Category Archives: Encryption
Cloud Encryption Gateways Market is Booming Worldwide | Global Analysis and Forecasts 2020-2026 | Key Players are Google, Ciphercloud, Perspecsys,…
A recent research report on the global Cloud Encryption Gateways Market provides an in-depth information on its overall working dynamics. The research report offers a great deal of information on the key driving factors, trends, and business opportunities that may arise in the global Cloud Encryption Gateways market over the course of the given forecast period. Furthermore, the report also sheds light on the recent technological and industry developments that has had a profound impact on the overall development of the global market. The research reports on the global Cloud Encryption Gateways market offers actionable insights on the intricate details of the functioning and its cause-and-effect mechanism on the overall ecosystem surrounding the market.
With an in-depth insights on these factors, the research report also offers a great deal of information about the changing market dynamics, shift in end-user demands, and evolving investment strategies. It also provides the reader with information about the factors that may hamper the growth of the market in the coming years of the forecast period.
Get FREE Sample Copy of Cloud Encryption Gateways Market Report @ https://www.researchmoz.us/enquiry.php?type=S&repid=2635266
The research report also concentrates on the advancements and developments happening in the competitive landscape of the global Cloud Encryption Gateways market and their impact on its overall development. The study scrutinizes key developments on the industrial front that are shaping the strategies of the leading companies of the global market. Moreover, it also provides the reader with an in-depth profile of some of the leading companies operating in the market space.
Key Players covered in this report are Oracle, IBM, Microsoft, Salesforce, Vormetric, Google, Ciphercloud, Perspecsys, Netscape and Skyhigh Networks
The research report on the global Cloud Encryption Gateways market also provides key insights about its overall segmentation along with detailed regional analysis. While being in sync with the global trends, the research report also concentrates on offering strong regional trends and opportunities. It also tracks the regulatory and industrial developments occurring at the regional front to give an extra dimension to the final assessment of the global Cloud Encryption Gateways market.
By Product Type, the market primarily split into-
By Applications, the market primarily split into-
Do You Have Any Query? Ask to Our Industry Expert @ https://www.researchmoz.us/enquiry.php?type=E&repid=2635266
The report focuses on the main regions and the main countries including:
Key highlights from Covid-19 impact analysis:
Key questions answered in the report:
If you have any special requirements, please let us know and we will offer you the report as per your requirements
Enquire for Discount Or Get Customization of Report @ https://www.researchmoz.us/enquiry.php?type=D&repid=2635266
About ResearchMoz
ResearchMoz is the one stop online destination to find and buy market research reports & Industry Analysis. We fulfil all your research needs spanning across industry verticals with our huge collection of market research reports. We provide our services to all sizes of organisations and across all industry verticals and markets. Our Research Coordinators have in-depth knowledge of reports as well as publishers and will assist you in making an informed decision by giving you unbiased and deep insights on which reports will satisfy your needs at the best price.
For More Information Kindly Contact:
ResearchMoz
90 State Street,
Albany NY,
United States 12207
Tel: +1-518-621-2074
USA-Canada Toll Free: 866-997-4948
Email: sales@researchmoz.us
Follow us on Twitter: https://twitter.com/researchmoz
Browse More Reports on: https://latestmarketstatus.blogspot.com/
End-to-End Encryption: Important Pros and Cons – CIO Insight
According to the 2020 Cost of a Data Breach Report by Ponemon Institute and IBM Security, data breaches are costing enterprises $3.86 million on average, and theyre taking an average of 280 days to discover the problem. Clearly, hackers can and already do easily identify and access both corporate and personal information when files are transmitted from device to device unless certain cybersecurity measures are put into place. End-to-end encryption is the easiest solution for protecting this data so it doesnt get into the wrong hands.
End-to-end encryption is the practice of encrypting data and information as it passes from device to device. The sending and receiving devices can see the original contents, but no other interceptors have the correct keys to decrypt the message. This approach to cybersecurity offers many benefits to companies and users that implement the protection, but there are still some drawbacks in areas like consumer-provider relationships. Read on to learn more about how end-to-end encryption works, as well as some of the pros and cons of end-to-end encryption security.
The total number of records compromised in 2020 exceeded 37 billion, a 141% increase compared to 2019 and by far the most records exposed in a single year since we have been reporting on data breach activity. Risk Based Security 2020 Year End Report
Read Next: 2021s Most Successful Phishing Ploys (So Far)
But how does end-to-end encryption keep data encrypted while it travels? Two cryptographic keys, a public key and a private key, are generated on the senders device. The public key is public, in the sense that a public key can be generated by anyone.
