Category Archives: Encryption
How encryption could stop the exposure of personal data in the cloud – NewsDio
An encryption product could improve cloud security.
fake images
What do a chain of Peruvian cinemas and a paid service for US cannabis dispensaries have in common? UU.? Databases without guarantee. In separate incidents this month, confidential data from Cineplanet customers in Peru and THSuite in the US were exposed. UU. On cloud servers without password protection. Identity theft experts say the global trend of exposures is as worrisome as hackers who steal data directly.
To alleviate the problem, database software manufacturers have tried to facilitate the security of cloud database administrators. On Monday, Kenn White, security director of the database software maker MongoDB, will describe a new technique, called field level encryption, to make data more secure in the cloud. The research will be presented at the Enigma Conference in San Francisco.
Field-level encryption works by encoding data before sending it to a database in the cloud and decrypting it when data is retrieved. The promise of the product is to protect the content of a database in the cloud, even if the bad guys access it. The feature has been available in the MongoDB open source product since December, as well as for the company's corporate product customers.
The new feature of MongoDB occurs as more and more companies transfer user data to servers in the cloud, instead of running their own expensive data centers. In April, Gartner projected that cloud computing would be a $ 214 billion industry by the end of 2019. That was more than 17% since 2018, when it was $ 182 billion.
Companies have rushed to the cloud without understanding all the security implications. Many companies have left countless databases exposed, revealing personal data that have included records of drug rehab centers. A database that contains details about who lives in 80 million US homes. UU. It was left unprotected in 2019, as was the data on Facebook users and the anticipated salaries of job seekers.
The seemingly endless exposures, the result of a failure to protect a database with a password, have inspired an army of security researchers looking for countless exposed databases that contain numbers of Social Security users, passwords, personal records and other details that should not be accessible. to anyone with an internet connection.
Data in the cloud must be password protected by default, says Chris Vickery, a security researcher looking for database exposures in UpGuard. Often, however, it is not.
"There are so many different platforms these days," Vickery said. "From one to another, you will have different levels of default security."
Sometimes, the person who sets up the database in the cloud inadvertently disables password protection, says White, the MongoDB executive.
MongoDB field level encryption could encourage some companies that currently do not use the cloud to consider it. Large companies distrust putting financial or health information in the cloud because exposures of that information carry high penalties in the United States. In some cases, companies are not legally allowed to share data with cloud providers in the first place.
Field level encryption could change that because companies would not share the data. Instead, they would share a string of incomprehensible characters that can only be decrypted with an encryption key stored on corporate machines. MongoDB has already subscribed to Apervita, a medical and prescription data processor, to use the function.
MongoDB dedicated 24 engineers to the project, which took two years. Its open source software is popular, it has been downloaded more than 80 million times, because it can be used to build virtual databases that run on many platforms, including Windows and Linux machines. It is compatible with processors in laptops and mobile phones, and is interoperable with more than a dozen programming languages.
The widespread use of MongoDB created a challenge for engineers, who had to create a function that would allow users to store and search encrypted data that works smoothly with all the hardware, operating systems and programming languages currently supported by MongoDB. White called it "a crazy amount of combinations."
Field level encryption addresses a paradox. Database administrators want to store their data in an illegible format, but they also want to be able to find specific information in the database with a simple search query. For example, someone might want to look for health care patients by their Social Security numbers, even if those numbers are stored as random characters.
To make this possible, field-level encryption allows database administrators to encrypt a search term on their machine and send it to the database as a query. The database matches the encrypted version of the search term with the record you are storing and then returns it.
This approach only works with specific types of data. Attackers could break encryption when a database stores information that only has a relatively small number of potential values, such as gender or status codes, by detecting repetitive patterns across the entire data set. Field-level encryption is also not useful for long text entries, such as notes in a patient's medical history, because he cannot search for individual words.
Even so, for data such as account numbers, passwords and government identification numbers, field-level encryption protects the data and maintains a usable database.
Most importantly, White said, it's easy to set up. Database administrators activate it with a unique configuration change when they configure the database.
"That is really powerful," he said.
Read the original here:
How encryption could stop the exposure of personal data in the cloud - NewsDio
Encryption Software Market | Global Analysis Along With Trends, Growth, Key Players And Future Predictions Till 2026 – VOICE of Wisconsin Rapids
Encryption Software Market is analyzed with industry experts in mind to maximize return on investment by providing clear information needed for informed business decisions. This research will help both established and new entrants to identify and analyze market needs, market size, and competition. It explains the supply and demand situation, the competitive scenario, and the challenges for market growth, market opportunities and the threats faced by key players.
