Category Archives: Encryption

The U.S. government’s been trying to stop encryption for 25 years. Will it win this time? – Tom’s Guide

SAN FRANCISCO In the age of mass digital surveillance, how private should your data and communications be? That question lies at the heart of the encryption panel that kicked off the Enigma Conference here yesterday (Jan. 27).

Four cryptography experts discussed the origins of the first "Crypto Wars" in the 1990s, the state of the current Crypto Wars between the government and technology companies two weeks ago, the U.S. attorney general called out Apple for not unlocking a terror suspect's iPhones and what's at stake now for consumers, companies and governments.

"It is a basic human right for two people to talk confidentially no matter where they are. This is sacrosanct," said Jon Callas, senior technologist at the American Civil Liberties Union (ACLU) and a veteran of the fight between the U.S. government and tech companies over the use of cryptography to protect digital communications in the 1990s.

It may be a human right, but most countries have not enshrined confidential conversations in their legal codes. What started as a resurgent fight against government surveillance in the wake of the documents leaked by Edward Snowden in 2013 has now bloomed into a larger struggle over who gets to encrypt communications and data.

In Snowdens wake, end-to-end encrypted messaging has become far more accessible, while Apple and Google have introduced on-device encrypted data storage by default. But access to those services could soon depend on which country you are in and whose digital services you're using.

The 1990s Crypto Wars centered on the Clipper Chip, a hardware chip designed to protect phone users calls from surveillance unless the government wanted to listen in. It was a "backdoor" that was going to be built into every cellphone.

But in 1994, cryptographer Matt Blaze, one of the panelists at yesterday's Enigma Conference talk, exposed security vulnerabilities in the Clipper Chip. Experts spent the next three years finding even more vulnerabilities in the Clipper Chip and fighting in court to prevent its inclusion in devices.

Since the commercial internet was in its infancy at the time, legal and computer security experts had to take on faith that the World Wide Web would eventually be important, Blaze said. With the publication in 1997 of a report on the risks of key recovery that Blaze co-authored, most U.S. federal agencies stopped fighting against the cryptographers.

"The FBI became the only organization arguing that computer security was too good," Blaze said.

Today, government access to encrypted communications through a mandated backdoor is not the law of the land in any single country. But laws requiring varying degrees of government access to encrypted communications are becoming more common, said panelist Riana Pfefferkorn, associate director of surveillance and cybersecurity at the Stanford Law School Center for Internet and Society.

Following the panel discussion, Pfefferkorn said she sees a growing trend, especially in the United States and India, to tie serious liability issues, in both criminal and civil law, to the encryption debate.

"In the U.S., it's child pornography. In India, it's the threat of mob violence," Pfefferkorn said. "They seem like two separate issues, but they're a way of encouraging the regulation of encryption without regulating encryption.

"They're going to induce providers to stop deploying end-to-end encryption lest they face ruinous litigation," she added. "It feels like a bait-and-switch."

Daniel Weitzner, the founding director of the Internet Policy Research Initiative at the Massachusetts Institute of Technology, noted during the panel that India's proposed changes to its intermediary liability law would make internet communications providers ("intermediaries") legally responsible for the actions and speech of their users.

He said India's proposals are similar to changes demanded by U.S. senators, including the EARN IT Act of 2019 authored by Senators Lindsey Graham (R-South Carolina) and Richard Blumenthal (D-Connecticut). Weitzner added that there are other countries with even tougher tech-liability laws on the books.

The United Kingdom passed the Investigative Powers Act in 2016, also known as the Snoopers' Charter. It lets the British government issue statutorily vague Technical Capacity Notices that let it mandate encryption backdoors or otherwise force companies to stop using end-to-end encryption. There's no requirement that the British government has to ever reveal the results of the evaluation process guiding the issuance of the notices.

Australia's Assistance and Access Bill from 2018 is similar, except that it specifically bans the introduction of systemic vulnerabilities into the product in question. What's not clear is another question raised by the legal mandate: Whats the difference between a technical vulnerability and a legally-mandated software backdoor?

As technology itself has grown more complicated and nuanced since the 1990s, so has the burden of responsibility facing its advocates. Proposals to change encryption should be tested "multiple times" strategically and technically, argued the Carnegie Encryption Working Group in September 2019.

And Susan Landau and Denis McDonough said in a column for The Hill that it would be wiser for the tech community to find common ground with governments over data at rest, such as data stored on a locked iPhone, instead of the more contentious data in transit embodied by end-to-end encrypted messaging apps.

Ultimately, the future of the consumer use of encryption is likely to depend heavily on the developers and companies that make it available.