However, the paired private key can only be generated by that particular sender and can only be used to decrypt data for the designated recipient device. Hackers can theoretically intercept the message in transit and service providers can access the encrypted message in order to store it, but it will remain completely illegible until it is received and decrypted by the recipient device. This practice ensures that the data can only be viewed in its true form on the sending and receiving devices, and nowhere in between.When end-to-end encryption is applied to data in transit, the data is first encrypted, or jumbled, on the sending device. The message cannot be decrypted by hackers, service providers, or anyone else until it is received by the end device.
With end-to-end encryption, private communications and other details, like timestamps and significant locations, are not easily read if intercepted by hackers or service providers like Google or Apple. When end-to-end encryption is enabled, you can rest assured that personal privacy prevails and consumer data is protected from outside viewers.
In other security setups, outside users can potentially gain access to a piece of data and manipulate its contents before it reaches the recipient (or worse, they can stop its delivery entirely). End-to-end encryption means that these malicious actors do not have the necessary key to access data in transit, so the integrity of data is maintained.
Whether its due diligence for a high-profile M&A transaction or the sharing of sensitive government intelligence data, end-to-end encryption is one solution that makes sure that no one outside of the sending and receiving parties can spread highly sensitive information. The reasons are twofold: 1) The key system in end-to-end encryption prevents unauthorized devices from opening the message. 2) If users maliciously or accidentally come across the message, end-to-end encryption has made it indecipherable to them.
Other types of encryption focus on encrypting data at the server level, but if a malicious actor or other outsider gains access to that server, they can decrypt any information in that server fairly easily. Overcoming end-to-end encryption requires hackers to perform device-level hacks to get the information that they want, which is considerably more difficult and time-consuming to do, leading most hackers to avoid those types of attacks altogether.
Lets take a look at the biggest data breach in history: Yahoos 2013 breach that compromised approximately 3 billion user accounts (all of their customers accounts at that time). Yahoo claims that no clear-text passwords or financial information were compromised in the attack, but experts believe that Yahoos outdated, easy-to-crack encryption still exposed those recordsbillions of recordsto malicious actors.
Needless to say, this attack damaged Yahoos reputation with customers, but it also damaged their negotiation powers with other major businesses. In 2017, Yahoo was in acquisition negotiations with Verizon, and after this news came to light, they were forced to lower the price of their assets by at least $350 million.
Making Security Affordable: 8 Low-Cost Ways to Improve Cybersecurity
Although end-to-end encryption offers many high-value benefits to enterprises and users, the security practice still suffers from several shortcomings and has led to some public safety concerns:
End-to-end encryption jumbles all of your datas contents in transit, but it does not hide the fact that data is being transferred. The ledger of communication remains, so people can still find records of transactions and possibly deduce the contents, based on sending and receiving parties.
End-to-end encryption does not guarantee the protection of data once it reaches the receiving device. If theres a security problem on that device or if that device falls into the wrong hands, the data has already been decrypted on the receiving device, leaving it susceptible to outside parties who gain access to the device.
One of the most important and highly controversial issues with end-to-end encryption is that its almost too successful at protecting data from third parties. This is a great feature as far as protecting private information against hackers, but what about for law enforcement and intelligence officers who need to conduct a serious investigation?
With end-to-end encryption, they cannot access evidence that has been encrypted, and neither can service providers if they are asked to cooperate in the investigation. Only participating devices can provide the information they need. In serious cases related to allegations like terrorism, murder, and physical abuse, this data protection becomes a major hindrance to public safety and national security.
Many national governments and international committees have fought against end-to-end encryption in personal devices and applications for this reason. One of the most recent end-to-end encryption ban coalitions includes India, Japan, New Zealand, Australia, the UK, and the United States. In their International Statement on End-to-End Encryption and Public Safety on October 11, 2020, they called for a ban on end-to-end encryption in apps like WhatsApp and pushed for technology companies to allow greater data access to international law enforcement forces.
Learn More About Security at CISA: Cyber Agency Launches Security Awareness Campaign
Several major companies have added end-to-end encryption features to their offerings over the years, and while some have experienced great success, others have become embroiled in controversy.
Data breaches are costing enterprises around $3.86 million per year, and that number only seems to grow, particularly in key areas of infrastructure. Although theres some controversy and concerns surrounding how end-to-end encryption works, its clear that the solution is a valuable security investment for the enterprises that select it and the consumers who benefit from it.
