Category Archives: Encryption
Better Late Than Never: Ring Adds End-to-End Encryption to Battery Powered Doorbells – Gizmodo
Photo: Chip Somodevilla (Getty Images)
Amazon-owned home surveillance camera king Ring is making good on its promise to bring end-to-end encryption (E2EE) to a wider range of its devices. This week, the company added the encryption secretive for audio and video to its lower-cost battery-powered doorbells and cameras which were left out of the companys previous E2EE rollout. The addition marks Rings latest attempt to correct course on a product history littered with privacy and security blunders.
Privacy advocates and security experts have for years pushed Ring and other device makers like it to incorporate E2EE by default. Rings encryption services, which are annoyingly opt-in, provide enrolled devices with a one of its-kind encryption key to unlock the encrypted videos. Ring claims that the key keeps anyone other than the devices users, including Ring itself, from accessing the videos. Further, Ring says all video uploaded to its cloud network features E2EE, by default at rest and in transit.
We believe we should offer a full range of privacy options to as many customers as possible, Ring said in its blog post. And we know that different devices make sense for different living situations.
If this all sounds a bit familiar, thats because Rings journey to finally bring E2EE to its doorbells was years in the making. The company first toyed with the capability in January 2021 as a technical preview for a select number of users. Then, in July 2021 the company pleased some security experts by adding encryption to a selection of its products globally. That rollout applied to 13 Ring products but notably did not include the companys battery-powered video doorbells. Fast forward 14 months and, well, here we are. Now, E2EE is available on all of Rings devices except its lower-priced Ring Video Doorbell Wired, according to TheVerge.
So why the long wait for E2EE on battery-powered devices? According to Ring, it was to ensure the quality of the product.
G/O Media may get a commission
A feature as ambitious as video End-to-End encryption, quite simply, took time to build, a Ring spokesperson said in an email to Gizmodo. We hold ourselves to a high standard to give our customers the best possible experience and offer products and features they can trust.
Ring users who own the battery-powered doorbells will likely welcome the change, especially considering the companys long history of less than stellar security bonafides. In recent years, thousands of Ring owners have reportedly had their personal information compromised and leaked during data breaches. Rings also found itself on the receiving end of lawsuits calling into question its security practices following a long list of concerns and sometimes creepy hacks. In one case, hackers even broke into a Ring device to scare the shit out of a household and taunt their dog.
E2EE encryption is definitely better than the alternative, but it alone wont solve thornier privacy concerns more fundamental to Rings design. Case in point, earlier this year Ring rejected requests made by Massachusetts Democratic Senator Ed Markey to adjust the devices settings so it would not record audio by default after product testing from Consumer Reports found its flagship doorbells microphone could potentially capture recording of conversations from 20 to 25 feet away in his letter to the company. Markey argued this granularity of data potentially being collected by the doorbells threatens the right to assemble, move, and converse without being tracked. Ring, in rejecting the proposal, said making audio recording opt-in would result in a negative experience for its customers.
Update 4:23 P.M: Added statement from Ring.
View post:
Better Late Than Never: Ring Adds End-to-End Encryption to Battery Powered Doorbells - Gizmodo
Beware, That VPN May Not Be What You Think It Is – CNET
There are some excellent, well-tested virtual private networks we recommend you try. But if you're exploring the competitive market of VPNs on your own, you're likely to find some shoddy VPNs companies that scatter hints of their dubiousness everywhere they go. Learning to identify a few of these red flags can save you hours of research and a hefty annual subscription cost for supposedly getting connected to the internet more securely.
Is the price too good to be true? Has the company been caught keeping logs? How are your connection speeds?
To save you time, here are a few of the biggest red flags to watch out for when taking your new VPN out for a test drive. And on the flip side, here are three things to look for in a VPN.