They could split their products, offering different levels of encryption for different countries and regions, as Netscape did in the 1990s, said Pfefferkorn. Or they could refuse to offer encrypted products in countries or regions that demand weaker encryption or backdoor access.

"Or," Pfefferkorn said, "it could be broken for everyone."

Read the original post:
The U.S. government's been trying to stop encryption for 25 years. Will it win this time? - Tom's Guide

Researchers showcase all-optical encryption tech to keep data hidden and safe – The Times of Israel

Researchers at Ben-Gurion University of the Negev are set to unveil what they say is a first all-optical stealth encryption technology that will be significantly more secure and private for transmission of highly sensitive financial, medical or social media-related information.

The technology will be presented at the Cybertech Global Tel Aviv conference held on January 28-30, 2020 in Tel Aviv.

Today, information that is transmitted on the internet is encrypted to protect the privacy and safety of the data by using digital techniques. The data is broken up into bits which are then encrypted by digital algorithms the most commonly used today is the RSA algorithm which turn the data into meaningless signals that are transmitted over electro-magnetic or radio waves or over fiber optic cables where light waves are used to transmit the data. The information is then decoded and reconstructed into the original message at destination.

Get The Start-Up Israel's Daily Start-Up by email and never miss our top storiesFree Sign Up

However, high-powered computers and government agencies like the US National Security Agency (NSA) and other bodies have the ability to decode and access these messages by breaking the encryption codes, explained Prof. Dan Sadot, the chairman of the Cathedra for Electro-optics at BGU who heads the team that has developed what the university says is groundbreaking technology.

Prof. Dan Sadot, the chairman of the Cathedra for Electro-optics at Ben-Gurion University. (Courtesy)

Not only that. Hackers who want to access data can today easily detect bits that are being transferred on the network and record them even without understanding the information in real time and then leisurely work offline on decoding the information at a later stage. And also, in future, the advent of quantum computers will see the creation of strong and fast machines that will have the ability to break all of the existing encryption codes, Sadot told the Times of Israel in a phone interview. Thus, a different data security paradigm must be found.

What the Ben-Gurion University researchers have come up with now is an end-to-end solution providing encryption, transmission, decryption, and detection optically instead of digitally, Sadot said.

Using standard optical equipment, the research team has managed to make the data transmission undetectable and stealthy and has overcome the drawbacks of the digital encryption, the university said in a statement on Wednesday.

The researchers do this by taking the information either already encrypted or not and spreading the data over a number of light waves in the fiber optic cables which are the most common method today used for transmitting data, Sadot said.

We spread the information not only on a single color of light, in the optical spectrum bandwidth as is done when transmitting bits digitally on fiber optic networks but over many colors, he said.

The method spreads the transmission across many colors in the optical spectrum bandwidth (1,000x wider than digital) and intentionally creates multiple weaker data streams that thus elude detection, because people do not realize that the bits are being transmitted. In addition, every transmission, electronic, digital, or fiber has a certain amount of network noise. The researchers showed that the weaker encrypted data can be transmitted under a stronger inherent noise level, concealing the information even further.

To add an extra level of security the researchers also use a commercially available so called phase mask, which changes the phase of each wavelength (color). This process also appears as noise, but destroys the coherence or ability to recompile the data without the correct encryption key. The optical phase mask also cannot be recorded and worked on offline, said Sadot.

Once the data reaches destination, the signals are decoded via an encryption key that is given to both the sender and the receiver of the message.

Basically, the innovative breakthrough is that if you cant detect it, you cant steal it, Sadot said. Because an eavesdropper can neither read the data or even detect the existence of the transmitted signal, our optical stealth transmission provides the highest level of privacy and security for sensitive data applications.

The new, patented method invented by Sadot and his team, can be highly useful for multiple applications, such as high-speed communication, sensitive transmission of financial, medical or social media-related information, without the risk of hackers getting their hands onto the information, said Zafrir Levy, Senior Vice President, Exact Sciences & Engineering, BGN Technologies, the technology transfer arm of the university.

BGN is now seeking an industry partner to implement and commercialize the technology, he said.

Clients of the technology could be companies that make transmitters or receivers, said Sadot, or network infrastructure vendors, or users of cloud systems and data centers, like Google, Facebook and Amazon.

The technology is an extension of the digital optical encryption method originally invented by Sadot and his team, in collaboration with Prof. Zalevsky of Bar Ilan University.

Excerpt from:
Researchers showcase all-optical encryption tech to keep data hidden and safe - The Times of Israel

Apple’s end-to-end encryption threatened by new proposed bill – AppleInsider

By William GallagherSaturday, February 01, 2020, 01:35 pm PT (04:35 pm ET)

Republican Senator Lindsey Graham is behind a draft bipartisan bill called the 'Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2019'' or EARN IT. Its stated aims are to "develop recommended best practices... regarding the prevention of online child exploitation." However, the methods Graham proposes would effectively ban all end-to-end encryption.