More on End-to-End Encryption from IT Business Edge: Enterprise End-to-End Encryption is on the Rise
Original post:
End-to-End Encryption: Important Pros and Cons - CIO Insight
5 Trends Shaping the Future of Encryption – Cyber Security Hub
Cloud computing has made securing data harder than ever. Compounding these challenges, especially in complex, multi-cloud environments, is the ever-growing number of encryption and key management solutions enterprises are using. In addition, 64% of companies say that it is unclear as to who owns key management, making this area especially problematic.
To combat these issues, companies are developing enterprise-wide encryption strategies. According to the Entrust 2021 Global Encryption Trends study, over 50% of organizations have implemented a single, comprehensive data encryption strategy across the entire enterprise, double the amount reported in 2011. In addition, to help strengthen key generation and management, 66% of companies are turning towards hardware security modules (HSMs).
Bring your own encryption (BYOE), also known as bring your own key (BYOK), refers is an encryption model where the data owner generates and uses its own cryptographic keys and, ideally, has sole access to them. Though designed as a way to help to increase data protection in the cloud without having to turn to a 3rd party key management vendor, BYOE and BYOK are not without their weaknesses.
Over the past 5 years, blockchain has proven to be an effective platform for secure and decentralized information exchange. First and foremost, blockchain automates the data storage process making human-error related data breaches obsolete. As data is decentralized, encrypted, and cross-checked by multiple nodes on the network, blockchain networks are close to impossible to hack.
Banks, governments, hospital systems and other large organizations tasked with managing high volumes of sensitive data are all experimenting with using blockchain technologies for cybersecurity purposes. However, blockchain remains prohibitively expensive and challenging to implement for most organizations. As the technology is still in its nascent stages, scalability and interoperability remain major obstacles to implementations as do the enduring difficulties of encryption key management.
Though conceptualized in 1978, homomorphic encryption is just now becoming a reality. A technique that allows for computations to be performed on encrypted data without a key, homomorphic encryption enables data owners or a third party (such as a cloud provider) to apply functions on encrypted data without needing to reveal the values of the data. The results are also encrypted and require a key to access.
When combined with blockchain, homomorphic encryption could usher in a new era of agile, highly resilient cybersecurity and encryption strategies. However, like blockchain, homomorphic encryption requires significant computing power to function and remains, for now, prohibitively expensive. Given its potential though, many key industry players such as IBM, Microsoft and AWS are all researching and developing homomorphic encryption solutions.
Quantum computing is poised to render current cryptography techniques obsolete. In fact, there is near scientific consensus that quantum computers will be able to break widely used public-key cryptographic schemes such as RSA and Diffie-Hellman. Furthermore, the transition to new quantum resistant cryptographic algorithms will take years.
Thankfully we have a head start. Not only are researchers developing new, quantum resistant encryption methodologies, some already exist. Lattice-based, code-based, hash-based, isogeny-based, and multivariate systems are all examples of quantum-resistant PKC systems.
See the article here:
5 Trends Shaping the Future of Encryption - Cyber Security Hub
Duality Technologies and Intel Collaborate to Deliver Optimized Homomorphic Encryption Applications – PRNewswire
NEWARK, New Jersey, June 2, 2021 /PRNewswire/ --Duality Technologies, a leading provider of Privacy-Enhancing Technologies (PETs) based on Fully Homomorphic Encryption (FHE), announced today that it has partnered with Intel to deliver optimized Data Science and AI applications for privacy-enhanced data collaboration. Leveraging Duality's expertise in FHE and data science with Intel's leadership in hardware platforms, the two companies have collaborated to accelerate FHE on the new 3rd Gen Intel Xeon processors with built-in AI plus encryption accelerators. By optimizing FHE performance on Intel platforms, the integration will make privacy-preserving data analytics scalable, enabling enterprises to collaborate on sensitive data while simultaneously preserving theprivacy and confidentiality of personal information, as well as maintaining full compliance with data privacy regulations throughout theanalytics cycle.
In today's data-driven economy, there is a rapidlygrowing need for collaboration across organizations seeking to derive value and insights from their data sets. A recent Gartner report identified privacy-enhancing computation as a top strategic technology trend for 2021, stating that "by 2025, half of large organizations will adopt privacy-enhancing computation for processing data in untrusted environments and multiparty data analytics use cases." Using PETs,enterprises cannavigate today's landscape of growing privacy regulations and successfullycollaborate on data across borders and institutions. PETs based on hardware-enhanced FHE protect data in use by preventing exposure of sensitive data, such as personally identifiable information (PII), during analysis, therebyensuring compliance with growing data privacy regulations.
