Category Archives: Encryption

Last Week In Venture: Eyes As A Service, Environmental Notes And Homomorphic Encryption – Crunchbase News

Hello, and welcome back to Last Week In Venture, the weekly rundown of deals that may have flown under your radar.

There are plenty of companies operating outside the unicorn and public company spotlight, but that doesnt mean their stories arent worth sharing. They offer a peek around the corner at whats coming next, and what investors today are placing bets on.

Without further ado, lets check out a few rounds from the week that was in venture land.

I dont know how youre reading this, but you are. Most of us read with our eyes, but some read with their ears or their fingers. Blind people frequently have options when it comes to reading, but theres more to life than just reading.

Imagine going to a grocery store and stepping up to the bakery counter. You might be able to read a label with your eyes, but if theres no label you could still probably figure out what type bread youre buying based on its color and shape. But what if you couldnt see (or see well)? What are you going to do, touch all the bread to figure out its size and shape? Get real down low and smell em all? (Which, for the record, sounds lovely, if a little unhygienic.)

Youd probably ask someone who can see for some help. Thats the kind of interaction a service like Be My Eyes facilitates. Headquartered in San Francisco, the startup founded in 2014 connects blind people and people with low vision to sighted volunteers over on-demand remote video calls facilitated through the companys mobile applications for Android and iOS. The sighted person can see whats going on, and offer real time support for the person who cant see.

The company announced this week that it raised $2.8 million in a Series A funding round led by Cultivation Capital. In 2018, Be My Eyes launched a feature called Specialized Help, which connects blind and low-vision people to service representatives at companies. Microsoft, Google, Lloyds Banking Group and Procter & Gamble are among the companies enrolled in the program.

Be My Eyes initially launched as an all-volunteer effort. The company says it has a community of more than 3.5 million sighted volunteers helping almost 200,000 visually impaired people worldwide. According to Crunchbase data, the company has raised over $5.3 million in combined equity and grant funding.

The environment is, like, super important. Its the air we breathe and the water we drink. Regardless of your opinion on environmental regulations, most come from a good place: Ensuring the long-term sustainability of life on a planet with finite resources by putting a check on destructive activity. Where theres regulation, theres a need to comply with it, and compliance can be kind of a drag. There is a lot of paperwork to do.

Wildnote is a company based in San Luis Obispo, California. Its in the business of environmental data collection, management and reporting using its eponymous mobile application and web platform. Field researchers and compliance professionals can capture and record information (including photos) on-site using either standard reporting forms or their own custom workflows. The companys data platform also features export capabilities, which produce PDFs or raw datasets in multiple formats.

The company announced $1.35 million in seed funding from Entrada Ventures and HG Ventures, the corporate venture arm of The Heritage Group. Wildnote was part of the 2019 cohort of The Heritage Groups accelerator program, produced in collaboration with Techstars, which aimed to assist startups working on problems from legacy industries like infrastructure, materials and environmental services.

Encryption uses math to transform information humans and machines can read and understand into information that we cant. Encrypted data can be decrypted by those in possession of a cryptographic key. To everyone else, encrypted data is just textual gobbledegook.

The thing is, to computers, encrypted data is also textual gobbledegook. Computer scientists and cryptographers have long been looking for a way to work with encrypted data without needing to decrypt it in the process. Homomorphic encryption has been a subject of academic research and corporate research and development labs for years, but it appears a commercial homomorphic encryption product has hit the market, and the company behind it is raising money to grow.

The company were talking about here is Enveil. Headquartered in Fulton, Maryland, the company makes software it calls ZeroReveal. Its ZeroReveal Search product allows customers to encrypt and store data while also enabling users to perform searches directly against ciphertext data, meaning that data stays secure. Its ZeroReveal Compute Fabric offers client- and server-side applications which let enterprises securely operate on encrypted data stored on premises, in a large commercial cloud computing platform, or obtained from third parties.

Enveil raised $10 million in its Series A round, which was led by C5 Capital. Participating investors include 1843 Capital, Capital One Growth Ventures, MasterCard and Bloomberg Beta. The company was founded in 2014 by Ellison Anne Williams and has raised a total of $15 million; prior investors include cybersecurity incubator DataTribe and In-Q-Tel, the nonprofit venture investment arm of the U.S. Central Intelligence Agency.

Image Credits: Last Week In Venture graphic created byJD Battles. Photo by Daniil Kuzelev, via Unsplash.

Continued here:
Last Week In Venture: Eyes As A Service, Environmental Notes And Homomorphic Encryption - Crunchbase News

CIA Encryption Meddling and Chinese Espionage Allegations Make It Clear: We All Need Strong Data Protection – Reason

U.S. officials have been insisting to tech platforms that overly strong encryption is a threat to public safety and that "back doors" must be provided for law enforcement to bypass security, all in the name of fighting crime.

Meanwhile, U.S. officials have also been claiming that China-based tech company Huawei can use secret security bypasses that are intended for law enforcement use only in order to access data that could be used by the Chinese government for surveillance purposes.

In summation: The same U.S. government that wants tech companies and telecoms to create secret software doors that would allow it to snoop on our private communications and data is also worried that other governments will be able to use those same back doors to do the same thing. This is what tech privacy experts have been warning U.S. officials (and U.K. officials and Australian officials) all along: Any back door that allows law enforcement to circumvent user privacy protections will ultimately be used by people with bad intentions.

The context here is a Wall Street Journal report that reveals U.S. officials have been quietly telling allies that Huawei can secretly access data from its phone networks through taps that the company built into the hardware it sells to cellphone carriers. Laws mandate that Huawei (and other telecom companies) install these "interception interfaces" into their equipment, but only authorized law enforcement officials are supposed to have access. Even Huawei itself is not supposed to be able to gain access without the permission of the phone carriers. But U.S. officials are insistent that Huawei has maintained secret access to these taps since at least 2009.