Global Encryption Software Market report is a comprehensive study of the global market and has been recently added by QYreports to its extensive database. Augmented demand for the global market has been increased in the last few years. This informative research report has been scrutinized by using primary and secondary research. The Global Encryption Software Market is a valuable source of reliable data including data of the current market.
Sample Report with Latest Industry Trends @: https://www.qyreports.com/ask-for-discount/?report-id=80081
Key Players are:
Reasons why you should buy this report
Understand the current and future of the Encryption Software Market in both developed and emerging markets.
The report assists in realigning the business strategies by highlighting the Encryption Software business priorities.
The report throws light on the segment expected to dominate the Encryption Software industry and market.
Forecasts the regions expected to witness the fastest growth.
The latest developments in the Encryption Software industry and details of the industry leaders along with their market share and strategies.
Saves time on the entry level analysis because the report contains very important info regarding growth, size, leading players and segments of the business.
Save and reduce time carrying out entry-level research by identifying the growth, size, leading players and segments in the global Market.
The detailed elaboration of the Global Encryption Software Market has been provided by applying industry analysis techniques such as SWOT and Porters five-technique. Collectively, this research report offers a reliable evaluation of the global market to present the overall framework of businesses.
Get Discount on This Report: https://www.qyreports.com/request-sample/?report-id=80081
Table of Contents
Report Overview: It includes six chapters, viz. research scope, major manufacturers covered, market segments by type, Encryption Software market segments by application, study objectives, and years considered.
Global Growth Trends: There are three chapters included in this section, i.e. industry trends, the growth rate of key producers, and production analysis.
Encryption Software Market Share by Manufacturer: Here, production, revenue, and price analysis by the manufacturer are included along with other chapters such as expansion plans and merger and acquisition, products offered by key manufacturers, and areas served and headquarters distribution.
Market Size by Type: It includes analysis of price, production value market share, and production market share by type.
Market Size by Application: This section includes Encryption Software market consumption analysis by application.
Profiles of Manufacturers: Here, leading players of the global Encryption Software market are studied based on sales area, key products, gross margin, revenue, price, and production.
Market Value Chain and Sales Channel Analysis: It includes customer, distributor, Encryption Software market value chain, and sales channel analysis.
For More Information: https://www.qyreports.com/enquiry-before-buying/?report-id=80081
*If you need anything more than these then let us know and we will prepare the report according to your requirement.
About Us
We at, QYReports, a leading market research report published accommodate more than 4,000 celebrated clients worldwide putting them at advantage in todays competitive world with our understanding of research. Our list of customers includes prestigious Chinese companies, multinational companies, SMEs and private equity firms whom we have helped grow and sustain with our fact-based research. Our business study covers a market size of over 30 industries offering unfailing insights into the analysis to reimagine your business. We specialize in forecasts needed for investing in a new project, to revolutionize your business, to become more customer centric and improve the quality of output.
Contact:
QYReports
Jones John
+(1) 786-292-8164
204, Professional Center,
7950 NW 53rd Street, Miami, Florida 33166
Jones John
View all posts byJones John
See the article here:
Encryption Software Market | Global Analysis Along With Trends, Growth, Key Players And Future Predictions Till 2026 - VOICE of Wisconsin Rapids
Whether Apple or Google: Is there a back door into your phones online backups? – USA TODAY
Rob Pegoraro, Special for USA TODAY Published 6:01 a.m. ET Jan. 26, 2020
Your smartphone may be smarter than you think. Become an iPhone power-user with these little-known tricks. Buzz60
When the company behind your smartphones software commits to backing up your devices data online, how far should it go to have your back?
A report Tuesday by Reuters on Apples iCloud backups brought fresh attention to this question. Citing six sources familiar with the matter, reporter Joseph Menn wrote that the firm dropped plans to let iPhone users fully encrypt backups of their devices in the companys iCloud service after the FBI complained that the move would harm investigations.
What that means is that while the contents of your iPhone remain encrypted on Apples servers, you dont have the only key to unlock them the Cupertino, California, tech giant also has one.
The company had announced intentions for full encryption of iCloud backups as far back as 2016. Apple did not comment to Reuters about the apparent reversal, nor did it respond to a USA TODAY query sent Wednesday.
Stupid human tricks: The weird and dangerous side of TikTok
'Chicken of the trees' for sale: People are really selling iguana meat on Facebook
Should you worry about Apple (or an adversary infiltrating its iCloud backup system) being able to unlock your backup for you? Maybe not: Without that fallback, forgetting the password to your backups means losing them forever.
Apple offers 5 gigabytes of storage free with iCloud.(Photo: Apple Inc.)
Apple does allow fully-encrypted local backups to your Mac via iTunes or, in macOS Catalina, the Finder, reminding users in a support note that there's no way to recover your iTunes backups without this password.
