Category Archives: Encryption

Internet of crap (encryption): IoT gear is generating easy-to-crack keys – The Register

A preponderance of weak keys is leaving IoT devices at risk of being hacked, and the problem won't be an easy one to solve.

This was the conclusion reached by the team at security house Keyfactor, which analyzed a collection of 75 million RSA certificates gathered from the open internet and determined that number combinations were being repeated at a far greater rate than they should, meaning encrypted connections could possibly be broken by attackers who correctly guess a key.

Comparing the millions of keys on an Azure cloud instance, the team found common factors were used to generate keys at a rate of 1 in 172 (435,000 in total). By comparison, the team also analyzed 100 million certificates collected from the Certificate Transparency logs on desktops, where they found common factors in just five certificates, or a rate of 1 in 20 million.

The team believes that the reason for this poor entropy is down to IoT devices. Because the embedded gear is often based on very low-power hardware, the devices are unable to properly generate random numbers.

The result is keys that could be easier for an attacker to break, leaving the device and all of its users vulnerable.

"The widespread susceptibility of these IoT devices poses a potential risk to the public due to their presence in sensitive settings," Keyfactor researchers Jonathan Kilgallin and Ross Vasko noted.

"We conclude that device manufacturers must ensure their devices have access to sufficient entropy and adhere to best practices in cryptography to protect consumers."

The recommendation is that IoT hardware vendors step up their security efforts to improve the entropy of these devices and make sure that their hardware is able to properly set up secure connections.

If vendors don't step up and address the issue, there is a good chance that criminal hackers will. The team says its experiments showed that this sort of attack could be pulled off without much in the way of an up-front investment.

"With modest resources, we were able to obtain hundreds of millions of RSA keys used to protect real-world traffic on the internet," said Kilgallin and Vasko.

"Using a single cloud-hosted virtual machine and a well-studied algorithm, over 1 in 200 certificates using these keys can be compromised in a matter of days."

Sponsored: From CDO to CEO

Originally posted here:
Internet of crap (encryption): IoT gear is generating easy-to-crack keys - The Register

What Is Snatch Ransomware and How to Remove It – Guiding Tech

It seems like crimeware developers never sleep as defenses rise. They're always on the lookout for different ways of honing their weapons of attack. One of the most recent techniques is a ransomware strain that can force a Windows device to reboot into Safe Mode right before encryption begins, intending to get around endpoint protection.

This particular strain is known as Snatch owing to its authors, who refer to themselves as the Snatch Team. It was discovered by Sophos Labs researchers, who outlined their discovery together with insights into how such gangs break into enterprises and other entities on their hit list.

Were going to explain what Snatch ransomware is, how it works, and how you can remove it from your devices.

Snatch is a fresh ransomware variant whose executable forces Windows devices to reboot to Safe Mode even before the encryption process begins in a bid to bypass endpoint protection that often doesnt run in this mode.

Discovered by SophosLabs researchers and Sophos Managed Threat Response team, the snatch ransomware is among multiple malware constellation components being used in an ongoing series of carefully orchestrated attacks featuring extensive data collection.

The new strain of the ransomware uses a unique infection method that applies sophisticated AES encryption so that users whose machines are infected cant access their files.

Snatch ransomware was first noticeably active in April 2019, but it was released end of 2018. However, the spike in encrypted files and ransom notes led to its discovery and follow up by the team of researchers at Sophos.

Its crypto-virus form attacks high profile targets, but this new strain, created using Google Go program, comprises a collection of tools including a data stealer and ransomware feature. Plus, it has a Cobalt Strike reverse-shell and other tools used by penetration testers and system administrators.

Note: The variant Sophos discovered is only able to run on Windows in 32-bit and 64-bit editions from version 7 through 10.

As a file locking virus, Snatch ransomware has no connections with other strains. Still, its developers released nine variants of the threat, which append different extensions after data is encrypted with AES cipher.

The trick is to reboot machines into Safe Mode, and then the ransomware restricts access to your data by encrypting your files. After that, the hackers try to extort money from you by soliciting ransoms in the form of Bitcoin in exchange for unlocking your files and giving back data access.

