Category Archives: Encryption

Nearly 500,000 say Congress shouldnt kill encryption with the EARN IT Act – The Daily Dot

A petition calling on members of Congress to reject the controversial EARN IT Act because it could kill encryption has garnered nearly 500,000 signatures.

The bill, which was unveiled by a bipartisan group of senators in early March, would force websites to adhere to a set of best practices for removing child exploitation content or risk having Section 230 of the Communications Decency Act immunity be taken away.

The bill has been fiercely criticized by internet rights advocates because of the influence the Justice Department and the attorney general would have on the commission that would create those best practices. Given the departments long-standing desire to create back doors into encryption, advocates have argued its not a stretch to thinkand perhaps is likelysuch a back door would be added as a best practice.

Section 230 has been hailed as an essential building block for the internet, as it protects websites from being liable for what is posted on them by third parties. The section has seen a string of attacks and criticism from the Justice Department, former Vice President Joe Biden, and most recently, President Donald Trump.

Not all lawmakers have expressed support for the EARN IT Act, with Sen. Ron Wyden (D-Ore.) calling it a Trojan horse that would give Attorney General [William] Barr and Donald Trump the power to control online speech and require government access to every aspect of Americans lives.

It appears that many other people feel the same way.

A petition from internet rights group Fight for the Future has collected around 480,000 signatures as of Monday morning. The petition asks for members of Congress to reject the dangerous EARN IT Act.

The website for the petition also has a phone number people can call that will connect them to members of Congress.

Evan Greer, the deputy director of Fight for the Future, told the Daily Dot the petition went viral over the past week as people are more aware than ever that encryption is an essential tool to keep people safe from police and government surveillance.

The EARN IT act is a perfect storm of bad ideas. It threatens to enable mass surveillance and monitoring of our internet activity and communications, while also posing an existential threat to online freedom of expression, Greer said. Lawmakers need to stop using Section 230 of the Communications Decency Act as a political football. Its dangerous and just plain silly. We can and should take steps to make the internet safer for everyone. The EARN IT act does the opposite of that.

In April, the popular encrypted messaging app Signal warned that if the EARN IT Act was passed, it would make it impossible for companies like it to operate in the United States.

Joshua Lund, a developer at Signal, said if a back door into encryption was a best practice in the billtherefore dangling Section 230it would open up Signal, which uses end-to-end encryption so only the sender and receiver can see messages, to liability.

Some large tech behemoths could hypothetically shoulder the enormous financial burden of handling hundreds of new lawsuits if they suddenly became responsible for the random things their users say, but it would not be possible for a small nonprofit like Signal to continue to operate within the United States, Lund wrote in a blog post.

READ MORE:

*First Published: Jun 8, 2020, 10:11 am

Andrew Wyrich is a politics and technology staff writer for the Daily Dot. Andrew has written for USA Today, NorthJersey.com, and other newspapers and websites. His work has been recognized by the Society of the Silurians, Investigative Reporters & Editors (IRE), and the Society of Professional Journalists (SPJ).

See the article here:
Nearly 500,000 say Congress shouldnt kill encryption with the EARN IT Act - The Daily Dot

COVID-19, Security and WFH: Myths and Misconceptions – Security Boulevard

With COVID-19 stay-at-home orders still in place in many states, working from home (WFH) has become what is sure to be the new normal in the post-pandemic world. Given this, remote security should be at the top of every organizations priority list.

Yet, there remains a long list of common myths and misconceptions about remote worker security. And its easy to see how and why this can happen, especially in a world where staff went from working onsite to working from home practically overnight. But it is critical that businesses make themselves aware of what these myths and misconceptions are and address them with the urgency they require.

The list is long, so below are the five most pressing.

Video chat has exploded in to peoples lives over the last couple of months. What was until very recently used mainly as a meeting tool (with a video function that people often tried to avoid) has suddenly become an essential part of our everyday lives in the WFH environmentboth for work and recreation.

And the video app of choice has turned out to be Zoom. But many people are still operating under the misconception that Zoom chats are end-to-end encrypted when they are not. In fact, a number of privacy issues have come to light, such as Zooms iOS app sending data to Facebook without explicit user consent. While this issue has since been rectified, people are still operating under the encryption misconception when it comes to Zoom and other video conferencing apps, some of which are end-to-end encrypted and some of which are not.

Another common misconception that WFH employees are operating under is that VPN connections will work and that there will be sufficient bandwidth and licenses for VPN solutions. This may not be the case because VPN has always been somewhat of an afterthought.

Until COVID-19 took over our everyday lives, VPN was generally used only in special scenarios in which someone needed to work remotely or outside their usual working hours. Because of this, housekeeping, maintenance, management and administration of VPN are not very effective. Organizations dont have dedicated people to handle those things. VPN requires a lot of bandwidth and adequate licenses, and suddenly, with millions of us working from home amid the pandemic, everybody is trying to use VPN, which means issues with bandwidth and licensing that we just hadnt thought of.

VPN solutions also lend themselves to a common WFH security myththat VPN solutions are fully secure. They arent. Generally speaking, we dont see day-to-day housekeeping of VPN servers, such as patching. Compounding this, organizations are often not on the latest versions of their VPN.

This can mean a remote, unauthenticated user may be able to compromise a vulnerable VPN server and gain access to all active users and their plain-text credentials. An attacker also may be able to execute arbitrary commands on each VPN client as it successfully connects to the VPN server.

Given this, and now that VPN has suddenly become so popularand is likely to stay that way in the post-pandemic worldwe need to make sure that VPN solutions are up to date and patched so that hackers dont see VPN as an easy vehicle through which to conduct an attack.