Amazon CEO Jeff Bezos apparently learned this the hard way after the reported hack of his iPhone via a malware-loaded WhatsApp message from Saudi Arabian crown prince Mohammed bin Salman. Investigators Bezos hired could not inspect his local backups without his lost password.
(Many users may also prefer local backup because iCloud only offers 5 gigabytes of free storage a limit that became inadequate years ago. You can buy more starting at 50 GB for 99 cents a month, or you can ease iClouds burden by using the free Google Photos to back up your iPhone pictures.)
I would certainly want Apple to both encrypt my backups and keep a copy of the key, emailed Philip R. Reitinger, president and CEO of the Global Cyber Alliance, a Washington trade group. He put in a vote for Apple letting users opt into full encryption: Apple keeping the key unless the user says otherwise.
Your smartphone may be smarter than you think. Become an iPhone power-user with these little-known tricks.(Photo: BZ60)
Googles Android operating system, however, has offered end-to-end encryption of backups since the 2018 release of Android Pie. The key to this system is your phones screen-lock code, pattern or password; forget that and your backups are bust.
Older Android releases lack this backup security. The Mountain View, California, firm did not answer a question sent Wednesday about how many current Android devices run Pie or 10.
But Apple, not Google, has been the target of complaints from the Trump administration for not helping law enforcement. In January, for instance, attorney general William Barr denounced Apple for not giving any substantive assistance to investigators of a Saudi pilots murder of three people at a naval base in Pensacola, Florida.
Apple pushed back against that, saying the Federal Bureau of Investigation had only requested its help with the shooters locked iPhone a week before Barrs remarks.
Civil libertarians object to Barr demanding that firms like Apple weaken the encryption protecting customers data.
Wrote Lindsey Barrett, a fellow at Georgetown University Law Centers Institute for Public Representation: His blustering on this issue is willfully disingenuous and ignores what privacy and cryptography experts have been telling law enforcement for years: that strong encryption doesn't protect criminals, it protects the privacy and safety of everyone.
Rob Pegoraro is a tech writer based out of Washington, D.C. To submit a tech question, e-mail Rob at rob@robpegoraro.com. Follow him on Twitter at @robpegoraro.
The recently released iPhone 11 Pro now features 3 camera lenses like the Samsung Galaxy S10. We compare both camera phones side-by-side. USA TODAY
Read or Share this story: https://www.usatoday.com/story/tech/columnist/2020/01/26/why-apple-needs-backdoor-access-your-iphone-backups-icloud/4567858002/
See the original post:
Whether Apple or Google: Is there a back door into your phones online backups? - USA TODAY
Bitcoin transactions will not be private even with Schnorr encryption – AMBCrypto
Bitcoin has successfully completed a decade of inception, and has entered a new one with one of the most important events lined up the halving. While the entire community is already looking forward for this event, there are some who have already started paying heed to the next big change that would unfold in Bitcoin privacy.
Now, the importance of privacy in Bitcoins base layer is no new topic, however, the debate it sparks has become the hot topic discussed in the crypto-market. The latest news in the Bitcoin-privacy column is the advancements of Schnorr/Taproot, with Blockstream developer Pieter Wuille announcing that the final proposal has been published. He stated,
That means that these documents are our final proposal for integrating Schnorr and Taproot into Bitcoin. Whether it gets accepted by the ecosystem, and how, is up to you.
Taking the advancements into consideration, Bitcoin Jack a trader and market analyst shared his opinion on the subject in a series of Tweets. Notably, Jack stated that the Schnorr encryption scheme would allow improvements to the Bitcoin protocol like block space efficiency, somewhat higher levels of privacy and better security. However, it will not make Bitcoin transactions private. He added,
Like it or not, privacy is a key feature missing for adoption. Without it money can be traced and for example give away key competitive information holding an edge. Sound money is not just hard and sovereign, but should also be resistant against you or any entity for that matter being able to figure out my holdings and actions
Notably, one of the biggest news that broke last year with regard to how transparent Bitcoins transactions are was the bust of the child porn website, Welcome to Video. Moreover, there have also been several influencers in the ecosystem who have time and again stated that one of the missing links of Bitcoin was privacy.
Jack said,
You see, with Bitcoin its out in the open. I understand there are certain protocols built upon the Bitcoin protocol that offer some kind of transaction/ownership obfuscation, but they are second layer solutions to a problem that should be solved natively. People confuse Schnorr to make Bitcoin private, it does not
While emphasizing that Schnorr would not make Bitcoin private, the Bitcoiner stated that it will, however, ensure that transactions take less space on the ledger, thereby enabling more transactions to be processed, and even reducing fees. He also clarified that Schnorr/Taproot would introduce several improvements, however, wont tend to the cryptocurrencies hurdles fungibility by privacy.
