Page 767«..1020..766767768769..780790..»

Research unveils stretchable high-resolution user-interactive synesthesia displays for visualacoustic encryption – Tech Xplore

This article has been reviewed according to ScienceX's editorial process and policies. Editors have highlighted the following attributes while ensuring the content's credibility:

fact-checked

peer-reviewed publication

trusted source

proofread

close

The future of human-machine interfaces is on the cusp of a revolution with the unveiling of a groundbreaking technologya stretchable high-resolution multicolor synesthesia display that generates synchronized sound and light as input/output sources. A research team, led by Professor Moon Kee Choi in the Department of Materials Science and Engineering at UNIST, has succeeded in developing this cutting-edge display using transfer-printing techniques, propelling the field of multifunctional displays into new realms of possibility.

The team's research is published in the journal Advanced Functional Materials.

Traditionally, multifunctional displays have been confined to visualizing mechanical and electrical signals in light. However, this pioneering stretchable synesthesia display shatters preconceived boundaries by offering unparalleled optical performance and precise sound pressure levels. Its inherent stretchability ensures seamless operation under both static and dynamic deformation, preserving the integrity of the sound relative to the input waveform.

A key advantage of this technology is its potential to revolutionize wearable devices, mobile devices, and the Internet of Things (IoT) as the next generation of displays. By seamlessly generating sound and light simultaneously, the stretchable display delivers a distinctive user experience and unlocks untapped potential for advanced encryption and authentication.

To demonstrate the capabilities of this synesthesia display, the research team presented two innovative applications. Firstly, they showcased visual-acoustic encryption, an advanced encryption method that combines visual and auditory cues. This breakthrough sets the stage for reinforced authentication systems that leverage the power of both sight and sound, elevating security to new heights.

Secondly, the team introduced a multiplex quick response code that bridges multiple domains with a single device. This remarkable technology empowers users to interact with the display, ushering in a new era of seamless integration and user-friendly experiences.

close

Professor Choi said, "The demand for next-generation displays is skyrocketing, and this stretchable high-resolution display that generates sound and light simultaneously overcomes the limitations of previous light-emitting devices. Our novel light-emission layer transfer technology, achieved through surface energy control, enables us to achieve remarkable patterns and maintain stability even under deformation."

The manufactured device boasts exceptional brightness and sound characteristics, with a circular shape maintained at a remarkable rate of over 95% in more than 5,000 deformation experiments. This unparalleled durability and versatility render the stretchable display ideal for a wide range of applications, including wearable speakers, double encryption devices, and multi-quick response code implementations.

According to the research team, this remarkable advancement in display technology propels us one step closer to a future where multifunctional displays seamlessly integrate with our daily lives. As the demand for advanced human-machine interfaces continues to surge, the stretchable high-resolution multicolor synesthesia display offers a tantalizing glimpse into the limitless possibilities of tomorrow.

More information: Jisu Yoo et al, Stretchable HighResolution UserInteractive Synesthesia Displays for VisualAcoustic Encryption, Advanced Functional Materials (2023). DOI: 10.1002/adfm.202302473

Journal information: Advanced Functional Materials

Read more:
Research unveils stretchable high-resolution user-interactive synesthesia displays for visualacoustic encryption - Tech Xplore

Read More..

Ubuntu 23.10 Mantic Minotaur released with a new App Center, hardware-backed full-disk encryption, and more – Liliputing

The latest version of Ubuntu is out today, bringing new and updated features including a new App Center for finding, downloading, and installing software, support for storing encryption keys for full-disk encryption in a TPM (Trusted Platform Module), and support for new hardware including single-board computers like the Raspberry Pi 5 and SiFive HiFive Pro P550.

Ubuntu 23.10 should be available soon from the Ubuntu Download page, or existing users should eb able to upgrade using the Software Updater.

Canonical says adding support for storing encryption keys in a TPM to Ubuntu Desktop 23.10 allows users or IT administrators to enable full-disk encryption without the need to enter a passkey at startup.

That said, its an experimental feature in this release, but the company says it hopes to bring broader hardware support for this feature with the launch of Ubuntu 24.04 LTS in April, 2023.

Support for the Raspberry Pi 5 was pretty much a no-brainer, as Canonical has been supporting other Raspberry Pi devices for a few years, and the newest model brings twice the performance, so it should be more than capable of supporting the latest version of Ubuntu.

But Canonical has also been making efforts to port its operating system to support RISC-V architecture in recent years, and the SiFive HiFive Pro P550 (Intel Horse Creek) board is one of the most powerful, versatile RISC-V development boards to date.

Other changes include an update to a Linux kernel 6.5, a new App Center designed in Flutter with better search functionality and support for choosing between Snap and .deb packages, and improved support for window tiling.

As with every recent Ubuntu release, the default version of the operating system ships with the GNOME desktop environment, and Ubuntu 23.10 will ship with GNOME 45 (and some new wallpapers).

But Ubuntu also comes in a number of different official flavors, with different desktop environments. New builds should also be out today (or soon) for Kubuntu, Lubuntu, Xubuntu, Ubuntu Budgie, Ubuntu Cinnamon, Ubuntu MATE, Ubuntu Unity, Ubuntu Studio, Ubuntu Kylin, and Edubuntu.

Liliputing's primary sources of revenue are advertising and affiliate links (if you click the "Shop" button at the top of the page and buy something on Amazon, for example, we'll get a small commission).

But there are several ways you can support the site directly even if you're using an ad blocker* and hate online shopping.

or...

Join 9,473 other subscribers

Excerpt from:
Ubuntu 23.10 Mantic Minotaur released with a new App Center, hardware-backed full-disk encryption, and more - Liliputing

Read More..

Microsoft warns of incorrect BitLocker encryption errors – BleepingComputer

Microsoft warned customers this week of incorrect BitLocker drive encryption errors being shownin some managed Windows environments.

According to Redmond, this known issue affects only client platforms, including Windows 11 21H2/22H2, Windows 10 21H2/22H2, and Windows 10 Enterprise LTSC 2019.

The issue also only impacts environments where drive encryption is enforced for OS and fixed drives.

Microsoft says Intune, its cloud-based unified endpoint management service, is one of the MDM platforms affected by the known issue. Still, it has not revealed what other MDM apps show these erroneous BitLocker errors.

'Using the FixedDrivesEncryptionType or SystemDrivesEncryptionType policy settings in the BitLocker configuration service provider (CSP) node in mobile device management (MDM) apps might incorrectly show a 65000 error in the 'Require Device Encryption' setting for some devices in your environment," the companysaidon the Windows Health dashboard.

"Affected environments are those with the 'Enforce drive encryption type on operating system drives' or 'Enforce drive encryption on fixed drives' policies set to enabled and selecting either 'full encryption' or 'used space only'."

Microsoft also clarified that this issue is caused by a reporting problem, and it does not impact drive encryption or the reporting of other device problems, including other BitLocker problems on MDM-enrolled Windows devices.

To address this, admins can enable the "not configured" setting for the "Enforce drive encryption type on operating system drives" or "Enforce drive encryption on fixed drives" policies in Microsoft Intune.

The company added that it's actively working on resolving the issue and will provide more details with an upcoming update.

Earlier this year, Redmond fixed a known issue impacting WSUS (Windows Server Update Services) servers upgraded to Windows Server 2022, which caused themto stop pushing Windows 11 22H2 updatesto enterprise endpoints.

The same month, it fixed another bugcausing video recording and playing failuresin apps using the WVC1 codec on Windows 10 and Windows 11 systems.

View original post here:
Microsoft warns of incorrect BitLocker encryption errors - BleepingComputer

Read More..

