Category Archives: Encryption

Encryption Foes in Washington Won’t Give Up – Reason

It's impossible to overstate just how much governments hate not being able to read your mail, listen to your phone calls, and peruse your text messages. When all that snoopy officials can pull up is scrambled gobbledygook, they just know they're missing out on the good stuff, like little kids bristling at whispered adult conversations.

That explains the U.S. government's decades-long war against private cryptography and its most recent manifestation in the crusade against "warrant-proof encryption."

No matter how much government officials stamp their feet and hold their breath, it'd be a bad idea to give them the access they want to our data. And they do keep stamping their feet.

"By enabling dangerous criminals to cloak their communications and activities behind an essentially impenetrable digital shield, the deployment of warrant-proof encryption is already imposing huge costs on society," Attorney General Bill Barr huffed last summer when he delivered the keynote address at the International Conference on Cyber Security in New York City. "It seriously degrades the ability of law enforcement to detect and prevent crime before it occurs. And, after crimes are committed, it thwarts law enforcement's ability to identify those responsible or to successfully prosecute the guilty parties."

If that sounds familiar, it's because it's essentially a rephrasing of former FBI Director James Comey's 2014 argument that "those charged with protecting our people aren't always able to access the evidence we need to prosecute crime and prevent terrorism even with lawful authority. We have the legal authority to intercept and access communications and information pursuant to court order, but we often lack the technical ability to do so."

In turn, Comey barely rewarmed the Clinton White House's overwrought 1994 warnings that "the same encryption technology that can help Americans protect business secrets and personal privacy can also be used by terrorists, drug dealers, and other criminals."

The encryption technology that gets officials so hot and bothered year after year grows increasingly widespread for the simple reason that it satisfies a very real demand. Barr may worry about privacy-minded terrorists and drug sellers, but most people are more concerned about hackers, identity thieves, and nosy busybodies. In response, tech companies build end-to-end encryption into a host of products so that regular people can benefit without memorizing a user's manual.

In response, Barr and company argue that all they want is a "back door" built into communications services so that they can gain access when necessaryand only after they jump through all the legal niceties, we're assured.

But weakened, government-accessible encryption isn't a magic solution that will be used only to catch bad guys. It will be weakened encryption, period.

"The problem with backdoors is knownany alternate channel devoted to access by one party will undoubtedly be discovered, accessed, and abused by another," notes David Ruiz, a writer with the internet security firm Malwarebytes Labs. "Cybersecurity researchers have repeatedly argued for years that, when it comes to encryption technology, the risk of weakening the security of countless individuals is too high."

"Encryption is one of the few security techniques that mostly works. We can't afford to mess it up," cautions Matt Blaze, a cybersecurity expert at the University of Pennsylvania. "As someone who's been working on securing the 'net for going on three decades now, having to repeatedly engage with this 'why can't you just weaken the one tool you have that actually works' nonsense is utterly exhausting."

How can we know that the critics are right? Because the U.S. government itself claims that a Chinese company has, for years, been misusing exactly such back doors.

"U.S. officials say Huawei Technologies Co. can covertly access mobile-phone networks around the world through 'back doors' designed for use by law enforcement, as Washington tries to persuade allies to exclude the Chinese company from their networks," the Wall Street Journal reported on February 12.

Well, it's only fair. For half a century, the CIA and German intelligence spied on international communications courtesy of back doors they built into the products of Crypto AG, a company the agencies co-owned.

The CIA and its German partner kept that arrangement secret for a long time, but mandated access to everybody's messaging apps would be public knowledge and serious hacker-bait. It might even be a target for bad actors wielding the hacking tools that were stolen in 2017 from the National Security Agencyan exploit generally considered among the most significant events in cybersecurity.

Whoopsies. It's almost like you really shouldn't trust government types with the ability to peruse your communications and paw through your data.

Despite that history, Senators Lindsey Graham (R-S.C.) and Richard Blumenthal (D-Conn.) are floating a bill that would make tech companies "earn" Section 230 protection against liability for other people's communications that pass through their platforms by adopting "best practices" that satisfy amorphous government standards.

"The AG could single-handedly rewrite the 'best practices' to state that any provider that offers end-to-end encryption is categorically excluded from taking advantage of this safe-harbor option," writes Riana Pfefferkorn, associate director of surveillance and cybersecurity at Stanford Law School. "Or he could simply refuse to certify a set of best practices that aren't sufficiently condemnatory of encryption. If the AG doesn't finalize a set of best practices, then this entire safe-harbor option just vanishes."

The whole thing is cloaked in the language of "child sex-abuse material" so that privacy advocates have to argue against a measure nominally aimed at kiddy porn in order to protect strong encryption protection for everybody's communications. Yes, once again, government officials pretend that the terrible things they want to do are all about protecting the children.

Meanwhile, any back doors forced into our encrypted communications are likely to affect harmless people more than they inconvenience criminals and terrorists.