"The absolute worst-case scenario could easily become reality," think tank TechFreedom president Berin Szoka told Bloomberg. "DOJ could effectively ban end-to-end encryption."

The act would introduce a National Commission on Online Child Exploitation Prevention "and for other purposes." Senator Graham's draft bill proposes a structure for the Commission, which would comprise 15 people including the US Attorney General.

The greater part of Senator Graham's proposals outline creating and enforcing age limits for online material, plus a rating system to categorize images by severity.

At no point does the draft bill mention encryption, however its requirements cannot be complied with if end-to-end encryption is used. Companies with any public or private online discussion areas, such as Whatsapp and Facebook, would be required to divulge user details to law enforcement.

"[Best practices] shall include... coordinating with law enforcement agencies and other industry participants to preserve, remove from view, and report material relating to child exploitation or child sexual abuse," says the draft bill.

"[Also] retention of evidence and attribution or user identification data relating to child exploitation or child sexual abuse, including such retention by subcontractors," it continues.

Senator Graham's proposals explicitly state that the result will be changes to the Communications Decency Act of 1934, which currently allows online services to shield themselves from lawsuits over such materials.

Neither Apple nor any online companies have publicly responded to the proposals yet. However, Apple has and continues to be a strong and vocal proponent of the necessity for end-to-end encryption and the dangers of removing it.

There is currently no date for when the draft bill will proceed further toward legislation.

However, it comes after FBI officials have reportedly been concerned over US Attorney General William Barr's pressures to weaken or remove end-to-end encryption.

Most recently, Apple's senior director of global privacy, Jane Horvath, spoke at CES in January about the company's position on weakening encryption to help combat crime.

"Building back doors into encryption is not the way we are going to solve those issues," she said.

Link:
Apple's end-to-end encryption threatened by new proposed bill - AppleInsider

With Streaming Becoming More Prevalent in 2020, it would be better to connect to the Internet with a VPN – gotech daily

Todays era of entertainment and the media has become completely digital. With every major cable TV provider now rushing to release its own streaming platform, the fight to gain customer confidence in choosing the new streaming service is becoming more aggressive both at home and abroad.

As a result, not all streaming opportunities are created equal. For those residing abroad, the ability to stream certain content is not the same as living in the United States. In addition, 2020 is the year of accountability for our tech giants who own the most valuable assets in the world.

In todays era of data breaches and security exploits, personal security and privacy is all the more necessary, especially when online content is streaming. For this reason, it is important for people living abroad and / or traveling frequently internationally to consider using a VPN provider or Virtual Private Network.

A VPN is a service that allows you to access the Internet as if you were connected to a private network anonymously and from any site. So, to bring the idea home if you live in an area where your internet content is restricted, a VPN essentially allows you to bypass that particular area-specific content (cough, china, cough) on the Internet. So yes, you can watch Schitts Creek all the way from India or Russia if you choose.

When you enable or disable your VPN, it creates an encrypted tunnel between your computer and a server operated by the VPN company. By streamlining all your internet traffic through this tunnel, it effectively hides your IP address (your computers social security number) and shows you that your traffic is coming from your VPN (geographically outdated) server and not your computer may be subject to restriction of content restriction. This essentially makes it more difficult for third party advertisers or others to monitor your online activities.

It also helps minimize and / or almost completely the ability of ISPs to sell your anonymous data for profit.

If you are one of these people who flows online through an Amazon Firestick, which is known to allow open source / third party option (assuming you understand that you accept the risk of anything that may happen or result from these downloads), you should probably use a VPN, no matter where you live.

Source: Surfshark

Just last week, CNET released its list of Best VPN Services in 2020, which includes well-known VPN networks such as ExpressVPN, IPVanish VPN, NordVPN and many more.

However, one VPN that we believe is up-and-coming and is completely new is Surfshark.

The most appealing about Surfshark is the ability to add an unlimited number of devices to an account while most of these other VPN networks are cut after a certain number of connections (usually five). But why is that?

The company offers over 1000 servers, while others such as ExpressVPN and NordVPN range from 3,000 to 5,200. However, it is important to note that most servers do not necessarily equal performance the number of servers simply reflects the number of subscribers serving a company.

Geographical location is an important factor to consider as Surfshark currently covers 61 countries exceeding the average in countries such as South America (often overlooked by other providers), Africa, Israel, Japan, Chile, and South Korea to name a few.

As mentioned, no matter where you are (at home or abroad), it is never a good idea in todays digital age to connect directly to the Internet. And the data breaches surrounding Avast and NordVPN antigen and security giant are proof of that.