Huawei says these claims are not true and that these hardware taps can only be accessed by "certified personnel of the network operators." The company also insists it is not surveilling data and passing it along to the Chinese government.

The story leans heavily on U.S. claims from secret intelligence that has recently been declassified, but it's not exactly proof of the claims.

On a surface level, this is about the global tech market and the competition between China and the United States. But dig deeper and you can see the relevance to our encryption fight.

The FBI and Department of Justice insist that tech companies need to be adding similar, virtual back doors in our communication tools, phones, and apps in the name of fighting crime and terrorism. People like FBI Director Christopher Wray and Attorney General William Barr are willing to discuss encryption back doors only in terms of how it helps the U.S. government. But this Wall Street Journal report makes it clear that the U.S. government is abundantly aware that any access point (real or virtual) to look at private data is a point of vulnerability.

If this intelligence is true, it means that any government-mandated encryption bypass is potentially abusable and the U.S. should not be demanding tech companies make them, lest the Chinese government (or Saudi government, or Russian government, or United Arab Emirates, or identity thieves with hacking skills) get their hands on whatever mechanism created for law enforcement use only.

If the intelligence is not true, it nevertheless makes it clear that the United States understands that back doors create huge vulnerabilities. Government officials know full well that the Justice Department's demands are unreasonable and should be shut down, and lawmakers like Sen. Lindsey Graham (RS.C.) should not be proposing bills to force companies to implement encryption back doors.

But then, perhaps I should simply stop treating the Justice Department and Congress as though they're making these arguments in good faith. You see, yesterday, the Washington Post published a very different story about encryption and data privacy. It turns out that, for decades, the CIA and German intelligence owned and secretly operated an encryption company named Crypto AG. They sold compromised encryption technology to other countries, then secretly spied on them. The Washington Post reports that

they monitored Iran's mullahs during the 1979 hostage crisis, fed intelligence about Argentina's military to Britain during the Falklands War, tracked the assassination campaigns of South American dictators and caught Libyan officials congratulating themselves on the 1986 bombing of a Berlin disco.

Germany left the partnership in the 1990s, fearing exposure. So the CIA ran the company until 2018 when it liquidated Crypto AG and sold it off to two companies, one of whom apparently had no idea about its secret background.

We should be wary of the U.S. government doubling down on its efforts to compromise encryption, especially now that Crypto AG is not of use to the CIA. We know full well those back doors are going to be used for a lot more than trying to track down alleged pedophiles, and the federal government knows that, too.

Here is the original post:
CIA Encryption Meddling and Chinese Espionage Allegations Make It Clear: We All Need Strong Data Protection - Reason

Congress, Not the Attorney General, Should Decide the Future of Encryption – Lawfare

The debate over end-to-end encryption focuses on the substantive question: Should encryption be restricted to help law enforcement, or do the privacy and security benefits of this technology outweigh its costs? A draft copy of the EARN IT Act, which could deprive platforms that use end-to-end encryption of their immunity from civil suit under Section 230 of the Communications Decency Act for child exploitation materials posted by users, has a set off a new round of debate.

But the encryption debate frequently ignores the vital procedural question: Who should decide? The EARN IT Act puts that question front and center by giving the attorney general the ultimate say in setting the best practices that will give Section 230 immunity for child exploitation suits. (And given Attorney General William Barrs recent statements criticizing end-to-end encryption, it is reasonable to think that he might include forgoing end-to-end encryption in the best practices.) Passing the buck to the attorney general is a bad idea.

As a threshold matter, the attorney general is not the right person to make this decision. Encryption is an issue that implicates many competing values, but the attorney generals natural focus will be on the subset for which he is responsible: fighting crime. His decision-making will reflect this priority, potentially at the cost of other values. This is not meant to single out the attorney general. It wouldnt make sense to put sole authority to determine best practices in the hands of the secretary of commerce, whose primary responsibility is the economic competitiveness of U.S. industry, not law enforcement effectiveness. Decisions about encryption should not be delegated to one agency alone.

More fundamentally, the question of whether to permit ubiquitous encryption is the sort of high-level policy decision that is best handled not by the executive branch but by Congress, which best represents the public and its different constituencies and interests. Congress doesnt have to do the technical heavy lifting; it could, for example, organize an expert committee to offer proposals or even outsource that job to various executive agencies, which could then return competing recommendations. But the legislature shouldnt shirk its responsibility to make this tough decision. To this extent, critics of the EARN IT Act, such as Stanfords Rianna Pfefferkorn, are right to call it a bait and switch, designed to limit encryption while giving legislators space to deny thats what theyre doing.

In the meantime, theres plenty that Congress can do to help fight child exploitation without prematurely wading into the encryption fight. And the easiest way to accomplish that is to explicitly make any child exploitation bill neutral on the issue of encryption. Congress has included neutrality riders before, in CALEA (47 U.S.C. 1002(b)(3)) and, more recently, in the CLOUD Act (18 U.S.C. 2523(b)(3)). In the case of the EARN IT Act, for example, Congress could exclude anything related to encryption from the list of best practices.

The decision whether or not to restrict end-to-end encryption is too important to be made indirectly. Congress should ultimately decideand if it wants to delay that decision, it shouldn't let anyone else do its job in the meantime.