In some ways, it seems so obvious that personal device security is often a far cry from company device security, yet so many organizations allow personal devices to be used for company business without a second thought for security.

Its obviously a challenge even during normal times for remote security to be implemented on any personal device that might be used for company business. But during these extraordinary times, when companies had to set staff up to work from home literally overnight in many cases, its an understandable oversight.

Still, it can have catastrophic consequences if not addressed in the WFH environment. Firms must implement two-factor authentication, content filtering, identity and access management, encryption, auto backups, authentication and security monitoring to any personal device being used for company business.

These are some of the things that youd see in a typical corporate network, but we dont see on personal devices; its a long and dangerous list of disparities creating a myth of security that isnt there.

They dont, and this is particularly problematic in the current situation, given the massive rise in phishing and spam emails since the COVID-19 situation took hold.

And with the majority of organizations currently running their staff remotely, this problem is only magnified. The pandemic is giving rise to a huge amount of fear, uncertainty, anxiety, sympathy, greed and disorder, meaning clarity is easily taken advantage of.

This makes phishing emails even more effective because our defenses are down and we are sitting alone at home with no one to bounce ideas off, ask immediate questions of or get opinions from. We are vulnerable right now and hackers know it.

Its exceptionally important that companies stay on top of these latest and advanced emerging phishing attacks and stop operating under the myth that their remote teams are going to be able to spot a suspect email every time. They probably wont.

Read the rest here:
COVID-19, Security and WFH: Myths and Misconceptions - Security Boulevard

Privacy News Online | Weekly Review: June 12th, 2020 – Privacy News Online

Video conferencing company Zoom will not offer end-to-end encryption functionality for free users. Earlier this year, Zoom had falsely advertised that they were providing end-to-end encryption on all of their calls even those with free users. Now that they are going about actually implementing real end-to-end encryption, more caveats have emerged. On their Q1 earnings call, Zoom CEO Eric Yuan commented:

We want to give [end-to-end encryption] to at least the enterprise customer or business customer. Free users, for sure, we dont want to give that. Because we also want to work together, say, with FBI, with local law enforcement in case some people that use Zoom for a bad purpose, right?

In a statement, Zoom clarified that they will still offer end-to-end encryption to organizations such as schools that are technically free users but still count as enterprise customers.

The Drug Enforcement Agency (DEA) has been granted a two week expansion of scope so that they can conduct surveillance on the growing protests across the country. The DOJ approved the request from the DEA last week and the full surveillance force of the DEA will come to bear against protestors in cities around America. This news was revealed by BuzzFeedNews, which released the memorandum that the DOJ used to grant the DEA this power. Protests are protected as First Amendment speech by the US Constitution and the use of an unrelated federal agency to surveill such activities is a gross overstep of federal power that has received pushback even from within the DEA.

US Customs and Border Protection (CBP) flew a Predator Drone over the city of Minneapolis during the ongoing George Floyd protests on May 29th. The use of a surveillance drone normally reserved for active war zones on a domestic target was noticed by journalist Jason Paladino through the use of public aircraft tracking data put out on the ADS-B Exchange. NOther news outlets have used similar aircraft tracking data to verify that military aircraft has been used to conduct surveillance on at least five other protests in the last week. The US House of Representatives Committee on Oversight Reform has opened an inquiry into the matter while the CBP wont say which federal agency requested the surveillance.

A research paper by Two Six Labs published at IEEE 41 has analyzed the risks of a Cambridge Analytica type information leak using Google API data. The G Suite Marketplace of apps allows third party apps to request Google API data from users. While apps in this marketplace are supposed to undergo code review by the Google team to make sure data is properly used and maintained, the researchers found that unverified apps were allowed on the marketplace. Google API data includes calendar, contact, and email information that could lead to an even worse data leak than Cambridge Analytica caused using the Facebook API.

Boies Schiller Flexner LLP has filed a 5 billion USD class action lawsuit against Google for violating privacy and wiretapping laws. The lawsuit alleges that Google continues to track users private internet use even after a user has indicated to Google that they do not wish to be tracked by using the Chrome browsers incognito mode. When someone is in incognito mode, their internet activity is still tracked and stored by Google on the visited websites end via Javascript code (Google Analytics). Google will fight the claim and has stated that they are eager to clarify why their actions arent illegal in court.

Federated analytics is the latest privacy preserving way to do data science without data collection which has traditionally led to databases full of supposedly anonymous data that has proven time and time again to be de-anonymize-able. Federated analytics is borne of federated learning, a method for machine learning that uses and keeps the data in question on the users device. Google has started using federated analytics in their machine learning and AI efforts. For instance, federated analytics is used in the Playing Now functionality that lets a Google user identify what song is playing without having to send an audio recording back to Google servers.

Brazils Senate is rushing through a new law called the Fake News Law which is supposed to protect the country from fake news but will instead impose requirements on messaging and social media platforms that would do away with privacy and freedom of expression. The laws would mandate platforms and apps to verify users identities with identification documents and even to store information on how a chain message is shared. Of course, to be able to track the development of a potentially fake news chain message, apps would have to do away with end-to-end encryption and continuously monitor their users. Apps that dont comply will be suspended. The EFF is speaking up against this poorly thought out law.

Privacy News Online is brought to you by Private Internet Access, the worlds most trusted VPN service. Sign up now!

Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization. Caleb holds a Master's in Digital Currency from the University of Nicosia as well as a Bachelor's from the University of Virginia. He feels that the world is moving towards a better tomorrow, bit by bit by Bitcoin.