Last year, antivirus and security giant Avast and NordVPN revealed monthly intrusions that shared a common cause, according to Brian Krebs forgotten or unknown user accounts that gave remote access to internal systems with little more than one password.

The NordVPN data breach, which occurred in March 2018, was unfortunately downgraded by the company, stating that while attackers could use private keys to track and track traffic for some of their customers traffic, monitoring communications routing through one of the companys more than 3,000 servers.

NordVPN blog report on data breach:

The server itself does not contain any user activity logs. None of our applications send user-created credentials for authentication, so usernames and passwords could not be withheld. With the same note, the only possible way to abuse site traffic was to perform a personalized and complex human attack in the middle to keep a single link trying to gain access. silver in NordVPN .

But why wait so long to report the invasion?

When we found out about the vulnerability the data center had a few months ago, we immediately terminated the contract with the server provider and broke all the servers we had rented from them, the company said. We did not disclose the exploitation right away because we needed to ensure that none of our infrastructure could be prone to such issues. This could not be done quickly because of the huge volume of servers and the complexity of our infrastructure.

This brings us back to the important issue of encryption and encryption. In cryptography, a code is an algorithm for performing encryption or decryption. For more information on cryptographers, you can read more here.

Surfshark uses AES-256-GCM, the fastest and most modern encryption method available today. For the unspecified, the AES-GCM over the AES-CBC concludes how secure its cryptography is.

AES is NIST-certified and used by the US government to protect secure data, and many have therefore adopted AES as the standard symmetrical selection cycle. It is an open standard that is free to use for any public, private, commercial or non-commercial use. AES is a symmetric key encryption key, the same key used to encrypt data is also used to decrypt it.

In cryptography, GCM or Galois / Counter Mode is a mode of operation for widely used cryptographic symmetric key cryptographic blocks. For more information on this, you can see an analysis of how encryption blocks work and how GCM plays here.

With Surfshark incorporating this level of encryption, it enables peer-to-peer (P2P) transactions, including BitTorrent, along with its own in-house ad blocker tool, called CleanWeb.

One feature we havent seen much with other providers, which many of our staff uses, is Multihop, a tunnel splitting tool that adds even more security to your connection. With this feature enabled, a VPN connection to one server and then your Internet traffic jumps to a second VPN server for even greater security.

At the end of the day, you want to make sure that you are always connected to the Internet safely and anonymously because black hackers are looking for new ways on your computer. So dont give them.

For more information about Surfshark, you can sign up for a free trial here.

Originally posted here:
With Streaming Becoming More Prevalent in 2020, it would be better to connect to the Internet with a VPN - gotech daily

nCipher Security: More Americans trust encryption than know what it is – Security Boulevard

New survey data reveals whatand how muchAmericans understand about encryption

nCipher Security, an Entrust Datacard company and provider of trust, integrity and control for business-critical information and applications, announces the results of a new survey exploring how much the average American knows about encryption.

One of the most interesting findings of the survey, fielded by nCipher to more than 1,000 U.S. adults, found that Americans are familiar withand trustthe concept of encryption, even if they are a bit fuzzy on exactly how it works.

Encryption is a key technology in protecting sensitive information such as social security numbers, government IDs and financial data, said Peter Galvin, chief strategy officer, at nCipher Security. It is also an important part of personal data privacy. Owing to domestic and international compliance regulations and ongoing policy debates, we expect the conversation around encryption to reach a crescendo this year.

Almost three-quarters (72.1%) of Americans surveyed know that encryption is the process of making data unreadable to anyone other than those holding the encryption keys. Even more Americans (87.4%) know that encryption is important.

When asked what encryption is able to secure, most Americans thought of financial data and transactions. Top answers included online banking (55.7%), financial information (52.6%), mobile payments (46%), mobile phone data (43.1%), and mobile wallets (42%).

In terms of the average Americans relationship with encryption, the survey also revealed that:

Nearly three-quarters (74%) of respondents say a formal seal of encryption (like the green check used with secure e-payments) would make them feel that their private information was secure online.

Likewise, 47.9% of Americans would trust a company that used such a seal, and 30% would expect that the data security of such a company was validated by a third party.

Among institutions, Americans most trust the financial services industry to encrypt their data (54.9%), followed by healthcare (38.7%) and technology (36.1%) industries. In contrast, only 10% of Americans trust that companies in the travel and tourism industry encrypt their sensitive data.

More than half of Americans (55.5%) believe their private data is safe in the cloud as long as its encrypted. A little more than a quarter (29.4%) arent quite sure. Only 15.1% believe it isnt.