"Short of a form of government intervention in technology that appears contemplated by no one outside of the most despotic regimes, communication channels resistant to surveillance will always exist," states a 2016 report from the Berkman Center for Internet and Society at Harvard University.

Unwilling to rely on commercial products that may or may not keep their secrets, criminals and terrorists develop their own encryption productsincluding secure phones. They're very unlikely to comply with law enforcement demands for back doors.

"I think there's no way we solve this entire problem," the FBI's Comey admitted to the U.S. Senate Judiciary Committee in 2015. "Encryption is always going to be available to the sophisticated user."

But what about the rest of us? Despite all the evidence of the foolishness of their efforts, government officials keep trying to make us expose our data to them and the criminals who ride on their coattails.

Originally posted here:
Encryption Foes in Washington Won't Give Up - Reason

BestCrypt by Jetico expands cross-platform protection to computers with T2 chip – Help Net Security

Jetico, long-trusted pioneer in data encryption, announced support for Mac computers with a T2 security chip. With this update, BestCrypt Volume Encryption Enterprise Edition becomes the industrys most comprehensive enterprise encryption software for Windows and macOS.

Native OS encryption tools might be an easy way to get started with data protection. Yet theres a critical limitation. Their security is bound to only some versions of a single operating system, states Jetico CEO, Michael Waksman.

BestCrypt is already proven to run on more Windows versions than native BitLocker. Now we expand our cross-platform protection to all editions of Mac.

The latest version of BestCrypt Volume Encryption applies FileVault, macOS native encryption, for Apple File System (APFS) volumes on computers with a T2 chip. Jetico offers the worlds only OS agnostic encryption tool, still used for all other volumes to ensure cross compatibility, especially when handling removable drives.

Waksman continues, Lost and stolen removable drives is one of the main causes of data breaches. Encryption overcomes this risk. Yet managing and accessing encrypted data on USB drives can be challenging available computers dont always support the same encryption tool.

Waksman focuses on the user benefit claiming, With this BestCrypt update, Jetico proudly delivers an independent solution to improve security while also boosting productivity. As always, our goal is to provide painless encryption that works the way you do.

Jetico Central Manager (JCM), part of BestCrypt Volume Encryption Enterprise Edition, also includes:

For added convenience, BestCrypt Volume Encryption Enterprise Edition can also run in the cloud, empowering Admins to control all disk encryption activities from anywhere without needing to configure and maintain a dedicated server.

See the rest here:
BestCrypt by Jetico expands cross-platform protection to computers with T2 chip - Help Net Security

Barr’s Motives, Encryption and Protecting Children; DOJ 230 Workshop Review, Part III – Techdirt

from the don't-break-the-internet dept

In Part I of this series on the Department of Justices February 19 workshop, Section 230 Nurturing Innovation or Fostering Unaccountability? (archived video and agenda), we covered why Section 230 is important, how it works, and how panelists proposed to amend it. Part II explored Section 230s intersection with criminal law.

Here, we ask what DOJs real objective with this workshop was. The answer to us seems clear: use Section 230 as a backdoor for banning encryption a backdoor to a backdoor in the name of stamping out child sexual abuse material (CSAM) while, conveniently, distracting attention from DOJs appalling failures to enforce existing laws against CSAM. We conclude by explaining how to get tough on CSAM to protect kids without amending Section 230 or banning encryption.

Banning Encryption

In a blistering speech, Trumps embattled Attorney General, Bill Barr, blamed the 1996 law for a host of ills, especially the spread of child sexual abuse material (CSAM). But he began the speech as follows:

[Our] interest in Section 230 arose in the course of our broader review of market-leading online platforms, which we announced last summer. While our efforts to ensure competitive markets through antitrust enforcement and policy are critical, we recognize that not all the concerns raised about online platforms squarely fall within antitrust. Because the concerns raised about online platforms are often complex and multi-dimensional, we are taking a holistic approach in considering how the department should act in protecting our citizens and society in this sphere.

In other words, the DOJ is under intense political pressure to do something about Big Tech most of all from Republicans, who have increasingly fixated on the idea that Big Tech is the new Liberal Media out to get them. Theyve proposed a flurry of bills to amend Section 230 either to roll back its protections or to hold companies hostage, forcing them to do things that really have nothing to do with Section 230, like be "politically neutral" (the Hawley bill) or ban encryption (the Graham-Blumenthal bill), because websites and Internet services simply cant operate without Section 230s protections.

Multiple news reports have confirmed our hypothesis going into the workshop: that its purpose was to tie Section 230 to encryption. Even more importantly, the closed-door roundtable after the workshop (to which we were, not surprisingly, not invited) reportedly concluded with a heated discussion of encryption, after the DOJ showed participants draft amendments making Section 230 immunity contingent on compromising encryption by offering a backdoor to the U.S. government. Barrs speech said essentially what we predicted he would say right before the workshop:

Technology has changed in ways that no one, including the drafters of Section 230, could have imagined. These changes have been accompanied by an expansive interpretation of Section 230 by the courts, seemingly stretching beyond the statutes text and original purpose. For example, defamation is Section 230s paradigmatic application, but Section 230 immunity has been extended to a host of additional conduct from selling illegal or faulty products to connecting terrorists to facilitating child exploitation. Online services also have invoked immunity even where they solicited or encouraged unlawful conduct, shared in illegal proceeds, or helped perpetrators hide from law enforcement. ...