Read the original post:
Privacy News Online | Weekly Review: June 12th, 2020 - Privacy News Online

Global Optical encryption Market Insights and Forecast 2020 to 2025 – Jewish Life News

Optical encryptionMarket Size Covers Global Industry Analysis, Size, Share, CAGR, Trends, Forecast and Business Opportunity.

Download Premium Sample of the Report:https://brandessenceresearch.biz/Request/Sample?ResearchPostId=158&RequestType=Sample

Global Optical encryption Market to reach USD XXX billion by 2025.

Global Optical encryption Market valued approximately USD XXX billion in 2016 is anticipated to grow with a healthy growth rate of more than XX% over the forecast period 2017-2025. Key factors which gives growth to the Optical encryption market are emerging requirement of regulatory compliances, growing concern over data security and privacy due to cyberattacks, and rising data center deployments and advantages such as reduced cost, lower latency, high bandwidth efficiency, improved performance, and high availability, offered by Layer 1 encryption.The objective of the study is to define market sizes of different segments & countries in recent years and to forecast the values to the coming eight years. The report is designed to incorporate both qualitative and quantitative aspects of the industry within each of the regions and countries involved in the study. Furthermore, the report also caters the detailed information about the crucial aspects such as driving factors & challenges which will define the future growth of the market. Additionally, the report shall also incorporate available opportunities in micro markets for stakeholders to invest along with the detailed analysis of competitive landscape and product offerings of key players. The detailed segments and sub-segment of the market are explained below:

By Encryption layer:

oOTN or layer 1oMACsec or layer 2oIPsec or layer 3

By Data rate:

o10Go40Go100G

By Vertical:

oBFSIoGovernment oHealthcare oData centre & cloud oEnergy & utilities

By Regions:oNorth AmericaoU.S.oCanadaoEuropeoUKoGermanyoAsia PacificoChinaoIndiaoJapanoLatin AmericaoBraziloMexicooRest of the World

Furthermore, years considered for the study are as follows:

Historical year 2015Base year 2016Forecast period 2017 to 2025

Some of the key manufacturers involved in the market ciena, adva, nokia, ECI telecom, cisco, huawei, microsemi, infinera, arista networks, Broadcom, juniper networks, centurylink, nucrypt. Acquisitions and effective mergers are some of the strategies adopted by the key manufacturers. New product launches and continuous technological innovations are the key strategies adopted by the major players.

Target Audience of the Global Optical encryption Market in Market Study:

oKey Consulting Companies & AdvisorsoLarge, medium-sized, and small enterprisesoVenture capitalistsoValue-Added Resellers (VARs)oThird-party knowledge providersoInvestment bankersoInvestors

Key factors influencing market growth:

Request Customization of the Report: https://brandessenceresearch.biz/Request/Sample?ResearchPostId=158&RequestType=Methodology

Customization of the Report:

Brandessence Market Research also provides customization options to tailor the reports as per client requirements. This report can be personalized to cater to your research needs. Feel free to get in touch with our sales team, who will ensure that you get a report as per your needs.

Thank you for reading this article. You can also get chapter-wise sections or region-wise report coverage for North America, Europe, Asia Pacific, Latin America, and Middle East & Africa.

To summarize, the Optical encryption market report studies the contemporary market to forecast the growth prospects, challenges, opportunities, risks, threats, and the trends observed in the market that can either propel or curtail the growth rate of the industry. The market factors impacting the global sector also include provincial trade policies, international trade disputes, entry barriers, and other regulatory restrictions.

About Us:

We publish market research reports & business insights produced by highly qualified and experienced industry analysts. Our research reports are available in a wide range of industry verticals including aviation, food & beverage, healthcare, ICT, Construction, Chemicals and lot more. Brand Essence Market Research report will be best fit for senior executives, business development managers, marketing managers, consultants, CEOs, CIOs, COOs, and Directors, governments, agencies, organizations and Ph.D. Students.

Read more here:
Global Optical encryption Market Insights and Forecast 2020 to 2025 - Jewish Life News

Hong Kong is number one in Asia for enterprise encryption, with customer personal information the top data protection priority, reports nCipher…

Encryption key management remains a critical challenge to effective data protection

HONG KONG, May 27, 2020 /PRNewswire/ -- nCipher Security, an Entrust Datacard company and world leader in hardware security modules (HSMs), today released its 2020 Hong Kong Encryption Trends Study, based on research by the Ponemon Institute. In adjusting to a "new work-from-home normal" as a result of the COVID-19 pandemic, most Hong Kong enterprises have accelerated digital initiatives. This brings even more attention to data protection and encryption strategies, with protection of customer information their number one priority. However many organizations face challenges deploying encryption technology.

Most Hong Kong enterprises have an encryption plan in place, but find it difficult to deploy technology and train users

Hong Kong adopts enterprise encryption at one of the highest rates among the global markets surveyed. 60% of Hong Kong companies surveyed say they have a consistent plan or strategy, well above the 48% global average.

Protecting personal customer information is the major driver behind data encryption adoption in Hong Kong. 72% of respondents see it as a priority, 18% higher than the global average. The second driver is intellectual property protection (70%), 18% higher than the global average. Compared to other markets, regulatory compliance mandates are of a lower priority, 17% below average.

Several types of data are encrypted at a much higher rate in Hong Kong compared to its global peers, including intellectual property (68% vs. 49% globally), healthcare information (66% vs. 25% globally) and customer data (52% vs. 44% globally).

Despite active data encryption by enterprises in Hong Kong, many respondents encounter difficulties in deployment (57%) and user training (24%)-- both exceeding global averages. With the growing demand for cybersecurity skills, there is a real need for solutions to help ease the burden of deploying effective enterprise-wide encryption.