Its probably, with full adoption, possible to save up to 25% in space and thus increase throughput and reduce fees. It will also mask transaction types, effectively shielding the public keys that participate in for example multi-sig transactions. It creates a layer of improved privacy by hiding some transaction information, making the chain faster and less transparent
Here is the original post:
Bitcoin transactions will not be private even with Schnorr encryption - AMBCrypto
SSL Encryption: Making The Web A Safer Place – TechShout!
On the surface, we can all rest assured that our data is safe, as long as it is not exchanged with someone who has non-benevolent intentions. If companies or other organisations on the internet were to use our personal data to hack into our accounts, their endeavours would be revealed immediately and their business would collapse. That is true and why most people stick to platforms they trust, such as popular online shops or well-known organisations.
However, even though both parties might have the best of intentions, breaches are still possible if the best security measures are not in place. This is where the issue of third parties pops up. Any online exchange of information, such as personal data and credit card information, passes through different channels when transmitted online. Without proper security measures, harmful third parties can suddenly access your personal data. This is why the SSL encryption was invented.
Traditional HTTP-connections transmitted online data in plain text, which was quickly identified as an omnipresent security breach around the internet. SSL converts this into encrypted lines of data, which has paved the way for online businesses to flourish, as they can now ensure the safety of their customers.
SSL is an acronym for Secure Socket Layer and is the most popular form of online data encryption. When you access a website online, the HTTP-part of the websites URL is likely to have an s next to it: https. Whether the s shows up or not, your browser is likely to tell you whether its a secure website or not. In popular browsers such as Google Chrome and Firefox, a little log shows up to the left of the websites URL. Furthermore, if its an unencrypted connection, your browser will likely inform you of it, while warning you against transmitting personal data. Some browsers warn against visiting these websites altogether.
To understand what SSL means in practice, things become slightly more complicated. SSL is a type of protocol that sets up an encrypted connection between you and the website (server) you are visiting. When you enter your data on an unencrypted website, your data is transmitted in plain text without an encrypted layer. With an encrypted connection, an informal agreement is made between the web browser and the server in question to set up the encrypted connection.
The SSL certificate that now develops contains a few different elements. Firstly, the certificate tries to confirm the identity of the website visited. Secondly, it checks the digital signature of the authority that issued the certificate, to begin with. Thirdly, it also hands over the websites own public encryption key. If everything matches, the encrypted connection goes ahead. This is usually the case but a website might pose with an encryption key that isnt theirs, or even pretend to be another website then it is. These are some of the security breaches the web browser and the server handles through the issuing of the SSL certificate, to ensure that no security breaches develop.
Unlike unencrypted connections, SSL allows for the safe and secure transmission of personal data, such as logins, card numbers and personal identification numbers. Businesses, e-Commerce shows and other high authority institutions on the internet have therefore embraced it. The BBC, for example, has been using an encrypted SSL-connection for years, citing its role as a trusted destination on the internet.
All actions on the internet require a transmission of data, which means that an encrypted connection is always useful and relevant. However, in some cases, it goes from being useful to being absolutely necessary. SSL is particularly important to companies that process a lot of personal and sensitive information. One prominent example is the online casino industry, which exchanges personal identification numbers, credit card information and addresses with its customers on a daily basis.
Licensed and regulated casinos always use encrypted connections, as protecting the players data is equally important to operators and customers alike. If you want a complete list of 100% secure online casinos in the UK, you can visit Betpal.com, a casino and betting comparison site. Using casinos that dont employ the proper security measures compromises your personal information and leave it open to potential breaches.
Today, online data encryption is not simply a question of secure and encrypted connections. Users of the internet around the world have started paying major attention to how they protect their data online, also while communicating with friends. This has led to a growth in encrypted messaging services such as WhatsApp and Wickr. Meanwhile, companies are more than ever being targeted by sophisticated cyberattacks, which has forced them to update their encryption standards.
It has also become a political question. In the European Union, the introduction of the General Data Protection Regulation (GDPR) has spelled major difficulties for companies across the continent. It has also challenged international actors, as everyone operating in Europe needs to comply with national legislation. Businesses have started turning towards end-to-end encrypted communication (also known as E2EE). Meanwhile, traditional email services are becoming outdated as companies seek to protect their data from cyberattacks and governments alike.
Secure Socket Layers (SSL) is therefore just one element in a worldwide battle for better data encryption and internet protection. Everyone values privacy and protected data, and SSL has been at the core of this project for more than two decades.
Read the original here:
SSL Encryption: Making The Web A Safer Place - TechShout!