"By joining forceswith Intel, we have already achieved most impressive FHE acceleration results. Duality and Intel share the objective of accelerating FHE and its applications by orders of magnitude, enabling organizations around the world to benefit from secure and privacy enhanced data collaboration", said Dr. Alon Kaufman, CEO and Co-Founder, Duality Technologies. "In an era in which data utility and data privacy are both paramount, we are excited to enableIntel customers to collaborateand generate insights from encrypted data without revealing sensitive information. Duality SecurePlus scalable and practical AI applicationspave the way for the widespread adoption of this transformativeprivacy-enhancing technology."
"The need for actionable big data insights has never been greater. With 3rd Gen Intel Xeon processors, DualitySecurePlus applicationscan simultaneously address privacy, security, confidentiality and scalability challenges in a manner which can benefit organizations across many industries," said Jeremy Rader, General Manager of Enterprise Strategy & Solutions, Data Platforms Group at Intel.
Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.
About Duality Technologies
Duality Technologies is at the forefront of Privacy Enhancing Technologies (PETs), setting thestandard for privacy-preserving data collaboration. Duality SecurePlus, a leading PET platform, combines advanced Homomorphic Encryption and data science, enabling organizations to derive insights without exposing their sensitivedata. Duality's products are used by companies across regulated industries including financial services, healthcare, telecommunications and more. Duality was listed on Fast Company's 2020 Most Innovative Companies List in the Data Science category and has been recognizedas a Gartner "Cool Vendor" for Privacy Preservation in Analytics.For more information, please visit dualitytech.com.
Duality Technologies Media Contact:Ben CromeHeadline Media(914) 336-4922[emailprotected]
SOURCE Duality Technologies
Read the original post:
Duality Technologies and Intel Collaborate to Deliver Optimized Homomorphic Encryption Applications - PRNewswire
Top Benefits that Help in Boosting the Growth of the Email Encryption Market – TechBullion
Share
Share
Share
The mobility, flexibility, and reliability of emails have increased extensively over the years. With an increase in the number of email users around the world, the threats related to emails such as phishing, data breaches, and others have increased considerably. Necessity is the mother of invention. The growing prevalence of such cases led to the invention of email encryption services and solutions. It emerged in popularity in no time. The rising demand for email encryption services from many individuals will bring tremendous growth opportunities.
Email encryption is a method of converting the information in the email in an encrypted form. Once the content of the email is encrypted, it will not be readable to outsiders. The content is reversed back to its decrypted form once it is unlocked with the private email key. The convenience and advantages attached to these services will prove to be good growth generators for the email encryption market.
According to the analysts at Transparency Market Research (TMR), the email encryption market is expected to expand at a healthy CAGR of ~25 percent across the assessment period of 2020-2030. The extensive benefits of the services will add extra stars of growth to the email encryption market.
A wide range of advantages is responsible for the rising demand for email encryption services. Many companies and organizations are choosing these services for preventing data leakage. The heightening awareness among diverse companies and firms regarding the importance of data protection will bring immense growth opportunities.
Here are some major benefits that help in increasing the growth rate of the email encryption market.
Request Brochurefor Email Encryption Market Report
Protection of Confidential Information
Email encryption provides the protection of confidential information such as social security numbers, credit card numbers, official information, etc. Some hackers may make use of this information for ulterior motives. To prevent such hazards, email encryption becomes necessary.
Affordable and Advanced
When an email service is already encryption-integrated in the server, the need for purchasing additional equipment becomes null. A trusted email encryption service provider enables server integration that makes it affordable. This factor will help in boosting the growth prospects of the email encryption market. Furthermore, the integration of additional features without any extra cost invites exponential growth.
Eliminates Spam
When an individual sends encrypted mail, the receiver can see the digital signature on the mail to verify the sender. Spoofed emails do not contain the signature. Hence, the use of email encryption assists in eliminating spam mail.
Saves Time
The utilization of email encryption enables risk-free sending of the mails without any additional requirement of protection. Earlier, for sending confidential information, mails had to be programmed with a large set of codes and then sent. Email encryption services have an inbuilt encryption mechanism which helps in saving a lot of time. This advantage will help in increasing the demand for email encryption services.
Helps in Staying Compliant-Friendly
The government bodies of numerous countries have made encryption mandatory for certain sectors like healthcare. Criminal Justice Information Services (CJIS) has mandated that any sensitive data in a secure location has to be encrypted before sending. The Health Insurance Portability and Accountability Act (HIPAA) also make the protection of patient health information through email information compulsory through email encryption. All these factors bode well for the growth of the email encryption market.