Theres a reason why their trick works. Some antivirus software dont start in Safe Mode, and the developers discovered they could easily modify a Windows registry key and just boot your machine into Safe Mode. Thus the ransomware runs undetected by your security software.

The first time its installed on your device, it comes through SuperBackupMan, a Windows service, and sets up right before your computer starts rebooting so you cant stop it in time.

Once installed, the attackers use admin access to run BCDEDIT, a Windows command-line tool, to force your computer to reboot in Safe Mode immediately.

It then creates a random named executable in your %AppData% or %LocalAppData% folder, which will be launched and starts scanning your computers drive letters for files to encrypt.

There are specific file extensions it encrypts, including .doc, .docx, .pdf, .xls, and many others, which it infects and changes their extensions to Snatch so you cant open them again.

The ransomware leaves a Readme_Restore_Files.txt text file note, demanding anything between one and five Bitcoin in exchange for a decryption key, with information on how to communicate with the hackers to get your data files back.

After the ransomware scans your computer completely, it uses vssadmin.exe, a Windows command to delete all Shadow Volume Copies on it so you cant recover and use them to restore encrypted data files. The final step is to encrypt any data files on your hard drive.

Currently, infected files arent decryptable owing to the sophisticated nature of the AES encryption used. However, you still have a lifeline if your computer is infected by restoring your files from the most recent backup.

Snatch ransomware has been targeting regular users via spam emails. But today, the main targets are corporations. By paying such criminals, you not only lose money and have no guarantee that theyll send the decryption key to you, but it also encourages them to continue with their cyber criminality.

If you dont have an updated backup, theres not much else you can do other than wait until security experts come up with a Snatch ransomware decrypter. That could take a long time, but there are other ways you can protect yourself from such attacks.

One of the best ways to remove Snatch ransomware and other malware is to install good antivirus security software such as Malwarebytes or SpyHunter that can scan, detect, and eliminate the threat. Not all antivirus engines can catch it because its an entirely new malware, so its good to scan using several programs.

You can protect yourself and your devices against ransomware attacks by taking simple steps such as downloading software from trusted sources, and avoid opening email attachments from untrusted sources.

Other ways you can protect yourself and your organization from Snatch and other types of ransomware include:

Snatch ransomware may sound almost life-threatening in how it works to paralyze your files and devices. Before you think of paying that ransom, try the steps above to remove the threat and always take preventive measures to ensure this and such threats don't show up on your computer or network.

Next up: If you suspect your phone is infected with ransomware, check our next article to find out how to detect that and remove it.

Last updated on 18 Dec, 2019

Read this article:
What Is Snatch Ransomware and How to Remove It - Guiding Tech

Hardware-based Full Disk Encryption Market Executive Summary, Introduction, Sizing, Analysis and Forecast To 2025 – Market Research Sheets

The Hardware-based Full Disk Encryption Market research added by UpMarketResearch.com, offers a comprehensive analysis of growth trends prevailing in the global business domain. This report also provides definitive data concerning market, size, commercialization aspects and revenue forecast of the industry. In addition, the study explicitly highlights the competitive status of key players within the projection timeline while focusing on their portfolio and regional expansion endeavours.

This report on Hardware-based Full Disk Encryption Market delivers an in-depth analysis that also comprises an elaborate assessment of this business. Also, segments of the Hardware-based Full Disk Encryption market have been evidently elucidated in this study, in addition to a basic overview pertaining to the markets current status as well as size, with respect to the profit and volume parameters.

Request Exclusive Free Sample PDF Of This Report At https://www.upmarketresearch.com/home/requested_sample/10552

The study is ubiquitous of the major insights related to the regional spectrum of this vertical as well as the companies that have effectively gained a commendable status in the Hardware-based Full Disk Encryption market.

Major Players included in this report are as follows Seagate Technology PLCWestern Digital CorpSamsung ElectronicsToshibaKingstonMicron Technology IncIntel

Hardware-based Full Disk Encryption Market can be segmented into Product Types as Hard Disk Drive (HDD) FDESolid State Drives (SSD) FDE

Hardware-based Full Disk Encryption Market can be segmented into Applications as IT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthers

Hardware-based Full Disk Encryption Market: Regional analysis includes:Asia-Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)Europe (Turkey, Germany, Russia UK, Italy, France, etc.)North America (United States, Mexico, and Canada.)South America (Brazil etc.)The Middle East and Africa (GCC Countries and Egypt.)