Review: SecureDrive BT, the encrypted external SSD you can unlock with Face ID – 9to5Mac
If youre looking for a secure external drive that meets both US military and government security standards, there are a number of encrypted external SSD options around. I reviewed one approach a couple of years ago, the iStorage diskAshur 2, which has a built-in PIN pad for entering a seven- to 15-digit code to unlock the drive.
The SecureDrive BT is a similar idea, but instead of a PIN pad, you unlock it via Bluetooth. Specifically, when you plug the drive into your Mac, you can use Face ID on your iPhone to unlock it
The drive is available in both spinning metal and SSD variants, in capacities ranging from 250 GB to 8 TB. Pricing for SSDs ranges from $262 (250GB) to $3,309 (8TB). I tested the 1TB SSD model at $458.80.
The drive can be used with Mac, Windows, and Linux, and the companion app is available on both iOS and Android.
The drive looks much like any other external drive. It has a blue anodized aluminum body with black plastic endcaps. On the front is a Secure Drive Bluetooth name, and on the back a somewhat unsightly mix of barcode, website, and various standards compliance logos.
One thing to watch for: SecureDrive tells me its available with both USB-A and USB-C cables. The drive I got had a USB-A cable, so needed an adapter to connect it to my MacBook Pro.
SecureDrive BT uses the same AES256-bit XTS hardware encryption as the iStorage drive. Often referred to as military-grade encryption, this is certified by the Institute of Electrical and Electronics Engineers (IEEE) as standard P1619 and is indeed approved for US military use.
The encrypted external SSD is also FIPS 140-3 certified. This is the Federal Information Processing Standards certification, which allows it to be used for the storage of US government Top Secret documents.
Inside, the chips are encased in epoxy resin, meaning its not possible to extract the SSD chips from the rest of the hardware.
The app lets you set a password in the 7- to 15-character range, and you can then choose to toggle on Face ID, Apple Watch unlock, or both. The drive offers remote-wipe capabilities, and can be set to automatically wipe if 10 incorrect passwords are entered.
Other security features available:
Incidentally, Apples FileVault also offers the same AES256-bit XTS standard, but defaults to the weaker 128-bit version for performance reasons. Disk Utility does, however, give you the option of formatting with full 256-bit AES.
Running Blackmagic, I saw write speeds of around 310MB/s, and read speeds of around 325MB/s.
These are, of course, low numbers compared to the very fast external SSDs available now, and there are two reasons for that. First, the interface is USB 3.1. Second, the AES256-bit XTS encryption does significantly slow things down, which is the reason Apple defaults to 128-bit with FileVault.
The bottom line here is that youre probably not going to want to use this as a working drive for demanding applications like video editing though it will cope with HD video.
Thats not to say its aslow drive in SSD form, but its still about half to two-thirds the speed of an equivalent unencrypted drive.
Mostly, though, this is a drive youre going to use to store commercially sensitive documents, like product designs, in-progress apps, marketing materials for unannounced products, customer databases, and similar.
Once the SecureDrive BT is unlocked, it works just like any other drive. So the in use section of the review is really about the unlocking experience and here theres good news and bad.
The bad news is that its a little less convenient than a drive with a keypad. To unlock it, you have to open the companion app and tap the drive name. At that point, Face ID will unlock it. But if you keep the app on your homescreen, unlocking is about as fast as using a keypad.
The good news is that youre trading off a slight inconvenience for more security. A keypad limits you to a numeric passcode; with this drive, you can have an alphanumeric password, including all special characters.
Plus, its not obvious that its a secure drive. If someone sees a drive with a keypad used in public, it draws attention to itself. This one, however, looks no different to any other external drive, and using your phone isnt going to be associated with unlocking the drive. So its the more discreet option, as well as the more secure. SecureDrive does make a keypad version, too, if you prefer that.
As I said about the diskAshur 2, whether or not the SecureDrive BT is right for you really depends on whether you have a need for the security:
The real question is whether you need this level of security. For the average consumer, its overkill, but I could definitely see some professional users appreciating it. Carrying around external drives with commercially sensitive materials on them is always a little nerve-wracking. There have been all kinds of reports of drives being left in embarrassing places like bars and trains.
For a startup, the peace of mind could well be worth the relatively small premium youre paying for heavy-duty security. For professional freelancers, it could even be turned into a selling point for clients. So if you need an external SSD and could use the reassurance this one brings, it could be very good value.
If you do need the security, or can use it as a selling tool, then the drive justifies itself. If you dont, you can get faster performance at a significantly lower price in unencrypted form. For example, the equivalent Western Digital My Passport 1TB SSD is about 50% faster and has a list price of $340 against just over $500 for the SecureDrive BT (and the WD drive is available for much less on Amazon). So, if you need this, it will be worth the price; if you dont, it wont.
