Category Archives: Encryption

EU Commission plans to end encryption and make Big Tech the gatekeeper – Andreas Vou – DiEM25

The European Commission is dressing up its latest attempt to end encryption under the guise of protection against child sexual abuse material.

The European Commission has proposed legislation that would essentially spell the end of personal privacy online and end-to-end encryption.

While dressed as a method to combat the proliferation of child sexual abuse material online, the proposal would hand tech giants like Meta and Apple access to users images and messages, opening the door for far wider reaching surveillance system.

Under the proposal, the Commission has outlined the requirement for private companies to scour their servers for abusive material and report them to relevant authorities. Not only would this leave massive room for error due to the magnitude of data that companies would have to sieve through, but also for wider abuses of privacy with access to all forms of communication.

Allowing any authority access to private communications should be deemed unacceptable but handing that ability to notoriously untrustworthy Big Tech companies is like letting the fox guard the henhouse.

Yet as preposterous as such an idea sounds, it can come as no surprise when looking at just how much influence Big Tech wields inside European institutions. Lobbying is legalised bribery and when it comes to this particular tactic, no sector does it quite like the tech giants.

Europes once proudly strong safeguards on data protection have been gradually eroded precisely by these companies, who have lobbied relentlessly to intrude further and further into the publics digital space.

This has resulted in a shift of power that now sees these tech giants sway the laws and regulations into their favour, prising power from EU states.

Apple, which will play a prominent role in assisting the EU in this latest proposal, being one of the two global mobile operating systems, has increased its lobbying expenditure by 900 percent in less than a decade. From 700,000 euros spent in 2013 on lobbying EU institutions, that figure reached 7 million in 2021. And from having zero lobbyists with European Parliament accreditation working on the companys causes in 2013, it now employs eight on a full-time basis.

It is no mere coincidence that this proposal eerily resembles the very plan that Apple sought to implement less than a year ago, before it was struck down due to privacy concerns.

Now it is back, rebranded, and with the support of the European Commission.

The desire from certain sections of European institutions to bring an end to encryption is nothing new. The blocs most powerful and influential states, France and Germany, jointly pushed for this under the guise of terrorism prevention in 2016, while an internal draft document from the Council of the European Union outlined plans to do the same on the back of the 2020 Vienna terrorist attack.

Before, it was due to counter-terrorism efforts, today it is to prevent child abuse, tomorrow it will be to combat Russian disinformation or COVID-19 sceptics. But no matter how it is dressed, it will always be to strip citizens of their right to digital privacy, as has long been the objective.

Like many of the Commissions proposals, what sounds like a well-intended plan on the surface is yet another ruse to further intrude on individual privacy.

Do you want to be informed of DiEM25's actions? Sign up here

Read the rest here:
EU Commission plans to end encryption and make Big Tech the gatekeeper - Andreas Vou - DiEM25

Introducing the Anonymous Internet Phone Booth, a Free Encrypted Video Calling Service by The Birdcalls Group. – PR Web

While we enjoy the sophistications that modern technology holds for us, The Birdcalls Group's Anonymous Internet Phone Booth reminds us that digital landscapes were meant for play as well.

MIDDLETOWN, Del. (PRWEB) July 30, 2022

Several months ago, the last phone booth in New York City was officially removed, as bystanders and nostalgia hunters looked on sadly. It was the end of an era for a city that, at one point, boasted over 22,000 of them over its five boroughs. And while many of us have cellphones; making it easy to connect with almost anyone in the world with the push of a couple of buttons, there is a certain sense of adventure and potential that will be sorely missed from stepping into a booth to make a private call.

However, The Birdcalls Group is helping restore some intrigue of these booths with the help of their digital offering; the Anonymous Internet Phone Booth. Like a step back in time (and into an eponymous booth) this digital portal combines old-world sentimentality with cutting-edge technology to allow users to make encrypted video calls to anyone in the world whenever they want, for free. Webcam-upgrading your call with a rigorous minimal knowledge architecture and peer-to-peer, end-to-end encryption means that users can enjoy the anonymity and privacy of an iconic phone booth in the comfort of their home, office, or even the palm of their hand. Its even got anti-screenshot technology, so you can rest assured that whatever happens in your booth, stays in your booth.

While we enjoy the sophistications that modern technology holds for us, The Birdcalls Group's Anonymous Internet Phone Booth reminds us that digital landscapes were meant for play as well. Whimsy, creativity, nostalgia, and gaiety are all essential parts of the creative online world, and by adapting the ways in which we communicate to hold both old traits and new, we don't run the risk of bulldozing history to make room for modernity. The internet, which is full of infinite possibilities, should be able to hold both at the same time.

Combining a classic red phone booth motif with green digital text and the familiar tones of a dial-up modem, the Anonymous Internet Phone Booth reminds us of the infinite possibilities that the internet holds for us, the countless connections we can make. All we have to do is pick up the phone and dial.

Share article on social media or email:

The rest is here:
Introducing the Anonymous Internet Phone Booth, a Free Encrypted Video Calling Service by The Birdcalls Group. - PR Web

Email Encryption Tool Market Analysis by Industry Perspective, Comprehensive Analysis, Growth and Forecast 2022-2028 – Digital Journal

Email Encryption Tool Market research involves the study of various factors affecting the industry, including market environment, competitive landscape, historical data, present trends in the market, technological innovation, upcoming technologies and the technical progress in related industry, and market risks, opportunities, market barriers, and challenges.

Email encryption refers to the authentication mechanism of encoding and disguising the contents of an email to protect it from unauthorized access. Email is an extremely vulnerable mode of communication that can be hacked over unsecured or public networks. Encryption is one of the primary data security solutions in the present times. It secures the contents of the email by making them unreadable as they get transferred over networks. The methodology primarily depends on cryptography wherein the user publishes a key to decrypt the message. Email encryption tool is essential for both organizations and individuals as it prevents the access of important and confidential data by unintended users.