Finally, and importantly, Section 230 immunity is relevant to our efforts to combat lawless spaces online. We are concerned that internet services, under the guise of Section 230, can not only block access to law enforcement even when officials have secured a court-authorized warrant but also prevent victims from civil recovery. This would leave victims of child exploitation, terrorism, human trafficking, and other predatory conduct without any legal recourse. Giving broad immunity to platforms that purposefully blind themselves and law enforcers to illegal conduct on their services does not create incentives to make the online world safer for children. In fact, it may do just the opposite.

Barr clearly wants to stop online services from going dark through Section 230 even though Section 230 has little (if any) direct connection to encryption. His argument was clear: Section 230 protections shouldn't apply to services that use strong encryption. Thats precisely what the Graham-Blumenthal EARN IT Act would do: greatly lower the bar for enforcement of existing criminal laws governing child sexual abuse material (CSAM), allow state prosecutions, and civil lawsuits (under a lower burden of proof), but then allow Internet services to earn back their Section 230 protection against this increased liability by doing whatever a commission convened and controllled by the Attorney General tells them to do.

Those two Senators are expected to formally introduce their bill in the coming weeks. Undoubtedly, theyll refer back to Barrs speech, claiming that law enforcement needs their bill passed ASAP to protect the children.

Barrs speech on encryption last July didnt mention 230 but went much further in condemning strong encryption. If you read it carefully, you can see where Graham and Blumenthal got their idea of lowering the standard of existing federal law on CSAM from actual knowledge to recklessness, which would allow the DOJ to sue websites that offer stronger encryption than the DOJ thinks is really necessary. Specifically, Barr said:

The Department has made clear what we are seeking. We believe that when technology providers deploy encryption in their products, services, and platforms they need to maintain an appropriate mechanism for lawful access. This means a way for government entities, when they have appropriate legal authority, to access data securely, promptly, and in an intelligible format, whether it is stored on a device or in transmission. We do not seek to prescribe any particular solution. ...

We are confident that there are technical solutions that will allow lawful access to encrypted data and communications by law enforcement without materially weakening the security provided by encryption. Such encryption regimes already exist. For example, providers design their products to allow access for software updates using centrally managed security keys. We know of no instance where encryption has been defeated by compromise of those provider-maintained keys. Providers have been able to protect them. ...

Some object that requiring providers to design their products to allow for lawful access is incompatible with some companies business models. But what is the business objective of the company? Is it A to sell encryption that provides the best protection against unauthorized intrusion by bad actors? Or is it B to sell encryption that assures that law enforcement will not be able to gain lawful access? I hope we can all agree that if the aim is explicitly B that is, if the purpose is to block lawful access by law enforcement, whether or not this is necessary to achieve the best protection against bad actors then such a business model, from societys standpoint, is illegitimate, and so is any demand for that product. The product jeopardizes the publics safety, with no countervailing utility. ...

The real question is whether the residual risk of vulnerability resulting from incorporating a lawful access mechanism is materially greater than those already in the unmodified product. The Department does not believe this can be demonstrated.

In other words, companies choosing to offer encryption should have to justify their decision to do so, given the risks created by denying law enforcement access to user communications. Thats pretty close to a recklessness standard.

Again, for more on this, read Berins previous Techdirt piece. According to the most recently leaked version of the Graham-Blumenthal bill, the Attorney General would no longer be able to rewrite the best practices recommended by the Commission. But he would gain greater ability to steer the commission by continually vetoing its recommendations until it does what he wants. If the commission doesnt make a recommendation, the safe harbor offered by complying with the best practices doesnt go into effect but the rest of the law still would. Specifically, website and Internet service operators would still face vague new criminal and civil liability for reckless product design. The commission and its recommendations are a red herring; the truly coercive aspects of the bill will happen regardless of what the commission does. If the DOJ signals that failing to offer a backdoor (or retain user data) will lead to legal liability, companies will do it even absent any formalized best practices.

The Real Scandal: DOJs Inattention to Child Sexual Abuse

As if trying to compromise the security of all Internet services and the privacy of all users werent bad enough, we suspect Barr had an even more devious motive: covering his own ass, politically.

Blaming tech companies generally and encryption in particular for the continued spread of CSAM kills two birds with one stone. Not only does it offer them a new way to ban encryption, it also deflects attention from the real scandal that should appall us all: the collective failure of Congress, the Trump Administration, and the Department of Justice to prioritize the fight against the sexual exploitation of children.