The Secure Drive BT encrypted external SSD is available from Amazon in both spinning metal and SSD variants, in capacities ranging from 250GB to 8TB. I tested the 1TB SSD model at $458.80. The equivalent spinning metal version costs $238.
FTC: We use income earning auto affiliate links. More.
Check out 9to5Mac on YouTube for more Apple news:
Read the rest here:
Review: SecureDrive BT, the encrypted external SSD you can unlock with Face ID - 9to5Mac
EncryptOnClick is a freeware tool that can encrypt files and folders – Ghacks Technology News
EncryptOnClick is a freeware tool that you can use to encrypt files and folders. The application offers an extra layer of security to protect data and uses military grade 256-bit AES encryption for protection.
The program's interface is very simple as it displays a handful of buttons only. It lists two encrypt actions and decrypt actions which can be run on files or folders.
Let's encrypt some files. Click on the File button and it will open an "Encrypt Password" window. You are prompted to enter a password and confirm it. Optionally, you can add a comment thought I didn't see any being displayed while decrypting the files.
Important: Don't forget the password, as there is no way to recover it.
Before clicking on the Ok button, decide if you wish to encrypt the filenames and enable the option, or skip it. This depends on how you're using the data, and how sensitive it is. If you select to encrypt the filename, it is modified so that it is no longer possible to get information just by looking at it.
Warning: If you are just testing the program, make sure to check the box next to the "Do not delete file after encrypting" option.
Hit Ok and the encryption process will begin. The time it takes for this depends on the size of the files that you're encrypting. The files are saved in the EOC format (named after the program). Okay, so if we remove the EOC from the name, will the file be readable? Of course not. You may have noticed that the encrypted file is smaller than the source file's size, that's because EncryptOnClick compresses the files while encrypting them. This is quite handy in case you want to email the files to your contact. When the file is decrypted, it will be restored to its original state and size.
Note: If you select the "Folders" option, the program will encrypt the files inside the folder, not the folder itself.
There are two ways to decrypt the contents. Either use the program and select the Decrypt option (Files or Folders), or just try opening the files (if the program is installed) and it should ask for the password. Once again, remember to check the "Do not delete file after decrypting" option, else the encrypted copy will be deleted. Regardless of the option, the uncompressed file will be saved in the same folder, so it's not a real loss.
The program doesn't have a portable archive ready to download, but you can create a portable version by copying three files from the installation directory: EncryptOnClick.exe, EncryptOnClick.exe.manifest and XceedZip.dll to a memory stick and use it anywhere. I tested this as well, and it works perfectly.
Do I need EncryptOnClick installed to open the files? Yes, according to the documentation, or WinZip 9 or above. The portable version works fine too. Since I'm a 7-Zip user, I wanted to check if it can decrypt it, and I can confirm that it works. This screenshot is from a friend's computer whom I sent the encrypted file to, he was able to open it with 7z.
Note: You can rename the extension of the encrypted files to anything you want, you can still decrypt it. It can be a good way to prevent others from opening your files.
EncryptOnClick can be very useful for protecting financial documents, personal data, pictures, etc. The simplicity of the program makes it suitable for people of all skill levels.
Author Rating
Operating System
Windows
Software Category
Security
Price
Free
Landing Page
Visit link:
EncryptOnClick is a freeware tool that can encrypt files and folders - Ghacks Technology News
Trump and Comey Are United Against Encrypted Communications – Reason
For all the public sparring between the two inflated egos known as Donald Trump and James Comey, the president and the former FBI director have some important commonalities. For starters, they both hate it when the common people keep secrets from the ruling class of which they represent competing factions.
The point of agreement between the two political antagonists became clear on January 14, when President Trump complained that Apple executives "refuse to unlock phones used by killers, drug dealers and other violent criminal elements." Some of us poked at our ears, wondering if we were hearing echoes. After all, not so long ago, as head of the FBI, Comey tried to force Apple to unlock encrypted cell phones and raged that Apple, Google, and other companies "market something expressly to allow people to place themselves beyond the law."
Trump agreed with Comey back then, too, by the way; in 2016, he called for a boycott of Apple until such time as the company helped the FBI break iPhone security.
Apparently, not as much divides these two men as they like to let on.
In public, Trump calls Comey a "disgrace" and Comey fires back at a man he calls a "strange and slightly sad old guy." Butaside from the fact that they're both correct about each other's flawsthat's intramural combat between power addicts over who should wield the power. That the public should be poked, prodded, and intruded upon is a given for Comey and Trump. And it's a sentiment that binds so many of our would-be lords and masters in public office.