However, 65.2% believe hackers can access confidential info even if its encrypted.

Hackers arent the only threat to Americans peace of mind when it comes to encryption and cybersecurity, however. Only 14% of Americans believe that artificial intelligence cant outsmart encryption. The rest either believe it could (45.6%) or dont know (40.4%).

For all of the hype around artificial intelligence, its unlikely that well see an AI sophisticated enough to outsmart encryption in the near future, added Galvin. Encryption is as water-tight as cybersecurity gets.

Have questions about how encryption works, or general questions about data protection? Visit nCiphers encryption FAQ page to find out (almost) everything you need to know.

Continue reading here:
nCipher Security: More Americans trust encryption than know what it is - Security Boulevard

Encryption Software Market 2020 Analysis by Current Industry Status, Key Manufacturers, Industry Drivers and Forecast to 2024 Dagoretti News -…

The Encryption Software Market 2019-2024 Research Report is a professional and in-depth study on the current state of the Encryption Software industry with a focus on the Global market. The report provides key statistics on the market status of the Encryption Software manufacturers and is a valuable source of guidance and direction for companies and individuals interested in the industry.

Download Sample Copy of Encryption Software Market @https://www.orbisresearch.com/contacts/request-sample/2678103

The report displays significant strategies which are articulated taking into a loop on technical data figures which have been sourced from the effective database. The Encryption Software Market report consists of prime information which could be an efficient read such as investment return analysis, investment feasibility analysis, trends analysis, recommendations for growth. The report also clears the vision of readers with an objective assessment of Encryption Software Market providing crucial insights from technical and marketing experts.

Top Players:

Sophos

Checkpoint Software Technologies

Trend Micro

Symantec Corporation

IBM Corporation

Sas Institute

Encryption SoftwareMarket, projects a standardized and in-depth study on the ongoing state of Market, providing basic industry insights such as definitions, classifications, supply chain, applications and industry cost structure. The report precisely delivers productive information about development policies and plans as well as manufacturing processes and techniques.

The key insights of the report:

The report provides key statistics on the market status of the Encryption Software manufacturers and is a valuable source of guidance and direction for companies and individuals interested in the industry.

The report provides a basic overview of the industry including its definition, applications and manufacturing technology.

The report presents the company profile, product specifications, capacity, production value, and 2013-2018 market shares for key vendors.

The total market is further divided by company, by country, and by application/type for the competitive landscape analysis.

The report estimates 2019-2024 market development trends of Encryption Software industry.

Analysis of upstream raw materials, downstream demand, and current market dynamics is also carried out

The report makes some important proposals for a new project of Encryption Software Industry before evaluating its feasibility.

To know more about Encryption Software Market Visit @https://www.orbisresearch.com/reports/index/global-Encryption Software-market-report-2019-history-present-and-future

Market Segments:

For product type segment, this report listed main product type of Encryption Software market

On-premises

Cloud

For end use/application segment, this report focuses on the status and outlook for key applications. End users sre also listed.

Disk encryption

File/folder encryption

Database encryption

Communication encryption

Cloud encryption

For geography segment, regional supply, application-wise and type-wise demand, major players, price is presented from 2013 to 2023. This report covers following regions:

North America

South America

Asia & Pacific

Europe

MEA (Middle East and Africa)

The Encryption Software Market report also carries the studies of Demand and supply dynamics, import and export scenario, industry processes and cost structures. As every market has a future perspective and expert point of view, this report holds an information related current and future market trends and regulations which are supremely organized in the report. This report will evaluate industry-leading tools and techniques of Encryption Software Market. The report briefly indicates about the current and future market share and size of the Global industry.

In the end, the report makes some important proposals for a new project of Encryption Software Industry before evaluating its feasibility. Overall, the report provides an in-depth insight of 2019-2024 Encryption Software industry covering all important parameters.

Market Highlights:

Analyzing the outlook of the Encryption Software market with the recent trends and SWOT analysis

Market dynamics scenario, along with growth opportunities of the market in the years to come

Encryption Software Market segmentation analysis including qualitative and quantitative research incorporating the impact of economic and non-economic aspects

Regional and country level analysis integrating the demand and supply forces that are influencing the growth of the market.

Encryption Software Market value (USD Million) and volume (Units Million) data for each segment and sub-segment

Competitive landscape involving the market share of major players, along with the new projects and strategies adopted by players in the past five years

Comprehensive company profiles covering the product offerings, key financial information, recent developments, SWOT analysis, and strategies employed by the major market players

1-year analyst support, along with the data support in excel format.

Enquire before buying @https://www.orbisresearch.com/contacts/enquiry-before-buying/2678103

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:

Hector Costello

Senior Manager Client Engagements

4144N Central Expressway,

Suite 600, Dallas,

Texas 75204, U.S.A.