No companies, whether big or small want to be victims of a data breach. Email encryption plays a gigantic role in keeping the information secure. Along with email encryption, the players also provide additional encryption services and features, which further bring promising growth for the email encryption market.
TMR offers custom market research services that help clients to get information on their business scenario required where syndicated solutions are not enough,request for custom research report
View original post here:
Top Benefits that Help in Boosting the Growth of the Email Encryption Market - TechBullion
Baffle Brings the Holy Grail of Encryption to Amazon RDS – Yahoo Finance
The First and Only Solution to Power Advanced Reporting and Analytics on De-identified and Encrypted Data on Amazon RDS
Baffle, Inc., a cloud data protection company, today announced it has extended its advanced multiparty compute capabilities to support Amazon Relational Database Service (Amazon RDS). An AWS Technology Partner, Baffle Data Protection Services (DPS) enables de-identification, encryption, and masking of data in the cloud to ensure compliance with data privacy regulations and reduce the risk of data breaches and leaks.
Baffle is the first and only vendor that allows customers to migrate data to the cloud, simultaneously de-identify the data, and seamlessly facilitate reporting and analytics on Amazon RDS. This comprehensive data protection capability operates with no impact on business intelligence or analyst functions. Baffles secure computation capability simplifies data protection by addressing customer concerns over exposed data in cloud database platforms. The solution leaves data de-identified in Amazon RDS and still allows operations, reporting, and computation to occur. Baffle DPS enables customers to not only accelerate their move to the cloud to deliver agility and speed to the business, but also enable a cloud-native, data security model.
"Organizations are consolidating their data to the cloud at a record pace, and according to Gartner, 75% of all data will be in the cloud by 2022," said Ameesh Divatia, Baffles co-founder and CEO. "Baffle is thrilled to bring its advanced secure computation capabilities to Amazon RDS to help further accelerate the adoption of AWS cloud services and ensure data privacy."
Learn how Baffle Data Protection Services integrates with Amazon environments to more easily and confidently migrate, store, and share cloud data.
About Baffle
Baffle secures data in the cloud and when shared across the entire analytics pipeline with no performance impact on the user experience. Proven in large-scale environments, only the Baffle Data Protection Services de-identifies sensitive information with zero application changes so companies can responsibly move more data, faster, to the cloud for privacy-preserving analytics in artificial intelligence (AI) and machine learning (ML). Investors include True Ventures, Clearvision Ventures, ServiceNow Ventures [NYSE: NOW], Greenspring Associates, Thomvest Ventures, Engineering Capital, Industry Ventures, and Triphammer Ventures. Follow us on Twitter and LinkedIn.
Story continues
View source version on businesswire.com: https://www.businesswire.com/news/home/20210602005307/en/
Contacts
Davida DinermanLook Left Marketingbaffle@lookleftmarketing.com (508) 561-4263
Read this article:
Baffle Brings the Holy Grail of Encryption to Amazon RDS - Yahoo Finance
Why Indian Courts Should Reject Traceability Obligations – EFF
End-to-end encryption is under attack in India. The Indian governments new and dangerousonline intermediary rulesforcing messaging applications to trackand be able to identifythe originator of any message, which is fundamentally incompatible with the privacy and security protections of strong encryption, due onMay 25th. Three petitions have been filed (Facebook; WhatsApp; Arimbrathodiyil) asking the Indian High Courts (in Delhi and Kerala) to strike down these rules.
The traceability provisionRule 4(2) in the Intermediary Guidelines and Digital Media Ethics Code rules (English version starts at page 19)was adopted by the Ministry of Electronics and Information Technology earlier this year. The rules requireany large social media intermediary that provides messaging shall enable the identification of the first originator of the information on its computer resource in response to a court order or a decryption request issued under the 2009 Decryption Rules. (The Decryption Rules allow authorities to request the interception or monitoring of decryption of any information generated, transmitted, received, or stored in any computer resource.)
The minister has claimed that the rules will [not] impact the normal functioning of WhatsApp and said that the entire debate on whether encryption would be maintained or not is misplaced because technology companies can still decide to use encryptionso long as they accept the responsibility to find a technical solution, whether through encryption or otherwise that permits traceability. WhatsApp strongly disagrees, writing that "traceability breaks end-to-end encryption and would severely undermine the privacy of billions of people who communicate digitally."