Read more: Best iPhone VPN of 2022
There's no such thing as a free lunch. Maintaining the hardware and expertise needed for large VPN networks isn't cheap. As a VPN customer, you either pay for a premium service with your dollars, or you pay for free services with your usage data when it's collected by the free VPN and bargained away to advertisers or malicious actors.
As recently as August 2019, 90% of apps flagged as potentially unsafe in Top10VPN's investigation into free VPN ownership still posed a privacy risk to users. Free VPNs can also leave you open to quiet malware installation, pop-up ad barrages and brutally slow internet speeds.
Read more: Best Free VPN 2022: Try These Risk-Free Services for a Privacy Boost
If a VPN is caught keeping or sharing user activity logs, I won't recommend it. While most VPN services claim they don't track or keep logs of user activity, that claim can sometimes be impossible to verify. In other instances, the claim falls apart publicly when a VPN company hands over internet records to law enforcement.
The latter has happened in a few cases. EarthVPN, Hide My Ass VPN and PureVPN have all been clocked by privacy advocates for handing over logs to authorities, as hasIPVanish.
To be clear, it is entirely possible to be grateful for the arrest of reprehensible scumbags while ardently advocating for consumer privacy interests. My beef isn't with any VPN company helping cops catch a child abuser via usage logs; it's with any VPN company that lies to its customers about doing so. The lie that helps law enforcement in the US catch a legitimate criminal is the same lie that helps law enforcement in China arrest a person watching footage of the 1989 Tiananmen Square protests.
Ideally, the VPN you choose should have undergone -- and published the results of -- an independent third-party audit of its operations, including its use of activity logs.
Read more: All the VPN Terms You Need to Know
Now playing: Watch this: Top 5 Reasons to Use a VPN
2:42
Another red flag to watch for when choosing a VPN is shoddy encryption standards. Users should expect AES-256 encryption or better from VPN services. Nearly every web browser and app already uses AES, often touted as "military-grade" encryption, after it was adopted by the US government in 2002. If your VPN only offers PPTP and L2TP encryption, look elsewhere.
While you're snooping around for encryption details, keep an eye out for one of our favorite phrases, "Perfect Forward Secrecy." Those three little words can have a hefty impact on your privacy: If one of your VPN's servers is ever breached, Perfect Forward Secrecy ensures that any keys used to decrypt private internet traffic quickly become useless -- giving you more security.
Read more: How We Evaluate and Review VPNs
With just a little bit of elbow grease, any moderately skilled internet jerk can throw together a service that looks like a VPN but is actually little more than a proxy service reselling your internet bandwidth. Not only can that slow your internet speed, it could potentially leave you on the legal hook for whatever they do with that resold bandwidth.
Hola's case was the most famous. The company was caught in 2015 quietly stealing users' bandwidth and reselling it to whatever group wanted to deploy its user base as a botnet. Hola CEO Ofer Vilenski admitted it'd been had, but contended this harvesting of bandwidth was typical for this type of technology.
Read more:How to Set up a VPN on our iPhone or Android Phone: Yes, You Need One
"We assumed that by stating that Hola is a (peer-to-peer) network, it was clear that people were sharing their bandwidth with the community network in return for their free service," he wrote.
Nearly all VPNs slow your browsing speed, some by as much as half. But a brutal crawl can be a sign of something worse than a simple lack of servers. So if being pressed into service as part of a botnet isn't your cup of tea, double-check those suspiciously slow speeds and the reputation of the VPN you're paying for.
For more VPN buying advice, here's how to pick the right VPN for your work-from-home setup. Plus, why we don't recommend US-based VPNs, and three things a VPN can't help you with.
See the original post here:
Beware, That VPN May Not Be What You Think It Is - CNET
How to Use Secret Conversations on Facebook Messenger – How-To Geek
Peter Gudella/Shutterstock.com
Using Facebook Messengers Secret Conversations feature, you can ensure your messages and calls are end-to-end encrypted so that only the sender and the receiver can access them. Well show you how to utilize this feature on your iPhone or Android phone.