Exploring The Evolving Landscape Of End-To-End Encryption – CIOReview

In an era marked by an ever-expanding digital landscape, the paramount importance of data security cannot be overstated. Amid the plethora of technologies dedicated to safeguarding our digital lives, one stands out as the bedrock of data protection: end-to-end encryption (E2EE).

End-to-end encryption serves as a robust method of secure communication, ensuring that only the intended recipients of a message, image, or file can access and decipher the contents. Recognizable names in the digital realm, such as WhatsApp, Signal, Skype, and Telegram, have wholeheartedly embraced E2EE, cementing its status as an indispensable tool for securing our digital interactions. In the following discussion, we will delve into the contemporary trends and challenges surrounding E2EE while contemplating its potential ramifications for our digital future.

The Significance of End-to-End Encryption

Before delving into the present-day trends and the unfolding future, it is paramount to grasp why E2EE has ascended to a position of such paramount importance in the realm of data security. At its core, E2EE operates on the premise that messages and data are encrypted on the source device and decrypted only on the receiver end. This means that not even service providers or platform administrators possess the capacity to access or decipher the content of the transmitted messages.

Amidst an era of escalating cyberattacks and data breaches, E2EE emerges as a formidable defense mechanism against unauthorized access. Its pertinence becomes particularly pronounced when safeguarding sensitive information, such as personal correspondence, financial transactions, and confidential documents.

Trends Steering the Future of E2EE

1. Widespread Adoption: E2EE is no longer an exclusive domain of niche communication platforms. Key players across various industries have come to acknowledge the indispensability of robust data security. Healthcare, financial institutions, and government agencies are progressively integrating E2EE into their communication frameworks to adhere to data protection regulations and uphold the trust of their clients and constituents.

2. Technological Advancements: The advancement of technology, while instrumental in driving the adoption of E2EE, also ushers in its set of challenges. The advent of quantum computing, for instance, poses a direct threat to traditional encryption methods. Quantum computers harbor the potential to crack existing encryption algorithms, rendering them ineffective. In response, experts are laboring to develop post-quantum cryptography, a more resilient encryption mechanism. As quantum computing gains mainstream prominence, the shift toward these advanced encryption techniques becomes an inevitability.

3. Privacy as a Foremost Concern: Recent years have witnessed a global surge in the advocacy for stronger privacy laws. High-profile data breaches and the heightened awareness of digital rights have stoked the demand for secure communication platforms fortified with E2EE. Technology companies have responded by channeling investments into the development and enhancement of their encryption technologies, making them more user-friendly and accessible.

Challenges and Controversies

Despite the evident advantages E2EE brings to the table, it remains ensnared in a web of challenges and controversies.

One of the most pronounced concerns revolves around law enforcement agencies and governmental entities. They posit that E2EE could be exploited by malevolent actors to evade detection and investigation. Consequently, calls for the introduction of "backdoors" in encryption systems, which would grant authorities access to encrypted data, have gained traction. However, this proposal introduces a pivotal dilemma: while it may assist in crime prevention, it might also engender vulnerabilities susceptible to exploitation by hackers.

Plotting the Course for E2EE's Future

As we cast our gaze toward the horizon, it becomes palpable that E2EE will continue to occupy a pivotal role in data security. In pursuit of an equitable implementation, we must take into account several pivotal considerations:

1. Striking the Balance Between Security and Access: Achieving equilibrium between preserving the highest echelons of security and facilitating lawful access to encrypted data for legitimate purposes constitutes a multifaceted challenge. It necessitates meticulous contemplation of potential consequences and vulnerabilities entailed in the introduction of backdoors or analogous mechanisms.

2. Safety by Design: The imperative of integrating safety measures into E2EE from its conceptualization stage cannot be understated. Retrofitting security features subsequent to the occurrence of harm emerges as a far less efficacious approach. The principle of "Safety by Design" ensures that security is an inherent aspect of any digital platform or service.

3. Industry Transparency: It becomes incumbent upon industry stakeholders to operate with transparency regarding the implementation of encryption and the management of associated risks. Transparency acts as a fulcrum to foster trust and help users make informed decisions about their digital engagements.

4. Collaborative Solutions: Confronting the multitudinous challenges entwined with E2EE warrants collaboration among industry players, governmental bodies, and the general public. Solutions encompassing technological advancements, regulatory frameworks, and public awareness campaigns emerge as the sine qua non for the effective deployment of E2EE.

Practical Counsel for End Users

While E2EE presents a formidable layer of security, end users should not abdicate their responsibility in safeguarding their digital realms:

1. Exercise Prudence: Vigilance should hallmark all communications transpiring on encrypted platforms, especially in interactions with unfamiliar entities. Caution should be the watchword when sharing personal information or engaging in discussions of a sensitive nature.

2. Leverage Native Features: Most E2EE platforms proffer tools for reporting, blocking, and muting individuals or accounts. Familiarizing oneself with these features fortifies digital safety.

3. Documentation of Evidence: In instances involving cyberbullying, abuse, or other malicious activities, the compilation of evidence, such as screenshots, proves instrumental in facilitating the reporting process and the initiation of appropriate countermeasures.

4. Prompt Reporting of Incidents: Swift reporting of any illegal or abusive content to both the encrypted service provider and pertinent law enforcement agencies stands as an imperative. Timely reporting can aid in shielding others from harm.

5. Stay Informed: Maintaining awareness regarding the latest developments in E2EE and digital security emerges as an invaluable asset in self-protection within the digital realm.

Needless to say, end-to-end encryption has firmly established itself as a linchpin of data security in our progressively digitized world. As we chart the course for its future, the intricate balance between security and access, the primacy of safety from the inception of digital platforms, and the cultivation of transparency within the industry all merit careful contemplation. While E2EE grapples with its own set of challenges, it remains an irreplaceable tool for fortifying our digital lives. With a judicious approach, we can ensure that the benefits conferred by E2EE perpetually outweigh the associated risks, thereby securing our digital future.

Go here to see the original:
Exploring The Evolving Landscape Of End-To-End Encryption - CIOReview

Read More..

Secure Shell (SSH) Protocol: Encryption Over Insecure Networks – EnterpriseNetworkingPlanet

Enterprise Networking Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

Secure Shell (SSH) is a widely used network protocol that enables users to securely access remote servers over unsecured networks. SSH creates a cryptographically secure connection between a server and a client to ensure that subsequent communications are encrypted and have not been tampered with. It is commonly used in various operating systems, such as Linux, Unix, and macOS.

SSH was originally developed in 1995 to replace protocols like Rlogin and Telnet, which came with several security flaws. SSH1 provided users with an encrypted login path to remote systems. It included features like symmetric encryption and enabled port forwarding.

Still, it had numerous security flaws that made it susceptible to cyberattacks. This led to the development of SSH2. The SSH2 protocol, released in 2006 and still in use today, includes additional security measures such as the DiffieHellman key exchange and message authentication codes (MACs).

With SSH, users can safely transfer files, manage network infrastructures, remotely access apps and devices, and execute commands. Thanks to its ability to authenticate and encrypt sessions, SSH provides robust protection against cyberattacks and information theft.

The SSH protocol operates on the client/server architecture model within a network. Communication takes place through shells such as Linux terminal shells. Clients use a form of the following command to connect to remote servers:

To authenticate and approve the process, SSH uses the DiffieHellman key exchange mechanism of public and private keys to access data securely. When a client attempts to connect to a server for the first time, the server will ask the client to prove its identity. The client, in turn, must provide valid credentials to establish its identity. If the client provides incorrect credentials, the authentication is rejected.