Sample PDF showcases the content structure and the nature of the information included in the report which presents a qualitative and quantitative analysis https://www.theinsightpartners.com/sample/TIPRE00023699

Competitive Overview:

A few leading players in the Email Encryption Tool domain have also been profiled in the report. The profiling of the market players acquaints the reader with their financial information about revenues as well as segment revenues, a competitive SWOT analysis for each player and the recent developments by the player in the Email Encryption Tool domain. The key developments are related to the mergers and acquisitions by the players in the recent past.

Players Mentioned are

Broadcom, Inc.

Cisco Systems, Inc.

CyberRe (Micro Focus)

Egress Software Technologies Ltd.

Entrust Corporation

Mimecast Services limited

Proofpoint, Inc.

Sophos Ltd.

Trend Micro Incorporated

Zix Corporation

Scope of the Report

The research on the Email Encryption Tool market focuses on mining out valuable data on investment pockets, growth opportunities, and major market vendors to help clients understand their competitors methodologies. The research also segments the Email Encryption Tool market on the basis of end user, product type, application, and demography for the forecast period 20212028. Comprehensive analysis of critical aspects such as impacting factors and competitive landscape are showcased with the help of vital resources, such as charts, tables, and infographics.

The report provides a detailed overview of the industry including both qualitative and quantitative information. It provides overview and forecast of the global Email Encryption Tool market based on various segments. It also provides market size and forecast estimates from year 2017 to 2028 with respect to five major regions, namely; North America, Europe, Asia-Pacific (APAC), Middle East and Africa (MEA) and South America. The Email Encryption Tool market by each region is later sub-segmented by respective countries and segments. The report covers analysis and forecast of 18 countries globally along with current trend and opportunities prevailing in the region.

Click here to avail lucrative discounts on our latest reports. We offer student, enterprise, and special periodic discounts to our clientele. Please fill the inquiry form below to know more https://www.theinsightpartners.com/discount/TIPRE00023699

The Insight Partners Email Encryption Tool Market Research Report Scenario includes:

The report provides qualitative and quantitative trends of global Email Encryption Tool Market across type, type of products, service, and geography.

The report starts with the key takeaways (Chapter Two), highlighting the key trends and outlook of the global Email Encryption Tool Market.

Chapter Three provides the research methodology of the study.

Chapter Four further provides PEST analysis for each region.

Chapter Five highlights the key industry dynamics in the Email Encryption Tool Market, including factors that are driving the market, prevailing deterrent, potential opportunities as well as future trends. Impact analysis of these drivers and restraints is also covered in this section.

Chapter Six discusses the global Email Encryption Tool Market scenario, in terms of historical market revenues, and forecast till the year 2028.

Chapter Seven to ten discuss Email Encryption Tool Market segments by type, type of application, service, and geography across North America, Europe, Asia-Pacific, Middle East and Africa, South and Central America. They cover market revenue forecast, and factors driving and governing growth.

Chapter Eleven describes the industry landscape analysis. It provides detailed description of various business activities such as market initiatives, new developments, mergers and joint ventures globally along with a competitive landscape.

Chapter Twelve provides the detailed profiles of the key companies operating in the global Email Encryption Tool Market. The companies have been profiled on the basis of their key facts, business description, products and services, financial overview, SWOT analysis, and key developments.

Chapter Thirteen, i.e. the appendix is inclusive of a brief overview of the company, glossary of terms, contact information, and the disclaimer section.

Immediate delivery of our off-the-shelf reports and prebooking of upcoming studies, through flexible and convenient payment methods https://www.theinsightpartners.com/buy/TIPRE00023699

About Us:

The Insight Partners is a one stop industry research provider of actionable intelligence. We help our clients in getting solutions to their research requirements through our syndicated and consulting research services. We specialize in industries such as Semiconductor and Electronics, Aerospace and Defense, Automotive and Transportation, Biotechnology, Healthcare IT, Manufacturing and Construction, Medical Device, Technology, Media and Telecommunications, Chemicals and Materials.

Contact Us:

If you have any queries about this report or if you would like further information, please contact us:

Contact Person: Sameer Joshi

E-mail: [emailprotected]

Phone: +1-646-491-9876

See original here:
Email Encryption Tool Market Analysis by Industry Perspective, Comprehensive Analysis, Growth and Forecast 2022-2028 - Digital Journal

Optical Encryption Market Size, Scope, Growth Opportunities, Trends by Manufacturers And Forecast to 2029 This Is Ardee – This Is Ardee

New Jersey, United States This Optical Encryption Market research works as the best evaluation tool to track the progress of the industry and keep an eye on the competitors growth strategies. It further helps to keep you ahead of your business competitors. This report depicts a few potential problems and gives solutions to them by doing comprehensive research on the market scenario. Valuable information is provided here about a particular market segment according to product type, application, region type, and end user. By referring to this comprehensive Optical Encryption market analysis report, it becomes possible for organizations to monitor the efficiency of sales, determine the quality of services offered by competitors, estimate the competition level in the market and understand the communication channels followed by competitors in the market.

This Optical Encryption Market research report covers career outlooks, regional marketplaces, and an overview of the expectations of a number of end-use sectors. With the help of relevant market data, key organizations are able to obtain a competitive benefit over the competitors in the market and attain the best results for business growth. Furthermore, this Optical Encryption market analysis report emphasizes doing a comparison between several various geographical markets in key regions such as North America, Europe, Middle East, Africa, Latin America, and Asia Pacific. It aims at covering complex structures to classifications to an easy-to-follow overview of different business sectors.