To Buy This Report Full or Customized, Visit https://www.upmarketresearch.com/buy/hardware-based-full-disk-encryption-market

Hardware-based Full Disk Encryption market scope A basic summary of the competitive landscape A detailed breakdown of the regional expanse A short overview of the segmentation

A generic overview of the competitive landscape The Hardware-based Full Disk Encryption market report comprises a thorough analysis of the competitive terrain of this vertical. The study offers details pertaining to each industry participants specific market share, the area served, manufacturing sites and more. Information pertaining to the producers product portfolio, product features, and their respective product applications have been talked about in the report. The report profiles the companies in conjunction with the facts regarding their gross margins and price models

For Best Discount on purchasing this report, Visit https://www.upmarketresearch.com/home/request_for_discount/10552

An all-inclusive framework of the geographical terrain The research report extensively segments the geographical spectrum of this industry. As per the report, the Hardware-based Full Disk Encryption market has established its presence across the regions of United States, China, Europe, Japan, Southeast Asia & India. The report includes insights regarding the industry share acquired by each region. In addition, data concerning growth opportunities for the Hardware-based Full Disk Encryption market across every detailed region is included within the report. The anticipated growth rate to be recorded by each region over the estimated years has been correctly specified within the research report.

A brief summary of the segmentation The Hardware-based Full Disk Encryption market report exemplifies the bifurcations of this vertical with extreme precision. Data with reference to industry share amassed by each product segment, together with their market value within the industry, have been highlighted in the report. Data pertaining to production growth has also been included in the report. With reverence to the application spectrum, the study comprises details concerning market share, amassed by each application segment. Moreover, the study emphasizes details associated with the product consumption of each application, along with the growth rate to be accounted for by each application segment over the estimation period.

Some of the Major Highlights of TOC covers: Hardware-based Full Disk Encryption Regional Market Analysis Hardware-based Full Disk Encryption Production by Regions Global Hardware-based Full Disk Encryption Production by Regions Global Hardware-based Full Disk Encryption Revenue by Regions Hardware-based Full Disk Encryption Consumption by Regions

Hardware-based Full Disk Encryption Segment Market Analysis (by Type) Global Hardware-based Full Disk Encryption Production by Type Global Hardware-based Full Disk Encryption Revenue by Type Hardware-based Full Disk Encryption Price by Type

Hardware-based Full Disk Encryption Segment Market Analysis (by Application) Global Hardware-based Full Disk Encryption Consumption by Application Global Hardware-based Full Disk Encryption Consumption Market Share by Application (2014-2019)

Hardware-based Full Disk Encryption Major Manufacturers Analysis Hardware-based Full Disk Encryption Production Sites and Area Served Product Introduction, Application and Specification Hardware-based Full Disk Encryption Production, Revenue, Ex-factory Price and Gross Margin (2014-2019) Main Business and Markets Served

For More Information on this report, Request Inquiry At https://www.upmarketresearch.com/home/enquiry_before_buying/10552

About UpMarketResearch: Up Market Research (https://www.upmarketresearch.com) is a leading distributor of market research report with more than 800+ global clients. As a market research company, we take pride in equipping our clients with insights and data that holds the power to truly make a difference to their business. Our mission is singular and well-defined we want to help our clients envisage their business environment so that they are able to make informed, strategic and therefore successful decisions for themselves.

Contact Info UpMarketResearchName Alex MathewsEmail [emailprotected]Website https://www.upmarketresearch.comAddress 500 East E Street, Ontario, CA 91764, United States.

This post was originally published on Market Research Sheets

Read more from the original source:
Hardware-based Full Disk Encryption Market Executive Summary, Introduction, Sizing, Analysis and Forecast To 2025 - Market Research Sheets

NYPD Eyeing Encrypted Radios to Protect Criminal Investigations – Officer

NEW YORK -- The NYPD wants to encrypt its radios to prevent criminals from following their every move not hide from the media, police officials insisted Thursday.

Deputy Commissioner John Miller noted the department already has several channels that allow law enforcement agencies, like the FBI and Secret Service, to communicate without worrying about crooks listening in.