The server encrypts a challenge message using the public key and waits for the client to respond. If the client can decrypt the challenge message with the correct private key, it is verified as genuine, and communication between the two is allowed.

It is important to note that the private key is only accessible to the user and should always be kept safe. Exposing the private key can let unauthorized persons access mission-critical systems. Conversely, the public key is used by both the client and the remote server, making it an essential element in the communication process between the two.

Lets say a server wants to access data on your local port that is inaccessible. How do you bypass firewalls and ensure the data is not stolen in transit when it passes through the public internet?

Network tunneling is the process of allowing bi-directional connections between a local port (i.e., the destination port on your own computer) and a remote port via a secure tunnel. SSH tunnels use hashing algorithms and symmetric encryption to encrypt data, thus providing security during data transmission.

To put it simply, SSH tunneling allows you to set up a new connection from your local computer to the remote server through an already-established SSH connection between the client and server. SSH tunneling is preferred by enterprises for its ease of use and its ability to bypass firewalls.

SSH connections are mostly used to:

SSH is generally considered to be one of the most secure encryption methods available today and is currently used on almost half of the worlds servers and nearly every Linux computer.

SSH keys encrypt traffic between the client and server, preventing malicious actors from eavesdropping and decrypting it. However, the proliferation of SSH keys in organizations exposes them to cybercriminals who can take advantage of these unattended and often forgotten SSH keys to gain privileged access to networks. This can result in significant damage to the organization and its stakeholders.

SSH can also be vulnerable to attacks such as brute force attempts to guess passwords or usernames. A significant threat to SSH is hackers exploiting SSH keys to gain root access to the server and install malicious malware. Although unconfirmed, it has been suggested that Edward Snowden successfully exploited SSH keys to breach the National Security Agency (NSA) in 2013.

Implementing multi-factor authentication (MFA), using firewalls, changing default options, deleting untracked/orphan keys, and frequently rotating keys are some ways to secure SSH.

Port 22 is the default port used for SSH protocol. When an SSH client wishes to connect to an SSH server, it sends a request for communication to the server on port 22. After the connection is made, the server and client exchange cryptographic keys, which are used to create a secure and encrypted communication channel between the two.

Although port 22 is the default port, it is possible for SSH to run on different ports. To change the SSH port number, locate the SSH server configuration file and modify the port number to one of your choice.

Telnet is a network protocol that was developed in 1969 and allows users to access remote servers. Over time, SSH has largely replaced Telnet due to its drastically superior security.

Similar to SSH, Transport Layer Security (TLS) and Secure Sockets Layer (SSL) are two cryptographic protocols that provide security for data transmitted over the internet. Like SSH, both protocols encrypt data and authenticate the connection. However, SSL has a significant number of security vulnerabilities and has been deprecated. TLS is now widely used as a replacement for SSL due to its improved security features.

While SSH and TLS share some common features, they differ in the following aspects:

The ssh command is used to securely log into remote systems. The most basic SSH command is ssh user@host, where user is the username/client, and host is the address or server of the remote machine.

Some common SSH commands include:

The cd (change directory) command is used to navigate between directories.

In case the directory structure is nested, then to reach a particular directory one needs to give the full path of the directory. For example:

The above command then takes you to Level2Directory.

The mkdir (make directory) command is used to create a directory. The syntax for an mkdir command is:

The touch command is used for creating a new file. The syntax for the touch command is:

The rm (remove) command is used for deleting or removing a file. The syntax for the remove command is:

The cp command (copy command) is used for copying a file. The syntax for the copy command is:

SSH has successfully replaced older network protocols like rsh, Telnet, and FTP that transferred information in plain text. By using SSH, you can be assured that every single communication between your device and server is secure and encrypted. Therefore, leveraging SSH protocol is an effective approach to protecting network health, particularly in light of continuous cybersecurity threats.

We carefully analyzed and selected the top encryption software to enhance the security of your data in transit and protect your critical communications.

See the rest here:
Secure Shell (SSH) Protocol: Encryption Over Insecure Networks - EnterpriseNetworkingPlanet

Read More..

Fully Homomorphic Encryption: Paving the Way for a Secure … – Korea IT Times

In today's digital era, the prevalence of passwords has become an integral part of our daily lives. Whether it's protecting a physical door lock, accessing financial accounts, or unlocking a smartphone, cryptography plays a pivotal role in safeguarding sensitive information from prying eyes. To ensure the ongoing security of our data, we must advance our cryptographic methods. Enter fully homomorphic encryption (FHE), an innovative cryptographic technology promising unparalleled security, even in the face of quantum computing threats.

Recent developments from the Electronics and Telecommunications Research Institute (ETRI) have introduced a high-speed computation technology for fully homomorphic encryption (FHE), often lauded as the next frontier in cryptographic innovation. In an age where data privacy takes center stage, let's explore how FHE is reshaping the landscape for a more secure future.

Fully Homomorphic Encryption represents a departure from traditional cryptographic methods. It's a technology that allows operations to be performed on data while it's in an encrypted state, without requiring decryption. At its core, FHE relies on a complex problem known as Ring-Learning with Error (R-LWE), which is exceptionally challenging to solve. This technology garners attention as a next-generation encryption solution because it incorporates operations that are resistant to hacking, even in the face of quantum computers.

Traditional cryptography necessitates decryption to work with ciphertexts and process data. Decryption is the process of converting encrypted data into human-readable information. Fully homomorphic encryption, on the other hand, can manipulate data while it's still in a ciphertext state, eliminating the need for decryption. This distinction extends beyond the capabilities of conventional cryptographic techniques.

Unlocking the Potential of Data Processing

Data processing involves conducting operations on data to derive meaningful insights. Picture merging, rearranging, and processing data elements such as gender, medical history, and credit information to generate statistical insights. This encompasses sensitive data that should remain confidential.

In the past, pseudonyms were used to anonymize data for statistical purposes, safeguarding the identity of individuals. However, this approach has limitations and may compromise the quality of the original data.Fully Homomorphic Encryption allows relatively accurate statistical computations on ciphertext data without exposing sensitive information.

The Inner Workings of the Fully Homomorphic Encryption Accelerator Chip

Fully homomorphic encryption supports computations between ciphertexts, which are represented as high-order polynomials with significant coefficients. Conducting operations between ciphertexts involves complex arithmetic operations on these high-order polynomials.

The fully Homomorphic Encryption accelerator chip is built with logic designed to execute these arithmetic operations efficiently. This chip possesses hardware logic characteristics. After creating modules capable of high-speed calculations, multiple modules can be integrated into the chip. One chip can swiftly process multiple ciphertexts simultaneously.

Calculating the four-pronged operations on high-order polynomials is a highly demanding task that conventional processors like CPUs and GPUs are ill-suited for due to their limited word size of 64 bits. In contrast, the fully Homomorphic Encryption accelerator chip is optimized for large coefficients and high-order polynomials in the ciphertext realm, ensuring high-speed computations.

Applications of the Fully Homomorphic Encryption Accelerator Chip

This technology can be applied to data that derives value from processing and analyzing personal or sensitive information. Additionally, it can be employed to maintain privacy in artificial intelligence operations. It will find use in various domains that require secure arithmetic and artificial intelligence computations, acting as a cryptographic shield against attempts to breach security using quantum computers.

Especially in sectors dealing with sensitive data, such as defense, public services, and healthcare, this technology will take precedence. In defense, the ability to exchange robust passwords during wartime, even in insecure network conditions, ensures data security. It can be effectively deployed in the public cloud and the medical field to encrypt and securely analyze sensitive data, including residential rescue data, health insurance data, and healthcare data.