Effective encryption is increasingly essential, but key management is critical

The survey shows that rising encryption use intensifies key management challenges, with approximately 60% of Hong Kong firms finding encryption key management to be "very painful". Reasons include no clear ownership (73%) and inadequate key management tools (57%).While 40% of respondents believe IT operations have the most influence in directing encryption strategies, nearly a quarter (23%) say no single function is responsible.

Looking ahead-- cloud, blockchain, quantum and adoption of new encryption technologies

Cloud adoption dominates in Hong Kong with 81% of respondents either currently using cloud computing services with sensitive or confidential data, or planning to do so in the next 12-24 months.

While the surge in remote working has increased the risk of data exposure, how are organizations looking ahead? In the near term, over 70% of responding organizations plan to use blockchain, with asset transactions, wallets, identity, supply chain and smart contracts cited at the top use cases.

Other much-hyped technologies are not on Hong Kong IT organizations' near-term radar. Most IT professionals see the mainstream adoption of multi-party computation at least five years away, with mainstream adoption of homomorphic encryption more than seven years away, and quantum resistant algorithms over eight years out, all of which are in line with global trends.

Story continues

"Consumers expect brands to keep their data safe from breaches and have their best interests at heart. Our survey found that IT leaders are taking this seriously, with the protection of consumer data cited as a top driver of encryption growth," says Dr Larry Ponemon, chairman and founder of Ponemon Institute. "Encryption use is at an all-time high right now, with 60% of respondents this year saying their organization has an encryption plan that is applied consistently across the entire enterprise, while a further 30% say they have a limited plan or strategy applied to certain applications and data types."

"As the world becomes increasingly digitalized, the impact of the global pandemic highlights how critical security and identity have become for organizations and individuals, both at work and at home," said Michael Tai, area vice president, Greater China region, nCipher Security. "We are glad to see that Hong Kong is one of world leaders in adopting enterprise encryption, despite the challenges they face in terms of deployment and cybersecurity skills shortages."

"Organizations are under relentless pressure to deliver high security and seamless access-- protecting their customer data, business critical information and applications, while ensuring business continuity," said Ian Christofis, managing principal consultant, nCipher Security. "nCipher empowers customers by providing a high assurance security foundation that ensures the integrity and trustworthiness of their data, applications and intellectual property."

Other key findings from the Hong Kong Encryption Trends Study include:

Download the 2020 Hong Kong Encryption Trends Study

2020 Hong Kong Encryption Trends Study methodology

The 2020 Hong Kong Encryption Trends Study surveyed 267 IT professionals in Hong Kong and is part of a larger global study, based on research by the Ponemon Institute. The report captures how organizations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their business critical information and applications.

6,457 IT professionals were surveyed across multiple industry sectors in 17 countries/regions: Australia, Brazil, France, Germany, India, Japan, Hong Kong, Mexico, the Middle East (which is a combination of respondents located in Saudi Arabia and the United Arab Emirates), the Russian Federation, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand, and Vietnam), South Korea, Taiwan, the United Kingdom, the United States and two new regions for the first time, Netherlands and Sweden.

Michael Tai, area vice president, Greater China region, nCipher Security (left) and Ian Christofis, managing principal consultant, nCipher Security (right)

Click hereto download high-resolution images and relevant videos.

About nCipher Security

nCipher Security, an Entrust Datacard company, is a leader in the general-purpose hardware security module (HSM) market, empowering world-leading organizations by delivering trust, integrity and control to their business-critical information and applications. Today's fast-moving digital environment enhances customer satisfaction, gives competitive advantage and improves operational efficiency-- it also multiplies the security risks. Our cryptographic solutions secure emerging technologies such as cloud, IoT, blockchain, and digital payments and help meet new compliance mandates. We do this using our same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business-critical applications, ensure the integrity of your data and put you in complete control-- today, tomorrow, always. http://www.ncipher.com

Follow us on LinkedIn, Twitter, Facebook and Instagram-- search nCipherSecurity.

Video - https://cdn5.prnasia.com/video/20200527_Ncipher_Security_EN.mp4Photo - https://photos.prnasia.com/prnh/20200527/2814366-1Logo - https://photos.prnasia.com/prnh/20200527/2814366-1LOGO

SOURCE nCipher Security

Go here to read the rest:
Hong Kong is number one in Asia for enterprise encryption, with customer personal information the top data protection priority, reports nCipher...

Are social giants morally obligated to break encryption? – ACS

It may have originally been intended to protect citizens from online harm, but scope creep could see the UKs new duty of care legislation put legal heft behind Five Eyes governments long-running efforts to access social media users encrypted communications.

New reports suggest that ministers from Five Eyes countries Australia, New Zealand, UK, US, and Canada will meet this week to discuss using the new UK legislation to cudgel recalcitrant social media giants into providing government agencies with access to private communications.

A UK government white paper last year outlined its proposed approach which emphasises the importance of a culture of transparency, trust and accountability that would force social media firms to audit harmful content and the measures they are taking to address it.

Compliance with the enforcement regime would be overseen by an industry-funded independent regulator which, the government posited, would also have powers to require additional information... including about the operation of algorithms.

The word encryption is conspicuously absent from the 98-page document, with just one instance of the term, relating to how online child grooming moves across different platforms.

A new twist on an old concept

Despite ongoing threats to clamp down on social media giants in the US, the UK legislation would lead the world in imposing a legally-enforceable duty of care on online platforms.

Just as the common-law idea of duty of care has been applied to a wealth of different situations, interest from Five Eyes partners suggests they see the new laws as allowing them to force social media companies to decrypt messages between customers.