When you have sophisticated criminal organizations that are listening to your communications about them, that would only make sense, Miller, head of the NYPDs Counterterrorism and Intelligence Bureau, said Thursday.

Using a kidnapping investigation as an example, he added: How do you conduct one of those over the radio when the whole world is listening for entertainment value?

The NYPDs plan to silence radio transmissions was first reported Wednesday by amNewYork.

A police source said the NYPD may start a pilot program next year to test a department-wide encryption program.

The 2017 mass shooting in Las Vegas, in which a gunman killed 58 people and wounded more than 400 victims after listening to police and hotel security radio dispatches, was a wake-up call for the NYPD, the source said.

We cant have criminals with better technology and tools available than police, NYPD Police Commissioner Dermot Shea said.

Miller said the entire department is at least three years away from being fully encrypted, and noted that other police departments have made similar moves with "arrangements with the news media that made sense.

Las Vegas police now use encrypted radios but allow the press to buy their own radios. In Knoxville, Tenn., police radio traffic is posted after a one-hour delay.

Reactions in different cities have varied, however, with police being accused of limiting journalists access and cutting the public off to information.

2019 New York Daily News

Visit New York Daily News atwww.nydailynews.com

Distributed byTribune Content Agency, LLC.

See the rest here:
NYPD Eyeing Encrypted Radios to Protect Criminal Investigations - Officer

What We Learned About the Technology That Times Journalists Use – The New York Times

Several years ago, some colleagues and I were chatting about what was missing from tech journalism. Plenty of news media outlets had written breathlessly about hot new gadgets and apps. But what were people really doing with that tech?

That question spawned Tech Were Using, a weekly feature that documented how New York Times journalists used tech to cover a wide variety of topics, including politics, sports, wars, natural disasters, food and art.

With the decade coming to a close, we decided to also wrap up the column after interviews with more than 130 Times reporters, editors and photographers. Here were our biggest takeaways.

Unsurprisingly, the smartphone was the most vital work tool among journalists. Many reporters relied on smartphones for recording interviews and turned to A.I.-powered apps like Trint and Rev to automatically transcribe interviews into notes.

Most Times reporters now also rely on some form of encrypted communication, particularly messaging apps like Signal and WhatsApp or the emailing service ProtonMail, to keep their sources and conversations confidential.

That is a remarkable shift. Encryption technologies became popular only a few years ago, after the former government security contractor Edward Snowden revealed the extent of what the United States government was doing to surveil its own citizens.

Another indispensable tool underlined a type of tech that has not improved much: batteries. Many reporters, especially national correspondents who live out of a suitcase, desperately needed phones with longer-lasting batteries, so battery packs were a staple in their arsenal of tools.

Many photographers were also early adopters of new tech. One key example: drones. Those were constantly getting smaller, and their cameras were improving, which created possibilities for new types of photography, like overhead shots of houses damaged in a fire.

In contrast, many tech reporters tried to minimize the amount of tech they used. That could be, in part, a symptom of knowing too much about the companies they covered and the wide swaths of data those companies collected.

Many editors and reporters also talked about how tech had transformed the industries they cover.

In the world of dining, digital photography and platforms like Instagram have become the main method that restaurants use to communicate with patrons. Rocket launches are now live-streamed online, which let our space reporter watch from his phone instead of heading to the space station. And in the entertainment world, video streaming has opened doors to a wealth of new content so much that reporting on movies and TV shows has become an art of curation.

Whats ahead? If tech has invaded everything, the answer is: even more transformation.

See the original post:
What We Learned About the Technology That Times Journalists Use - The New York Times

Volunteer firefighters, EMTs worry they won’t have NYPD radio access to help public – amNY

As the city continues to stay mum on the plan to encrypt tens of thousands of police radios in New York City, yet another group is expressing concerns that they will also be shut out of the NYPD feed volunteer firefighters and ambulance companies.

Dozens of volunteer ambulance groups currently respond to help New Yorkers around the city, and they monitor police radios to provide assistance.

Those radios will likely go silent should the NYPD proceed with its plan to encrypt all police radios in 2020, as reported Wednesday in amNewYork.