Get Full PDF Sample Copy of Report: (Including Full TOC, List of Tables & Figures, Chart) @https://www.verifiedmarketresearch.com/download-sample/?rid=27147

Key Players Mentioned in the Optical Encryption Market Research Report:

ADVA Optical Networking SE, Ciena Corporation, ECI Telecom Ltd., Nokia Corporation, Huawei Technologies CO, Infinera Corporation, Microsemi Corporation, Acacia Communications, Arista Networks, Cisco System, Inc.

A massive amount of information presented in this Optical Encryption Market report helps business players to make beneficial decisions. Some of the major key aspects covered in this market analysis are key performance indicators, customer acquisition, and manufacturers list. Performance results of the marketing plan are also covered in this market analysis report. This market study report enables to bring the improvements required in the business. It further talks about how COVID-19 caused huge trauma in several major sectors. Key marketing channels, market growth opportunities, core marketing strategy, and current scope of the business are some of the major factors discussed in this report. It further briefs on the current position of the market. It depicts the effect of metrics on market trends, revenue, and leads.

Optical EncryptionMarket Segmentation:

Optical Encryption Market, By Encryption Layer

OTN-Layer 1 MACsec-Layer 2 IPsec-Layer 3

Optical Encryption Market, By Data Rate

Less than 10G Greater than 10G and less than 40G Greater than 40G and less than 100G Greater than 100G

Optical Encryption Market, By Vertical

Banking, financial services, and insurance (BFSI) Government Healthcare Data center and cloud Energy and utilities Others

Inquire for a Discount on this Premium Report@ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=27147

For Prepare TOC Our Analyst deep Researched the Following Things:

Report Overview:It includes major players of the Optical Encryption market covered in the research study, research scope, market segments by type, market segments by application, years considered for the research study, and objectives of the report.

Global Growth Trends:This section focuses on industry trends where market drivers and top market trends are shed light upon. It also provides growth rates of key producers operating in the Optical Encryption market. Furthermore, it offers production and capacity analysis where marketing pricing trends, capacity, production, and production value of the Optical Encryption market are discussed.

Market Share by Manufacturers:Here, the report provides details about revenue by manufacturers, production and capacity by manufacturers, price by manufacturers, expansion plans, mergers and acquisitions, and products, market entry dates, distribution, and market areas of key manufacturers.

Market Size by Type:This section concentrates on product type segments where production value market share, price, and production market share by product type are discussed.

Market Size by Application:Besides an overview of the Optical Encryption market by application, it gives a study on the consumption in the Optical Encryption market by application.

Production by Region:Here, the production value growth rate, production growth rate, import and export, and key players of each regional market are provided.

Consumption by Region:This section provides information on the consumption in each regional market studied in the report. The consumption is discussed on the basis of country, application, and product type.

Company Profiles:Almost all leading players of the Optical Encryption market are profiled in this section. The analysts have provided information about their recent developments in the Optical Encryption market, products, revenue, production, business, and company.

Market Forecast by Production:The production and production value forecasts included in this section are for the Optical Encryption market as well as for key regional markets.

Market Forecast by Consumption:The consumption and consumption value forecasts included in this section are for the Optical Encryption market as well as for key regional markets.

Value Chain and Sales Analysis:It deeply analyzes customers, distributors, sales channels, and value chain of the Optical Encryption market.

Key Findings:This section gives a quick look at the important findings of the research study.

For More Information or Query or Customization Before Buying, Visit @ https://www.verifiedmarketresearch.com/product/optical-encryption-market/

About Us: Verified Market Research

Verified Market Research is a leading Global Research and Consulting firm that has been providing advanced analytical research solutions, custom consulting and in-depth data analysis for 10+ years to individuals and companies alike that are looking for accurate, reliable and up to date research data and technical consulting. We offer insights into strategic and growth analyses, Data necessary to achieve corporate goals and help make critical revenue decisions.

Our research studies help our clients make superior data-driven decisions, understand market forecast, capitalize on future opportunities and optimize efficiency by working as their partner to deliver accurate and valuable information. The industries we cover span over a large spectrum including Technology, Chemicals, Manufacturing, Energy, Food and Beverages, Automotive, Robotics, Packaging, Construction, Mining & Gas. Etc.

We, at Verified Market Research, assist in understanding holistic market indicating factors and most current and future market trends. Our analysts, with their high expertise in data gathering and governance, utilize industry techniques to collate and examine data at all stages. They are trained to combine modern data collection techniques, superior research methodology, subject expertise and years of collective experience to produce informative and accurate research.

Having serviced over 5000+ clients, we have provided reliable market research services to more than 100 Global Fortune 500 companies such as Amazon, Dell, IBM, Shell, Exxon Mobil, General Electric, Siemens, Microsoft, Sony and Hitachi. We have co-consulted with some of the worlds leading consulting firms like McKinsey & Company, Boston Consulting Group, Bain and Company for custom research and consulting projects for businesses worldwide.

Contact us:

Mr. Edwyne Fernandes

Verified Market Research

US: +1 (650)-781-4080UK: +44 (753)-715-0008APAC: +61 (488)-85-9400US Toll-Free: +1 (800)-782-1768

Email: sales@verifiedmarketresearch.com

Website:- https://www.verifiedmarketresearch.com/

Original post:
Optical Encryption Market Size, Scope, Growth Opportunities, Trends by Manufacturers And Forecast to 2029 This Is Ardee - This Is Ardee

The 5 Best Cloud Storage Services of 2022 – How-To Geek

sdx15/Shutterstock.comWhat to Look For With Cloud Storage in 2022

In little more than 10 years, cloud storage has gone from something only used by businesses and the tech-savvy to something that millions of us rely on every day. As such, the number of available cloud storage services has increased exponentially while their prices have gone down.