RELATED: What Is End-to-End Encryption, and Why Does It Matter?
When you enable the Secret Conversations feature with a user, Messenger encrypts your messages and calls as soon as you send them. Then, these contents are only decrypted on the receivers phone. This ensures no one can access your chat contents, not even Metaat least not without physical access to you or your recipients phone.
That encryption is the difference between a regular chat and a secret one. If any bad actors gain access to Metas servers, they cant see your encrypted messages. Any of your regular chats might be visible, as they remain unencrypted on Metas servers.
However, Meta restricts who you can have secret chats with. At the time of writing in August 2022, you cant start such a chat with businesses, professional accounts, Instagram accounts from Messenger, and people you havent messaged before. Also, both you and your chatting partner need to be using the latest version of the app, so make sure you both update Messenger on your respective devices.
Additionally, certain features you might be used to wont work while in one of these chats. Metastates that group messages and money payments are not supported in secret conversations. If those limitations create problems for you, look into alternativesecure communication methodsthat might offer the features you need.
To begin a new secret chat with someone, first, launch the Messenger app on your phone.
In the Messenger apps top-right corner, tap the pencil icon.
Youll see a New Message screen. Here, in the top-right corner, turn on the Secret Conversations option.
On the same page, in the To field, enter the name of the person you want to have a secret chat with. Then, select that person on the list.
A new chat will start with your chosen person. Any messages or calls you make in this conversation will be end-to-end encrypted. You can start sending messages as usual.
To make a voice or video call, then at the top of the chat screen, tap the appropriate icon.
To delete your secret chat with someone, then in the chat screens top-right corner, tap the i icon. Then, scroll down the page and choose Delete Chat.
And thats how you hold secret conversations with your chosen people on Facebooks Messenger platform. Happy chatting!
Did you know Messenger lets you send disappearing messages? Check out our guide to learn how to use that feature.
RELATED: How to Send Disappearing Messages in Facebook Messenger
Originally posted here:
How to Use Secret Conversations on Facebook Messenger - How-To Geek
GUEST BLOG: Five steps to take when securing your data with multi-factor authentication – Military Embedded Systems
Blog
September 06, 2022
Computer data exists in different states at different times: data in transit (information flowing through a network); data in use (active data that is being accessed and manipulated by a computer program); and data-at-rest, known as DAR, or data that is physically housed in a storage device like a solid-state drive. Many cybersecurity solutions focus on securing data in transit and data in use, but neglect securing DAR.
President Bidens Executive Order on Improving the Nations Cybersecurity, enacted on May 12, 2021, directs all branches of the federal government to improve their resilience to cybersecurity threats. This order directly calls out the need to secure data-at-rest (DAR) with encryption and multi-factor authentication (MFA).
MFA requires a user to provide multiple pieces of evidence that combine to verify a users identity. Depending on the application, MFA may be required at login or perhaps when trying to access an application or even a particular folder or file. MFA combines two or more independent credentials: what the user knows (password, for example), what the user has (an authentication app, for example), and what the user is (biometric palm vein scan, for example). Since most MFA implementations use two factors, its often called two-factor authentication, or 2FA.
There are five important considerations when protecting your data with MFA.
1. Understand the sensitivity of your data:First, note that not all data is subject to the same levels of protection. In the U.S., since all federal departments are part of the executive branch, the data-classification system is governed by executive order rather than by law. As of 2009, information may currently be classified at one of three levels: confidential, secret, and top secret. Subsequent executive orders may change these classifications and the levels of protection associated with each classification.
2. Use self-encrypting drives:Sensitive data needs to be encrypted, executive orders notwithstanding. Self-encrypting drives (SEDs) encrypt data as its written to the drive, which has a self-contained drive encryption key (DEK). The key and encryption process are transparent to users.
SEDs encrypt everything on the drive, which is called full-disk encryption (FDE), including operating system (OS), applications, and data. On-drive encryption is called hardware FDE (HWFDE) and uses an embedded encryption engine (EE), which should provide 256-bit AES encryption.