The Indian government's assertion is bizarre because the rules compel intermediaries to know information about the content of users messages that they currently dont and which is currently protected by encryption. This legal mandate seeks to change WhatsApps security model and technology, and the assumptions somehow seem to imply that such matter neednt matter to users and neednt bother companies.
Thats wrong. Because WhatsApp uses a specific privacy-by-design implementation that protects users secure communication by making forwarding indistinguishable for the private messaging app from other kinds of communications. So when a WhatsApp user forwards a message using the arrow, it serves to mark the forward information at the client-side, but the fact that the message has been forwarded is not visible to the WhatsApp server. The traceability mandate would make WhatsApp change the application to makethis information, which was previously invisible to the server, nowvisible.
The Indian government also defended the rules by noting that legal safeguards restrict the process of gaining access to the identity of a person who originated a message, that such orders can only be issued for national security and serious crime investigations, and on the basis that it is not any individual who can trace the first originator of the information. However, messaging services do not know ahead of time which messages will or will not be subject to such orders; as WhatsApp has noted,
there is no way to predict which message a government would want to investigate in the future. In doing so, a government that chooses to mandate traceability is effectively mandating a new form of mass surveillance. To comply, messaging services would have to keep giant databases of every message you send, or add a permanent identity stamplike a fingerprintto private messages with friends, family, colleagues, doctors, and businesses. Companies would be collecting more information about their users at a time when people want companies to have less information about them.
India'slegal safeguards will not solve the core problem:
The rules represent a technical mandate for companies to re-engineer or re-design their systems for every user, not just for criminal suspects.
The overall design of messaging services must change to comply with the government's demand to identify the originator of a message. Such changes move companies away from privacy-focused engineering and data minimization principles that should characterize secure private messaging apps.
This provision is one of many features of the new rules that pose a threat to expression and privacy online, but its drawn particular attention because of the way it comes into collision with end-to-end encryption. WhatsApp previously wrote:
Traceability is intended to do the opposite by requiring private messaging services like WhatsApp to keep track of who-said-what and who-shared-what for billions of messages sent every day. Traceability requires messaging services to store information that can be used to ascertain the content of peoples messages, thereby breaking the very guarantees that end-to-end encryption provides. In order to trace even one message, services would have to trace every message.
Rule 4(2) applies to WhatsApp, Telegram, Signal, iMessage, or any significant social media intermediaries with more than 5 million registered users in India. It can also apply to federated social networks such as Mastodon or Matrix if the government decides these pose a material risk of harm to national security (rule 6). Free and open-source software developers are also afraid that theyll be targeted next by this rule (and other parts of the intermediary rules), including for developing or operating more decentralized services. So Facebook and WhatsApp arent the only ones seeking to have the rules struck down; a free software developer named Praveen Arimbrathodiyil, who helps run community social networking services in India, has also sued, citing the burdens and risks of the rules for free and open-source software and not-for-profit communications tools and platforms.
This fight is playing out across the world. EFF has long said that end-to-end encryption, where intermediaries do not know the content of users messages, is a vitally important feature for private communications, and has criticized tech companies that dont offer it or offer it in a watered-down or confusing way. Its end-to-end messaging encryption features are something WhatsApp is doing rightfollowing industry best practices on how to protect usersand the government should not try to take this away.
See the original post here:
Why Indian Courts Should Reject Traceability Obligations - EFF
Ending encryption: On enforcing traceability on popular messaging apps – The Hindu
Barely a day before the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules 2021 came into force, WhatsApp moved the Delhi High Court against the rules specifically the one that mandates that a significant social media intermediary providing services primarily in the nature of messaging shall enable the identification of the first originator of the information on its computer resource as may be required by a judicial order. Given the specification that a significant social media intermediary is one with more than 50 lakh registered users, WhatsApps messenger service would clearly be affected. WhatsApps contention is that for compliance and traceability, it would have to break its end-to-end encryption service that allows messages to be read only by the sender and the receiver. Its argument is that the encryption feature allows for privacy protections and breaking it would mean a violation of privacy. The question to be asked is whether the traceability guidelines (by breaking encryption) are vital to law enforcement in cases of harmful content. A release by the Ministry of Electronics and IT has said that the traceability measure will be used by law enforcement as the last resort and will come by only in specific situations, such as for the purposes of prevention, detection, investigation, prosecution or punishment of an offence related to the sovereignty and integrity of India... or child sexual abuse material, punishable with imprisonment.... The assertion suggests that this requirement is in line with the Puttaswamy judgment that clarified that any restriction to the right of privacy must be necessary, proportionate and include safeguards against abuse.