The Daily, The New York Times podcast, ran part one of a two-part series on this topic on Wednesday. Reporters Michael Keller and Gabriel Dance summarized a lengthy investigative report they published back in September, but which hasnt received the attention it deserves. Heres the key part:

The law Congress passed in 2008 foresaw many of todays problems, but The Times found that the federal government had not fulfilled major aspects of the legislation.

The Justice Department has produced just two of six required reports that are meant to compile data about internet crimes against children and set goals to eliminate them, and there has been a constant churn of short-term appointees leading the departments efforts. The first person to hold the position, Francey Hakes, said it was clear from the outset that no one felt like the position was as important as it was written by Congress to be.

The federal government has also not lived up to the laws funding goals, severely crippling efforts to stamp out the activity.

Congress has regularly allocated about half of the $60 million in yearly funding for state and local law enforcement efforts. Separately, the Department of Homeland Security this year diverted nearly $6 million from its cybercrimes units to immigration enforcement depleting 40 percent of the units discretionary budget until the final month of the fiscal year.

So, to summarize:

Let that sink in. In a better, saner world, Congress would be holding hearings to demand explanations from Barr. But they havent, and the workshop will allow Barr to claim hes getting tough on CSAM without actually doing anything about it while also laying the groundwork for legislation that would essentially allow him to ban encryption.

Even for Bill Barr, thats pretty low.

Filed Under: cda 230, congress, csam, doj, encryption, funding, section 230, william barr

Here is the original post:
Barr's Motives, Encryption and Protecting Children; DOJ 230 Workshop Review, Part III - Techdirt

Comment: Its time for governments to learn how end-to-end encryption works – 9to5Mac

Theres an emerging health crisis at the moment, besides coronavirus: the head injuries caused by techies banging their heads on their desks at each piece of evidence that governments dont understand how end-to-end encryption works.

The latest example of this, reported in the Guardian, was the head of Britains domestic counterintelligence and security agency, MI5, calling on tech companies like Apple and Facebook to continue to offer end-to-end encryption, but to provide MI5 access on an exceptional basis

MI5, short for Military Intelligence, Section 5, is responsible for detecting planned terrorist attacks and preventing them before they can be carried out. It also assists other law enforcement agencies in the investigation of other serious crimes.

The Guardian quotes from an interview broadcast on British television channel ITV.

Parker called on the tech firms to use the brilliant technologists youve got to answer a question: Can you provide end-to-end encryption but on an exceptional basis exceptional basis where there is a legal warrant and a compelling case to do it, provide access to stop the most serious forms of harm happening?

The entire point of end-to-end encryption is that only an intended recipient of a message is able to decrypt it. When I send you an iMessage, nobody else is able to read it not even Apple because only a device authenticated by your Apple ID and password has the decryption key.

Technically, you can argue that Parkers question isnt quite as dumb as it sounds, as there is one potential workaround that would work with some end-to-end encrypted chat services known as the ghost proposal.

Its relatively easy for a service provider to silently add a law enforcement participant to a group chat or call. The service provider usually controls the identity system and so really decides whos who and which devices are involved theyre usually involved in introducing the parties to a chat or call. In a solution like this, were normally talking about suppressing a notification on a targets device and possibly those they communicate with.

In short, Apple or any other company that allows people to privately chat would be forced to allow the government to join those chats as a silent, invisible eavesdropper.

Unlike other proposals for compromising end-to-end encryption, that one at least has the virtue of being technically possible. It effectively takes advantage of the way that Apple allows you to begin an iMessage conversation on your iPhone then continue it on your iPad or Mac. Apple could effectively create a fake virtual device, authenticated as you, which would receive all your messages.

However, that would only be possible because it would break authentication of participants in the chat, which is a key component of end-to-end encrypted messaging. If you take an end-to-end encrypted messaging service and compromise the authentication process, you no longer have an end-to-end encrypted messaging service. Thewhole point of end-to-end encryption is that only authorized participants can decrypt it.

So, heres my open letter to governments:

Dear governments,

If you want to ban end-to-end encryption, as some of you have said, please understand what this means. Like the end of e-banking and online shopping.

If you instead want to ban the use of end-to-end encryption in messaging, you might first want to check whether many military, government, and law enforcement agency messaging services use it.

You now want to ban only the civilian use of end-to-end encrypted messaging, you say? Think about the impact on journalism. Think about the massive criminal opportunities you would be creating for identity theft and other forms of fraud. Above all, please think about the fact that you are telling your citizens they are no longer entitled to have private conversations using any electronic means, nor to privately share their photos with their partner, friends, or family. Think about what kind of regime wants that.

If you then decide, as MI5 apparently has, that you want to allow end-to-end encryption in messaging, but create a backdoor for governments, what you need to know is this: You cant. Because compromised end-to-end encryption isnt end-to-end encryption.

I hope that helps.

Love, Ben

FTC: We use income earning auto affiliate links. More.