Pushback from Apple, Facebook, Google and other social media giants remains a thorn in the side of police and intelligence services that have struggled to access encrypted mobile devices they say are protecting terrorists and paedophiles.

Facebooks resistance which stems in large part from the Privacy Manifesto that CEO Mark Zuckerberg penned last year after the companys Cambridge Analytica privacy debacle has been particularly problematic given that it owns dominant social media platforms Facebook, Instagram, and WhatsApp.

I believe the future of communication will increasingly shift to private, encrypted services where people can be confident what they say to each other stays secure and their messages and content won't stick around forever, Zuckerberg wrote amidst law enforcement bodies increasing calls for access to customer data.

Under zero knowledge encryption frameworks, that data is often protected by encryption that the social media firms often cant break but that hasnt stopped government agencies from demanding access to it.

Where does liability start and end?

Australias leadership against live-streaming violence kick-started a global consensus around forcing social media firms to police their content, and its Assistance and Access Act has singularly and controversially focused on letting the government order the breaking of encryption.

Home Affairs Minister Peter Dutton is also calling for unprecedented powers allowing the Australian Signals Directorate (ASD)s surveillance arsenal to be turned on criminal suspects within in Australia.

Yet rather than focusing on specific technologies, the UKs idea of subjecting social media providers to a broader duty of care could shift the onus onto those companies to ensure that potentially harmful communications can be accessed and blocked.

The design choices made by the companies in constructing these platforms are not neutral, a trio of legal experts wrote in an analysis of the proposed laws that called it a sensible regulatory framework on which to proceed.

Every pixel a user sees on an online service is there as a result of decisions taken by the company the operates it, they wrote. Companies have to own responsibility for reasonably foreseeable matters that arise from operation of their service.

If the use of their encryption platforms for online harms like terrorism and paedophilia can be reasonably foreseen, the logic goes, online platforms would be breaking the law if they dont provide a mechanism to help stop such harms.

This novel legal structure would distance the UK government from the perception that its forcing companies to build technological back doors into their products.

The problem with backdoors, as well-intentioned as they are, is that they are engineered vulnerabilities and bad actors inevitably find them, Internet Society senior director of policy strategy and development Konstantinos Komaitis warned.

This means for every crime you stop with a backdoor, you enable countless others... the criminal world effectively gets their hands on a digital skeleton key.

Whether the new legislation represents more carrot or stick, remains to be seen but the fact that Google, Facebook and Twitter all singled out the new legislation as a potential threat suggests that the battle is only getting started.

Read this article:
Are social giants morally obligated to break encryption? - ACS

Facebook plot to encrypt ALL chats will help child abusers to hide, former police chief warns – The Sun

FACEBOOK risks helping child abusers to hide their sick online activities, a former police chief has warned.

The alarm has been raised over Facebook's plans to encrypt more of our private chats shutting out hackers, but also the police.

4

Encryption jumbles messages in transit, and is widely accepted to be one of the best ways of blocking online snoopers.

But Sir Mark Rowley, a former assistant commission at the Metropolitan Police, said Facebook's encryption plans would "make it easier for criminals to flourish on their platform".

"I have lost count of the times my teams were unable to stop crimes in the UK, because of decisions taken thousands of miles away by Silicon Valley executives," Sir Mark said, as quoted by The Times.

He said that Facebook would be "blinding itself to serious crime".

4

"Without access to content, Facebook's AI will be able to detect only a tiny fraction of the criminality it currently identifies," he said.

"We consider our homes to be private, but if the police suspect a serious crime is being plotted in a safe house, it's entirely reasonable to expect them to get a warrant to bug that house.

"This is the digital equivalent."

Facebook is currently trying to"merge" the behind-the-scenes messaging techthat powers Facebook Messenger, WhatsApp and Instagram.

The idea is that users will be able to message each other from and to any Facebook platform. A WhatsApp user could chat to an Instagrammer, for example.

This would also mean encrypting messages sent on all platforms rather than just WhatsApp.

End-to-end encryption means your message is garbled into gibberish during transit, and can only be read in its true form by the sender and recipient.

That's because the contacts involved in the chat each have a "key" that decodes the message.

Anyone else (including Facebook) is unable to read the encrypted text.

It's an important privacy feature, and already one of the defining features of WhatsApp.

Strong encryption is critically important to keep everyone safe from hackers and criminals," said a Facebook spokesperson, speaking to The Sun.

"It is already the leading security technology employed by many services to protect peoples chats and calls today.

"Facebook has led the industry in tackling terrorism and child exploitation online, including tripling the size of our safety and security team to 35,000 people in recent years.

"The rollout of end-to-end encryption is a long-term project and we are committed to building strong safety measures into our plans.

"We will continue to work with industry experts and law enforcement to combat criminal activity across all our platforms."

4

Today's comments echo earlier warnings about Facebook inadvertently helping child abusers.

In February, dozens of child safety groups penned a joint letter urging Mark Zuckerberg to bin his encryption plans.

"Facebook may be happy to shut their eyes to abuse but they cant close their ears to this unanimous concern shown by international experts," Peter Wanless, NSPCC chief, told The Sun.

"Mark Zuckerberg has a choice whether to allow sexual abuse to soar on his sites or listen to those from all over the world asking him to rethink how to implement encryption without putting children at risk.

"In its current form encryption would breach Facebooks duty of care for children so the UK Government must ensure a new regulator has the power to hold them financially and criminally accountable."

Child safety experts including Child USA and the UK's NSPCC argue that it puts kids at risk however.

"Abusers will be able to exploit existing design aspects to make easy and frictionless contact with large numbers of children," the letter reads.

"And then rapidly progress to sending end-to-end encrypted messages.

"This presents an unacceptable risk to children, and would arguably make your services unsafe.