The NYPD, while not explicitly denying the amNewYork report, said in a statement Tuesday that the department is undergoing a systems upgrade that is underway for the next 3-5 years.

Part of that upgrade includes ensuring radios can support either encrypted or non-encrypted use, said Sergeant Jessica McCrory, a spokesperson for the NYPD Deputy Commissioner of Public Information. The Department constantly evaluates technology capabilities and safety measures, and once upgrades are complete, will determine encryption best practices based on safety needs of the city and law enforcement best practices.

Some companies also have access to the FDNY radio feed. The Fire Departments radios are capable for encryption, but officials there say they have no plans to do that. Even so, the NYPD and FDNY commanders would still need radios capable of communicating with each other.

All news organizations would potentially be locked out if the encryption plan goes forward. Many get their early tips of breaking news from listening to police radio scanners or following services which have such access.

Many advocacy groups have weighed in after amNewYorks report, including the Committee to Protect Journalists, which issued the following statement: CPJ is looking into this, and we have also shared it with the US Press Freedom Tracker.

When Police Officers Rafael Ramos and Wenjian Liu were shot to death in 2015, the Bedford-Stuyvesant Volunteer Ambulance Corps was able to quickly respond to the scene because they heard emergency calls on the police radio.

Thats how we responded so rapidly to them, said Antoine Robinson, commanding officer and CEO of the Bed Stuy Volunteer Ambulance. Thats how we get our jobs, but you know the police have to do what is best for the public and police department. No matter what they do, we still have to answer our call and obtain information we need.

Robinson said he plans to speak to the NYPD to see what can be done to maintain communications.

We used to sign out radios, but they stopped doing that, so may be something else can be worked out, Robinson said.

The Central Park Medical Unit, an all-volunteer ambulance unit serving Central Park and the surrounding streets, was able to save the life of a man injured by a home-made bomb in 2016. They were able to get to him quickly because they heard the call on NYPD radio.

Volunteer rescuers have been concerned about losing radio access for some time amid rumors about encryption.

Danny Cavanaugh, president of the Volunteer Firemans Association of New York, said volunteer companies around the city have expressed their concerns previously, but received little response from the NYPD.

We want to maintain the relationship we have always had, and we look forward to continuing it, Cavanaugh said. We always come to the aid of the police and hope we can continue to do that.

Travis Kessel, chairperson of District 4 New York State Volunteer Ambulance and Rescue Association, said it is essential that volunteer units closely with the police department and render aid in a timely manner.

Kessel, who works with the Glendale and Ridgewood Volunteer Ambulance Corps, said he has a close relationship with the NYPD, but losing the radio would make it difficult for the corps to respond to police emergencies.

Since weve existed, weve been part of every large scale event in city every blizzard, heat emergencies to obviously larger events like 9-11. Those open lines of communication to assist, then NYPD and FDNY and other agencies losing that line would be devastating, Kessel said. Our ability to help in a moments notice, by monitoring those radio frequencies and through media channels, allows us to bring aid quicker allows us to have that inside knowledge that knowing what type of resources are needed.

Councilman Donovan Richards, chair of the Public Safety Committee, said he and all other elected officials were taken aback by the radio encryption plans but hes not shocked to hear the NYPD doing this in secret.

Anything that goes backward and kills transparency in this city with the NYPD is not good for the public, Richards said. We are very interested in hearing from the NYPD this is not good for democracy.

Despite Mayor Bill de Blasio saying he would speak with Commissioner Dermot Shea about the radio encryption and loss of transparency, his office has yet to reply for comment.

Read this article:
Volunteer firefighters, EMTs worry they won't have NYPD radio access to help public - amNY

The Defense Department Says It Needs the Encryption the FBI Wants to Break – Free

Even the Defense Department is now pointing out that the governments quest to weaken encryption lies somewhere between counterproductive and downright harmful.

Attorney General Bill Barr and Senate Judiciary Committee Chair Lindsey Graham have been on a tear lately in a bid to undermine encryption standards. Those efforts culminated in a hearing this week whose primary purpose appears to have been to demonize encryption by falsely proclaiming it poses a risk to public safety.

Many staffers at both the Department of Justice and FBI have joined the festivities, arguing that encryption enables all manner of nefarious behavior, from human trafficking to child exploitation as they push for the inclusion of law enforcement backdoors in everything from routers to smartphones.