Check out 9to5Mac on YouTube for more Apple news:

Continued here:
Comment: Its time for governments to learn how end-to-end encryption works - 9to5Mac

Crypto AG Shows That US Concern Over Huawei Encryption Backdoors Comes From Long Experience Doing the Same Thing – CPO Magazine

The United States government has been dead set against the use of Huawei equipment in national infrastructure since early 2018, when AT&T was pressured into dropping a lucrative 5G contract with the Chinese company. Speculation about encryption backdoors for use by the Chinese government has driven most of this, coming to a head recently with direct accusations that Huawei hardware has law enforcement backdoors in addition to new charges of racketeering and theft of trade secrets.

Another news story that broke recently may shed some light on the depth and intensity of United States suspicions even in the face of what sometimes seems to be scanty evidence.

U.S.-controlled Crypto AG, which has sold cryptographic equipment to governments throughout the world, used similar backdoors to allow the CIA to spy on foreign affairs for decades.

All of this is not to say that the U.S. does not have solid reasons to be wary of Huawei. As a company based in China, Huawei is required by law to comply with any demands the governing CCP makes of it; there is no room for something like Apples refusal to create an encryption backdoor for the US government. China and the US are racing to be the first into the lucrative 5G space, and Huawei has been caught with its hand in the industrial espionage cookie jar before.

Before you continue reading, how about a follow on LinkedIn?

The thing that is more nebulous is the accusations of hardware backdoors that lead back to China, which until recently had relied on a trust us, were the government approach from the US. While there may well be classified evidence that makes this more than a case of projection, US history would indicate that this abundance of government caution stems from the actions of its own intelligence agencies. No story is more illustrative than that of Crypto AG.

Founded in Switzerland in 1952, Crypto AGs trade was in providing ciphering machines to U.S. forces during World War II. The firm became an international cryptography giant from there, providing technology to the governments of more than half the worlds nations over the decades.

Initially, Crypto AG was independent. But in the 1960s, control of the Swiss company was covertly taken by the CIA and West German intelligence. Business continued as normal and the rest of the world was unaware, but from about 1970 forward the equipment coming out of Crypto AG contained encryption backdoors.

The U.S. used this to spy on a broad range of foreign nations, and not just enemies and rivals. This equipment was in use in Spain, Italy, Turkey, Greece, Argentina, India, Pakistan, and the Vatican among other locations.

The full details of the relationship were confirmed by a recent Washington Post report, but there were strong indications and suspicions dating back to the 1970s. Communications between the NSA and the founder of Crypto AG hinted at the relationship, as did some careless statements made by President Reagan during the 80s. This may be why primary rivals Russia and China were never customers of the company. However, in the early 1990s the CIA bought out West Germany and continued to produce this compromised equipment until the company was fully dissolved in 2018. News reports speculating about this connection appeared as early as 1995, but at that point the world of cryptography was transitioning to the internet and Crypto AG was becoming much less relevant.

The CIA and West German intelligence were at odds from the beginning, but managed to keep the program together for over two decades. The CIA was dismayed at the West German focus on using the encryption backdoors to make money rather than gather important intelligence; the West Germans were aghast at the willingness of the US to spy on everyone but its closest allies, according to internal reports unearthed by the Washington Post. The reports indicate that the United Kingdom, Sweden, Switzerland and Israel were aware of the encryption backdoor program and were given access to intelligence gathered from it.

The reports also indicate that Crypto AG used bribes to foreign leaders and smear campaigns against competitors to maintain its dominant market position.

Though the US has virtually frozen the company out of the country at this point, not all of its allies have taken the same tack. The UK will allow Huawei components in non-sensitive parts of the countrys 5G network, and a vote on the companys presence in Germany is forthcoming.

Australia has banned it, but New Zealand intends to incorporate some Huawei components into its network and Canada is still mulling the possibility.

Huawei, for its part, has staunchly maintained it does not include encryption backdoors for the Chinese government. And U.S. accusations of that nature have been vague thus far, not providing enough details for anyone else to independently verify them.

The dilemma for every other country in the world is that Huaweis equipment tends to be the cheapest option among the major manufacturers, and is about as advanced as it gets in the 5G realm. There are fair reasons to wonder what kind of access the CCP will have bundled with it, but as of now the only evidence is the insistence of the same government that brought the world Crypto AG, NSA surveillance of allied leaders, demands for an encryption backdoor in all Apple devices, and multiple insecure backdoors in Cisco routers. Whether that helps or hurts their case is in the eye of the beholder.

What can the average end user do with all of these government backdoors in their hardware? Kevin Bocek, VP security strategy & threat intelligence at Venafi, provides some parting thoughts:

Government mandated backdoors will allow cyber criminals to undermine all types of private, secure communications and weaken the power of encryption ultimately, if we create this power for government, it will soon work its way into the wrong hands. We have already seen this with EternalBlue and the Ukranian power station hack. This is why the Crypto AG revelations should be a major concern for all of us.