The shared nature of official nosiness becomes clear when you remember last November's bipartisan vote to extend the Patriot Act, a measure that the Electronic Frontier Foundation says "broadly expands law enforcement's surveillance and investigative powers and represents one of the most significant threats to civil liberties, privacy, and democratic traditions in US history." Even as Democrats debated impeaching Donald Trumpa move they later approvedthey overwhelmingly joined with the Trump administration to support the surveillance bill's extension.
Trans-partisan hand-holding on surveillance state measures is certainly nothing new among the political class. The Patriot Act originally passed during the presidency of Republican President George W. Bush, but with plenty of cross-aisle support.
"I drafted a terrorism bill after the Oklahoma City bombing," senator and current leading Democratic presidential wannabe Joe Biden boasted to The New Republic after the Patriot Act's passage. "And the bill John Ashcroft sent up was my bill."
Biden's anti-privacy efforts extend back so far that he inspired Phil Zimmermann to complete the development of PGP encryption software.
Later, as vice president, Biden threatened countries that considered offering asylum to surveillance whistleblower Edward Snowden.
Sen. Elizabeth Warren (D-Mass.), another leading contender for the Democratic presidential nomination, frets that the data encrypted communications will "allow companies to hide from 'government spying'such as text messages and chatroom transcriptshave proven to be 'key evidence' in previous regulatory and compliance cases."
It seems Trump and Comey are in good company on the issue. Well, good-ishfor a certain D.C.-centric value of the word.
"Lawmakers are giving big tech firms an ultimatum: Give police access to encrypted communications or we'll force you," The Washington Post reported last month.
"It ain't complicated for me," Senate Judiciary Committee Chairman Lindsey Graham (R-S.C.) told representatives from Facebook and Apple at a Capitol Hill hearing in December. "You're going to find a way to do this or we're going to do it for you."
"You all have got to get your act together or we will gladly get your act together for you," said Sen. Marsha Blackburn (R-Tenn.), who also sits on the judiciary committee.
Ranking Democratic member Dianne Feinstein (Calif.), meanwhile, said she is "determined to see that there is a way that phones can be unlocked when major crimes are committed," whether tech companies like it or not.
And so on. Trump and Comey's frenemy act opposing communications privacy for people who don't draw government paychecks is the rule, not the exception.
Sure, there are some surveillance skeptics and privacy advocates among the political class. But they're rare, and except for a very few civil liberties-oriented and government-skeptic types who are usually on the outs with the real powerbrokers, they're awfully unreliable on the issue.
The problem is that the Trumps, Comeys, Grahams, Bidens, Feinsteins, Blackburns, and Warrens of the world largely agree that the government that defines their lives and gives them importance should be vastly powerful. The rationales they come up with depend on the specific priorities of the politician in question, the cultural moment, and the audience, but they're forever arguing in favor of an intrusive state from which we can keep no secrets.
"It had become clear, to me at least, that the repeated evocations of terror by the political class were not a response to any specific threat or concern but a cynical attempt to turn terror into a permanent danger that required permanent vigilance enforced by unquestionable authority," whistleblower Edward Snowden wrote of his growing awareness of what lay behind the surveillance state in Permanent Record, his 2019 memoir.
Substitute "violent criminal elements" or "criminal action by Wall Street" or "child abusers" or any other justification politicians might come up with if you wish, but it all leads in the same direction. Ultimately, the members of the political class may fight tooth and nail, but it's not over whether Leviathan should paw through our communications. They just disagree over who should be in charge of the pawing.
Here is the original post:
Trump and Comey Are United Against Encrypted Communications - Reason
Police Scotland to roll out encryption bypass technology – Glasgow Live
Technology that allows police officers to gather data from digital devices without the need for a password is to be rolled out from next week.
Police Scotland confirmed on Tuesday that the so-called cyber kiosks - digital triage devices - will be given to officers on January 20.
The kiosks are laptop-sized machines that enable the user to override encryption on devices such as mobile phones and tablets.
Technology was due to be deployed earlier but the roll-out was hit by delays as MSPs called for greater clarity over the legal framework for their use.
A total of 14 kiosks have already been bought by Police Scotland and will be located across all policing divisions.
It is expected all of the kiosks will be operational before May 1.
Police Scotland believe having the kiosks will allow lines of inquiry to be progressed at a faster pace, with officers being able to return mobile devices to their owners when they are having to assess them for potential evidence.
Officers will only examine the device of an individual when there is a legal basis and it is "necessary, justified and proportionate" to the crime under investigation.
They will not be enabled to store data from any devices and when an examination is complete all data will be securely deleted.