Actual security expertsand tech giants like Facebook and Applehave long highlighted the foolishness of such efforts. Encryption aids everybody, theyll note, protecting consumers, activists, and criminals alike. Embed backdoors in encryption and network gear, theyve warned, and youre undermining an essential security tool, putting everybody at risk.

We do not know of a way to deploy encryption that provides access only for the good guys without making it easier for the bad guys to break in, Apples director of user privacy, Erik Neuenschwander told hearing attendees.

While vast segments of government have embraced the recent war on encryption, some government officials seem to understand the benefits of retaining strong encryption. This week, Representative Ro Khanna forwarded a letter to Lindsay Graham from the Defense Department's Chief Information Officer Dana Deasy.

In the letter, first reported by Techdirt, Deasy notes that all DOD issued unclassified mobile devices are required to be password protected using strong passwords, and that any data-in-transit on DOD issued mobile devices be encrypted via VPN.

The importance of strong encryption and VPNs for our mobile workforce is imperative, Deasy wrote.

As the use of mobile devices continues to expand, it is imperative that innovative security techniques, such as advanced encryption algorithms, are constantly maintained and improved to protect DoD information and resources, he said. The Department believes maintaining a domestic climate for state of the art security and encryption is critical to the protection of our national security.

Theres endless examples of governments, organizations, and corporations attempting to undermine encryption standards for both surveillance and profit. Comcast, for example, has worked to undermine recent efforts to encrypt Domain Name Server (DNS) traffic because doing so would threaten the companys efforts to monetize user behavior online.

Facebook sent a letter this week to Bill Barr, in which the company made it clear that it would not backdoor its encrypted messaging apps at the governments request.

Cybersecurity experts have repeatedly proven that when you weaken any part of an encrypted system, you weaken it for everyone, everywhere, Facebook wrote.

But while cybersecurity experts and tech giants spent the week warning that weakening encryption harms everyone, a bipartisan coalition of lawmakers remain stubbornly impervious to the argument.

Democratic Senator Dick Durbin largely mirrored Grahams rhetoric at this weeks hearings, insisting the latest war on encryption was about ensuring big tech companies werent beyond the reach of the law. Were talking about our government protecting our citizens, he insisted, seemingly oblivious that eroding encryption would likely have the exact opposite impact.

The Justice Department has argued for years that by including strong encryption on their networks and in their products, Silicon Valley giants are undermining the governments quest to rein in criminals. But security experts, and now the DOD, have made it abundantly clear that encryption protects everybody, not just the worst segments of society.

So far, politicians like Graham have made it abundantly clear theyre not listening, insisting that if tech companies dont set about backdooring their products and weakening encryption, there will soon be hell to pay.

My advice to you is to get on with it, because this time next year, if we havent found a way that you can live with, we will impose our will on you, Graham said.

Go here to see the original:
The Defense Department Says It Needs the Encryption the FBI Wants to Break - Free

The Senate Judiciary Committee Wants Everyone to Know It’s Concerned About Encryption – EFF

This morning the Senate Judiciary Committee held ahearing on encryption and lawful access. Thats the fanciful idea that encryption providers can somehow allow law enforcement access to users encrypted data while otherwise preventing the bad guys from accessing this very same data.

But the hearing was not inspired by some new engineering breakthrough that might make it possible for Apple or Facebook to build a secure law enforcement backdoor into their encrypted devices and messaging applications. Instead, it followedspeeches, open letters, and other public pressure by law enforcement officials in the U.S. and elsewhere to prevent Facebook from encrypting its messaging applications, and more generally to portray encryption as a tool used in serious crimes, including child exploitation. Facebook has signaled it wont bow to that pressure. And more than 100 organizations including EFFhave called on these law enforcement officials to reverse course and avoid gutting one of the most powerful privacy and security tools available to users in an increasingly insecure world.

Many of the committee members seemed to arrive at the hearing convinced that they could legislate secure backdoors. Among others, Senators Graham and Feinstein told representatives from Apple and Facebook that they had a responsibility to find a solution to enable government access to encrypted data. Senator Grahamcommented, My advice to you is to get on with it, because this time next year, if we haven't found a way that you can live with, we will impose our will on you.