Phone No.: +1 (214) 884-6817; +9120641 01019

Email id:[emailprotected]

See the original post here:
Encryption Software Market 2020 Analysis by Current Industry Status, Key Manufacturers, Industry Drivers and Forecast to 2024 Dagoretti News -...

Emerging Opportunities in Hardware-based Full Disk Encryption Market with Current Trends Analysis – Dagoretti News

The Hardware-based Full Disk Encryption market study Added by Market Study Report provides an in-depth analysis pertaining to potential drivers fueling this industry. The study also encompasses valuable insights about profitability prospects, market size, growth dynamics, and revenue estimation of the business vertical. The study further draws attention to the competitive backdrop of renowned market contenders including their product offerings and business strategies.

The report gives a far-reaching examination of the Hardware-based Full Disk Encryption industry advertise by sorts, applications, players and locales. This report additionally shows the 2014-2024 generation, Consumption, income, Gross edge, Cost, Gross, piece of the overall industry, CAGR, and Market impacting elements of the Hardware-based Full Disk Encryption industry.

Request Sample Report @ https://www.researchmoz.com/enquiry.php?type=S&repid=2096592&source=atm

A rundown of the competitive spectrum:

The following manufacturers are covered:Seagate Technology PLCWestern Digital CorpSamsung ElectronicsToshibaKingstonMicron Technology IncIntel

Segment by RegionsNorth AmericaEuropeChinaJapan

Segment by TypeHard Disk Drive (HDD) FDESolid State Drives (SSD) FDE

Segment by ApplicationIT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthers

In-depth information about the sales volume and the market share accumulated by each of the company, in addition to the revenue margin of every player is elucidated.

A basic outline of the company, along with its chief rivals and its manufacturing base has also been provided.

The report encompasses, in minute detail, information regarding the products manufactured by every company of Hardware-based Full Disk Encryption market, product specifications, as well as their application scope.

The report is also inclusive the price patterns and the gross margins of the industry magnates.

The revenue and market share accumulated by every region has been enumerated in the report, in addition to the sales forecast and the volume.

The present status of the regional markets in this business sphere in addition to the prospects that every region holds in Hardware-based Full Disk Encryption market in the years to come has been provided.

The projected growth rate of every region in Hardware-based Full Disk Encryption market over the forecast timeline has also been discussed about.

Make An EnquiryAbout This Report @ https://www.researchmoz.com/enquiry.php?type=E&repid=2096592&source=atm

An outline of the Hardware-based Full Disk Encryption market segmentation:

The report elucidates the Hardware-based Full Disk Encryption market in terms of the product landscape, split into Medical Service and Medicine Marketing.

Details regarding the revenue amassed by every product in tandem with the volume share have been enlisted.

The market share accumulated by every product in Hardware-based Full Disk Encryption market has been specified as well.

The report is inclusive of the application landscape of this industry, segmented into Hospitals and Clinics.

The study encompasses the revenue that every application segment accounts for, as well as the volume and market share of the application.

You can Buy This Report from Here @ https://www.researchmoz.com/checkout?rep_id=2096592&licType=S&source=atm

The Hardware-based Full Disk Encryption market report enumerates quite some details about the factors impacting the industry, influence of technological developments on the vertical, risks, as well as the threats that substitutes present to the industry players. In addition, information about the changing preferences and needs of consumers in conjunction with the impact of the shifting dynamics of the economic and political scenario on the Hardware-based Full Disk Encryption market has also been acknowledged in the study.

Highlights of the Hardware-based Full Disk Encryption market report:

Read the original:
Emerging Opportunities in Hardware-based Full Disk Encryption Market with Current Trends Analysis - Dagoretti News

Scientists from Israel have developed the worlds first optical encryption technology Stealth – The Times Hub

Scientists working at the University of Ben Gurion in the Negev (Israel) said that the developed all-optical encryption technology Stealth. According to the authors of the study, due to this, soon will be able to provide maximum security for the transmission of information.

To date, all data is encrypted through the use of digital methods. As for transmission, it is accomplished using fiber-optic networks. Time and amount of effort expended on security and privacy technology.

The above problems are solved by the development of the Israeli scientists. They found a universal solution that provides direct encoding, transmission, decoding data in optical form. In this case, this process involved the usual equipment. The method is based on the distribution of transmission immediately in many colors, in the specified band of the spectrum. Along with this, are formed the weaker the flow of information that is hidden under the noise.

According to scientists, the method has not been without the phase mask, changing the color of the wave. In the end, it also manifests itself as noise, according to the portal Planet Today.