Follow this link:
Congress, Not the Attorney General, Should Decide the Future of Encryption - Lawfare

The code breakers: This vault is the epicenter in law enforcement’s battle to unlock encrypted smartphones – USA TODAY

Apple has reopened a privacy battle with the FBI after refusing to unlock the iPhones of the Saudi pilot who opened fire at Naval Air Station Pensacola Buzz60

NEW YORK Inside a steel-encased vault in lower Manhattan, investigators bombard an Apple iPhone 7 with ajumble of numerical codes generated by nearby computers.

The grinding exercise has continued for the past 21 months with a singular aim: Crack the phone's passcode, so police can extract potentialevidence in an aging attempted murder investigation.

Despite the formidable resources ofa $10 million cyberlaboperated by the Manhattan District Attorneys Office including costly assistance provided by privatesleuths the phone has won.

Last month, Attorney General William Barr revived the titanic struggle betweenlaw enforcement and Big Techwhen he disclosedthat the FBI couldn'tunlock two iPhones used by a Saudi officer who opened fireat a Navy base in Florida in December.

The breadth of the ground war wagedagainst encrypted phones, tablets and other devices seized in criminal inquiries is perhaps best appreciated withinthe securedoors of this Manhattanlaboratory.

Steven Moran, director of the High Technology Analysis Unit at the Manhattan District Attorneys Office, describes how investigators try to crack encrypted smartphones in a special steel-encased vault. It was built to block outside radio frequencies, preventing suspects from remotely erasing their devices.(Photo: Kevin Johnson, USA TODAY)

More than 8,000 devices have poured into the facility since 2014.Each year, more of them are locked, rising from 24% in 2014 to 64%last year. For Apple devices, it's gone from 60% to 82%.

Nearly 2,500 of the locked devices remain inaccessible to investigators, hindering investigations into child exploitation, financial fraud, theft, violence and other crimes.

The numbers illustrate afrustration shared by law enforcement agencies across the country.

"I don't think there is an awareness of the scope of the problem," Manhattan District Attorney Cyrus Vance said.

Duffie Stone, president of the National District Attorneys Association, describedthe challenge as a technological tidal wave overwhelming agencies across the country, particularly smaller oneswithout Manhattan's considerable resources.

It's been difficult to measurehow much of a problem locked devices are for law enforcement. There is no national data repository tracking how often investigators areblockedby phones "going dark," as they say.

In 2018, the FBI estimated federal authorities recovered nearly 8,000 locked phones for analysis,butthe bureau acknowledged that figure was overstated.The FBI has not publicly updated the data since, leaving Vance as law enforcements most vocal authority in the struggle between law enforcement and privacy interests.

Tech giant Apple is law enforcement's favorite target because of its commercial popularity and its efforts to bolster user privacy.In the past six years, law enforcement officials said, Apple and other companies have made their devices virtually warrant-proofby enabling encryption by default and moving fromfour-digit passcodes to six.

Law enforcement vs. consumer privacy: Should Apple help DOJ unlock terrorist's iPhones?

"We have always maintained there is no such thing as a backdoor just for the good guys," Apple said in a statement last month, responding to Barr's claims that the company had not helped unlock the two iPhones recovered from the Pensacola shooter.

"Today, law enforcement has access to more data than ever before in history, so Americans do not have to choose between weakening encryption and solving investigations," Apple said. "We feel stronglyencryption is vital to protecting our country and our users' data."

"We might need more shelving," says Steven Moran, director of the High Technology Analysis Unit. Inside the unit's vault, computers bombard seized smartphones with codes to crack encryptions and enable investigators to access their data.(Photo: Kevin Johnson, USA TODAY)

It looks like a bomb shelter. In a sense, it is.

Just off the main corridor of the Manhattan cyberlaboratory, protected by a heavy steel door, is a small chamber where some of the lab's most consequential work is carried out in isolation.

About 100 locked cellphones,seized in various criminal investigations, arestacked neatly on two shelves. Nearby,computerssilently batter the devices with spurts of numerals as they attempt toguess thepasscodes.

Only when the lights are offis the workvisible, in flashes of blinking lights.

Success can come in minutes, hours, days ormonths. Or not at all.

Of the 1,035 devices that were locked on arrival at the lab last year, 405 remain inaccessible, according to lab records. The year before, 666 of the 1,047 locked phones could not be opened.

New batches of phones are moved into the chamber like unbaked cookies. Others are moved out before they're done.

"We might need more shelving," said Steven Moran, director of the High Technology Analysis Unit.

The room's heavy drape of security, Moran said, is not for show. It was built to block outside radio frequencies, preventingsuspects from remotely erasing their devices before examiners can break the locks.

"It is a real concern," Moran said, adding that some suspects released on bond have sought to do just that.

In particularlyurgent cases, or when devices prove especially resistant, they are hand-delivered to private contractors who subject the phones tonew types of hacking.

From 2014 to 2019, Vance said,his office paid those contractors $1.5 million for software and assistance.

New York District Attorney Cyrus Vance says there's a lack of awareness about the frustrations law enforcement faces over unaccessible cellphone data.(Photo: ANGELA WEISS, AFP via Getty Images)

Their help has become critical not only in Manhattan but in places such as South Carolina's 14th Judicial Circuit, a five-county area in the state's low countrywhere Duffie Stone is the prosecutor.

"The use of technology by criminals is probably the biggest change in the criminal justice system," Stone said. "We are confronting this kind oftechnology, and the challenge of penetrating it, in virtually every case we are prosecuting."

Stone credits Vance with helping other prosecutors take on the new investigative burdens.

"The value of digital evidence is not limited to proving a defendant's guilt," Vance told a Senate panel in December. "In some instances, evidence recovered from devices mitigates the culpability of an accused or exonerates a defendant entirely."

In 2018, Vance said, an internal survey revealed 17 casesin which his office "reduced or dismissed charges because of evidence recovered from a smartphone."