An SED should adhere to the TCG Opal standard, a secure standard for managing encryption and decryption in the SED. SEDs are often certified to Federal Information Processing Standards (FIPS), developed by the National Institute of Standards and Technology (NIST). For example, a FIPS 140-2 L2 certification assures that the SEDs EE has been properly designed and secured; the L2 ensures that there is visible evidence of any attempt to physically tamper with the drive.
The National Information Assurance Partnership (NIAP) is responsible for the U.S. implementation of the Common Criteria (CC), an international standard (ISO/IEC 15408) for IT product security certification. CC is a framework that forms the basis for a government-driven certification scheme required by federal agencies and critical infrastructure.
3. Employ pre-boot authentication:A designated security officer or administrator will define the user roles and identity management used to authenticate access to the SED. The password security that forms part of an OS is notoriously weak and subject to hacking, so the first level of authorization acquisition (AA) should occur prior to the booting of the OS, in which case it is known as pre-boot authentication (PBA).
Each user should have an individually assigned password, which authorizes the SED to use its cryptographic key to unlock the data. The security officer should have the ability to add new users and revoke access to existing users. When a users access is revoked, that user wont even be able to boot the OS.
A more robust PBA implementation will include MFA.
4. Multi-factor authentication methods:In addition to a username/password, MFA requires another form of authentication. One approach is to use a security dongle, such as a YubiKey, containing a license key or some other cryptographic protection mechanism that the user plugs into a device USB port. The U.S. Department of Defense (DoD), including civilian employees and contractor personnel, uses a smartcard called the common access card (CAC), in which case the computer must be equipped with a physical card reader.
Other MFA methods include applications, often on smartphones, that provide a one-time code synced to the device or system asking for authentication. Also taking advantage of the ubiquity of smartphones is an SMS-based system that will include a one-time code in a text message.
5. Provide the ability to destroy the data:There are various scenarios in which it may be necessary to destroy any data stored on the SED. A benign case is when an organization decides to upgrade its computers and/or drives, transfer computers and/or drives within the organization, or dispose of or recycle the computers and/or drives outside the organization. A worst-case scenario is when an unauthorized entity gains control of the drive with the intent of accessing the data.
Using standard operating system-based delete functions to remove files and folders is not sufficient because experienced hackers can still retrieve some or all the data. SEDs that are used to store confidential data should support special hardware functions to perform secure erase (write zeroes into every area where data is stored on the drive) and crypto erase (wipe any cryptographic keys stored on the drive, thereby rendering any encrypted data stored on the drive unreadable and useless to a bad actor).
To address the worst-case scenario, the organizations designated security officer should have the ability to define erase procedures to be automatically initiated by the drive itself; for example, failing AA a specified number of times should cause the drive to self-erase.
In the case of a SED equipped with appropriate PBA, any data stored on the disk will essentially be invisible until AA has taken place, thereby preventing bad actors from cloning the drive to circumvent the restricted number of permitted attempts at AA.
To sum up
Some organizations mistakenly assume that employing MFA such as fingerprint scans or facial recognition after the OS has booted offers a high level of confidence. However, once the OS has booted, any data on its drives is exposed to sophisticated hackers or potentially nation-state bad actors.
The highest levels of confidence and security are achieved by using MFA as part of a PBA environment implemented using HWFDE realized on a FIPS + CC certified and validated SED. (Figure 1.)
[Figure 1|An example of a secure solid-state drive, part of the Citadel family of secure data storage. Photo courtesy CDSG.]
CDSG directorof marketing Chris Kruell leads the sphere of marketing activities, including corporate branding, corporate and marketing communications, product marketing, marketing programs, and marketing strategy. Chris previously was VPofmarketing at ERP-Link and hardware startup Lightfleet. He was a marketing director at Sun Microsystems andheldseveral marketing positions in the high-tech industry. Chris holds a BSdegree from Cornell University and an MA degree from Hamline University.