The only way organizations can be confident that their encryption does not possess any backdoors is by ensuring they have complete visibility and control over the encryption keys and certificates that act as machine identities. These security assets enable and secure machine to machine communications and are used in nearly every digital transaction.

Read this article:
Crypto AG Shows That US Concern Over Huawei Encryption Backdoors Comes From Long Experience Doing the Same Thing - CPO Magazine

Global Encryption Software Market is projected to reach a value of USD 20.44 billion by 2026 – WhaTech Technology and Markets News

Global Encryption Software Market Outlook 2026 -Top Companies In Market, Trends & Growth Factors

A new business intelligence report released by Report Ocean with the title Global Encryption Software Market Research Report" is made covering in-depth analysis by manufacturers and key business segments. The Over-the-top Market research report offers energetic visions to conclude and study the market size, share, market hopes, industry trends, forecast, and competitive surroundings.

The research is derived through primary and secondary statistics sources and it comprises both qualitative and quantitative detailing. This Report covers the manufacturers' data, including shipment, price, revenue, gross profit, interview record, business distribution, etc; these data help the consumer know about the competitors better.

The global encryption software market size is anticipated to reach USD 20.44 billion by 2026

Key Market Growth Drivers/Restraints

For more information on this report visitwww.reportocean.com/industrrt_id=5148

Geographical Segmentation

Key Players

The Global Encryption Software Market is primarily dominated by major companies like Microsoft Corporation, Symantec Corporation, IBM Corporation, EMC Corporation, CISCO Systems Inc., Intel Security, Check Point Software Technologies Ltd., Oracle Corporation, Trend Micro, Inc., and Sophos Group Plc. among others.

Market Segmentation

Global Encryption Software Market has been divided into the following segments

Deployment

Application

Organization Size

End-user

DOWNLOAD FREE SAMPLE COPY @ http://www.reportocean.com/industrrt_id=5148

Major Highlights of the Global Encryption Software Market

What the report offers?

- Understanding of the potential market opportunity with precise market size and forecast data.- Detailed market analysis focusing on the growth of Encryption Software in the aesthetic industry.- Factors influencing the growth of the Encryption Software market.- In-depth competitive analysis of dominant and pureplay vendors.- Prediction analysis of the Encryption Software industry in both developed and developing regions.- Key insights related to major segments of the Encryption Software market.- The latest market trend analysis impacting the buying behavior of the consumers.

This email address is being protected from spambots. You need JavaScript enabled to view it.

Read more from the original source:
Global Encryption Software Market is projected to reach a value of USD 20.44 billion by 2026 - WhaTech Technology and Markets News

MI5 Still Thinks Encryption Backdoors are an Excellent Idea That Couldn’t Possibly Go Wrong – Gizmodo UK

Really, this again?

We feel like we've written this article a thousand times but once again, Britain's security services are complaining that they can't read absolutely all of your online communications and it's JUST NOT FAIR!

Sir Andrew Parker, head of MI5, is asking tech companies to give spy agencies "exceptional access" (meaning in exceptions, not exceptionally detailed although we wouldn't be surprised) to encrypted messages, especially on Facebook (and presumably Facebook-owned WhatsApp) which is introducing end-to-end encryption.

Parker's comments were made in an ITV interview that'll be broadcast this Thursday. In it, Sir Andrew apparently bemoans the fact that your inbox is "a wild west, unregulated, inaccessible to authorities" and says it's "increasingly mystifying" that spies can't just have a quick look.

As ever, the excuse is that MI5 and other spy agencies can't see what terrorists are saying to one another, but as we all know, this kind of argument is always used to try and scare us into giving up the tiny sliver of privacy we have left. Much like the way Met Police chief Cressida Dick recently said having your face scanned against your will is better than "a knife in the chest," as if those were the only two options.

"Use the brilliant technologists youve got," says Parker, to "provide end-to-end encryption but on an exceptional basis [...] where there is a legal warrant and a compelling case to do it, provide access to stop the most serious forms of harm happening." Sorry, how is that end-to-end? From one end to the other with a quick diversion to MI5? Cool.

Essentially, Parker is saying "hey locksmiths, can you provide locks that are totally secure on everyone's doors and windows, but also open with a master key? BUT STILL SECURE!"

As a coalition of tech companies said on one of the many previous occasions spies pleaded for backdoors, it would turn "a two-way conversation into a group chat where the government is the additional participant." Sweet! Who doesn't want Joe The Spy sending gif reacts to your texts?

Even if we do give up the last bit of privacy we had and allow spies into our chats, we won't be safe, Parker admits. Asked if he thought MI5 was in control of the situation in 2017 when there was a string of terror attacks, he said, "Well were not in control of it ever, are we? To be in control would mean that somehow we could manage this whole landscape and stop everything. We cant. We cant do that."