Even so, finding the best value-for-money service is important. That isnt always about how much space you get, but that is often where we start when looking at storage plans. Unfortunately, it is difficult to know exactly how much storage space you might need until you actually start storing all of your files.

Most providers have a free storage plan to get you started, but it is still worth looking at how much the premium plans will cost if you ever need to upgrade. The average market price for 2 terabytes of cloud storage is around ten dollars a month, which is more than enough storage for almost everyone.

Almost all cloud storage services offerend-to-end encryption. This means that your files are encrypted during transfer as well as when they are in the cloud storage. Anyone intercepting them will only see scrambled data unless they have the encryption key.

In standard end-to-end storage, it is usually only you and the storage provider who has the key. Zero-knowledge encryption takes this a step further by taking the encryption key away from the provider so that only you can read your files. If you want the best possible data security, zero-knowledge storage is the way to go.

Microsoft, Apple, and Google all have their own cloud storage services, both free and premium. Only Google Drive has made it onto our list, mainly because it is less OS-dependent than the other two. However, if you use Windows and work in Microsoft Office, choosing OneDrive for your cloud storage is a viable option. Equally, if you use one or more Apple devices, upgrading to a premium plan with iCloud is a great option.

Both Box and Dropbox, two other huge names in cloud storage, are also missing from our list of the best. Both services are very good but are geared more toward businesses rather than individual usersas such, theyre worth considering if you need cloud storage for a company rather than for yourself.

All of our picks are, of course, solid cloud storage services. But each also offers something unique that makes it worth the recommendation.

Pros

Cons

IDrive is somewhat unique because it offers a mix of cloud storage and online backup, which are usually sold as separate services. It manages to do this at a price that is lower than many stand-alone cloud storage services without compromising too much on features.

IDrive offers a free plan that gives you 10GB of basic cloud storage space for those who want to try out the service. Beyond that, the premium plans are some of the cheapest around for the capacity they offer. The lowest-priced plan is IDrive Personal, which gives you a huge 5TB for less than $5/month for the first year.The only downside is that there isnt the option to pay monthly, so you need to foot the annual bill upfront.

File storage can be easily managed through the browser interface or in the desktop and mobile apps. When you install the desktop app, it creates a single folder called Sync. Everything you place in this folder is backed up to the cloud storage and is accessible from your other devices, making it easy to access important files from anywhere.

One of the most interesting features of IDrive is how it handles versioning. Most cloud storage will retain versions of your files for a set period of time, so you can recover or revert changes to files. IDrive does things differently, keeping up to 30 previous versions of edited files for an unlimited time. Those 30 previous file versions also dont count towards your storage quota, so you dont need to worry about filling up your space with multiple versions of the same file.

Your cloud-stored files and backed-up data are protected by end-to-end, 256-bit AES encryption. By default, the service isnt zero-knowledge, but you can choose to create a private key during setup. Doing this makes it zero-knowledge, but you sacrifice the option to easily share files. If you dont think you will need to share files, this wont be a problem.

Aside from the general file storage features, IDrive also gives you the tools to create and save a backup or a clone of your computers hard disk. If your drive fails, a clone allows you to quickly restore everything, including the operating system, onto a new drive.

It could be argued that IDrive is more about backups than it is about file storage, but we think the split between the two services is pretty even. It does lack the sharing and collaboration tools that most pure cloud storage services give you, but for data backup and storage, IDrive is brilliant.

Pros

Cons

Google Drive makes it onto this list over other well-known cloud storage providers for several reasons, starting with just how many people already have a Google account.The 15GB of free storage and excellent collaboration tools, especially for those who also useGoogle Workspace, are also compelling arguments for using it.

If 15GB of free storage isnt enough, there are several premium plans to upgrade to. They start with Basic, which gives you 100GB for just $2 a month and goes up to 30TB for $150 a month. In the middle, you have the 2TB plan, and while this isnt the best value at $8.33/month, it is comparable to similar storage plans from other providers.

One of the best features of Google Drive is the number of available add-ons. There are dozens of completely free tools that you can add, from file organization tools to collaboration and productivity aids.

If the people you collaborate with use Google Workspace tools such as Docs and Sheets, Google Drive becomes even more useful. You can easily share a document with someone, grant them editing permissions, and even work on the same document at the same time as someone else.

As you might expect, it also works well with all other Google products. If you have an Android phone, Drive is completely integrated and can be easily used to store backups of your phone system and data. There are also apps available for Windows, iOS, iPadOS, andMac, all of which are well designed and easy to use.

Where Google Drive fails slightly is in security and privacy. Although it features end-to-end encryption, there isnt zero-knowledge encryption. That means, at least from a technical standpoint, Google can access your data whenever it wants. And as Google doesnt have the very best reputation for respecting its users privacy, youll want to keep this in mind when using Drive.

Pros

Cons

Icedrive is the newest cloud storage service on this list, having only been around since 2019. In a market dominated by some very big and well-established names, it is all too easy to overlook the new players. That would be a mistake, though, as this innovative UK-based company has a brilliant cloud storage offering.

To start, Icedrive offers a free plan for personal use. This free plan gives you a respectable 10GB of cloud storage, with a 3GB daily bandwidth limit. You dont get the same client-side encryption that the premium plans have, but for less sensitive data, this free service is good. The three premium storage plans start at just $1.67 a month for 150GB, with the biggest 5TB plan running to $15/month.

One of the best features of Icedrive is how it gives you access to your stored files. As well as the easy-to-use apps for Android and iOSand the web application, it also offers some rather clever Windows desktop software.