Ordinarily, few would confuse William Barr with Cyrus Vance.

As President Donald Trump's attorney general, Barr has shielded his boss from Vance's subpoenas and document requests. Their fight over the president's tax records is before the Supreme Court.

On the issue of encryption, they have found common ground.

Last month, Barr rekindled a long-standing dispute between the Justice Department and Apple when he accused the company of failing to provide "substantive assistance" in unlocking two iPhones used by the Saudi attacker who killed three people atNaval Air Station Pensacola in December.

Airman Mohammed Hathaim, Ensign Joshua Watson and Airman Apprentice Cameron Walters were killed in the shooting at Naval Air Station Pensacola. USA TODAY

One of the devices was damaged by a bullet, possibly fired by the gunman in an attempt to destroy anyevidence it contained.

The attorney general said investigators rebuilt both phones, but they had not been able to bypass the passcodes to gain access to the data.

"This situation perfectly illustrates why itis critical that investigators be able to get access to digital evidence once they have obtained a court order based on probable cause," Barr said.

Apple rejected Barr's rebuke, saying it responded quickly to investigators' many requests. The company said itlearned only a week earlier that the Justice Department needed help unlocking the phones.

Barr's criticismmirrored a standoff between the FBI and Apple over an iPhone recovered after a mass shooting in San Bernardino, California, that left 14 people dead in 2015.

In that case, the FBI went to federal court todemand Apple assist investigators in accessing the device recovered from terrorist Syed Farook, who was killed withhis wife, Tashfeen Malik, in a shootout with authorities after the attack.

The FBI's effort was led by then-director James Comey, whomaintained the bureau wanted accessonly in that case. Apple and other tech companies feared granting access to Farook's phone would ultimately require them to build so-called backdoors that would allowlaw enforcement around the country to access their devices.

Nothing to see here: FBI blacks out most details on hack of terrorist's iPhone

Law enforcement officers search for suspects in a mass shooting Dec. 2, 2015, in San Bernardino, Calif.(Photo: Patrick T. Fallon, AFP via Getty Images)

The FBI dropped its challenge after it secured the assistance of an outside contractor that bypassed the iPhone's passcode.

Vance, who supported Comey's efforts, said theSan Bernardino caseraised public awareness of the problem,but it"deflated because there was mutual finger-pointing."

If Barr were to challengeApple again, Vance said, he probably would support it, thoughthe district attorney said courts won't offer a long-term solution.

"Nothing really has changed" since San Bernardino,Vance said.

"Companies are not going to redesign their devices to open for search warrants," he said. "The only way to move forward is the threat of federal legislation."

Read or Share this story: https://www.usatoday.com/story/news/politics/2020/02/11/manhattan-vault-investigators-try-unlock-encrypted-iphones/4670518002/

See the article here:
The code breakers: This vault is the epicenter in law enforcement's battle to unlock encrypted smartphones - USA TODAY

Enea Announces New Smart Tools to Identify Encrypted and Evasive Network Traffic – Yahoo Finance

The Enea Qosmos ixEngine delivers the traffic visibility that solution vendors need to optimize network security and performance, while safeguarding privacy

STOCKHOLM, Feb. 12, 2020 /PRNewswire/ -- Enea (NASDAQ Stockholm: ENEA), a global supplier of innovative software components for cybersecurity and telecommunications, is pleased to announce enhancements to the Enea Qosmos ixEngine and Enea Qosmos Probe products that deliver greater insight into encrypted and evasive traffic.

Anonymity and privacy technologies, like data encryption and VPNs, are vital for safe and secure communications, but they limit the visibility network professionals rely on for troubleshooting, performance optimization, and business analytics. They also impact cyber security specialists, who need traffic visibility to detect and analyze threats in networks.

Providers of network management and security products have long relied on Enea's Qosmos traffic intelligence technology for exceptional visibility and rich data sets that enable them to differentiate their products in continuously evolving markets. The rise of encrypted and evasive traffic may be a challenging evolution, but as with others that have preceded it, Enea can help its customers transform change into competitive advantage.

To this end, the company has created a special team dedicated to developing innovative techniques for extracting maximum insights from encrypted and evasive traffic, while packet content remains private. The efforts have resulted in recent product enhancements that deliver unique visibility of 6 types of evasive traffic:

"As the use of encryption increases - and becomes more robust with TLS 1.3 - and as evasive tactics become more complex, innovation is key for our customersto maintain the critical visibility they need to optimize performance and respond to threats," said Jean-Philippe Lion, Senior Vice President of the DPI Business Unit at Enea. "With our new and enhanced capabilities, we are confident our clients will be able to meet the challenges of encrypted and evasive traffic head on, and develop even stronger and smarter solutions for protecting networks."

The enhanced versions of the Enea Qosmos ixEngine and Enea Qosmos Probe products will be presented at the Enea booth (#236) in the South Expo hall at RSA Conference 2020. For more details or free expo passes, go to https://www.qosmos.com/rsa-conference-2020/. Personal demonstrations during the event can be requested by sending an email to rsa@qosmos.com.

Additional Resources

For additional information about encrypted and evasive traffic, visit our dedicated resource hub at https://www.qosmos.com/resources/use-case-hubs/encryption-2/.

To learn more about Qosmos traffic classification, explore the Qosmos Labs Protobook at https://protobook.qosmos.com/index.html/.