But the Government, as the law stands now, can already seek access to encrypted data under Section 69(3) of the IT Act, and Rules 17 and 13 of the 2009 Surveillance Rules that require intermediaries to assist with decryption when they have the technical ability to do so and when law enforcement has no other alternative. Besides, it can still seek unencrypted data, metadata and digital trails from intermediaries such as WhatsApp. The trouble with enforcing traceability is that without safeguards such as having any independent or judicial oversight, government agencies could seek any users identity on vague grounds and this could compromise the anonymity of whistle-blowers and journalistic sources, who can claim to be acting in the public interest. WhatsApps contention that requiring messaging apps to trace chats is the equivalent of asking us to keep a fingerprint of every single message sent... and fundamentally undermines right to privacy is, therefore, not hyperbole. If anything, the Government needs to revisit its position on traceability commitments of intermediaries and instead revise the IT Act, 2000 in line with existing global best practices besides legislating the long-pending Data Protection Bill.
Read the original post:
Ending encryption: On enforcing traceability on popular messaging apps - The Hindu
E-mail Encryption Market is Anticipated to Gain Moderate CAGR by 2027 The Manomet Current – The Manomet Current
This E-mail Encryption market report also focuses on a few key projections that are necessary for a positive business future. New technologies are also presented in order to gain a total advantage over the competition. Numerous industry aspects, including sales methods, investments, and growth rate, are also statistically evaluated in the Market Report. It also focuses on making comparisons between a variety of geographical areas.
Get the complete sample, please click:https://www.globalmarketmonitor.com/request.php?type=1&rid=669952
It reflects on the changes that new and established companies must make in order to grow and adapt to consumer developments in the future. It also assists the reader in identifying key aspects of the global report and offers enough statistical data to comprehend its service. It also looks at potential flaws as well as issues that new and established businesses face. The E-mail Encryption market report provides the reader with all of the vital financial, economic, and social factors applicable to the industry, allowing them to make an informed decision.
Major enterprises in the global market of E-mail Encryption include:Proofpoint Trend Micro HP Data Motion Sophos Privato Cryptzone Symantec EdgeWave LuxSci
Market Segments by Application:Financial Services Energy Government Education Healthcare
Worldwide E-mail Encryption Market by Type:SMTP STARTTLS S/MIME PGP
Table of Content1 Report Overview1.1 Product Definition and Scope1.2 PEST (Political, Economic, Social and Technological) Analysis of E-mail Encryption Market2 Market Trends and Competitive Landscape3 Segmentation of E-mail Encryption Market by Types4 Segmentation of E-mail Encryption Market by End-Users5 Market Analysis by Major Regions6 Product Commodity of E-mail Encryption Market in Major Countries7 North America E-mail Encryption Landscape Analysis8 Europe E-mail Encryption Landscape Analysis9 Asia Pacific E-mail Encryption Landscape Analysis10 Latin America, Middle East & Africa E-mail Encryption Landscape Analysis 11 Major Players Profile
Ask for a Report Sample at:https://www.globalmarketmonitor.com/request.php?type=3&rid=669952
Furthermore, this study sheds light on a few key points that will drive the global markets financial flow. It also focuses on a number of key sources that can be used in the market to achieve the best results and gains. It also covers some critical approaches for exploring global market opportunities and expanding the company. In this E-mail Encryption market report, a thorough regional study is carried out, with a focus on a few main regions such as Europe, China, North America, Japan, India, and South America. Key players can easily gain a prominent position in the market with the aid of this detailed market research. It also depicts the COVID-19 global effects on various segments and countries.
In-depth E-mail Encryption Market Report: Intended AudienceE-mail Encryption manufacturersDownstream vendors and end-usersTraders, distributors, and resellers of E-mail EncryptionE-mail Encryption industry associations and research organizationsProduct managers, E-mail Encryption industry administrator, C-level executives of the industriesMarket Research and consulting firms
This E-mail Encryption Market report will help its clients to learn about gaps and growth in the market, investment opportunities, new methods of production, as well as how to target market with the aid of this Market Report. It includes information on marketing strategies, market demographics, and sales volume. Readers will get a few important insights about prospective customers and their needs in the user research part of this distinctive Market analysis. The purpose of a market research study is to give information on the market environment, consumers, rivals, and other industry elements. It conducts in-depth research into all sectors of the industry in order to provide information on geopolitical, social, scientific, economic, and societal trends that have a significant impact on any organization.