This software lets you access your cloud-stored files as if they were in a drive mounted in your computer, so your cloud storage looks and behaves just as all the other storage does. Moving files to and from this virtual drive is as quick and smooth as it would be to move files from one folder to another on your PC.

Another unique selling point of Icedrive is how it encrypts your files. Rather than using the standard and widely-used AES encryption algorithm, it uses something called Twofish. Twofish is considered by many security experts to be as or more secure than AES encryption, and because it is not as widely used, is less likely to be targeted by hackers.

In addition, the encryption is zero-knowledge and end-to-end, so the encryption keys that are generated are only available to younot even Icedrive can access them.

Where Icedrives cloud storage is slightly lacking is in its sharing and collaboration features. There are a few, such as the ability to password-protect sharing links and set an expiration date. You can also create upload-only links to folders if you dont want someone to have full control over the contents. But one glaring omission is the lack of permissions for other users. That means you cant allow collaborators to edit files or folders in your storage.

If sharing and collaboration arent important to you, however, and you want secure and hassle-free cloud storage, Icedrive is a perfect choice.

Pros

Cons

Sync may not be as well known as some of the other names in cloud storage, but over the last few years, it has become increasingly popular. This is due to its extremely attractive mix of great value, strong security, and an impressive suite of features. As a pure cloud storage service, Sync is top-tier.

As with every cloud storage service in this list, Sync offers a free plan for anyone who needs a bit of basic storage or who wants to try out the service. For free, you get 5GB of storage space, 30 days of file versioning and recovery, and some limited sharing options such as the ability to create a few password-protected links. The premium solo plans start at $8/month for 2TB of storage and go up to $20/month for 6TB.

Sync has data security covered thanks to its use of zero-knowledge, end-to-end encryption. The strong security features continue over into the sharing options. You can create unlimited password-protected links, set download limits on shared files, and set expiration dates for shared links.

Along with the secure sharing features already mentioned, you can create centralized folders and set access permission by the user or folder. If a device that has access to the storage is lost or stolen, you have the option to remotely lock out connected devices. It also lets you remotely delete files that you have shared.

Sync does file syncing very well, with easy-to-use apps for iOS and Androidand a well-designed web interface. Most cloud storage works by storing files on your computer and in the cloud. Sync is no different, but if physical storage space on your computer is a concern, you can choose folders that only sync to certain devices. And unlike several other cloud storage services, there are no limits on file size and data transfer, making it a great choice if you regularly need to store large files.

In our testing, which involved uploading the same 1GB folder to all of the cloud storage services on this list, it wasnt the fastest at transferring data, but it certainly wasnt prohibitively slow. If you want a secure, useable, and good-value cloud storage service that doesnt try to be anything else, Sync ticks all the boxes.

Pros

Cons

MEGA makes the list for several reasons, but the main selling point is that it offers the largest amount of free storage space of any current cloud storage service. MEGAs free plan offers 20GB of storage before you need to upgrade, double the amount many services on this list give you.

MEGA also allows you to add more free storage space by completing certain actions such as installing themobile app for iOS or Androidor inviting friends to sign up. This bonus storage is only valid for a year, but if you have filled it up for the entire year, upgrading to a premium plan was in the cards anyway.

On that note, there are several premium plans to choose from. For individuals, these start at $5 a month for 400GB and go up to a huge 16TB for under $30 a month. You do have monthly data transfer limits on all of the premium plans, but they are fairly generous and are equal to the total size of the storage.

MEGA is another cloud storage service that uses end-to-end, zero-knowledge encryption. As long as you are careful with your account password, this is about as secure as consumer cloud storage can get. For added security, you can also enable Two-Factor Authentication (2FA) and save a recovery key that can be used to regain access if you forget your account password.

One of the most unique features of MEGA is the secure chat client it provides. In either the desktop, mobile, or web app, you can create a chat link. Only someone with that link can join, and all of the chat content is secure and encrypted, so it is completely private.

There is also a good selection of sharing options. Shared links are encrypted, and encryption keys can be sent separately for added security. You can also set passwords and expiration dates on links, or revoke access by changing the permissions after the link is sent.

MEGA does have a slightly troubled past, having been created by Kim Dotcom. He left the company in 2015, however, and no longer has any dealings with it. There are also some privacy concerns with the privacy policy stating that third parties can use your data. This is not really different from the sort of data companies like Google or Microsoft collect and use, but it is worth keeping in mind.

MEGA offers a very secure, fast, and good value service, and if you are looking for a large chunk of free cloud storage, it cant be beat.

Read more from the original source:
The 5 Best Cloud Storage Services of 2022 - How-To Geek

As map apps add more features, this startup aims to make navigation simpler – CNBCTV18

Google recently annnounced that it is adding more interactive features for Indian users. Earlier in the year, Google had announced Immersive View using which users can completely explore a landmark in select cities around the world. Apple too is constantly adding features to its native maps application to make it a more attractive prospect.

Against such a backdrop, a plucky startup is aiming to cut all the complications out of navigations to make it simpler for one to find their way around. If the app, Pataa, gains a large userbase, then gone will be the days when you have to explain directions to befuddled delivery executives despite having dropped a pin on your precise location.

Pataa Navigations is an Indore-based startup founded by Rajat and Mohit Jain. In November 2021, the startup claims to have raised seed funding to the tune of $2.1 million dollars from investors based in Dubai, the United States and India. So far, the app claims to have clocked 7 million active users

Also read:

How does it work?

The app available on Android, iOS and web browsers divides the the world into 3 square metre blocks, each with an unique code. All you have to do is drop a pin on your exact location, and you will be given a unique ID that has your complete address replete with navigation guidance.