Details of the product enhancements:

These recent enhancements complement the existing capabilities of Qosmos ixEngine to deliver visibility into traffic using other evasive techniques including:

About Enea

Enea is a world-leading supplier of innovative software components for telecommunications and cybersecurity. Focus areas are cloud-native, 5G-ready products for mobile core, network virtualization, and traffic intelligence. More than 3 billion people rely on Enea technologies in their daily lives. Enea is listed on Nasdaq Stockholm. For more information: http://www.enea.com

Media Contact

Erik Larsson, SVP Marketing & Communication, EneaPhone: +46-8-507-140-00E-mail: erik.larsson@enea.com

This information was brought to you by Cision http://news.cision.com

https://news.cision.com/enea-ab/r/enea-announces-new-smart-tools-to-identify-encrypted-and-evasive-network-traffic,c3032004

The following files are available for download:

View original content:http://www.prnewswire.com/news-releases/enea-announces-new-smart-tools-to-identify-encrypted-and-evasive-network-traffic-301003821.html

SOURCE Enea AB

Read the original here:
Enea Announces New Smart Tools to Identify Encrypted and Evasive Network Traffic - Yahoo Finance

Encryption Vs. Decryption: What’s the Difference? – Techopedia

Applying encryption adds a level of security to the data that can help prevent the file contents from being understood by any unauthorized person who gets hold of it. Even if the data is accessed, it requires decryption to extract its meaning.

When more than one key is involved in the process, it's also possible to use to authenticate the sender. (Read Expert Feedback: What Data Encryption Advancements Should Businesses Be Aware Of?)

Encryption is the process of using an algorithm to transform information to make it unreadable for unauthorized users. Once the information is encoded, it requires decryption to be understood. (Read Encryption Just Isn't Enough: 3 Critical Truths About Data Security.)

Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.

Decryption is the process of transforming data that has been rendered unreadable through encryption back to its unencrypted form.

The encoded data reverts back to its original form, whether it contains texts or images, so that it makes sense to the human reader and/or the computer system. This process may be automated or be conducted manually.

Typically, there is a form of key involved. (Read 10 Best Practices for Encryption Key Management and Data Security.)

This eBook makes it easier than ever to get everything out of this powerful data tool. Free offer expires 2/18/2020.

CC BY-SA 3.0

A Scytale was what ancient Greeks used to make a simple transposition cipher. All it took was a strip of leather on which the letters were written and cylinder around which to wrap it. The sensitive data that was protected this way was likely centered around battle strategies. (Read Encryption Backdoors: The Achilles Heel to Cybersecurity?)

The encryption is the result of the letters being taken out of the order necessary to read and make sense of the message when they are unwrapped. In this case, the right cylinder functions as the key because it is what would get the letters properly aligned once the strip was wrapped once again.

The cylinder would be what is called a pre-shared key (PSK) in cryptography, that is a secret key that was shared ahead of the secret message being sent on it. Its letting the other party know what code the hidden message will be in. (Read Cryptography: Understanding Its Not-So-Secret Importance to Your Business.)

The Scytale method of encryption is the first one mentioned in A Brief History of Cryptological Systems, an instructive and entertaining read about strategies to prevent unauthorized people from reading secret message.

What may be the most famous stone in the world is housed in the British Museum. The museumss blog on the historic Rosetta Stone explains that Napoleons army found it in the Nile delta town for which it is named in 1799. At that time, no one had the capability to read hieroglyphs. It was a code with no key.

That is until scholars studied the Rosetta Stone. It opened the way to meaning through two components. One was that the same message was carved into in three languages, including Ancient Greek, which scholars could read.

The other was an identifiable cartouche that indicated which symbols stood for the name of the king Ptolemy.That was the basis of finding which of the 53 lines of Ancient Greek corresponded to the 14 lines of hieroglyphics and figure out the meaning of individual symbols.

It then took a couple of scholars 20 years to work it all out.

While the Rosetta Stone did function effectively as a decryption key, we need something easier to work with than a 1,680 pound rock for our everyday needs. The keys used in computer encryption are based on algorithms which scramble the plaintext data to render it into apparently random gibberish.

Applying the decryption key will put it back into understandable plaintext. There are different possible setups with single or double sets of keys.

Symmetric key encryption is based on algorithms that apply the same keys for both encryption and decryption. Its the same concept that worked for the Scytale in which the same size cylinder is used both to set the code and to rewrap the strips to make sense of the apparently random letters.

The same key that rendered the plaintext into ciphertext will turn the ciphertext back into plaintext In his blog, Panayotis Vryonis offers the analogy of locking something away in a box. The same key used to remove the contents from view is used to unlock the box and reveal them.

This is also sometimes called public key encryption. The name is a bit misleading because the asymmetry actually depends on having both a public and a private key. The public key is used to encrypt the message that is decrypted with the private key.

You can also encrypt data with the private key and have the receiver decrypted with the public key. The point is just that different keys are used for two functions.

Vryonis once again offers an image of a locked box to understand the concept: This lock has three states: A (locked), B (unlocked) and C (locked). And it has two separate (yes, two) keys. The first one can only turn clockwise (from A to B to C) and the second one can only turn anticlockwise (from C to B to A).

He names the one who locks it Anna, and she has an exclusive on one key the private key. The second key is the public one, which is copied and distributed.

So. Anna has her private key that can turn from A to B to C. And everyone else has her public-key that can turn from C to B to A. This opens up the possibility of locking up what you dont have the power to unlock.

"First of all, imagine you want to send Anna a very personal document. You put the document in the box and use a copy of her public-key to lock it. Remember, Annas public-key only turns anticlockwise, so you turn it to position A. Now the box is locked. The only key that can turn from A to B is Annas private key, the one shes kept for herself."

Anyone with the public key can make sure the box is locked, and only the person in possession of the private key can unlock it. Back to the world of algorithms, only the private key can decrypt what was encrypted by the public key. But it also has the possibility of allowing the public key to decrypt what was decrypt what was encrypted with the private key.