Super. [The Guardian]

Main image: MW238 via Flickr Creative Commons

Read this article:
MI5 Still Thinks Encryption Backdoors are an Excellent Idea That Couldn't Possibly Go Wrong - Gizmodo UK

Exporters Should Be ‘Very Careful’ of Misusing New End-to-End Encryption Carve-Out in ITAR, Experts Say – Export Compliance Daily

Companies should ensure their data is fully encrypted with no access by third parties before using the new encryption carve-out in the upcoming amendments to the International Traffic in Arms Regulations, according to a cybersecurity compliance expert and a trade lawyer. Although they lauded the ITAR for recognizing that some technology, such as encryption, can protect transfers of export controlled data, both said complying fully with the carve-out may be complicated. There is a wrong way to do the end-to-end encryption, so you need to be very careful when applying it, said Alex Major, a cybersecurity and trade lawyer with McCarter & English, speaking during a Feb. 27 webinar hosted by the Massachusetts Export Center.

The carve-out, which takes effect March 25, is part of an interim final rule recently issued by the State Department that provides definitions for activities that are not exports, re-exports, retransfers or temporary imports (see 1912230052). The rule makes significant changes to reduce compliance burdens surrounding encrypted data to help better facilitate international data storage and transfers (see 1912300024).

But companies using the carve-out to export data need to ensure they are correctly encrypting data, said Ryan Heidorn, a cybersecurity compliance expert with Steel Root, an information technology services company. Certain encryptions could lead to misuses of the rule and violations of the ITAR. Its super important and probably more difficult than you'd think to implement true end-to-end encryption, Heidorn said.

Heidorn stressed that true end-to-end encryption occurs only when the parties responsible for the data could potentially decrypt that data. That means companies should exclude third parties, including certain encryption apps, which may perform some encryption services but may not meet ITARs standards. End-to-end encryption is when you, as an organization, hold the decryption keys, Heidorn said. Meaning that you could be using a commercial service like Google Mail or Office 365, and even if there's encryption in place, if those other entities hold the decryption key, that is not end-to-end encryption.

Major said compliance with the carve-out ultimately depends on key management, or how secure companies make the encryption key for their exported data. There are companies that perform strong end-to-end encryption, such as PreVeil, Major said, but others may not fully comply with ITAR. You need to make sure you're talking to people who know what they're talking about when it comes to the key management, Major said. If you give that key to a third party you lose the protection of the carve-out. Its very important.

Although encryption can be complex, both Major and Heidorn said that the carve-out can be a significant tool for exporting controlled data. I consider this a win for the ITAR to recognize that technology can protect export controlled data across networks, Heidorn said.

Go here to read the rest:
Exporters Should Be 'Very Careful' of Misusing New End-to-End Encryption Carve-Out in ITAR, Experts Say - Export Compliance Daily

Encryption Software Market 2020 Analysis by Overview, Growth, Top Companies, Trends, Demand and Forecast to 2026 – Packaging News 24

Verified Market Research adds new research report on market size for Encryption Software and regional forecasts for 2020-2026. The report provides an in-depth analysis of the Encryption Software market, taking into account market dynamics, segmentation, geographic expansion, the competitive landscape, and various other key issues. The market analysts who prepared the report have thoroughly examined the Encryption Software market and provided reliable and accurate data. They understand the needs of the industry and customers, so they can easily focus on the issues that end users have been looking for. The research report provides an analysis of an assessment of existing and upcoming trends in which players can invest. It also includes an assessment of the players financial prospects and the nature of the competition.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

This report includes the following Companies; We can also add other companies you want:

Encryption Software Market: Competitive Landscape

The competitive landscape is a must for market participants to withstand the competition in the Encryption Software market. This helps market participants to develop effective strategies to optimize their market positions. In addition, the competitive analysis helps them identify potential benefits and obstacles in the Encryption Software market. This allows them to monitor how their competitors are implementing different strategies, including pricing, marketing, and sales.

Encryption Software Market: Drivers and Limitations

The report section explains the various drivers and controls that have shaped the global market. The detailed analysis of many market drivers enables readers to get a clear overview of the market, including the market environment, government policy, product innovation, development and market risks.

The research report also identifies the creative opportunities, challenges, and challenges of the Encryption Software market. The framework of the information will help the reader identify and plan strategies for the potential. Our obstacles, challenges and market challenges also help readers understand how the company can prevent this.

Encryption Software Market: Segment Analysis

The report section contains segmentations such as application, product type and end user. These segments help determine which parts of the market will improve over others. This section analysis provides information on the most important aspects of developing certain categories better than others. It helps readers understand strategies to make solid investments. The market for Encryption Software is segmented according to product type, applications and end users.

Encryption Software Market: Regional Analysis

This section of the report contains detailed information on the market in different regions. Each region offers a different market size because each state has different government policies and other factors. The regions included in the report are North America, Europe, Asia Pacific, the Middle East and Africa. Information about the different regions helps the reader to better understand the global market.