Recruiting experts proficient in fully homomorphic encryption algorithms has proven challenging, exacerbated by the scarcity of individuals with expertise in both fully homomorphic encryption and semiconductor chip design. To address this issue, ongoing efforts focus on enhancing understanding through technical seminars and fostering collaboration between semiconductor chip design experts and algorithm specialists.

Is Fully Homomorphic Encryption the Ultimate Solution?

Fully homomorphic encryption is firmly rooted in complex mathematical problems, making it exceptionally resilient to hacking, even in the face of quantum computers. To date, no vulnerabilities in its security have been reported, rendering it a secure solution. However, no technology is infallible, and continuous development and security assessments remain crucial.

Defense Advanced Research Projects Agency (DARPA) is actively involved in securing this technology and ETRI's research. Beyond algorithmic research, the importance of developing practical technologies cannot be overstated. The goal is to secure and ultimately commercialize practical technologies, such as chips, accelerators, and cloud-based solutions using fully homomorphic encryption. Sustained research funding will undoubtedly help achieve even more significant milestones.

Korea IT Times

Read the original here:
Fully Homomorphic Encryption: Paving the Way for a Secure ... - Korea IT Times

Read More..

The Shapeshifting Crypto Wars – Lawfare

By some counts, the Crypto Wars have been going on for a half century. Starting in the 1970s with claims that publication of cryptographic research would endanger national security, and continuing over whether the National Security Agency (NSA) should control the development of cryptographic standards for non-national security agencies, the Crypto Wars then focused on export control. In effect, this determined whether U.S. products with strong cryptography would be exportedand thus whether there would be strong cryptography available within the U.S.

When the European Union and the United States loosened cryptographic export controls at the turn of the millennium, it looked as if the technologistswho had fought for thishad won. By the end of the 2000s, major manufacturers began encrypting data on consumer devices, including phones, and, shortly afterward, in communications. The latter involved end-to-end encryption (E2EE), a method of securing communications so that only the message endpoints (the sender and receiver of the message) can view the unencrypted message.

But law enforcement has always taken issue with encryption, including E2EE, being widely publicly available. In 1995, FBI Director Louis Freeh told Congress that [d]rug cartels, terrorists, and kidnappers will use telephones and other communications media with impunity. As the years passed, wiretapping experienced function creep, the phenomenon in which the uses for a particular surveillance technology expand continually.

By the 2000s, the FBI argued that law enforcement was increasingly Going Dark, unable to conduct investigations because of encryption and lack of access to communications and data. In the 1990s, the bad guys were organized crime, drug dealers, and kidnappers, while in the 2000s, they were predators who exploit the most vulnerable among us[,] ... violent criminals who target our communities[,] ... a terrorist cell using social media to recruit, plan, and execute an attack. Now, in what appears to be a cynical ploy by law enforcement officials across the globe, the newest fight against E2EE is being waged on the basis of the need to prevent the internet-enabled spread of child sexual abuse material (CSAM).

Understanding CSAE

Child sexual abuse and exploitation (CSAE), which includes online child sexual trafficking and video streaming sexual abuse, is a serious problem. The internet has enabled sharing of CSAM, sexual trafficking of children, and video streaming of real-time sexual abuse of children. Some of these horrific activities appear to have greatly increased in recent yearsalthough some of that increase may be due to better reporting. To have a clear-headedas opposed to a highly emotionaldiscussion of the issues, it is critical to get at the facts. That is the purpose of this piece.

Ill start with a reprise of the CSAE situation and the technologies used to detect and investigate the associated crimes. Next Ill discuss E2EE and securing todays online world. To clarify the conflict between investigating online CSAE and ensuring the wide availability of E2EE, Ill examine the recent spate of bills in the U.K., EU, and U.S. aimed at tackling online CSAE, including the recently enacted U.K. Online Safety Act. In order to tell a complete story, some of this is a reprise of articles Ive written in the past.

The U.S. National Center for Missing and Exploited Children (NCMEC) is a federally funded clearinghouse for information on missing and sexually abused children. The organization collects and shares evidence of CSAE with authorized parties; it is one of the worlds leading providers of information on online occurrences of CSAE. In existence since 1984, NCMEC has seen online reporting of CSAE cases grow explosively. The organization received 29 million reports of online sexual exploitation in 2021, a 10-fold increase over a decade earlier. Meanwhile the number of video files reported to NCMEC increased over 40 percent between 2020 and 2021.

Understanding the meaning of the NCMEC numbers requires careful examination. Facebook found that over 90 percent of the reports the company filed with NCMEC in October and November 2021 were the same as or visually similar to previously reported content. Half of the reports were based on just six videos. That the reports involved far fewer than 29 million different instances of child sexual exploitation does not make the CSAE problem go away. Each occurrence of a photo or video showing a child being sexually abused, even if it is a previous one shared hundreds of thousands of times, is harmful, for such showing increases the chance that an abused person will be recognized as having been the subject of CSAE.

To understand how to prevent CSAE and interdict its perpetrators, we need to examine what CSAE really is. In 2022, Laura Draper provided an excellent report that laid this out while also examining how CSAE might be investigated even in the face of E2EE.

Draper observed that CSAE consists of four types of activities exacerbated by internet access: (a) CSAM, which is the sharing of photos or videos of child sexual abuse imagery; (b) perceived first-person (PFP) material, which is nude imagery taken by children of themselves and then shared, often much more widely than the child intended; (c) internet-enabled child sex trafficking; and (d) live online sexual abuse of children. One of Drapers points was that interventions to prevent the crime and to investigate it vary by the type of activity.

Consider the sharing of CSAM photos and videos. In a study Facebook conducted in 2020-2021, the company evaluated 150 accounts that the company reported to NCMEC for having uploaded CSAE content. Researchers found that more than 75 percent of those sharing CSAM did not do so with ... intent to hurt the child. Instead, they were sharing the images either out of anger that the images existed or because of finding the images humorous. Two of Drapers suggestionssimplified methods for CSAM reporting and alerting users that sharing CSAM images carries serious legal consequencesseem likely to reduce that particular type of spread.

Other types of interventions would work for other types of cases of CSAE. For example, in PFP sharing of nude images, the child herselfthe vast preponderance of those doing PFP are femaleis not committing a crime. They also may not see a problem with sharing a nude photo of themselves. In 2021 Thorn, an international organization devoted to preventing child sexual abuse, reported that 34 percent of U.S. teens aged 13 to 17 saw such sharing as normal and that this was also true for 14 percent of children between ages 9 and 12. Draper pointed out that by empowering a child to report an overshared photo, law enforcement investigators would have a head start on investigating and thwarting this and related crimes.

Or consider the particularly horrific crime in which there is live streaming of a child being sexually abused according to requests made by a customer. The actual act of abuse often occurs abroad. In such cases, aspects of the case can be investigated even in the presence of E2EE. First, the video stream is high bandwidth from the abuser to the customer but very low bandwidth the other way, with only an occasional verbal or written request. Such traffic stands out from normal communications; it looks neither like a usual video communication nor a showing of a film. And the fact that the trafficker must publicly advertise for customers provides law enforcement another route for investigation. But investigations are also often stymied by the in-country abuser being a family member or friend, making the child reluctant to speak to the police (this is also the case for so-called child sex tourism, in which people travel with the intent of engaging in sexual activity with children).

The point is that each of these types of cases is investigated with quite different techniques. I will stop here; for a thorough discussion of the prevention and investigation of CSAE crimes, read Drapers report (or see my summary in Lawfare).