But when it came to questioning witnesses, the senators had trouble establishing the need for or the feasibility of blanket law enforcement access to encrypted data. As all of the witnesses pointed out,even a basic discussion of encryption requires differentiating between encrypting data on a smartphone, also called encryption at rest, and end-to-end encryption of private chats, for example.

As a result, the committees questioning actually revealed several points that undercut the apocalyptic vision painted by law enforcement officials in recent months. Here are some of our takeaways:

The first witness was Manhattan District Attorney Cyrus Vance, Jr., who has called for Apple and Google to roll back encryption in their mobile operating systems. Yet by his own statistics, the DAs office is able to access the contents of a majority of devices it encounters in its investigations each year. Even for those phones that are locked and encrypted, Vance reported that half could be accessed using in-house forensic tools or services from outside vendors. Although he stressed both the high cost and the uncertainty of these tools, the fact remains that device encryption is far from an insurmountable barrier to law enforcement.

As we saw when the FBIdramatically lowered its own estimate of unhackable phones in 2017, the level of security of these devices is not static. Even as Apple and Google patch vulnerabilities that might allow access, vendors like Cellebrite and Grayshift discover new means of bypassing security features in mobile operating systems. Of course, no investigative technique will be completely effective, which is why law enforcement has always worked every angle it can. The cost of forensic tools may be a concern, but they are clearly part of a variety of tools law enforcement use to successfully pursue investigations in a world with widespread encryption.

Meanwhile, even as Vance focused on the cost of forensic tools to access encrypted phones, he repeatedly ignored why companies like Apple began fully encrypting their devices in their first place. In a colloquy with Senator Mike Lee, Apples manager of user privacy Erik Neuenschwander explained that the companys introduction of full disk encryption in iOS in 2014 was aresponse to threats from hackers and criminals who could otherwise access a wealth of sensitive, unencrypted data on users phones. On this point, Neuenschwander explained that Vance was simply misinformed: Apple has never held a key capable of decrypting encrypted data on users phones.

Neuenschwander explained that he could think of only two approaches to accomplishing Vances call for lawful access, both of which would dramatically increase the risks to consumers. Either Apple could simply roll back encryption on its devices, leaving users exposed to increasingly sophisticated threats from bad actors, or it could attempt to engineer a system where it did hold a master key to every iPhone in the world. Regarding the second approach, Neuenschwander said as a technologist, I am extremely fearful of the security properties of such a system. His fear is well-founded;years of research by technologists and cryptographers confirm that key escrow and related systems are highly insecure at the scale and complexity of Apples mobile ecosystem.

Finally, despite the heated rhetoric directed by Attorney General Barr and others at end-to-end encryption in messaging applications, the committee found little consensus. Both Vance and Professor Matt Tait suggested that they did not believe that Congress should mandate backdoors in end-to-end encrypted messaging platforms. Meanwhile, Senators Coons, Cornyn, and others expressed concerns that doing so would simply push bad actors to applications hosted outside of the United States, and also aid authoritarian states who want to spy on Facebook users within their own borders. Facebooks director for messaging privacy Jay Sullivan discussed ways that the company will root out abuse on its platforms while removing its own ability to read users messages. As weve written before,an encrypted Facebook Messenger is a good thing, but the proof will be in the pudding.

Ultimately, while the Senate Judiciary Committee hearing offered worrying posturing on the necessity of backdoors, were hopeful that Congress will recognize what a dangerous idea legislation would be in this area.

Read more:
The Senate Judiciary Committee Wants Everyone to Know It's Concerned About Encryption - EFF

Congress wants to regulate encryption for big tech – The Burn-In

On Tuesday, Congress warned technology companies that lawmakers will take action to regulate encryption if they dont cooperate more openly with law enforcement. The announcement has reinvigorated an ongoing debate between big tech and the U.S. government.

Government officials argue that encryption will hinder criminal investigations. Tighter security is preventing access to critical information exchanged via devices and messaging apps. Big tech, on the other hand, believes encryption is essential for protecting individuals from bad actors and authoritarian governments.

It appears there is no simple solution as both sides believe they are acting in the best possible manner for the American people. As internet use and global communication increases, its likely the topic isnt going to die down any time soon.