Other features

Voice directions: Pataa claims to gives users the option of recording precixe directions to your address.

Landmark selection: Users can also select the nearest landmark from which they can select the best route to their address.

While these may not seem like revolutionary features, Kratika Jain, Pataa's Chief Operating Officer, says the app, in fact, cuts out at least five steps in one navigating to a location. Further, staring July, Jain says the company has opened up its Application Programming Interface (API) to e-commerce websites and other delivery platforms, wherein you would just need to enter your Pataa unique ID.

"We will give our clients, with the short code, access to your information, address, your geo-tagged location, so that when you place the order, a QR code can be added to the label. The delivery guy can just scan the code to get the benefit of the app's navigation system," she explains.

The directions then open on a browser and Bob's your uncle.

Jain makes sure to make the distinction between Pataa, and Google Maps and Apple Maps. "We are an addressing application, and not a navigation service. We only augment the maps apps," she says.

Each 3x3 block has unique GPS coordinates and the world is divided into 3 billion blocks. which means many truckloads of potentially uniquely identifiable data, which is stored with Pataa.

That brings up the very pertinent question how safe is my data? "We use 356-bit encryption," says Jain.

This is one of the most secure encryption methods after 128- and 192-bit encryption, and is used in most modern encryption algorithms, protocols and technologies. Hackers will need to make 2 to the power of 256 attempts to break this encryption, which is a number running into 77 digits virtually impossible, simply put.

For an startup that is just over two-years-old, the goal to disrupt the whole navigation ecosystem might be quite ambitious, but it has a long way to go, and the company knows it.

First Published:Jul 29, 2022, 04:29 PM IST

See more here:
As map apps add more features, this startup aims to make navigation simpler - CNBCTV18

Is Encryption Ethical?. In a world where data privacy is | by xyuon.tech | Jul, 2022 – Medium

In a world where data privacy is increasingly under threat, many people are turning to encryption to protect their information. But is encryption ethical? In this blog post, well explore the ethical implications of encryption and how it can be used responsibly.

Encryption is a technique used to protect data or communication from unauthorized access. It uses mathematical algorithms to transform the data into a form that is unreadable by anyone who does not have the decryption key. Data that has been encrypted is often referred to as ciphertext, while unencrypted data is called plaintext.

Encryption is used in a variety of applications, including email, file sharing, and secure communications. It is also used to protect sensitive data, such as medical records and financial information.

There are many benefits to using encryption. Firstly, it helps to ensure the privacy of communications and data. Secondly, it can help to prevent data breaches, as encrypted data is much more difficult to steal or tamper with. Finally, encryption can also be used to create a chain of trust, as encrypted data can be verified and authenticated.

Encryption is a powerful tool and it is important to understand how this whole thing works and how it can be used to benefit you as a person.

The widespread use of encryption is a hotly debated topic, particularly when it comes to government agencies and law enforcement. On one side, some argue that encryption is a vital tool for protecting the privacy of citizens. On the other side, people argue that encryption can be used by criminals and terrorists to hide their activities from the authorities.

So what are the ethical concerns of encryption? Is it a tool that should be used to protect the privacy of citizens, or is it a tool that can be used by criminals and terrorists to hide their activities from the authorities? The answer is not clear, but what is clear is that encryption is a powerful tool that can be used for both good and bad. As we continue to use and develop encryption, we will need to be mindful of both its potential benefits and its potential risks.

In light of the recent data breaches and security vulnerabilities that have been exposed, many people are wondering if we should be encrypting everything. After all, if our data is secure, it cant be stolen or used against us, right? Wrong, encryption is not a perfect solution. It can be expensive and time-consuming to encrypt large amounts of data, and there is always the possibility that someone will figure out how to break the encryption. Additionally, encryption can make it more difficult to share data with others, as they may not be able to access the data if they dont have the right key.

Ultimately, the decision of whether or not to encrypt your data is up to you. There are pros and cons to both sides, and youll need to weigh those carefully before making a decision.

If you enjoyed the article, please give me a follow.

Read more:
Is Encryption Ethical?. In a world where data privacy is | by xyuon.tech | Jul, 2022 - Medium

How Conti ransomware hacked and encrypted the Costa Rican government – BleepingComputer

Details have emerged on how the Conti ransomware gang breached the Costa Rican government, showing the attack's precision and the speed of moving from initial access to the final stage of encrypting devices.

This is the last attack from the Conti ransomware operation before the group transitioned to a different form of organization that relies on multiple cells working with other gangs.

The Conti ransomware operation launched in 2020 to replace Ryuk and quickly grew to infamy after attacking victims in both the private and the public sector, includinglocal governmentsin the U.S.,schools, andnational healthcaresystems.

On April 11, 2022, Conti began their last incursion under this brand after gaining initial access to the Costa Rica governments network and engaging in reconnaissance activity.

A report from cyber intelligence company Advanced Intelligence (AdvIntel) details the Russian hackers steps from initial foothold to exfiltrating 672GB of data on April 15 and executing the ransomware.

The threat actor entry point was a system belonging to Costa Ricas Ministry of Finance, to which a member of the group referred to as MemberX gained access over a VPN connection using compromised credentials.

Advanced Intelligence CEO Vitali Kremez told BleepingComputer that the compromised credentials were obtained from malware installed on the initial device compromised on the victim network.

More than 10 Cobalt Strike beacon sessions were set up in the early stages of the attack, AdvIntel researchers say in the report.

The infection followed a typical attack flow wherein the adversaries gained access from the compromised VPN log by installing a crypted form of Cobalt Strike inside the Costa Rica sub-network -AdvIntel

After gaining local network domain administrator access, the intruder used the Nltest command-line tool to enumerate domain trust relationships. Next, they scanned the network for file shares using ShareFinder and AdFind utilities.