End-to-end encryption hides communications content from everyone but the sender and recipient, and its use can complicate CSAE investigations. But as we have seen, by digging deeper into the different kinds of crimes that constitute CSAE, one finds that there are successful prevention and investigative techniques that do not involve breaking encryption. Thus, while it is easy to blame encryption for the CSAE problem, E2EE technology is not the root of the child sexual abuse problem. As Jim Baker, former FBI general counsel, wrote in 2019,

The Benefits of E2EE

Its time to look at the other side of the coin, namely the protections that E2EE affords society.

E2EE provides confidentiality to online communications. Although EE2E is important for privacy, its uses are much broader than that. Wide availability of encryption tools is extremely important for providing personal, business, and national security. However, to be useful, encryption tools have to be not only widely available but also easy to use. The ubiquity of E2EE in applications such as WhatsApp, iMessage (though this is only for iPhone-to-iPhone messaging), and Signal makes it simple to deploy. Thus, over the past decade as these tools have become increasingly available, more and more people have used E2EE. This includes congressional use. In 2017, the Senate sergeant at arms approved the use of Signal by Senate staff.

Good public policy decision-making requires weighing competing interests. In 2019, the Carnegie Endowment for International Peace published the results of an encryption study. Study members included several people who had held senior government posts in law enforcement and national security, academics, and representatives from civil society and industry interests (disclosure: I was a participant). In our report, we noted, Security in the context of the encryption debate consists of multiple aspects including national security, public safety, cybersecurity and privacy, and security from hostile or oppressive state actors. The key is determining how to weigh competing security interests."

Many national security leaders strongly agree with the move to broader availability of E2EE. In 2015, former NSA Director Mike McConnell, former Department of Homeland Security Secretary Michael Chertoff, and former Deputy Defense Secretary William Lynn wrote in the Washington Post that the greater public good is a secure communications infrastructure protected by ubiquitous encryption at the device, server and enterprise level without building in means for government monitoring. In 2016, former NSA and CIA Director Michael Hayden told an interviewer that we are probably better served by not punching any holes into a strong encryption systemeven well-guarded ones. That same year, Robert Hannigan, the former head of the U.K.s General Communications Headquarters, the U.K.s signals intelligence agency, argued for keeping encryption strong: I am not in favour of banning encryption. Nor am I [] asking for mandatory back doors.

Such arguments are part of the reason behind the change in cryptographic export controls in 1999 and 2000. Its why encryption controls did not return in the face of terrorist attacks such as in Paris and San Bernardino. In 2015, the Obama administration opted not to pursue a legislative solution to the encryption problem of locked devices. The decided lack of public statements by the U.S. national security establishment in support of law enforcements stance on encryption is also notable.

The argument for ending E2EE to prevent CSAE fails to respect that balance needed in weighing competing public interests. Curbing the use of E2EE to prevent CSAE would be like prohibiting the use of airbags because their deployment can injure short people. The action may help protect those shorter in stature but only at the higher societal cost of failing to prevent far more injuries of a more serious nature.

Yet despite the strong support of the national security community and economic arguments for wide public availability of E2EE, in the name of seeking to reduce the online spread of CSAE, some legislators are strongly pressing to stop the use of E2EEbut doing so in a way that disguises some of the consequences of proposed legislation.

Deficient Legislative Efforts

Several current bills in the EU and U.S. appear to permit the use of E2EE. Carefully interpreting the language shows this to be otherwise. Ill start by looking at the recently enacted U.K. law.

The U.K. Online Safety Act has many parts. The part that affects encryption requires that all UK provider[s] of a regulated user-to-user service must operate the service using systems and processes which secure (so far as possible) that the provider reports all detected and unreported CSEA [Child Sexual Exploitation and Abuse] content present in the service ( 67 (1)). (All non-U.K. providers of regulated services must do the same for any U.K.-linked CSEA content.) Providers must secure their services using an accredited technology ( 122(2)(iii) and (iv)). This technical accreditation will be done by Ofcom, the U.K. communications regulator and rough equivalent of the U.S. Federal Communications Commission.

Heres where legislative wishes conflict with scientific reality.

In November 2022, Ofcom published a report detailing the complexities of developing a CSAE-recognizing technology that has a reasonable accuracy standard. As I explain in the next few paragraphs, there is currently no known technology that can do what the new law requires.

Ofcom started by discussing the current technology of choice for recognizing known CSAE: perceptual hashing. This is a technique that assigns a file, such as a piece of music or a visual image, a string of bits; two files are tagged as similar if their perceptual hashes differ in relatively few places. The perceptual hash is calculated by first breaking the file into many small pieces and then a hash function is calculated on each of the bits. For example, this function might be based on how light or dark the image in that small piece is, with 00 being white, 01, light gray, 10, dark gray, and 11 being black. The perceptual hash is an ordered linking together of these. This method enables image recognition even if an image is changed slightly (e.g., through resizing or graying of the image). Systems in useMicrosofts PhotoDNA, YouTubes CSAI Match, Apples NeuralHash, Metas PDQ and TMK-PDQall use perceptual hashing to recognize known CSAM (both photos and videos).

But a problem arises with this solution. Software for image editing can manipulate an image so that it looks much the same to a human but has a quite different perceptual hash. Such manipulations would lead to a false negative for a CSAE image. False positivesimages that look nothing alike but have very similar or even the same perceptual hashesare also possible. This leaves an opening for mischief, and worse. It is unfortunately too easy to arrange for, say, a candidate for elective office, to receive a photo that looks innocuous, store it, and only later learn that the photo triggered a law enforcement alert because its perceptual hash was the same as that of known CSAM. Damage would be high and may not go away (recall Pizzagate).

Would such an attack be feasible? Yes. Shortly after a researcher published the code used in Apples NeuralHash, an Intel researcher produced a hash collision: two images that look nothing alike but have the same perceptual hashes. Such capabilities are present for researchersand others, especially those with an incentive to cause problems. As computer scientists Carmela Troncoso and Bart Preneel observed, In the arms race to develop such detection technologies, the bad guys will win: scientists have repeatedly shown that it is easy to evade detection and frame innocent citizens."

Other proposed techniques to recognize CSAE, including previously unknown examples, include machine learning. But as my co-authors and I discussed in Bugs in our Pockets, false positives and false negatives are a problem here too.

The impact of false positives can be grueling on those accused. While for some types of criminal investigations, once the person is cleared, the taint may go away, that is often not the case for accusations of CSAE. Such accusations come with realand often permanentcosts for the innocent people who have been accused. Their families may feel the effects as well.

The frequency of false positives in practice is difficult to know because of the problems of studying the CSAE issue. It is illegal to store CSAE material, making studies on CSAE activity hard to come by. However, data from the Irish Council for Civil Liberties (ICCL) sheds some light on the issue. Responding to an information request from ICCL, the Irish police reported that NCMEC had provided 4,192 referrals in 2020. Of these, 409 of the cases were actionable and 265 cases were completed. Another 471 referrals were Not Child Abuse Material. The Irish police nonetheless stored (1) suspect email address, (2) suspect screen name, [and] (3) suspect IP address. Now 471 people have police records because a computer program incorrectly flagged them as having CSAM.

With that background in place, let us return to Ofcoms response to the Online Safety Act. In its 2022 report on the feasibility of using current technology for finding CSAE, Ofcom reported that [r]esearch has demonstrated that applications of perceptual hashing can be limited due to several inherent properties, such as non-negligible inaccuracy (i.e. false positives and false negatives). Then, when the British Parliament was debating the passage of the Online Safety Act, the junior minister for arts and heritage stated that the government would only require companies to scan their networks when a technology was developed that was capable of doing so. As Ofcom had already stated, perceptual hashing, the primary method for identifying CSAE, was inadequate due to its inherent properties. In other words, the legislature could ignore the objections of the technologists that E2EE was incompatible with the acts reporting requirements because Ofcom would not put forth an accredited technology. Such technology did not exist.