"End-to-end encryption will embolden abusers to initiate and rapidly escalate abuse directly on Facebook's services."

The letter adds: "We therefore urge you not to proceed with the rollout until and unless you can demonstrate there will be no reduction in children's safety as a result of this decision."

Who is on Facebook's Safety Advisory Board?

Here's the official list...

4

Encryption is a tricky issue for tech giants.

By encrypting messages, it becomes impossible to tech firms to police the contents of those message.

This, safety experts say, puts kids at greater risk of being targeted by predators.

But privacy experts (and Facebook itself) say encryption is vital to the security of messaging.

By placing a "backdoor" in messages, it exposes all users' chats to government snooping and hack attacks.

"Strong encryption is critically important to keep everyone safe from hackers and criminals," said David Miles, Head of Safety at Facebook.

"The rollout of end-to-end encryption is a long-term project, protecting children online is critically important to this effort and we are committed to building strong safety measures into our plans.

"We are working closely with child safety experts including NCMEC, law enforcement, governments and other technology companies to help keep children safe online.

"We have led the industry in safeguarding children from exploitation and we are bringing this same commitment and leadership to our work on encryption.

"Over the last few years, weve tripled the size of our safety and security team and now have more than 35,000 people working to protect the people using our platforms.

"We are also continuing to invest billions in safety, including artificial intelligence technology to proactively find and remove harmful content."

Facebook has shown no signs of backing down from its decision to roll out end-to-end encryption.

ABORT, ABORTHistoric SpaceX mission CANCELLED after tornado alert risks astronauts' safety

Live Blog

ABORT, ABORTNasa SpaceX launch cancelled MINUTES before liftoff due to stormy conditions

TELLY UPGRADESky TV is about to look MUCH better but only on some telly models

EYES TO THE SKIESHow to spot the ISS and Elon Musk's spaceship with the naked eye TONIGHT

T-MINUS...Elon Musk's SpaceX rocket blasts off TONIGHT and you can watch it live here

PLAY TIMEPS5 to FINALLY debut at top-secret 'virtual' Sony event on June 3, insiders claim

In other news, Facebook has announced a new digital wallet called Novi for its controversial Libra cryptocurrency.

Facebook Messengeruses AI to spot suspected paedos.

Facebook and Instagram have launched virtual shopswhere you can buy almost anything.

And a recent surge in users means that2.6billion people now log onto Facebook every single month.

We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at tech@the-sun.co.uk

See the article here:
Facebook plot to encrypt ALL chats will help child abusers to hide, former police chief warns - The Sun

Encryption Software Market To Expand At A Robust 14.27% Cagr Of 2020 | Sophos,McAfee,Check Point Software Technologies,Proofpoint,Trend Micro – 3rd…

Software-based encryption is one of the fast emerging end point data security solutions. An increasing number of organizations worldwide are adopting encryption to address their growing concerns of data safety and data privacy compliance regulations. With data protection and compliance becoming a high priority, organizations have started to view encryption as an enabler to achieve compliance, data security and flexibility. In addition to the complex regulations, increasing adoption of new technologies such as mobility, cloud and virtualization have also fuelled the need for encryption more than ever before.

Get Sample Copy of this Report @ https://www.premiummarketinsights.com/sample/AMR00012629

Some of the key players of Encryption Software Market:

The main purpose of an encryption software is to protect the confidentiality of the data stored in files/folders and disks or data-at-rest; and the data travelling over wireless network or data-in-transit, depending upon the security and compliance requirements of an organization. This is achieved by converting a message or plain text into coded message called the Cipher text so that only the authorized parties can read it. Software-based encryption uses software to encrypt and decrypt data at-rest as well as data-in-transit. Thus, by rendering the data unreadable by unauthorized persons, encryption software ensures the safety and security of the confidential data.

Additionally, a number of data privacy legislations mandate the use of encryption or cite encryption as one most appropriate measures of data protection. Thus, the adoption of encryption would continue to grow in response to data protection compliance regulations and the on-going cyber attacks.

Owning our reports will help you solve the following issues:

1. Uncertainty about the future?Our research and insights help our clients to foresee upcoming revenue pockets and growth areas. This helps our clients to invest or divest their resources.

2. Understanding market sentiments?It is imperative to have a fair understanding of market sentiments for a strategy. Our insights furnish you with a hawk-eye view on market sentiment. We keep this observation by engaging with Key Opinion Leaders of a value chain of each industry we track.

3. Understanding the most reliable investment centers?Our research ranks investment centers of the market by considering their returns, future demands, and profit margins. Our clients can focus on the most prominent investment centers by procuring our market research.

4. Evaluating potential business partners?Our research and insights help our clients in identifying compatible business partners.

Avail Discount on this Report:https://www.premiummarketinsights.com/discount/AMR00012629

What the report features:-

1.Global analysis of Encryption Software Market from 2013 2020 illustrating the progression of the market.

2. Forecast and analysis of Encryption Software Market by Dosage, Route of Administration and Application from 2013 2020.

3.Forecast and analysis of Encryption Software Market in five major regions, namely; North America, Europe, Asia-Pacific (APAC), Middle East and Africa (MEA) and South & Central America.

Reason to Buy:

1.Save and reduce time carrying out entry-level research by identifying the growth, size, leading players and segments in the global Encryption Software Market.2. Highlights key business priorities in order to assist companies to realign their business strategies.3. The key findings and recommendations highlight crucial progressive industry trends in the Encryption Software Market, thereby allowing players to develop effective long term strategies.4. Develop/modify business expansion plans by using substantial growth offering developed and emerging markets.5. Scrutinize in-depth global market trends and outlook coupled with the factors driving the market, as well as those hindering it.6. Enhance the decision-making process by understanding the strategies that underpin commercial interest with respect to products, segmentation and industry verticals.