Deputy Chief Constable Malcolm Graham said having the ability to quickly assess which devices either do or do not contain evidence on them will minimise the intrusion into people's lives.
"We are committed to providing the best possible service to victims and witnesses of crime," he said.
"This means we must keep pace with society. People of all ages now lead a significant part of their lives online and this is reflected in how we investigate crime and the evidence we present to courts.
"Many online offences disproportionately affect the most vulnerable people in our society, such as children at risk of sexual abuse, and our priority is to protect those people."
He added: "Increases in the involvement of digital devices in investigations and the ever-expanding capabilities of these devices mean that demand on digital forensic examinations is higher than ever.
"Current limitations, however, mean the devices of victims, witnesses and suspects can be taken for months at a time, even if it later transpires that there is no worthwhile evidence on them.
"By quickly identifying devices which do and do not contain evidence, we can minimise the intrusion on people's lives and provide a better service to the public."
Have you downloaded the new and improved Glasgow Live app? Get all the latest news and events at the touch of a button on Android and Apple .
See the article here:
Police Scotland to roll out encryption bypass technology - Glasgow Live
Encryption battle reignited as US govt at loggerheads with Apple – Times Now
(Representational photo)  |  Photo Credit: IANS
Apple and the US government are at loggerheads for the second time in four years over unlocking iPhones connected to a mass shooting, reviving debate over law enforcement access to encrypted devices.
Attorney General Bill Barr said Monday that Apple failed to provide "substantive assistance" in unlocking two iPhones in the investigation into the December shooting deaths of three US sailors at a Florida naval station, which he called an "act of terrorism."
Apple disputed Barr's claim, while arguing against the idea of "backdoors" for law enforcement to access its encrypted smartphones.
"We reject the characterization that Apple has not provided substantive assistance in the Pensacola investigation," the company said in a statement.
"Our responses to their many requests since the attack have been timely, thorough and are ongoing."
Late on Tuesday, President Donald Trump weighed in on Twitter, saying the government was helping Apple on trade issues "yet they refuse to unlock phones used by killers, drug dealers and other violent criminal elements."
"They will have to step up to the plate and help our great Country, NOW!" he added.
The standoff highlighted the debate between law enforcement and the tech sector about encryption -- a key way to protect the privacy of digital communications, but which can also make investigations difficult, even with a court order.
The latest battle is similar to the dispute between Apple and the US Justice Department after the December 2015 mass shooting in San Bernardino, California, when the iPhone maker rejected a request to develop software to break into the shooter's iPhone.
That fight ended in 2016 when the government paid an outside party a reported $1 million for a tool that circumvented Apple's iPhone encryption.
Barr last year called on Facebook to allow authorities to circumvent encryption to fight extremism, child pornography and other crimes. The social network has said it would move ahead with strong encryption for its messaging applications.
Digital rights activists argue that any privileged access for law enforcement would weaken security and make it easier for hackers and authoritarian governments to intercept messages.
"We have always maintained there is no such thing as a backdoor just for the good guys," Apple's statement said.
"Backdoors can also be exploited by those who threaten our national security and the data security of our customers."
Apple and others argue that digital "breadcrumbs" make it increasingly easy to track people, even without breaking into personal devices.
The government's latest demand "is dangerous and unconstitutional, and would weaken the security of millions of iPhones," Jennifer Granick of the American Civil Liberties Union said in a statement.
"Strong encryption enables religious minorities facing genocide, like the Uighurs in China, and journalists investigating powerful drug cartels in Mexico, to communicate safely."
Granick added that Apple cannot allow the FBI access to encrypted communications "without also providing it to authoritarian foreign governments and weakening our defenses against criminals and hackers."
Kurt Opsahl of the Electronic Frontier Foundation echoed that sentiment, saying Apple "is right to provide strong security" for its devices.
"The AG (attorney general) requesting Apple re-engineer its phones to break that security is a poor security trade-off, and imperils millions of innocent people around the globe," Opsahl tweeted.
James Lewis of the Center for Strategic and International Studies, a Washington think tank, said he believes it's possible to allow law enforcement access without sacrificing encryption.
"You're not weakening encryption, you're making it so it's not end-to-end," Lewis told AFP.
"It means that there's a third party who can look at it under appropriate authority."
But Lewis said he does not expect either side to come out a winner in the battle, and that US officials will likely find another outside party to crack the two iPhones belonging to the shooter, Royal Saudi Air Force 2nd Lieutenant Mohammed Saeed Alshamran, who died in the attack.
"It's a repeat of the movie we saw in San Bernardino," he said.
"It's going to be harder because Apple probably fixed the trick that worked in San Bernardino."
More:
Encryption battle reignited as US govt at loggerheads with Apple - Times Now