There is plenty of wiggle room in the phrase capable of doing so. In recent years, we have seen many governments, including well-respected democracies, ignore scientific reality in climate change, coronavirus protections, and other issues to score political points. But to pass a law requiring the use of a technology that doesnt existand that many believe cannot be developedis duplicitous and dangerous.

In the case of the U.K. law, this wiggle room could result in a choice by startups to implement a less secure form of encryption than E2EE out of a concern that the government might later require them to replace the E2EE protections. Thus, the result of the Online Safety Act could well leave U.K. residents less safe, not more so.

Meanwhile, both the EU and U.S. are pressing forward with legislation that, much like the Online Safety Act, is willing to sacrifice E2EE in the name of child safety. None of these bills explicitly prohibits E2EE. Instead, they present requirements effectively preventing the technologys use without explicitly saying so.

The EU proposal requires that if any hosting service or provider becomes aware of any information indicating potential online child sexual abuse on its services, they must report it or face legal consequences. The word potential is key. How does a provider become aware of CSAE on its site unless it scans all the material on its siteand that material is unencrypted?

The U.S. Congress has two bills under discussion that would also eliminate E2EE : Stop CSAM Act and the EARN IT Act.

The Stop CSAM Act allows platforms to be held liable for intentional, knowing, or reckless promotion or facilitation of CSAE. With the use of E2EE technology, knowing whether CSAE is on the site is not necessarily possible. Thus, this bill effectively prohibits the use of E2EE.

The same is the case for the EARN IT Act. Here the bill appears to support Section 230, which largely provides immunity to internet services for the third-party content they host. But theres a catch: The bill would remove liability protections for any CSAE on the site. But providers can know if there is CSAE material on the site only if they scan the sites content. Putting it more bluntly: no E2EE-protected material on internet sites.

The bills proponents state that technologies will be developed to satisfy the requirements, technologies that can function even with E2EE in place. But as Ive already discussed, there are not any such technologies at present. And most computer security researchers doubt such technology can be developed. This is a situation of putting out a legislative cart that requires the existence of a unicorn to pull it.

This is not the first time policymakers have pushed technical mandates prior to there being an effective working solution. An example of this is the 1994 Clipper Chip initiative for escrowed encryption with keys stored with agencies of the U.S. government. There were strong political objections to the proposal, but there were also serious concerns about security and technical viability. A 1996 National Academies of Sciences study on cryptography policy noted that prior to requiring any form of escrowed encryption, it was essential to obtain operational experience with a large-scale infrastructure to do this. In other words, first show that there is a technology that works in practice, then legislate. The U.K. lawand the EU and U.S. proposalshave this backward.

The Path Forward

The findings from the Carnegie study on encryption policy provide guidance for governments to move forward on the problems E2EE poses to CSAE investigations. In spite of differences in the committee on the issue of E2EE encryption and locked devices, we found much common ground:

The last two points echo the issue raised by the 1996 National Academies study about first determining that there is a technology that can effectively do what the policy seeks, then legislating. Its a point ignored by the U.K. in passing the Online Safety Act as well as both the EU and the U.S. Congress in debating such bills now. In the name of child safety, these bills would eviscerate end-to-end encryption and thus weaken public safety.

I would like to end this tour of the current E2EE and CSAE situation with a discussion of the principled approach that Apple has taken on the issue. Its a strong standand one that holds true to science and privacy.

In the past, Apple has led the industry on securing devices and encrypting communications. Apple urged the U.K. government to amend the Online Safety bill to protect E2EE. Apple also indicated it might remove its encrypted communications products iMessage and FaceTime from the U.K. if the Online Safety bill passed. Signal, an app that provides E2EE for phone, email, and text, has announced a similar intention. (The lack of a current U.K. plan to require technological changes for 67(1) means that even though the Online Safety Act is now law, Apple and Signal are not making changes at this time.)

The stance was an interesting change for Apple. In 2021, the company had developed two systems to combat CSAE. Their client-side scanning systems, which work on iPhones, would use perceptual hashing and machine learning technologies to prevent CSAE. One system would scan iMessages for nude images being sent to or from children on Family Sharing plans, while the second would check photos being uploaded to the iCloud for CSAM. If a child under 13 nonetheless chose to receive or send such a photo after being warned of its content, Apples 2021 plan involved notifying the parents of the childs action. Public concern by civil liberties organizations, privacy advocates, and computer scientists caused Apple to pause on implementing these two projects in the fall of 2021. In December 2022, the company abandoned them.

Apple has now taken a public stance on this. Scanning every users privately stored iCloud data would create new threat vectors for data thieves to find and exploit, said Apples director of user privacy and child safety, Erik Neuenschwander. He explained that the scanning technology was not practically possible to implement without ultimately imperiling the security and privacy of our users. Neuenschwander elaborated, It would also inject the potential for a slippery slope of unintended consequences. Scanning for one type of content, for instance, opens the door for bulk surveillance and could create a desire to search other encrypted messaging systems across content types.

Apple has it exactly right. As I and some of my colleagues have written, LGBQT children often question their sexuality before they discuss it with their parents (some never do, in fact, due to issues of safety at home). Outing them, which the Apple technology would have done, would have imperiled them, not made them safer. And having a childs phone report their activities to their parents would instill the notion that online surveillance is acceptablesurely not a lesson we want to teach children.

The fact that an Apple-like system can be repurposed for such censorship and surveillance made the Apple 2021 product effort even more problematic. The EU has documented instances in which spyware has been used to destroy media freedom and freedom of expression in Hungary and to silence government critics in Poland. Client-side scanning technologies could also be used for such purposes. In publicly backing away from client-side scanning to a privacy-protective product regime, Apple took a strong and highly principled stance that protected peoples privacy and securityand, in so doing, societys.

Think differently. Think long term. Think about protecting the privacy and security of all members of societychildren and adults alike. By failing to consider the big picture, the U.K. Online Safety Act has taken a dangerous, short-term approach to a complex societal problem. The EU and U.S. have the chance to avoid the U.K.s folly; they should do so. The EU proposal and the U.S. bills are not sensible ways to approach the public policy concerns of online abetting of CSAE. Nor are these reasonable approaches in view of the cyber threats our society faces. The bills should be abandoned, and we should pursue other ways of protecting both children and adults.

Go here to read the rest:
The Shapeshifting Crypto Wars - Lawfare

Read More..

Email Encryption Market worth $16.3 billion by 2028 – Exclusive … – PR Newswire

CHICAGO, Oct. 9, 2023 /PRNewswire/ -- The future of email encryption is probably going to include end-to-end encryption becoming more popular, quantum-safe encryption to combat new threats, enhanced usability and integration with email clients, standardised protocols, and compliance with changing laws. Email security will also be significantly improved by advanced authentication techniques, AI-driven security, and user education.

The global Email Encryption Marketsize is projected to grow from USD 6.2 billion in 2023 to USD 16.3 billion by 2028 at a CAGR of 21.3% during the forecast period, according to a new report by MarketsandMarkets. The Email Encryption market experienced substantial growth due to a surge in Email data breaches, an increase in BEC frauds and spear-phishing incidents, a rise in stringent government regulations and data privacy compliance, and advancements in encryption technology.