That opens up the possibility of attaching digital signatures, which Vryonis explains as follows:

"Someone delivers me this box and he says its from Anna. I dont believe him, but I pick Annas public-key from the drawer where I keep all the public-keys of my friends, and try it. I turn right, nothing. I turn left and the box opens! Hmm, I think. This can only mean one thing: the box was locked using Annas private key, the one that only she has.

In that scenario, the lock that is only possible from the private key guarantees that the sender is the one represented, which is the function of the digital signature. It would be like an unbroken seal on a letter formed by the persons signet ring used in the days of quill pens.

Accordingly, the asymmetric key offers more possible functions than the symmetric key system. Anyone with the public key can secure their data transmission to be decrypted only by the one in possession of the private key.

Plus anyone who receives data encrypted by the private key can trust the source. That preserves the integrity of the files and the validation of origin for digital communication, both of which are essential for functional and secure digital interactions.

View post:
Encryption Vs. Decryption: What's the Difference? - Techopedia

Encryption Software Market Growth by Top Companies, Trends by Types and Application, Forecast to 2026 – News Parents

The report is an all-inclusive research study of the Encryption Software Market taking under consideration the expansion factors, recent trends, developments, opportunities, and competitive landscape. The market analysts and researchers have done extensive analysis of the global Encryption Software market with the help of research methodologies such as PESTLE and Porters Five Forces analysis. They have provided accurate and reliable market data and useful recommendations with an aim to help the players gain an insight into the overall present and future market scenario. The report comprises in-depth study of the potential segments including product type, application, and user and their contribution to the general market size.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

The Encryption Software market report provides detailed information on key factors, Opportunities, Challenges, industry trends and their impact on the market. The market report Encryption Software also includes company data and its operation. This report also contains information about the pricing strategy, brand strategy and target customer of the Encryption Software market.

Get | Download Sample Copy @https://www.verifiedmarketresearch.com/download-sample/?rid=1826&utm_source=NPN&utm_medium=002

The top Manufacturer with company profile, sales volume, and product specifications, revenue (Million/Billion USD) and market share

Global Encryption Software Market Competitive Insights

The competitive analysis serves as a bridge between manufacturers and other participants that are available on the Encryption Software Market. The report includes a comparative study of Top market players with company profiles of competitive companies, Encryption Software Market product innovations and cost structure, production sites and processes, sales details of past years and technologies used by them. The Encryption Software Market report also explains the main strategies of competitors, their SWOT analysis and how the competition will react to changes in marketing techniques. In this report, the best market research techniques were used to provide the latest knowledge about Encryption Software Market to competitors in the market.

Global Encryption Software Market Segmentation information

The report provides important insights into the various market segments presented to simplify the assessment of the global Encryption Software Market. These market segments are based on several relevant factors, including Encryption Software Market product type or services, end users or applications and regions. The report also includes a detailed analysis of the regional potential of the Encryption Software Market, which includes the difference between production values and demand volumes, as well as the presence of market participants and the growth of each Region over the given forecast period

Ask For Discount (Exclusive Offer) @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=NPN&utm_medium=002

Encryption Software Market: Regional Analysis :

As part of regional analysis, important regions such as North America, Europe, the MEA, Latin America, and Asia Pacific have been studied. The regional Encryption Software markets are analyzed based on share, growth rate, size, production, consumption, revenue, sales, and other crucial factors. The report also provides country-level analysis of the Encryption Software industry.

Table of Contents

Introduction: The report starts off with an executive summary, including top highlights of the research study on the Encryption Software industry.

Market Segmentation: This section provides detailed analysis of type and application segments of the Encryption Software industry and shows the progress of each segment with the help of easy-to-understand statistics and graphical presentations.

Regional Analysis: All major regions and countries are covered in the report on the Encryption Software industry.

Market Dynamics: The report offers deep insights into the dynamics of the Encryption Software industry, including challenges, restraints, trends, opportunities, and drivers.

Competition: Here, the report provides company profiling of leading players competing in the Encryption Software industry.

Forecasts: This section is filled with global and regional forecasts, CAGR and size estimations for the Encryption Software industry and its segments, and production, revenue, consumption, sales, and other forecasts.

Recommendations: The authors of the report have provided practical suggestions and reliable recommendations to help players to achieve a position of strength in the Encryption Software industry.

Research Methodology: The report provides clear information on the research approach, tools, and methodology and data sources used for the research study on the Encryption Software industry.

What will you find out from the global Encryption Software Market Report?

The report contains statistical analyses of the current and future Status of the global Encryption Software Market with a forecast to 2026.The report contains detailed information on manufacturers, Encryption Software Market raw material suppliers and buyers with their trade outlook for 2020-2026.The report informs you about the most important drivers, technologies and Trends that will shape the global Encryption Software Market in the near future.The report added an exclusive market segmentation, broken down by Product Type, Encryption Software Market end user and Region.The strategic perspectives on Encryption Software Market Dynamics, current production process and applications.

Complete Report is Available @ https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=NPN&utm_medium=002

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Our research studies help our clients to make superior data-driven decisions, capitalize on future opportunities, optimize efficiency and keeping them competitive by working as their partner to deliver the right information without compromise.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email:[emailprotected]

TAGS: Encryption Software Market Size, Encryption Software Market Growth, Encryption Software Market Forecast, Encryption Software Market Analysis, Encryption Software Market Trends, Encryption Software Market

Here is the original post:
Encryption Software Market Growth by Top Companies, Trends by Types and Application, Forecast to 2026 - News Parents

Labor Bill to fix Australian encryption laws it voted for hits second debate – ZDNet

The Australian Labor Party said on Monday it would be debating a Private Senator's Bill to fix the encryption laws that it voted for in 2018.