AdvIntels details on the threat actors activity on the Costa Rica governments network include the specific commands used at each step.

According to the researchers, MemberX then used the Cobalt Strike backdoor channel to download the fileshare output to a local machine.

The attacker was able to access administrative shares where they uploaded a Cobalt Strike DLL beacon and then ran it using the PsExec tool for remote file execution.

Using the Mimikatz post-exploitation tool for exfiltrating credentials, the adversary collected the logon passwords and NTDS hashes for the local users, thus getting plaintext and bruteable local admin, domain and enterprise administrator hashes.

The researchers say that Conti operators leveraged Mimikatz to run aDCSyncandZerologonattack that gave them access to every host on Costa Ricas interconnected networks.

To make sure that they dont lose access in case defenders detect the Cobalt Strike beacons, Conti planted the Atera remote access tool on hosts with less user activity where they had administrative privileges.

The adversaries pinged the whole network and re-scanned the network domain trusts, leveraging enterprise administrator credentials with ShareFinder and compiling a list of all corporate assets and databases available under their new elevated privileges -AdvIntel

Stealing the data was possible using the Rclone command-line program that can manage files on multiple cloud storage services. Conti used this to upload data to the MEGA file hosting service.

A diagram of the attack flow:

According to a note on the Conti leak site, the ransom demand was initially $10 million and then increased to $20 million when Costa Rica refused to pay.

However, AdvIntel researcherssaythat internal communication between Conti members showed that the price was far below $1 million USD.

AdvIntel notes that Contis attack on the Costa Rican government was relatively unsophisticated and that a flat network designed combined with misconfigured administrative shares helped the attacker move to domain trusts.

Following this crippling attack, Costa Rica was forced on May 8 todeclare a national emergencyas the intrusion had extended to multiple government bodies, with some agencies resuming activity in early June.

About 10 days later, Conti leaders started toshut down the operationby taking offline part of the infrastructure offline and announcing that the brand no longer existed.

The final step happened in late June whenConti shut downall the sites used for negotiating ransoms with victims and took offline the data leak site.

However, the cybercriminal syndicate lives on, under a different organization where its members dispersed into other ransomware operations (Quantum, Hive, AvosLocker, BlackCat, Hello Kitty).

Other operations also in the extortion business, minus the file encryption part, that are also linked to Conti areKarakurt,BlackByte, and theBazarcall collective.

See the original post here:
How Conti ransomware hacked and encrypted the Costa Rican government - BleepingComputer

Why financial institutions cant bank on encryption – Global Banking And Finance Review

Simon Mullis, Chief Technology Officer at Venari Security

The past few years have seen a marked increase in geo-political tensions and emerging cyberattacks, keeping security teams on their toes. One of the most significant security threats however, is already hiding in plain sight remaining undetected within encrypted traffic. A major target for these attacks is the UKs Critical National Infrastructure (CNI), and defending against them should be an urgent priority for the finance industry.

The National Cyber Security Centres UK CNI comprise of 13 sectors the essential systems, processes, people and information needed for the countrys infrastructure. Importantly, the loss or compromise of each organisation could result in damaging and extensive impacts to the economy or to society. Although the first essential systems that come to mind may be power grids or water supplies, the finance sector also includes many organisations which provide essential services. Whether it be cash withdrawals and deposits, digital wire transfers, loan applications or investments, they are all relied on daily and must be treated in the same way. This results in a real responsibility for banks and financial institutions to ensure their systems are secure, with equally real consequences for failing to do so.

If attacks on CNI are only increasing, what does this mean for financial institutions, and more importantly, how can they ensure they are guarding against them? Lets consider the risks cyberattacks pose to CNI, as well as the actions the finance sector can take to protect its customers, their data, and financial assets.

The cybersecurity risks to CNI

One of the most recent high-profile CNI attacks that the finance industry must analyse and ensure is guarding against is the Colonial Pipeline ransomware incident, which took place in May 2021. The pipeline operator reported that a cyberattack had forced the company to temporarily shut down all business functions.

What is particularly significant about this attack is that it was simply an exposed username/password that allowed the attackers to gain access. Once in, their activity was end-to-end encrypted just like all the other traffic. Vast swathes of the US were affected with 45% of the East Coasts fuel operations halted as a result.

In this case, despite the organisation protecting its data with strong encryption standards, attackers were able to enter the network through a legitimate, encrypted path and thus rendered many of the counter measures ineffective. With the operators unaware of any anomalous activity on their networks, the intruders had all the time they needed to assess the system and get organised.

This presents a dilemma for CNI sectors, especially finance, where interactions and operations have to be encrypted.

Encryption is no longer enough

As happened in the Colonial Pipeline incident, the use of end-to-end encryption enabled attackers to conceal themselves in legitimate traffic. While critical to support data privacy and security in the event of breaches, end-to-end encryption renders many established means of detection ineffective.

Most defence methods still rely heavily on decryption and relatively rudimentary analysis to detect when traffic might be known-bad or deviating from expected patterns. The volume and speed of encrypted data now passing across networks means that it is impossible to detect everything with processes and techniques requiring this type of inspection.

And indeed, this is not a cutting-edge approach by cybercriminals. In the first three quarters of 2021 alone, threats over encrypted channels increased by 314% on the previous year. If organisations continue to use the same inadequate detection techniques to uncover malicious activity on their network, the rate of attacks using encrypted traffic will continue to grow at this rate or higher.

The security industry has long understood that breaches are not if, but when scenarios. And the current global climate, sparking a rise in nation-state attacks, undoubtedly increases the threat level further for CNI and especially for sensitive sectors such as finance.