About Global Market MonitorGlobal Market Monitor is a professional modern consulting company, engaged in three major business categories such as market research services, business advisory, technology consulting.We always maintain the win-win spirit, reliable quality and the vision of keeping pace with The Times, to help enterprises achieve revenue growth, cost reduction, and efficiency improvement, and significantly avoid operational risks, to achieve lean growth. Global Market Monitor has provided professional market research, investment consulting, and competitive intelligence services to thousands of organizations, including start-ups, government agencies, banks, research institutes, industry associations, consulting firms, and investment firms.ContactGlobal Market MonitorOne Pierrepont Plaza, 300 Cadman Plaza W, Brooklyn,NY 11201, USAName: Rebecca HallPhone: + 1 (347) 467 7721Email: info@globalmarketmonitor.comWeb Site: https://www.globalmarketmonitor.com
Guess You May Interested In:Flange Safety Valves Market Reporthttps://www.globalmarketmonitor.com/reports/476362-flange-safety-valves-market-report.html
Fetal and Neonatal Care Equipment Market Reporthttps://www.globalmarketmonitor.com/reports/489867-fetal-and-neonatal-care-equipment-market-report.html
RIS Radiology Information System Market Reporthttps://www.globalmarketmonitor.com/reports/634136-ris-radiology-information-system-market-report.html
Mobile Payment (Mobile Money) Market Reporthttps://www.globalmarketmonitor.com/reports/687851-mobile-paymentmobile-moneymarket-report.html
Chlorfluazuron Market Reporthttps://www.globalmarketmonitor.com/reports/488066-chlorfluazuron-market-report.html
Optically Clear Adhesive Market Reporthttps://www.globalmarketmonitor.com/reports/613085-optically-clear-adhesive-market-report.html
Expert Stakeholder Consultation Report on the Indian Encryption Debate – Business Wire India
New Delhi, Delhi, India: On Tuesday, June 1, 2021, The Dialogue, a Delhi-based technology policy think tank, released its Expert Stakeholder Consultation Report on the Indian Encryption Debate. This report is based on the three expert stakeholder consultations hosted by The Dialoguefrom October 2019 to February 2021, held in partnership with NULLCON, Asias leading information security conference.
The recommendations are as follows:
Dr. Gulshan Rai, the Former National Cyber Security Coordinator, who wrote the foreword of the report noted,
There exists a legitimate state interest in seeking access to data for law enforcement purposes. The balance between privacy and national security is not bereft of technological or operational solutions. While aiming to achieve them it is crucial that none of the key stakeholders take an extremist position where we end up compromising security and privacy of Indians.
Among veterans from law enforcement agencies who participated, Mr. Yashovardhan Azad, who served as the Special Director at the Intelligence Bureau and Secretary (Security), Government of India explained,
The State may have reasons in the legitimate interest of national security to seek access to information. A blanket measure to seek access which renders the entire platform susceptible to attacks by hostile actors must not be relied on. Implementing such a measure will not only compromise user privacy but also national security. The State must assess the technical feasibility of the measures it directs the platforms to implement to effectuate exceptional access while also ensuring that the measure does not fail on the anvil of the Puttaswamy test.
Describing end-to-end encryption as a non-negotiable Dr. Aruna Sharma, Former Secretary of the Ministry of Communications and Information Technology pointed out,
There is technical dichotomy between end to end encryption and that of tracing the originator for a message as the new rule states as a mandatory requirement.
Explaining the challenges around overarching mandates like backdoor access to encrypted chats for the exceptional use by the law enforcement agencies, Cyber Security Professional Mr. Anand Venkatnarayanan explained,
Most hacks and attacks are done by disabling the encryption or working around the same. In todays time, hackers understand that fooling people is far more easier than breaking encryption so they workaround the same through fake OTPs and other parallel systems to gain access to encrypted devices. If the objective of the Government is to stop these attacks, it is possible through targeted attacks and interceptions and there is no real need for a blanket policy of a backdoor that affects everyone instead of just the offender. A policy cannot be about making 99% of the population safe from the 1% by making all 100% of them unsafe
The report based on the expert stakeholder consultations seeks to shed light on the crucial aspects of the Indian encryption debate. This is even more relevant given the promulgation of the IT Rules of 2021 which may end up undermining end-to-end encryption owing to its originator traceability mandate. The experts had agreed that the way forward must be consultative keeping the privacy and security of the users in mind.
Link:
Expert Stakeholder Consultation Report on the Indian Encryption Debate - Business Wire India