The changes would include judicial authorisation that make the laws compatible with the US CLOUD Act, as well as changes in theprevious Bill that was stranded prior to the May 2019 election.

"Tech companies report that customers are less likely to seek out contracts with Australian companies because the encryption laws pose risks that they would be required by the government to introduce systemic weaknesses into their products and systems," Shadow Minister for Home Affairs Kristina Keneally said.

Labor was warned of this exact situation in 2018 before it voted for the laws.

Australian security vendor Senetas called for the laws to be dumped in 2018 because it would damage Australian reputations and trust.

"The Bill will damage Australian developers' and manufacturers' reputations in international markets, resulting in loss of trust and confidence in Australian cybersecurity R&D and products," Senetas said at the time.

"Rather than protecting the interests of citizens, this Bill compromises their security and privacy as a consequence of weaker cybersecurity practices and easier access to new tools for cyber criminals."

As long as the government majority holds, and there are no signs it would not, then Labor's fixes will die on the House of Representatives floor.

"Today is a test for the Morrison government -- will they stand up for the 700,000 Australians working in our technology industry and Australia's law enforcement agencies ... or continue with their broken promises and do-nothing plan?" Keneally said without a hint of irony.

Labor had previously said it would fix the "rushed legislation" it passed if it won government in May. The ALP did not win.

On Friday it was revealed that the nation's metadata laws were capable of handing to the cops the web browsing history of Australians.

At the time, Labor Senator Anthony Byrne noted his "grave concern" this was happening despite assurances.

Updated at 19:17pm AEDT, 10 February 2020: Article headline originally said the Bill was being introduced. The Bill was up for second reading debate.

AFP and NSW Police used Australia's encryption laws seven times in 2018-19

Seven Technical Assistance Requests made with no Technical Assistance Notices or Technical Capability Notices issued.

How the B-Team watches over Australia's encryption laws and cybersecurity

Most telco interception warrants are issued by non-judges. Important cybersecurity work isn't being done. The Information Commissioner lacks funding. Does the government actually care about privacy and security?

Home Affairs report reveals deeper problems with Australia's encryption laws

The first seven months of Australia's controversial encryption laws didn't see an explosion of decryptions. Worry instead about the cops bypassing judges to get their interception warrants approved.

End-to-end encryption means Huawei bans are about availability, not interception

Former Prime Minister who brought in Australia's anti-encyption laws says the technology can prevent potential tapping by telco equipment manufacturers.

Labor says it will fix encryption laws it voted for last year

Better late than never for agreeing to judicial authorisation, but legislation is unlikely to pass the House of Representatives.

Read more here:
Labor Bill to fix Australian encryption laws it voted for hits second debate - ZDNet

Mobile Encryption Market to Grow Massively (2020-2025) By Size, Share, Price, Trend and Forecast | Blackberry, T-Systems International, ESET, Sophos,…

Global Mobile Encryption Market Analysis to 2025 is a specialized and in-depth study of the Mobile Encryption industry with a focus on the global market trend. The research report on Mobile Encryption Market provides comprehensive analysis on market status and development pattern, including types, applications, rising technology and region. Mobile Encryption Market report covers the present and past market scenarios, market development patterns, and is likely to proceed with a continuing development over the forecast period. A number of analysis tools such as SWOT analysis and Porters five forces analysis have been employed to provide an accurate understanding of this market.

Get Sample Copy of this Report @ https://www.reportsweb.com/inquiry&RW00013197819/sample

Some of the key players of Mobile Encryption Market:

The Global Mobile Encryption Market research report offers an in-depth analysis of the global market, providing relevant information for the new market entrants or well-established players. Some of the key strategies employed by leading key players operating in the market and their impact analysis have been included in this research report.

Segmentation by Solution:

The report provides a detailed overview of the industry including both qualitative and quantitative information. It provides overview and forecast of the global Mobile Encryption market based on product and application. It also provides market size and forecast till 2025 for overall Mobile Encryption market with respect to five major regions, namely; North America, Europe, Asia-Pacific (APAC), Middle East and Africa (MEA) and South America (SAM), which is later sub-segmented by respective countries and segments.

Get Discount for This Report @ https://www.reportsweb.com/inquiry&RW00013197819/discount

The report evaluates market dynamics effecting the market during the forecast period i.e., drivers, restraints, opportunities, and future trend and provides exhaustive PEST analysis for all five regions.

Fundamentals of Table of Content:

1 Report Overview1.1 Study Scope1.2 Key Market Segments1.3 Players Covered1.4 Market Analysis by Type1.5 Market by Application1.6 Study Objectives1.7 Years Considered

2 Global Growth Trends2.1 Mobile Encryption Market Size2.2 Mobile Encryption Growth Trends by Regions2.3 Industry Trends

3 Market Share by Key Players3.1 Mobile Encryption Market Size by Manufacturers3.2 Mobile Encryption Key Players Head office and Area Served3.3 Key Players Mobile Encryption Product/Solution/Service3.4 Date of Enter into Mobile Encryption Market3.5 Mergers & Acquisitions, Expansion Plans

4 Breakdown Data by Product4.1 Global Mobile Encryption Sales by Product4.2 Global Mobile Encryption Revenue by Product4.3 Mobile Encryption Price by Product

5 Breakdown Data by End User5.1 Overview5.2 Global Mobile Encryption Breakdown Data by End User

Inquiry About Report @ https://www.reportsweb.com/inquiry&RW00013197819/buying

About ReportsWeb:ReportsWeb.com is a one stop shop of market research reports and solutions to various companies across the globe. We help our clients in their decision support system by helping them choose most relevant and cost effective research reports and solutions from various publishers. We provide best in class customer service and our customer support team is always available to help you on your research queries.