Going beyond decryption to gain visibility

Financial institutions must strike a careful balance when it comes to security. On the one hand, it is vital they gain back visibility of their networks that end-to-end encryption might be at risk of concealing; on the other, its a necessity that they maintain a level of encryption in the first place.

Decryption is a too cumbersome and time-consuming approach now that our entire networks are encrypted both data-at-rest and in motion and organisations can only hope to keep up if they monitor for aberrant behaviour and malicious activity in their traffic without having to rely on decryption.

The solution? Security teams need to look towards using behavioural analytics to detect what is happening within encrypted traffic flows. A combination of machine learning and artificial intelligence, behavioural analytics can analyse encrypted traffic in near real-time without decryption. By accurately understanding the abnormalities between normal and anomalous behaviour, it significantly increases the rate and speed at which malicious activity concealed in encrypted traffic can be detected, whilst ensuring data remains private.

Security teams can then react immediately to contain the threats it identifies rather than responding after the fact, when banks might only realise that an attack has taken place after a customer has experienced a breach.

Not a threat, but a reality

As the geo-political landscape becomes more treacherous, and society, even more interconnected, critical infrastructure attacks will only increase, with financial services a major target.

Security teams can no longer bury their head in the sand, as these attacks may not be a looming threat, but an existing issue, hidden by the very encryption theyve relied on. Acting now is key, otherwise the risks posed by an attacker will only increase.

Continue reading here:
Why financial institutions cant bank on encryption - Global Banking And Finance Review

Can Encryption Key Intercepts Solve The Ransomware Epidemic? – SecurityWeek

California-based Nubeva is building technology to recover encrypted data without making ransomware payments

A San Jose, Calif-based ransomware data recovery firm has announced the successful recovery of encrypted data without requiring any ransom payment. The firm takes a novel approach: it intercepts the encryption process and extracts the keys used by the ransomware. With these, it can recover data without recourse to paying the ransom.

Privately owned Nubeva Technologies gave two examples in June 2022. SecurityWeek talked to CMO Steve Perkins. The first victim was a firm in the architectural, engineering and construction (AEC) sector that had been hit by a new version of REvil. This firm had been ransomed three times in the last few years before it turned to Nubeva. The second firm was an insurance processing firm in the healthcare sector, and was not a customer of Nubeva when its files were encrypted.

The Nubeva solution involves a small agent that operates in the background on each endpoint and server. Using patented technology that the firm calls session key intercept (ski), the process is automatically initiated at the first sign of anomalous or mass encryption. Ski listens in real time to the encryption process and extracts the encryption keys. It stores them in a secret location on the system, with copies in the customers cloud account.

Literally within 48 hours we provide a decryptor. Its usually shorter than that, if we have a decryptor. If its something new and we dont have a decryptor, well build one. Forty-eight hours is our SLA, and youre decrypting on the spot.

In practice, it is not an instant decryption that would likely rebuild files onto an infected system. There must be an intervening forensics stage where an incident response team assesses the systems to ensure that recovery goes to clean computers. Nubeva helps here. It has collected, time-stamped, and stored all the encryption processes. It can give the forensics team a complete fingerprint of the extent of the damage from ground zero which would normally take days to assess manually.

Many companies decide to pay a ransom because they believe it will be the quickest way to recover operations and avoid a lengthy downtime. But this process still involves the time it takes to negotiate with the attackers, obtain the decryptor, and start the rebuild. This period will normally take the best part of three weeks, and there is no guarantee that the decryption will work. Nubeva can dramatically shorten the downtime without paying the ransom, and can recover the files efficiently.

In this instance, the victim was able to recover its data files despite being attacked by REvil, and without paying the ransom.

Some companies decline to pay a ransom because of their own backups. If youve got a simple backup, said Perkins, just do it. The problem is that over 50% of the time people still end up paying a ransom because their backups have been corrupted. And all the time, the downtime clock is ticking.

This problem with backups was illustrated in the second recovery example given by Nubeva. This victim had a good backup process in place when the ransomware struck, but no relationship with Nubeva. The attackers had been resident in the network for several weeks, and the incident response firm warned the victim it would have to restore from backup to a state at least four weeks prior to the encryption to be sure of eliminating the original infection.

This was unacceptable. The company is a healthcare insurance transaction processing firm. All transactions undertaken during the roll back would be lost, and could only be recovered by submitting duplicate transactions leaving the firm open to charges of fraud. The only alternative would be to lose millions of dollars and all track of accounting during the period. The firm told the incident responders that it had to restore to no earlier than the day before the encryption.

The incident response team called in Nubeva, which was installed ahead of the backup recovery. The recovery process to the day prior to encryption was undertaken; and as expected, the infection was reintroduced. This time, however, Nubeva caught the encryption keys and gave the responders the infection process fingerprint. As a result, the systems could be rapidly cleaned, and the data restored again through the keys captured by Nubeva.

Nubeva does not consider itself to be a traditional ransomware prevention product. It is a data recovery product. It does not detect ransomware, nor does it prevent ransomware. There are many other products that promise to do this with varying degrees of success and failure. Nubeva is a data recovery tool for ransomware-encrypted data. It acts like a safety-net for when ransomware succeeds, as it so often does. Nubeva captures the encryption keys, and in conjunction with a forensic response team can restore encrypted data back onto clean systems. It does this in a shorter time than it would take to pay and restore, but without having to pay.

Related: Study Finds Eighty Percent of Ransomware Victims Attacked Again

Related: New Malware Samples Indicate Return of REvil Ransomware

Related: The Psychology of Ransomware Response

Related: SecurityWeek Cyber Insights 2022: Ransomware

Originally posted here:
Can Encryption Key Intercepts Solve The Ransomware Epidemic? - SecurityWeek