CDSG (CRU Data Security Group) https://cdsg.com/
Follow this link:
GUEST BLOG: Five steps to take when securing your data with multi-factor authentication - Military Embedded Systems
A 14-Year-Old Cracked The Codes on Australias New Coin In Just Over An Hour – TechTheLead
Share
Share
Share
Australias new limited edition commemorative coin was launched with five different encryption codes on it but it took little over an hour for a 14-year-old boy to crack four of them, delighting security experts everywhere.
On the 75th anniversary of the Australian Signals Directorate, the country released a limited edition coin covered in codes to pay homage to Australias foreign intelligence cyber security agency and find their future employees, hopefully.
The security experts behind the new coin, which was minted in just 50,000 pieces, included five different encryption codes on it, challenging buyers to try and solve them.
Theres a challenge out there to see who can correctly break all the layers, and, would you believe it, yesterday the coin was launched at 8:45am; we put up our web form and said, Hey, if you think youve got the answers, fill in the form.
And believe it or not, a boy, 14 years old in Tasmania, was the first person in just over an hour to get all four layers right, said ASDs director-general Racher Noble.
Delighted at the childs genius, she added Can you imagine being his mum? and that her organization hopes to meet him soon in the hopes of recruiting him to their ranks.
Like the early code breakers in ASD, you can get through some of the layers with but a pencil and paper but, right towards the end, you may need a computer to solve the last level, Ms Noble said, adding that, as of yet, the fifth level of encryption was not broken yet.
Are you up to the challenge?
Also read: Authorities Spread Encrypted ANoM App To Criminals Worldwide, Bust More Than 800 Of Them In Massive Sting
Facebook Twitter LinkedInReddit WhatsApp
Subscribe to our website and stay in touch with the latest news in technology.
You will soon receive relevant content about the latest innovations in tech.
There was an error trying to subscribe to the newsletter. Please try again later.
Read this article:
A 14-Year-Old Cracked The Codes on Australias New Coin In Just Over An Hour - TechTheLead
You May Be Able to Send Secret Messages in the Molecular Code of Ink Someday – Twisted Sifter
Do you remember those invisible ink sets you used to be able to buy out of magazines and comic books back in the day?
Theyd (sort of) work for a day or two and then that would be the end of it. It was a novelty for kids.
But thanks to scientists at the University of Texas, sending secret messages in the molecular code of ink might be something that well all be doing sooner than later.
A new study from the Texas researchers focuses on an example of steganography that is an encrypted message-within-a-message. Professor Eric Anslyn is a big fan ofThe Wizard of Ozand he encrypted the book by L. Frank Baum and sent it to a colleague.
And for this experiment, it was all about the ink. Anslyn explained that his team used a special kind of polymer and encoded a 256-character key to encrypt and decrypt the book.
The study says, To store 256 bits of information, we chose to encode a cipher key in hexadecimal (base-16) in a mixture of eight 10-mer [oligourethanes]. Eight of the 10 monomers encode information In base-16, each monomer provides a storage density of 4 bits per monomer, thus 32 bits per 10-mer, and overall, 256 bits in the sample.
The team then mixed these oligourethanes with soot, isopropanol, and glycerol, and they had an ink they could use for their project.
Anslyn said, The most important scientific breakthrough was the use of mass tags that allow us to sequence eight oligourethanes simultaneously. This is the real advance in the field. The encryption key was just a single application that can be envisioned.
Pretty exciting stuff, dont you think?
Read more from the original source:
You May Be Able to Send Secret Messages in the Molecular Code of Ink Someday - Twisted Sifter
How to shore up data protection beyond cyber security policies and standards – Open Access Government
Its all well and good having rigorous data protection policies and standards in place, as many organisations indeed do. However, we continue to see that if employees are not aware of these policies or apply them in practice, they may as well not exist.