About Premiummarketinsights:

Premiummarketinsights.com is a one stop shop of market research reports and solutions to various companies across the globe. We help our clients in their decision support system by helping them choose most relevant and cost effective research reports and solutions from various publishers. We provide best in class customer service and our customer support team is always available to help you on your research queries.

Contact Us: Call: +912067274191Email: [emailprotected]

See original here:
Encryption Software Market To Expand At A Robust 14.27% Cagr Of 2020 | Sophos,McAfee,Check Point Software Technologies,Proofpoint,Trend Micro - 3rd...

Encryption Software Market Forecast Revised in a New Market Expertz Report as COVID-19 Projected to Hold a Massive Impact on Sales in 2020 | Long-term…

Market Expertz sheds light on the market scope, potential, and performance perspective of the Global Encryption Software Market by carrying out an extensive market analysis. Pivotal market aspects like market trends, the shift in customer preferences, fluctuating consumption, cost volatility, the product range available in the market, growth rate, drivers and constraints, financial standing, and challenges existing in the market are comprehensively evaluated to deduce their impact on the growth of the market in the coming years. The report also gives an industry-wide competitive analysis, highlighting the different market segments, individual market share of leading players, and the contemporary market scenario and the most vital elements to study while assessing the global Encryption Software market.

The research study includes the latest updates about the COVID-19 impact on the Encryption Software sector. The outbreak has broadly influenced the global economic landscape. The report contains a complete breakdown of the current situation in the ever-evolving business sector and estimates the aftereffects of the outbreak on the overall economy.

Avail your copy of the sample of the Encryption Software market [emailprotected] https://www.marketexpertz.com/sample-enquiry-form/20910

The information that is furnished in the report is updated and certified by industry analysts, which help investors and industry experts to make crucial business decisions. Moreover, this report focuses on the development of Encryption Software and vital factors that contribute to the overall market growth.

Competitive Analysis:

Encryption Software market report highlights key players included in the market in order to render a comprehensive view of the competing players existing in the market. The participants are profiled based on factors such as product types manufactured, industry scenario, share distribution in the market, and strategies of competitors.

Leading Encryption Software manufacturers/companies operating at both regional and global levels:

DellEsetGemaltoIBMMcafeeMicrosoftPkwareSophosSymantecThales E-SecurityTrend MicroCryptomathicStormshieldOthers

The report also inspects the financial standing of the leading companies, which includes gross profit, revenue generation, sales volume, sales revenue, manufacturing cost, individual growth rate, and other financial ratios.

The Encryption Software market report provides successfully marked contemplated policy changes, favorable circumstances, industry news, developments, and trends. This information can help readers fortify their market position. It packs various parts of information gathered from secondary sources, including press releases, web, magazines, and journals as numbers, tables, pie-charts, and graphs. The information is verified and validated through primary interviews and questionnaires. The data on growth and trends focuses on new technologies, market capacities, raw materials, CAPEX cycle, and the dynamic structure of the Encryption Software market.

Order Your Copy Now (Customized report delivered as per your specific requirement) @ https://www.marketexpertz.com/checkout-form/20910

This study analyzes the growth of Encryption Software based on the present, past and futuristic data and will render complete information about the Encryption Software industry to the market-leading industry players that will guide the direction of the Encryption Software market through the forecast period. All of these players are analyzed in detail so as to get details concerning their recent announcements and partnerships, product/services, and investment strategies, among others.

Industrial Analysis:

The Encryption Software market report is extensively categorized into different product types and applications. The study has a separate section for explaining the cost of raw material and the revenue returns that are gained by the players of the market.

The segmentation included in the report is beneficial for readers to capitalize on the selection of appropriate segments for the Encryption Software sector and can help companies in deciphering the optimum business move to reach their desired business goals.

In market segmentation by types of Encryption Software, the report covers-

On-premisesCloudOthers

In market segmentation by applications of the Encryption Software, the report covers the following uses-

Disk encryptionFile/folder encryptionDatabase encryptionCommunication encryptionCloud encryptionOthers

The report includes accurately drawn facts and figures, along with graphical representations of vital market data. The research report sheds light on the emerging market segments and significant factors influencing the growth of the industry to help investors capitalize on the existing growth opportunities.

To get in-depth insights into the global Encryption Software market, reach out to us @ https://www.marketexpertz.com/customization-form/20910

Sales Forecast:

The report contains historical revenue and volume that backing information about the market capacity, and it helps to evaluate conjecture numbers for key areas in the Encryption Software market. Additionally, it includes a share of each segment of the Encryption Software market, giving methodical information about types and applications of the market.

Reasons for Buying Encryption Software Market Report

Read the full Research Report along with a table of contents, facts and figures, charts, graphs, etc. @ https://www.marketexpertz.com/industry-overview/encryption-software-market

In the end, the Encryption Software market is analyzed for revenue, sales, price, and gross margin. These points are examined for companies, types, applications, and regions.

To summarize, the global Encryption Software market report studies the contemporary market to forecast the growth prospects, challenges, opportunities, risks, threats, and the trends observed in the market that can either propel or curtail the growth rate of the industry. The market factors impacting the global sector also include provincial trade policies, international trade disputes, entry barriers, and other regulatory restrictions.

About Us:Planning to invest in market intelligence products or offerings on the web? Then marketexpertz has just the thing for you reports from over 500 prominent publishers and updates on our collection daily to empower companies and individuals catch-up with the vital insights on industries operating across different geography, trends, share, size and growth rate. Theres more to what we offer to our customers. With marketexpertz you have the choice to tap into the specialized services without any additional charges.