Natasha Kumar is a general assignment reporter at the Times Hub. She has covered sports, entertainment and many other beats in her journalism career, and has lived in Manhattan for more than 8 years. She studies in University of Calcutta. Natasha has appeared periodically on national television shows and has been published in (among others) Hindustan Times, Times of India

See the rest here:
Scientists from Israel have developed the worlds first optical encryption technology Stealth - The Times Hub

Government Report Reveals Its Favorite Way to Hack iPhones, Without Backdoors – VICE

The US government is once again reviving its campaign against strong encryption, demanding that tech companies build backdoors into smartphones and give law enforcement easy, universal access to the data inside them.

At least two companies that sell phone-cracking tools to agencies like the FBI have proven they can defeat encryption and security measures on some of the most advanced phones on the market. And a series of recent tests conducted by the National Institute of Standards and Technology (NIST) reveal that, while there remain a number of blind spots, the purveyors of these tools have become experts at reverse engineering smartphones in order to extract troves of information off the devices and the apps installed on them.

Asked whether the NIST test results have any bearing on the public debate about backdoors for police, Barbara Guttman, who oversees the Computer Forensic Tool Testing program for NIST told Motherboard, None at all.

This is a completely different question. Thats a policy question, she said, adding that NISTs only purpose is to ensure that If youre acquiring the phone [data], you should acquire it correctly.

But the demonstrated ability of phone cracking tools to break into and extract data from the latest phones is further proof that the government is perfectly capable of getting into terrorists devices, Andres Arrieta, the director of consumer privacy engineering at the Electronic Frontier Foundation, told Motherboard.

When it comes to the capabilities from law enforcement, I think these documents show theyre quite capable, he said. In the San Bernardino case, they claimed they didnt have the capabilities and they made a big circus out of it, and it turned out they did. Theyve proven consistently that they have the tools.

The never-ending public debate over smartphone security has focused on backdoors for law enforcement to bypass device encryptionand more recently, Apple features that erase all data after 10 failed password attempts or block data extraction through lightning ports. But accessing a phone is only part of the battle; once inside, digital forensic investigators have to understand the complicated data structures they find and translate them into a format that meets the high accuracy standards for evidence, using acquisition tools from companies like Cellebrite, Grayshift, and MSAB.

Results from an NIST test of Cellebrite found that it largely works as expected.

In a series of reports published over the last year, NISTs Computer Forensic Tool Testing program documented how well the latest tools perform that task on dozens of different smartphones and apps. The tests paint a picture of an industry trying to keep pace with the constantly changing smartphones and social media landscapewith mixed results.

Lets say you can get into the phone, you can defeat the encryption. Now you have a blob of ones and zeros, Bob Osgood, a veteran FBI agent who is now the director of digital forensics at George Mason University, told Motherboard. Smartphones contain millions of lines of code, the structures of which differ between every device and can change with every OS or app update. Cracking a phones encryption doesnt necessarily mean an investigator can access the code on it, including deleted and hidden files, hence the need for the tools tested by NIST. In the digital forensics world, the state of complete Nirvana is to get a complete image of the phone, Osgood said. The amount of technical know-how it takes to actually do this stuffreverse engineer, beat the encryption, get data itselfis massive. There are a million moving targets.

Take Cellebrite, the Israeli company whose Universal Forensic Extraction Device (UFED) is a favorite of police departments and the FBI. In June, the company announced that its new premium tool could crack the encryption on any iOS device and many top-end Androidsa major win for law enforcement agencies that had been complaining about built-in encryption.

The companys current UFED 4PC software is then capable of accurately extracting the vast majority of important device informationGPS data, messages, call logs, contactsfrom an iPhone X and most previous models, according to a NIST test from April. It was able to partially extract data from Twitter, LinkedIn, Instagram, Pinterest, and Snapchat as well. NIST did not test the extraction ability for other apps, like Signal.

UFED 4PC could not extract email data from newer iPhone models, but police can gain access to cloud email services like Gmail with a warrant.

Results from Cellebrite on Android phones

Cellebrite was less successful with phones running Android and other operating systems, though. The UFED tool was unable to properly extract any social media, internet browsing, or GPS data from devices like the Google Pixel 2 and Samsung Galaxy S9 or messages and call logs from the Ellipsis 8 and Galaxy Tab S2 tablets. It got absolutely nothing from Huaweis P20 Pro phone.

Some of the newer operating systems are harder to get data from than others. I think a lot of these [phone] companies are just trying to make it harder for law enforcement to get data from these phones ... under the guise of consumer privacy, Detective Rex Kiser, who conducts digital forensic examinations for the Fort Worth Police Department, told Motherboard. Right now, were getting into iPhones. A year ago we couldnt get into iPhones, but we could get into all the Androids. Now we cant get into a lot of the Androids.