Browse in-depth TOC on "Email Encryption Market"

291 - Tables 49 - Figures297 - Pages

Download PDF Brochure @ https://www.marketsandmarkets.com/pdfdownloadNew.asp?id=182623205

Scope of the Report

Report Metrics

Details

Market size available for years

- 2017-2028

Base year considered

- 2022

Forecast period

- 20232028

Forecast units

- Value (USD Million/Billion)

Segments Covered

- Offering, Deployment, Verticals, and Regions

Geographies covered

- North America, Europe, Asia Pacific, Middle East and Africa, and Latin America

Companies covered

- Major vendors in the global Email Encryption market include Fortinet (US), BAE Systems (UK), Mimecast (UK), Cisco (US), Proofpoint (US), Zoho (India), Broadcom (US), OpenText (Canada), Barracuda Networks (US), Thales (France), HPE (US), Entrust (US), Fortra (US), Sophos (UK), Trend Micro (Japan), Seclore (US), Egress Software (UK), Echoworx (Canada), LuxSci (US), Neocertified (US), SSH Communication (Finland), Retarus (Germany), Paubox (US), PreVeil (US), Sealit Technologies (UK), SendSafely (US), and Zivver (Netherlands).

By vertical segment, the healthcare vertical will grow at the highest CAGR during the forecasted period.

The healthcare vertical is anticipated to have the highest CAGR in the Email Encryption market, primarily driven by stringent regulatory compliance demands worldwide, particularly concerning patient data protection. In many countries, such as the US, with the Health Insurance Portability and Accountability Act (HIPAA), healthcare institutions are mandated to safeguard patient health information, especially when transmitted via Email. Additionally, as cyber threats aimed at health data escalate, especially given its substantial value on the black market, healthcare institutions are progressively channeling resources into sophisticated encryption tools. They aim to bolster the security of Email communications, minimize the risk of data breaches, and sidestep significant regulatory penalties. This heightened concern for safety and regulatory imperatives propels the rapid growth in Email Encryption within the healthcare domain.

Request Sample Pages @ https://www.marketsandmarkets.com/requestsampleNew.asp?id=182623205

By deployment, the on-premises holds the largest market size during the forecast period.

The on-premises deployment mode is anticipated to dominate the Email Encryption market during the forecasted period primarily due to the enhanced control and customization it offers organizations. Direct oversight over their Encryption infrastructure allows entities to tailor solutions to specific needs and ensures seamless integration with existing systems. Furthermore, on-premises solutions address data sovereignty and compliance concerns by keeping data within an organization's infrastructure, which is especially pertinent for sectors with stringent data residency regulations. These factors propel the on-premises deployment mode in the Email Encryption market to have the largest market size.

By region, the Asia Pacific market is to grow at the highest CAGR during the forecast period.

The Asia Pacific region, encompassing well-established economies like China, Japan, Australia, and New Zealand and emerging players like India and Singapore, is poised for the most significant CAGR during the anticipated period. This is due to its rapid digital transformation, especially in countries like India, China, and Southeast Asian nations. This transformation amplifies the volume of online communications, necessitating advanced Email Encryption solutions. Additionally, the robust growth of emerging economies in this region has led to the expansion of IT infrastructure and increased business activities, all heightening the demand for Email Encryption. Coupled with this is a rising awareness and understanding of cybersecurity prompted by the region's escalating cyberattacks and data breaches.

Top Key Companies in Email Encryption Market:

Fortinet (US), BAE Systems (UK), Mimecast (UK), Cisco (US), Proofpoint (US), Zoho (India), Broadcom (US), OpenText (Canada), Barracuda Networks (US), Thales (France), HPE (US), Entrust (US), Fortra (US), Sophos (UK), Trend Micro (Japan), Seclore (US), Egress Software (UK), Echoworx (Canada), LuxSci (US), Neocertified (US), SSH Communication (Finland), Retarus (Germany), Paubox (US), PreVeil (US), Sealit Technologies (UK), SendSafely (US), and Zivver (Netherlands) are the key players and other players in the Email Encryption market.

Recent Developments

Inquire Before Buying @ https://www.marketsandmarkets.com/Enquiry_Before_BuyingNew.asp?id=182623205

Email Encryption Market Advantages

Report Objectives

To define, describe, and forecast the Email Encryption market based on offering, deployment, verticals, and regions:

Browse Adjacent Market: Information Security Market ResearchReports & Consulting

Browse Other Reports:

Data Center Transformation Market- Global Forecast to 2028

Metaverse Market- Global Forecast to 2030

AR VR Software Market- Global Forecast to 2028

Finance Cloud Market- Global Forecast to 2028

Digital Payment Market- Global Forecast to 2028

About MarketsandMarkets

MarketsandMarkets has been recognized as one of America's best management consulting firms by Forbes, as per their recent report.

MarketsandMarkets is a blue ocean alternative in growth consulting and program management, leveraging a man-machine offering to drive supernormal growth for progressive organizations in the B2B space. We have the widest lens on emerging technologies, making us proficient in co-creating supernormal growth for clients.

Earlier this year, we made a formal transformation into one of America's best management consulting firms as per a survey conducted by Forbes.

The B2B economy is witnessing the emergence of $25 trillion of new revenue streams that are substituting existing revenue streams in this decade alone. We work with clients on growth programs, helping them monetize this $25 trillion opportunity through our service lines - TAM Expansion, Go-to-Market (GTM) Strategy to Execution, Market Share Gain, Account Enablement, and Thought Leadership Marketing.

Built on the 'GIVE Growth' principle, we work with several Forbes Global 2000 B2B companies - helping them stay relevant in a disruptive ecosystem. Our insights and strategies are molded by our industry experts, cutting-edge AI-powered Market Intelligence Cloud, and years of research. The KnowledgeStore (our Market Intelligence Cloud) integrates our research, facilitates an analysis of interconnections through a set of applications, helping clients look at the entire ecosystem and understand the revenue shifts happening in their industry.

To find out more, visit http://www.MarketsandMarkets.com or follow us on Twitter, LinkedIn and Facebook.

Contact:Mr. Aashish MehraMarketsandMarkets INC.630 Dundee RoadSuite 430Northbrook, IL 60062USA: +1-888-600-6441Email: [emailprotected]Research Insight: https://www.marketsandmarkets.com/ResearchInsight/email-encryption-market.aspVisit Our Website: https://www.marketsandmarkets.com/Content Source: https://www.marketsandmarkets.com/PressReleases/email-encryption.asp

Logo: https://mma.prnewswire.com/media/660509/MarketsandMarkets_Logo.jpg

SOURCE MarketsandMarkets

Read more:
Email Encryption Market worth $16.3 billion by 2028 - Exclusive ... - PR Newswire

Read More..

Hybrid cloud security: Balancing accessibility and encryption – The Financial Express

By Mohammed Imran KR

What Is a Hybrid Cloud?

A hybrid cloud is a way of using different types of cloud computing environments together, usually combining a public cloud and a private cloud or local infrastructure. This allows businesses to take advantage of the benefits of both public and private clouds by sharing data and applications between them.

Hybrid clouds allows businesses to choose where to place workloads and data based on compliance, audit, policy, or security requirements. While the various environments that make up a hybrid cloud remain unique and separate entities, migrating between them is facilitated by containers or encrypted application programming interfaces (APIs) that help transmit resources and workloads. This separateyet connectedarchitecture is what allows enterprises to divide their workloads between private cloud, which they directly control, and public cloud, offered by CSPs such as E2E Cloud, depending on their policies.

In the era of Generative AI, this is becoming even more important as a strategy, where companies are looking to divide their AI stack in a way that it can be deployed across both private and GPU cloud setups, to maximize the scalability of AI inference.

The many benefits of a hybrid cloud include:

Hybrid cloud allows businesses to flexibly allocate workloads and applications between public and private cloud environments depending on their needs. Generative AI workloads, for instance, can be split between private setup, during development, and public cloud during large scale model training.