Contact Us:Call: +1-646-491-9876Email: [emailprotected]

Tags: Demand Mobile Encryption MarketForecast Mobile Encryption Market GrowthMobile EncryptionMobile Encryption CAGRMobile Encryption Competitive AnalysisMobile Encryption MarketMobile Encryption Market AnalysisMobile Encryption Market ForecastMobile Encryption Market GrowthMobile Encryption Market ManufactureMobile Encryption Market priceMobile Encryption Market Research ReportMobile Encryption Market ShareMobile Encryption Market SizeMobile Encryption Market TrendsMobile Encryption Value Chain Analysis

Read more from the original source:
Mobile Encryption Market to Grow Massively (2020-2025) By Size, Share, Price, Trend and Forecast | Blackberry, T-Systems International, ESET, Sophos,...

Child-Welfare Activists Attack Facebook Over Encryption Plans – The New York Times

WASHINGTON New opponents confronted Facebook on Wednesday as it moves forward with a plan to encrypt all of its messaging platforms: child welfare advocates who said that encryption would allow child predators to operate with impunity across the companys apps.

Facebook has a responsibility to work with law enforcement and to prevent the use of your sites and services for sexual abuse, a group of 129 child protection organizations, led by the National Society for the Prevention of Cruelty to Children, said in a letter to the Silicon Valley company. An increased risk of child abuse being facilitated on or by Facebook is not a reasonable trade-off to make.

The letter indicates how activists and law enforcement agencies have seized on child exploitation as a new way to combat the expanded use of encryption in consumer technology.

The Justice Department and its counterparts in Britain and Australia previously used the threat of terrorist activity to rail against encryption, saying that tech companies were shielding malicious and dangerous criminals. But they have recently shifted their focus to child exploitation as tech companies have made good on plans to make it harder to see or stop illicit activity on those platforms.

In a statement, Facebook said, Encryption is critically important to keep everyone safe from hackers and criminals. The company said it was building safety measures for children and working closely with child safety experts.

We have led the industry in safeguarding children from exploitation and we are bringing this same commitment and leadership to our work on encryption, Facebook said.

Last March, Mark Zuckerberg, Facebooks chief executive, announced that he planned to knit together and encrypt the companys various messaging services, including WhatsApp, Instagram and Facebook Messenger. The products serve billions of people globally.

Facebook has been grappling with its role in the explosion of online child pornography. In 2018, tech companies reported more than 45 million online photos and videos of children being sexually abused. Facebook accounted for more than 90 percent of reports that tech companies flagged that year. Once Facebook Messenger the companys main source of such imagery is fully encrypted, it will be nearly impossible for Facebook to detect such images.

Tech companies said they had found other ways to combat abuse of their services, even if they introduce encryption. Those methods include scanning and matching the profile photos of users to those of known predators, as well as relying on user reports and complaints. WhatsApp, which is already fully encrypted, has said it bans more than 250,000 users every month for posting imagery of exploited children.

The scope and severity of online child pornography has grown exponentially along with the rise of social networks.

It is possible to find images and videos of children as young as infants being raped and abused online, and some services allow people to watch pay-per-view live streams of assaults of victims from around the world. Many victims live in fear of being recognized, thanks to the near impossibility of deleting these images from the internet.

It would take nearly every agent at the F.B.I. to pursue every child pornography lead that came into the bureau, according to F.B.I. and Justice Department officials who have fought to obtain information that companies like Apple say they cannot give because of the strengthened security in their products.

In a hearing with the House Judiciary Committee on Wednesday, Christopher Wray, director of the Federal Bureau of Investigation, also criticized Facebook on its encryption plans, calling it a dream come true for predators and child pornographers who use the services to traffic in illicit material.

If Facebook moves forward with the plans that they have at the moment, we will be blinded, Mr. Wray said. They will blind themselves and law enforcement.

Mr. Wray said Facebook should not be able to decide unilaterally to shut out law enforcement, leaving open the possibility that American lawmakers could try to mitigate the problem through legislation, as Australia has done. In 2018, the Australian Parliament passed a bill that required tech companies to provide law enforcement authorities with access to encrypted communications.

Tech companies like Facebook have a vital responsibility to balance privacy with the safety of vulnerable children, Priti Patel, the British home secretary, said in a statement on Wednesday. We have also submitted detailed evidence to the U.S. Senate about these concerns.

In a recent meeting with Sheryl Sandberg, Facebooks chief operating officer, Ms. Patel said the social networks encryption plans could not be allowed to hamper law enforcements ability to protect children online.

Facebook and other tech companies have received support for encryption from a coalition of civil liberties organizations, techno-libertarian groups and former national security experts, many of whom served in the Obama administration.

While many of these groups agree that there needs to be a balance between public safety and the privacy of people who use technology to communicate, they said encryption was a public good that helps ensure a safer world.

The future of cybersecurity, robotics, communications and other technologies depends on better encryption, said Ari Schwartz, managing director for cybersecurity services at Venable.

Law enforcement officials have long been frustrated by this argument. They said companies like Facebook and Apple did not encrypt parts of their services that would make it impossible for users to do things like reset their passwords when they forget them a decision that keeps those products generally usable and appealing, and makes it possible for law enforcement authorities to see into services such as Apples iCloud.

The question, some law enforcement officials said, is why tech companies choose not to encrypt when it serves their bottom line, but choose to encrypt when it could harm public safety.

Katie Benner reported from Washington and Mike Isaac from San Francisco.

More:
Child-Welfare Activists Attack Facebook Over Encryption Plans - The New York Times