is the other major group and the overall operating margin was 30%. Gross margin was 63% overall.

Contrast that to AMD's Q4 2016 margins. AMD reported negative operating margins and a 32% gross margin.

AMD server scenarios

To compete with Intel in the server market I believe AMD will need to compete on pricing, and even at the same price would have lower gross and operating margins. I am going to pick a number out of the air, 20% for operating margin. If you know how to use a spreadsheet, you can examine what would happen at other margin points. Even margins of 18% or 22% would have significant impacts on how I would price AMD stock.

Here's what we get using Intel data center group revenue as the market size, an 8% annual growth rate, a 20% operating margin, and various AMD market shares. The years are just illustrative. I would be very impressed if AMD got 10% per year each year, but not surprised at the 5% per year rate:

year

TAM, millions

% of TAM

AMD revenue, millions

AMD operating profit, millions

2018

$18,600

5%

$ 930

$ 186

2019

20,100

10%

2,010

402

2020

21,700

15%

3,255

651

2018

18,600

10%

1,860

372

2019

20,100

20%

4,020

804

2020

21,700

30%

6,510

1,302

As the table shows, there is a huge difference between AMD taking 5% of the server market and then getting stuck there, and eventually taking 30% of the server market.

Note that it has been years since AMD has shown an operating profit on a full-year basis, even using non-GAAP accounting. Showing any operating profit at all would be a win, but would not justify the current stock price.

AMD stock price scenarios

Investors are enthusiastic about Ryzen CPUs and AMD's new graphics chip lineup, which are likely to add to revenue and profits. There could even be positive earnings for Q2. I am going to ignore that here and assume only the server CPU market will produce operating profits, earnings, and positive EPS. I am clear it is not the assumption most investors are making; it is to clarify the server segment potential contribution.

The 20% operating margin used in the calculations above is simply a guess, placed between AMDs past zero to negative margins and Intel's rather good margins.

I will use operating margins as earnings and EPS (earnings per share). In reality, at the very least, AMD's interest payments and any taxes would be subtracted from the earnings.

I am also using the latest number of shares published, 945 million. This would tend to be low since AMD will certainly issue stock-based compensation during the period covered.

Finally, I have to pick a P/E ratio. Right now that ratio is infinite, which is to say, there is no meaningful correspondence between the current stock price and 2016 earnings, which were negative. They were negative $0.60 per share on a GAAP basis, and negative $0.14 per share non-GAAP.

So you might say I am counting on Ryzen to at least get AMD to break-even, which is not an unreasonable assumption.

I am going to use a P/E of 20, which is a reasonable P/E for a company with a history of profitability but not very fast EPS growth, at least in a low-interest-rate environment. If AMD does turn out to grow revenue and EPS at a fast rate, a higher P/E would be reasonable.

So here are the calculated stock values for my table, with all the many assumptions I have made:

year

AMD server revenue, millions

AMD earnings, millions

EPS

AMD stock value, P/E = 20

2018

$ 930

$ 186

$0.197

$3.94

2019

2,010

402

0.425

8.51

2020

3,255

651

0.689

13.78

2018

1,860

372

Visit link:
Evaluating AMD's Server Market Potential - Seeking Alpha

Read More..