Advertisement

Regulated encryption has been a hot topic for several years. In 2016, the FBI ordered Apple to unlock the iPhone of one primary suspect in a San Bernardino, California shooting. Apple refused to help, even after receiving an order from a federal judge. Tim Cook was alarmed by the request, citing that doing so would leave millions of devices vulnerable.

The battle between Apple and the FBI kicked off a controversial discussion around data privacy and how much the government should be able to access. In a recent meeting, Apples Manager of User Privacy, Erik Neuenschwander, explained why weakening encryption across the board is not the answer.

At this time, weve been unable to identify any way to create a backdoor that would work only for the good guys, said Neuenschwander. When we have weaknesses in our system, theyre exploited by nefarious entities as well.

The encryption topic retook center stage this fall when the Justice Department asked Facebook to delay its plans to encrypt its messaging services. Legislators are concerned that encryption would prevent law enforcement from identifying and prosecuting child predators.

Last year, Facebook reported nearly 17 million cases to the U.S. National Center for Missing and Exploited Children. Congress is concerned Facebook wouldnt be able to provide adequate evidence for cases going forward if the social media giant moves forward with encryption.

Like Apple in 2016, Facebook is holding steady against the government in this area. The company sent a letter to Attorney General William Barr refusing to weaken encryption for WhatsApp. Facebook leadership also believes that regulating encryption would not work over the long term. Criminals will simply switch over to unregulated, international platforms to get what they want.

U.S. Lawmakers seem to be sticking to their guns. Many believe there is no better way to protect Americans than to regulate how tech companies encrypt devices and user data. Also, other countries overseas have already paved the way on regulated encryption.

There are many serious cases where we cant access the device in the time period where it is most important for us to access it, said Manhattan District Attorney Cy Vance Jr. Without moving toward legislation, were not going to solve this problem.

Some lawmakers are hopeful that big tech will respond amicably in 2020. Otherwise, by this time next year, there may be a legal movement and much bigger fight ahead. Stay tuned.

See original here:
Congress wants to regulate encryption for big tech - The Burn-In

Facebook says it won’t break end-to-end encryption – TechRadar

Ahead of an upcoming senate hearing on encryption, Facebook executives have sent a letter to Attorney General William Barr in which they said that the social media giant would not provide law enforcement with access to its encrypted messaging products.

In the letter, written by WhatsApp head Will Cathcart and Messengerhead Stan Chudnovsky, the executives explained that by creating backdoor access into Facebook's products for law enforcement, the would also be giving cybercriminals and other bad actors a way to enter their systems, saying:

The backdoor access you are demanding for law enforcement would be a gift to criminals, hackers and repressive regimes, creating a way for them to enter our systems and leaving every person on our platforms more vulnerable to real-life harm. Peoples private messages would be less secure and the real winners would be anyone seeking to take advantage of that weakened security. That is not something we are prepared to do.

Facebook's CEO Mark Zuckerberg announced earlier this year that the company would be bringing end-to-end encryption to both Messenger and WhatsApp to make both of the apps faster, simpler, more private and more secure.

However, in October the Justice Department raised concerns about the company's encryption plans and suggested they would benefit criminals such as sex traffickers and pedophiles. Barr insisted that law enforcement should have access to company's systems in order to investigate these serious crimes, saying: Companies should not deliberately design their systems to preclude any form of access to content even for preventing or investigating the most serious crimes.

The letter from Facebook executives was sent in response to Barr's inquiry in October and it arrived just before a Senate Judiciary hearing on encryption. During that hearing, Chairman Lindsey Graham said that while he appreciates that cybercriminals can't hack into his smartphone, he still believes encrypted devices and messaging apps create a safe haven for criminals.

Facebook's director of messaging privacy Jay Sullivan then argued that American companies must lead when it comes to secure and encrypted messaging or foreign firms would take up the mantle. If this occurred, it would be even more difficult for US law enforcement officials to gain access to these services to conduct investigations.

The war for encryption continues and expect this issue to be debated heavily as governments try to protect their citizens from criminals and other threats while continuing to take away their privacy online.

Via The Verge

More:
Facebook says it won't break end-to-end encryption - TechRadar