We rarely go for long without hearing of an information security breach or cyber-attack to which a public sector body or local council has fallen prey despite significant ongoing efforts and resource deployment to prevent them.
A case in point appears to be Aberdeenshire Council, which revealed in response to a Freedom of Information (FOI) request that some 243 breaches occurred between January 2020 and March 2022 with that figure representing an upward trend.
Whilst public and private sectors increasingly value best practices around information security: gaps in approach continue to result in exposure and risk. One area where improvements can often be made is in education and training.
After all, its commonly the human factor that is the weakest link in the cyber security plan; it wont matter how large your cyber security technology investment is if it is not paired with appropriate behaviours and understanding throughout the organisation.
At Apricorn, we have concluded that a solid requirement for comprehensive cybersecurity training should be written into every employees contract, with regular knowledge updates mandated and delivered, for all workers both internal and external to the company. This must be an integral, ongoing part of staff professional development.
From the onboarding stage onwards, employees must be kept up to date with evolving cyber threats as well as corporate cyber security, information and data handling policies, bolstered with regular refresher courses and bite-sized learning approaches added in.
Training shouldnt cover only the what and how of keeping data safe and data protection. A comprehensive education approach must also include the why element the specific risks to the organisation and its customers or service users if policies are not adhered to along with potential ramifications.
All must understand that cyber security cannot simply be delegated as someone elses problem least of all the IT teams, regardless of seniority, department or specific role.
Implementing training that builds upwards from this greater level of context will create the engagement required, alongside an understanding that the company must be accountable for the totality of its actions around the handling of information and data protection.
We often hear that accidental mistakes contribute to breaches and failings in cyber security and information security. To err is human, certainly but we should not forget that an effective mitigation strategy to defend the company against near-inevitable human error is essential.
More must realise too that change is possible Apricorns latest research shows that more than 60% of IT leaders still expect their remote workers to expose them to the risk of a data breach, regardless of the training theyve received.
Education should be combined with the automation and enforcement of security policies
To help bridge this gap, education should be combined with the automation and enforcement of security policies through technology wherever possible.
Robust, regularly reviewed and tested policy and practice, with appropriate technology choices and implementation, supported by education and comprehensive backup and recovery strategy, will deliver optimum protection where, even in the event of a pernicious cyber-attack such as ransomware or successful spear phishing of executives, a swift and efficient recovery can reduce the chance of costly downtime.
Scheduling automatic backups of all data on a regular basis is also important perhaps every day, depending on how often the data is altered or changed and how critical specific data sets are to the organisations mission.
In an Apricorn survey from April 2022, 99% of surveyed IT decision-makers stated they have backup strategies in place, but as many as 26% admitted they were unable to fully restore all data and documents when recovering from a backup.
Only 27% acknowledged having automated backup to both a central and personal repository. We have found that three in five companies do not back up their data or devices in advance of working remotely, while only one in five follow backup best practices such as the 3-2-1 storage strategy and backing up in real-time.
If a 3, 2, 1 backup policy is employed, information should always be recoverable and restorable in the case of cyber-attack, breach or employee error. Have at least 3 copies of data, held on at least 2 different media, with at least 1 copy held offsite a message that has not yet been heeded by everyone, it seems.
Also, the recovery process must be regularly tested to ensure full data restoration can be achieved in the event of a breach or mistake.
Additionally, the encryption of data as standard across the organisation should be mandatory, both when its in transit and at rest, and automated wherever possible. Currently, almost half (47%) of organisations now require the encryption of all data, whether its at rest or in transit a share thats growing, but still falling short of the level of protection possible.
We should add that the stakes appear to be rising for those organisations that dont give the approach sufficient attention: 16% of the IT leaders we surveyed admitted that a lack of encryption had been the main cause of a data breach within their company, up from 12% in 2021.
When data is encrypted, its fully protected, so if for instance, an unauthorised individual gains entry to an IT system, the information will remain unreadable.