Contact Us:John WatsonHead of Business Development40 Wall St. 28th floor New York CityNY 10005 United StatesDirect Line: +1-800-819-3052Visit our News Site: http://newssucceed.com

See the original post here:
Encryption Software Market Forecast Revised in a New Market Expertz Report as COVID-19 Projected to Hold a Massive Impact on Sales in 2020 | Long-term...

Global Homomorphic Encryption Market Analysis 2020-2025: by Key Players with Countries, Type, Application and Forecast Till 2025 – Cole of Duty

This report studies the global Homomorphic Encryption market size, industry status and forecast, competition landscape and growth opportunity. This research report categorizes the global Homomorphic Encryption market by companies, region, type and end-use industry.

This report studies the Homomorphic Encryption market, Homomorphic encryption is a form of encryption that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. The purpose of homomorphic encryption is to allow computation on encrypted data.

Access the PDF sample of the report @https://www.orbisresearch.com/contacts/request-sample/2164405

The Homomorphic Encryption is mainly classified into the following types: Partially Homomorphism, Somewhat Homomorphism and Fully Homomorphism. And Fully Homomorphism is the most widely used type which took up about 50.18% of the total in 2016 in USA

Homomorphic Encryption is mainly used in Industrial, Government, Financial & Insurance, Health Care and Others. And Government is the most widely used area which took up about 30.98% of the USA total in 2016.

In 2017, the global Homomorphic Encryption market size was xx million US$ and it is expected to reach xx million US$ by the end of 2025, with a CAGR of xx% during 2018-2025.

This report focuses on the global top players, coveredMicrosoft (U.S.)IBM Corporation (U.S.)Galois Inc (U.S.)CryptoExperts (France)

Market segment by Regions/Countries, this report coversUnited StatesEuropeChinaJapanSoutheast AsiaIndia

Market segment by Type, the product can be split intoPartially HomomorphismSomewhat HomomorphismFully Homomorphism

Make an enquiry of this report @https://www.orbisresearch.com/contacts/enquiry-before-buying/2164405

Market segment by Application, split intoIndustrialGovernmentFinancial & InsuranceHealth CareOthers

The study objectives of this report are:To study and forecast the market size of Homomorphic Encryption in global market.To analyze the global key players, SWOT analysis, value and global market share for top players.To define, describe and forecast the market by type, end use and region.To analyze and compare the market status and forecast between China and major regions, namely, United States, Europe, China, Japan, Southeast Asia, India and Rest of World.To analyze the global key regions market potential and advantage, opportunity and challenge, restraints and risks.To identify significant trends and factors driving or inhibiting the market growth.To analyze the opportunities in the market for stakeholders by identifying the high growth segments.To strategically analyze each submarket with respect to individual growth trend and their contribution to the marketTo analyze competitive developments such as expansions, agreements, new product launches, and acquisitions in the marketTo strategically profile the key players and comprehensively analyze their growth strategies.

In this study, the years considered to estimate the market size of Homomorphic Encryption are as follows:History Year: 2013-2017Base Year: 2017Estimated Year: 2018Forecast Year 2018 to 2025For the data information by region, company, type and application, 2017 is considered as the base year. Whenever data information was unavailable for the base year, the prior year has been considered.

Browse the complete report @https://www.orbisresearch.com/reports/index/global-homomorphic-encryption-market-size-status-and-forecast-2025

Key StakeholdersHomomorphic Encryption ManufacturersHomomorphic Encryption Distributors/Traders/WholesalersHomomorphic Encryption Subcomponent ManufacturersIndustry AssociationDownstream Vendors

Available CustomizationsWith the given market data, QYResearch offers customizations according to the companys specific needs. The following customization options are available for the report:Regional and country-level analysis of the Homomorphic Encryption market, by end-use.

Detailed analysis and profiles of additional market players.

Table of Contents

Global Homomorphic Encryption Market Size, Status and Forecast 2025

Chapter One: Industry Overview of Homomorphic Encryption

1.1 Homomorphic Encryption Market Overview

1.1.1 Homomorphic Encryption Product Scope

1.1.2 Market Status and Outlook

1.2 Global Homomorphic Encryption Market Size and Analysis by Regions (2013-2018)

1.2.1 United States

1.2.2 Europe

1.2.3 China

1.2.4 Japan

1.2.5 Southeast Asia

1.2.6 India

1.3 Homomorphic Encryption Market by Type

1.3.1 Partially Homomorphism

1.3.2 Somewhat Homomorphism

1.3.3 Fully Homomorphism

1.4 Homomorphic Encryption Market by End Users/Application

1.4.1 Industrial

1.4.2 Government

1.4.3 Financial & Insurance

1.4.4 Health Care

1.4.5 Others

Chapter Two: Global Homomorphic Encryption Competition Analysis by Players

2.1 Homomorphic Encryption Market Size (Value) by Players (2013-2018)

2.2 Competitive Status and Trend

2.2.1 Market Concentration Rate

2.2.2 Product/Service Differences

2.2.3 New Entrants

2.2.4 The Technology Trends in Future

Chapter Three: Company (Top Players) Profiles

3.1 Microsoft (U.S.)

3.1.1 Company Profile

3.1.2 Main Business/Business Overview

3.1.3 Products, Services and Solutions

Continued.

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:

Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: +1 (972)-362-8199 ; +91 895 659 5155

Read more from the original source:
Global Homomorphic Encryption Market Analysis 2020-2025: by Key Players with Countries, Type, Application and Forecast Till 2025 - Cole of Duty