Ask for Discount @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=PN24&utm_medium=001

Table of Content

1 Introduction of Encryption Software Market

1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Encryption Software Market Outlook

4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Encryption Software Market , By Deployment Model

5.1 Overview

6 Encryption Software Market , By Solution

6.1 Overview

7 Encryption Software Market , By Vertical

7.1 Overview

8 Encryption Software Market , By Geography

8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Encryption Software Market Competitive Landscape

9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix

11.1 Related Research

Request Report Customization @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=PN24&utm_medium=001

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Analysts with high expertise in data gathering and governance utilize industry techniques to collate and examine data at all stages. Our analysts are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research reports.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

TAGS: Encryption Software Market Size, Encryption Software Market Growth, Encryption Software Market Forecast, Encryption Software Market Analysis, Encryption Software Market Trends, Encryption Software Market

Read the original post:
Encryption Software Market 2020 Analysis by Overview, Growth, Top Companies, Trends, Demand and Forecast to 2026 - Packaging News 24

If We Build It (They Will Break In) – Lawfare

Attorney General William Barr has staked his ground in the long-running debate over law enforcement access to encrypted communications. Last fall, Barr decried end-to-end encryption as enabling dangerous criminals to cloak their communications and activities behind an essentially impenetrable digital shield. As the debate continues, commentators and policymakers often overlook a historical example of the problems with law enforcement access.

Barrs position is hardly novel. For more than two decades, law enforcement has argued that end-to-end encrypted communications present an extreme public safety risk and that tech companies must build in access in the form of some variation of escrowed keys, backdoors, front doors or exceptional access. During that time, many observers have argued that creating this access for law enforcement would decrease public security, not increase it. Theres a cautionary tale about wiretapping from the 1990s that has bearing on todays encryption battles.

As new (primarily digital) telephone services emerged in the 1990s, old-style wiretapping couldnt keep up. The old techniques werent equipped to handle new capabilities, such as call forwarding and other advanced features. Law enforcement was really worried. Then-FBI Director Louis Freeh called digital telephony the number one law enforcement, public safety and national security issue facing us today. After several years of pressing Congressand an added sweetener for the telecom providers in the form of a half-billion in funds to the service providers for updating switches to accommodate the new requirementslaw enforcement got its way with the 1994 passage of the Communications Assistance for Law Enforcement Act (CALEA), which required service providers to build digitally switched telephone networks so that they were wiretap enabled. That meant that the phone switches, which connect telephone lines, were to be built in a way that enabled any call to have a silent third partyan eavesdropperlistening in. These wiretap enabled networks essentially put a security hole in the middle of a phone switch, creating serious risks. Although computer scientists raised that concern about the legislation, the law ultimately passed.

Nothing was simple about implementing CALEA. There were arguments over lots of different issues: how much surveillance capacityboth wiretaps and pen/traps metadata collectionhad to be put into the switches; whether post-cut-through-digits, which have prompts that can vary from press 1 to speak to a receptionist to please enter your credit card number now, were considered content (and thus required a wiretap warrant in order to be collected); and whether location information should be included in information that the telephone companies provided law enforcement. And then there was a debate over fundingthe half-billion dollars did not come close to covering the service providers expenses. Court battles over various aspects of CALEA implementation went on for more than a decade.

But fights over implementation were not CALEAs most serious problem. Building a wiretapping interface for law enforcement into a telephone switch did, as predicted, enable others to listen in. The most well-known occurrence of this phenomenon is the Greek wiretapping case of 2004-2005. Unknown parties wiretapped the cellphones of 100 senior members of the Greek government for a period of 10 months using the law enforcement interface of an Ericsson phone switch built for Greek Telecom. The law enforcement wiretapping interface was built according to European Telecommunications Standards Institute (ETSI) specifications, which were modeled on the CALEA requirements. In another example, IBM researcher Tom Cross showed in 2010 that Cisco specifications for an IP network wiretapping architecture based on the ETSI standards had major security holes. Cross demonstrated that various service providers had implemented a flawed architecture and allowed unauthorized people to intercept communications.

Security problems were not limited to Europe. In 2011, Dickie George, the former technical director of the National Security Agencys Information Assurance Division, told me that his agency had found security problems with the CALEA-compliant implementation on every single switch submitted for testing. In other words, required wiretapping capabilities built for law enforcement were insecure, and others, including nefarious actors, could potentially access them. And then, just this month, the Wall Street Journal reported that U.S. officials are now telling our allies that Huawei Technologies Co. can covertly access mobile-phone networks around the world through back doors designed for use by law enforcement. Why were those backdoors put in? They are what is legally required by CALEA and the European laws based on the U.S. law.

Fast forward to today. Law enforcements line on encryption is that surely the smart people in Silicon Valley can figure out how to build systems that enable law enforcement, backed up with a court order, to access encrypted communications and encrypted data on phones. In reality, such surveillance systems are not easy to buildand not easy to build securely. If the CALEA story reveals anything, it shows that when companies build in backdoors, hackers, nation-states and criminals will come. Thats not the cybersecurity, national security or public safety solution we need.

Originally posted here:
If We Build It (They Will Break In) - Lawfare