In particular, selected storage locations should include an offline solution, such as high-capacity hardware-encrypted USBs that automatically encrypt all data written to them, again taking the human risk out of the equation even for distributed teams. Copies of critical files can be kept secure and disconnected from the network to create an air gap between information and threat.
In addition, built-in hardware encryption with onboard authentication affords stronger protection than software-based encryption, which can leave devices exposed to counter resets, software hacking, screen capture and keylogging. Encryption keys can be kept safe within a hardware crypto module.
With greater attention to the above points, cyber security defences can become fully embedded into ways of working, with full benefits accruing to the organisation.
Written by Jon Fielding, Managing Director EMEA Apricorn
Editor's Recommended Articles
Read more here:
How to shore up data protection beyond cyber security policies and standards - Open Access Government
Zoom adds ‘bring your own key’ encryption to its conferencing service – SiliconANGLE News
Continuing to address security issues that emerged during the early days of the COVID-19 pandemic, Zoom Video Communications Inc. has added support for customer-provided encryption to its popular videoconferencing service.
Zoom Customer Managed Key is aimed primarily at customers in heavily regulated industries like healthcare and financial services. It comes on the heels of increased encryption support that was built into version 5.0 of its platform, which was announced in April. That release added Advanced Encryption Standard 256-bit Galois/Counter Mode, a type of encryption that is known for both security and performance.
All cloud platforms and many software-as-a-service providers support encryption but most require that keys be stored in the hosted cloud. That isnt sufficient for some firms, though, and support for customer keys has become a point of differentiation for security-focused services. In rolling out its Cloud for Financial Services in 2019, IBM Corp. promoted bring your own key encryption as a core feature that distinguishes its platform from other public clouds.
With Customer Managed Key, users can opt to use their own encryption keys to encrypt such assets as cloud recordings, voicemails and calendar access, Zoom said. Encryption can be applied to meetings, webinars, voicemails, Microsoft Corp. Teams access tokens and archived sessions.Administrators can provision encryption keys directly within the Security tab on the Zoom administrative portal or get help from Zooms Global Servicesorganization.
The feature will incur an additional cost but Zoom didnt provide specifics.
Read this article:
Zoom adds 'bring your own key' encryption to its conferencing service - SiliconANGLE News
Current encryption and security will be null and void by 2030 at the latest – TelecomTV
Even if you could afford it, you couldnt go out and buy a quantum computer today because theyre a long way from being commercially available. However, that doesnt mean the machines dont exist they do. It is known that that there are such devices in the laboratories of commercial companies, in university research labs and military installations in various countries including the US and the UK, and the chances are that China, Russia and other countries also have them.
However,despite the intense international race to be the first to develop fully-functioning, full-sized quantum computers, currently, as far as practical applications are concerned, the experimental models are generally too small to outperform traditional electronic super-computers. That said, some have beendeveloped to the point that they can be used to solve some heavy-duty tasks, such as integer factorisation.
In essence, integer factorisation this is the decomposition of a composite number, which is a number can be made by multiplying other whole numbers. For example, 6 can be made from 2 x 3 and 15 can be made from 1, 3, 5 and 15, and thus is a composite number. When composite numbers become very large, no workable non-quantum integer factorisation algorithm has yet been found (although one might actually exist). The field of research is important because many cryptographic algorithms are based on the extreme difficulty of factorising large composite integers, and this has direct relevance and security of RSA public key encryption and the RSA digital signature.
Three years ago, a team of French researchers factored a 240-digit number that took 900 core-years of computing power to achieve, and from that experiment estimated that the factorisation of 1024-bit RSA modulus would take 500 times as long in other words, 450,000 core years of computing. However, quantum computers can perform such calculations very quickly. A quantum computer utilising superposition, interference, and entanglement could crack and render instantly obsolete the ubiquitous RSA encryption algorithm in a matter of seconds. Soon, keeping information secret will become many orders of magnitude more difficult.