By using the hybrid cloud, which mixes workloads between private and public clouds, businesses have the capability to scale their computing resources up or down as required without having to worry about infrastructure constraints.

Hybrid cloud allows businesses to save money by leveraging the cost-effectiveness of public cloud resources for non-sensitive data and workloads while still maintaining control over sensitive data and applications on private cloud or on-premises infrastructure.

Hybrid cloud enables businesses to implement stronger security measures and control over highly sensitive data, as they can keep it within their private cloud or on-premises infrastructure.

By using the newest technology and services provided by public cloud vendors while keeping sensitive data under their control, businesses can use hybrid cloud to innovate and create new products and services more rapidly and effectively.

While the hybrid cloud offers many benefits, it also presents certain security risks that businesses need to be aware of. These risks include:

Data Breaches: When sensitive data is shared between public and private cloud environments, it increases the risk of data breaches and unauthorized access.

Insider Threats: In a hybrid cloud setup, insider threats can pose a significant security risk. This is because employees with access to both public and private cloud environments may misuse their privileges and compromise the entire systems security.

Compliance Issues: When sensitive data is stored and processed across multiple cloud environments, ensuring compliance with industry and government regulations can take time and effort. It is critical to ensure that following a hybrid cloud setup doesnt violate the countrys IT laws, something that we guide our customers on regularly.

Interoperability Challenges: Cloud environments may have different security protocols and standards, making it difficult to assure consistent security across the hybrid cloud environment.

Network Vulnerabilities: Communication between public and private cloud environments can create vulnerabilities in the network, making it easier for cybercriminals to access sensitive data and applications.

Security in the Supply Chain: Hybrid cloud environments often include products and software from multiple vendors in a complicated ecosystem. Knowing how your vendors test and manage their software and products is important.

Securing a hybrid cloud environment requires a comprehensive and layered approach with multiple security measures. Some key steps businesses can take to secure their hybrid cloud environment include:

Identifying and Classifying Data: Determine which data is sensitive and requires additional security measures to protect it. Classify the data based on its level of sensitivity and ensure that appropriate security measures are in place to protect it.

Using Strong Authentication and Access Controls: It is important to use strong authentication protocols like Multi-Factor Authentication (MFA) and access controls like Role-based Access Control (RBAC) to make sure only authorized users can access sensitive data and applications.

Encrypting Data: It is crucial to encrypt sensitive data when it is in transit and at rest to prevent unauthorized access. Strong encryption algorithms should be used, and encryption keys should be securely stored. In the future, we will potentially see increasing use of Confidential Computing to protect data even when it is being processed.

Implementing Network Security: Use firewalls, VPNs, and other security measures to ensure secure communication between public and private cloud environments. Ensure that all communication between the two environments is encrypted and authenticated.

Monitoring and Logging Activities: Monitor and log all activities within the hybrid cloud environment to detect and respond to security incidents. Security Information and Event Management tools can be used to monitor logs to keep track of activities in all cloud environments and on-premises infrastructure.

Conducting Regular Vulnerability Assessments: Identify vulnerabilities within the hybrid cloud environment and address them promptly. It is important to conduct regular vulnerability assessments and penetration testing on the security architecture to find potential security vulnerabilities and fix them in advance.

Ensuring Compliance with Regulations: Ensure that the hybrid cloud environment complies with industry and government regulations. Establish security policies and procedures that are aligned with regulatory requirements, and ensure that all cloud providers involved in the hybrid cloud environment comply with these regulations.

Developing and Testing Disaster Recovery and Business Continuity Plans: Develop and test disaster recovery and business continuity plans to ensure the hybrid cloud environment can recover from potential disasters or disruptions. Test the procedures regularly to ensure that they are practical and up-to-date.

Although the hybrid cloud offers many benefits, it also presents security challenges that must be addressed. However, organizations can mitigate these risks by implementing a comprehensive and planned hybrid cloud security strategy. By doing so, they can protect their hybrid cloud environments, reduce the likelihood of cyberattacks and ensure they adhere to IT laws and regulatory compliances.

The author is CTO, E2E Networks Ltd

Follow us onTwitter,Facebook,LinkedIn

Go here to read the rest:
Hybrid cloud security: Balancing accessibility and encryption - The Financial Express

Read More..

Kryotech Ltd., an Industry Leader in Encrypted Application Development, Announces Next-Gen Cryptocurrency Wallet, VOX Crypto, in Partnership with…

The New State-of-the-Art Wallet Offers a Safe and Regulated Way to Store and Manage Digital Assets, as Well as Buy, Transfer and/or SellCrypto to Multiple Recipients for a Single Gas Fee.

LONDON, Oct. 11, 2023 /PRNewswire/ --In a monumental stride towards revolutionizing the cryptocurrency landscape, Kryotech Ltd., a pioneer in encrypted applications, has announced its collaboration with Transak and WalletGuard to unveil Vox Crypto. The safe, secure and regulated CryptoWallet is set to redefine how users send, receive, and manage cryptocurrencies.

Vox Crypto's unique value proposition lies in its regulatory compliance, guaranteeing users a safe and secure way to store and manage their digital assets. Taking this commitment to security and compliance a step further, Kryotech Ltd. is in the process of registering with the Financial Conduct Authority (FCA). This positions Vox Crypto as the only crypto-wallet in the space with financial regulation, reinforcing its promise of safety and trustworthiness.

"The volatile nature of the cryptocurrency market has left many investors anxious about the safety and security of their digital assets," said Vox Crypto Founder JB Benjamin. "While many crypto wallets claim to be secure, they often lack regulatory oversight, leaving users vulnerable to potential threats. Vox Crypto provides a solution by offering a safe and regulated way to store and manage digital assets, as well buy, transfer and/or sell crypto to multiple recipients for a single gas (transaction) fee using our optimized smart-contract."

Vox Crypto also offers seamless on-ramping and off-ramping capabilities. Users can easily integrate their debit/credit cards or bank accounts via Transak, ensuring a smooth transition between fiat and crypto. The partnership with WalletGuard introduces automatic transaction simulation, along with robust wallet drainer and phishing protection, ensuring the utmost security for every transaction.

Story continues

"Vox Crypto's underlying magic lies in our comprehensive security measures which are designed to protect users' assets against theft, hacks, and other vulnerabilities," saidGarethMurfin, CTO, Kryotech. "The platform uses cutting-edge encryption technology, multi-sig authentication, and cold storage to secure digital assets, and we constantly monitor and update our security protocols to ensure maximum protection against emerging threats."

Kryotech Ltd. is no stranger to pioneering encrypted applications. Their track record boasts the launch of the world's first post-quantum encrypted messenger, Vox Messenger, in 2017. This groundbreaking app has since garnered a user base of over 60,000 across more than 30 countries. Currently available on Android and soon to be released on iOS, Vox Messenger stands as a testament to Kryotech Ltd.'s commitment to providing safe and secure communication tools for the digital age.

Eagerly awaited by the crypto community, Vox Crypto will be available across Android, iOS, and Desktop platforms. Pre-registration kicks off on 12th October 2023, allowing users to be among the first to experience this revolutionary wallet.

To learn more visit our website at https://kryotech.co.uk/For media inquiries, please contact: Will@Cocreateagency.io

Cision

View original content:https://www.prnewswire.com/news-releases/kryotech-ltd-an-industry-leader-in-encrypted-application-development-announces-next-gen-cryptocurrency-wallet-vox-crypto-in-partnership-with-transak-and-walletguard-301953254.html

SOURCE Kryotech Ltd

See the rest here:
Kryotech Ltd., an Industry Leader in Encrypted Application Development, Announces Next-Gen Cryptocurrency Wallet, VOX Crypto, in Partnership with...

Read More..