Cellebrite, which did not respond to requests for comment, frequently updates its products to address the failures discovered in testing and in the field, experts said, so the weaknesses NIST identified may no longer exist. Previous NIST testing data, though, shows that many blindspots can last for years.

It is important to note that just because a cracking tool cant successfully extract data doesnt mean a forensic investigator cant eventually get to it. The process just becomes much longer, and requires significant expertise.

Kiser said that Cellebrite is currently the industry leader for most devices. The exception is iPhones, where Grayshift, an Atlanta-based company that counts an ex-Apple security engineer among its top staff, has taken the lead.

Like Cellebrite, Grayshift claims that its GrayKey toolwhich it sells to police for between $15,000 and $30,000can also crack the encryption on any iPhone. And once inside, NIST test results show that GrayKey can completely extract every piece of data off an iPhone X, with the exception of Pinterest data, where the tool achieved partial extraction.

Grayshift did not respond to a request for comment.

Other products, like Virginia-based Parabens E3:DS or Swedish MSABs XRY displayed weaknesses in acquiring social media, internet browsing, and GPS data for several phones. Some of those tests, though, are older than the recent results for Cellebrite and Grayshift.

In the NIST tests, both Cellebrite and Grayshift devices were able to extract nearly all the data from an iPhone 7one of the phones used by the Pensacola naval air station shooter. That incident prompted the Department of Justices latest call for phone manufacturers to create encryption backdoors, despite ample evidence that hacking tools can break into the latest, most privacy conscious phones, like the iPhone 11 Pro Max.

This whole thing with the new terrorists and [the FBI] cant get into their phones, thats complete BS, Jerry Grant, a private New York digital forensic examiner who uses Cellebrite tools, told Motherboard.

Link:
Government Report Reveals Its Favorite Way to Hack iPhones, Without Backdoors - VICE

Forensics detective says Android phones are now harder to crack than iPhones – Android Authority

The United States government, as well as US law enforcement agencies, care a lot about iOS and Android encryption. Smartphone data can reveal a lot about terrorists, people who conduct mass shootings, and even general criminals. If officials conduct investigations properly, that data can be used in court as evidence.

Thats why there have been lots of headlines recently about the US government trying to convince companies such as Apple to hand over so-called backdoor access to our smartphone data.

However, critics argue that the government having easy access to your private data pretty much defeats the purpose of encrypted data in the first place, and Apple (among other companies) have mostly refused to cooperate. According to a new expos from Vice, though, the government appears to be doing fine with cracking smartphone encryption, with or without help from the smartphones creators.

At least, thats the case when it comes to most iPhones. When it comes to Android encryption, the job is reportedly getting increasingly more difficult for investigators.

Detective Rex Kiser, who conducts digital forensic examinations for the Fort Worth Police Department, had this to say toVice: A year ago we couldnt get into iPhones, but we could get into all the Androids. Now we cant get into a lot of the Androids.

Vices investigation into the matter shows that Cellebrite one of the most prominent companies that government agencies hire to crack smartphones has a cracking tool that can break into any iPhone made up to and including the iPhone X. The tool pulls data such as GPS records, messages, call logs, contacts, and even data from specific apps such as Instagram, Twitter, LinkedIn, etc., all of which could be incredibly helpful in prosecuting criminals.

However, that same Cellebrite cracking tool is much less successful with Android encryption on prominent handsets. For example, the tool could not extract any social media, internet browsing, or GPS data from devices such as the Google Pixel 2 and Samsung Galaxy S9. In the case of the Huawei P20 Pro, the cracking software literally got nothing.

Some of the newer operating systems are harder to get data from than others, Kiser toldVice. I think a lot of these [phone] companies are just trying to make it harder for law enforcement to get data from these phones under the guise of consumer privacy.

If you own one of those Android phones just mentioned or even newer phones from those same companies, dont think that your phone is uncrackable. Just because Cellebrites tool doesnt work doesnt mean investigators cant extract the data they need. The process just becomes more labor-intensive and takes more time and resources. Even a brand new phone, such as the iPhone 11 Pro Max, can be cracked, according toVices sources. It just isnt as easy as hooking it up to a cracking tool and watching the data flow.

Related:How does encryption work? Gary explains!

Either way,Vices article heavily suggests that Android phones are the safer alternative as compared to iPhones if your main concern is security and privacy. After all, law enforcement organizations arent the only people after your data: criminal enterprises could use the same tools to get your information illegally. For now, this article makes it seem that Android encryption is the way to go to best avoid those situations.

See original here:
Forensics detective says Android phones are now harder to crack than iPhones - Android Authority