The qubit is the fundamental data processing element of a quantum computer and researchers are building machines with more and more of them whilst simultaneously developing error-correction methodologies that will enable the performance of longer and longer calculations. Its only a matter of time before all current encryption techniques will be rendered null and void. The general consensus within the industry is that this will happen by 2030 at the latest.
Originally posted here:
Current encryption and security will be null and void by 2030 at the latest - TelecomTV
Encrypted Phone Provider Calls It Quits After Failing To Persuade Middlemen To Roll Their Own Device Management Systems – Techdirt
from the passing-the-buck-means-having-no-more-bucks-to-pass dept
Over the past few years, international law enforcement has been cracking down on encrypted device purveyors. Were not just talking about regular device encryption, which has been mainstream for several years now. These would be specialized manufacturers that appear to cater to those seeking more protection than the major providers offer services that ensure almost no communications/data originating from these phones can be obtained from third-party services.
The insinuation is that specialized devices are only of interest to criminals. And there is indeed some evidence backing up that insinuation. But plenty of non-criminals have reason to protect themselves from government surveillance, a fact that often goes ignored as criminal crackdowns continue.
Even if theres a honest market for something international law enforcement considers to be a racket (as in RICO), the market cannot seem to sustain the continuous scrutiny of law enforcement. Another purveyor of specialty phones catering to people who desire the utmost in security and privacy has decided resellers should bear the legal burden of offering its offerings. Heres Joseph Cox reporting for Motherboard:
Encrypted phone firm Ciphr, a company in an industry that caters to serious organized criminals, has made a radical change to how its product can be used and sold, signaling an attempt by the company to distance themselves from, or perhaps cut off, their problematic customers.
How do you cut off perhaps your (previously) most valued customers? Well, in this market, you force the resellers to assume all legal liability.
Now, it is shifting that responsibility away from itself to individual resellers of the devices. The message says that for resellers to continue with new sales or renewals of customers subscriptions, they will need to run their own MDM solution. This essentially puts the management of customers much more in the hands of the resellers and not Ciphr.
Offloading mobile device management (MDM) to third party resellers perhaps provides Ciphr with plausible deniability. If resellers want to have something to sell, theyll need to take direct control of device management to ensure end users dont install apps that might compromise security as well as controlling distribution of software updates and other necessities of cell phone service.
While this move may have ultimately provided Ciphr with plausible deniability when the feds came knocking, it immediately appears it wont be profitable for Ciphr. The offloading of device management to resellers appears to have severely harmed reseller desire for Ciphr phones, as Joseph Cox notes in his follow-up article.
Ciphr will cease operations at the end of the month, according to the message. The reason was that not enough resellers took up Ciphr on its plan to shift the responsibility for Mobile Device Management (MDM) away from the company itself to individual resellers.
Resellers appeared to enjoy their previous relationship with Ciphr, which allowed them to profit heavily from a demanding, but limited market. That relationship allowed Ciphr to absorb the legal liability while third parties cashed checks. Check cashing is still an option, but cashing checks now means a possible increase in legal liability. Obviously, Ciphrs biggest resellers arent on board with assuming additional legal risk.
Since theres no interest from downstream retailers in running their own device management systems, Ciphr could either sell directly to customers it has always tried to distance itself from or call it a day. It chose the latter option, which will likely end up being far less harmful to its profits than dealing with the outcome of raids, arrests, and criminal charges that may have been the end result of its continued existence.
And while it may be easy to cheer on the demise of another company that apparently catered to criminals, lets not forget every failure by device manufacturers like this one make it far easier for government entities to (falsely) claim secure devices and end-to-end encryption only benefit criminals. For that reason alone, we should be concerned about companies like these that shut down rather than offer products that could possibly fend off sustained attacks by state-sponsored hackers and make normal surveillance tools irrelevant.
Filed Under: criminals, encrypted phones, encryptionCompanies: ciphr