Category Archives: Encryption
How to Encrypt USB Flash Drive in Windows 10 – BollyInside
This tutorial is about the How to Encrypt USB Flash Drive in Windows 10. We will try our best so that you understand this guide. I hope you like this blog How to Encrypt USB Flash Drive in Windows 10. If your answer is yes then please do share after reading this.
A USB drive is a portable device that offers a convenient way to store and/or transfer your data, although it can present several security risks. Fortunately, you can encrypt a USB drive and protect your sensitive files and data as they move between different locations. You should be aware that encryption does not protect your data and files from password snooping methods and password harvesting malware. It is simply a way to prevent your sensitive and confidential files and data from falling into the wrong hands or being accessed by unauthorized persons through security incidents and data breaches. Flash drives and SD cards are useful tools for data transfer.
However, convenience and portability come with a security risk. This is where encryption becomes valuable, and BitLocker in Windows 10 makes it easy. Also, Windows 10 version 1151 has a new and improved encryption algorithm. Passionate about all things Windows and combined with his innate curiosity, Ivan has deepened his understanding of this operating system, specializing in drivers and driver troubleshooting.
BitLocker in Windows 10 version 1511 (November Update) now includes XTS-AES 256-bit encryption mode, which provides additional integrity support with the improved algorithm. However, it is not available in earlier versions of Windows.
You must choose which method you want to use. So if you only want to use that drive on the PC youre encrypting it on, youll probably want to use the new encryption mode. However, if you need to use the drive on other PCs running older versions of Windows (which is probably the case with a flash drive or SD card), choose the compatible mode, which uses the older 128-bit AES. Now you can start encrypting the drive.
Runtime depends on your system specifications, amount of data, and drive size. Now when you plug in the encrypted drive, you will be prompted to enter the password you created for it. You can also select other options and have the drive automatically unlocked on this PC or enter the recovery key if you forgot your password. You can tell if a drive is encrypted by the lock symbol when you open This PC. Thats all about it. Now the data on your flash drive is much safer.
I hope you understand this article How to Encrypt USB Flash Drive in Windows 10, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.
Go here to see the original:
How to Encrypt USB Flash Drive in Windows 10 - BollyInside
WhatsApp Ban in Dubai [What You Need to Know in 2022] – Cloudwards
Does WhatsApp work in Dubai? Well, not entirely. You can send and receive WhatsApp messages, but you cant make video and voice calls. Considering that WhatsApp is the worlds most popular messaging app, the WhatsApp ban in Dubai can be frustrating. Even worse, theres no clear indication from the United Arab Emirates (UAE) government whether the ban will be lifted.
Fortunately, virtual private networks (VPNs) are excellent workarounds, as they allow you to use the internet anonymously. In this guide, well show you the best VPNs to unblock WhatsApp calling in Dubai. If you want a quick answer; we recommend ExpressVPN.
You can send WhatsApp text messages in Dubai, but you cant make video or voice calls.
Because WhatsApp is blocked, your voice and video calls wont go through; however, you can send and receive texts.
WhatsApps end-to-end encryption features prevent the UAE government from monitoring calls. In addition, the government wants to promote its own telecommunications industry.
VoIP apps BOTIM, CMe and ToTok work in Dubai.
For years, the UAEs Telecommunications Regulatory Authority (TRA) has banned WhatsApp calls. While authorities have not officially explained the reasons behind the restriction, its obvious that WhatsApps end-to-end encryption is a stumbling block to the governments desire to monitor internet calls.
Internet users have been calling for the UAE government to unban WhatsApp. Sadly, the bright spots have been few and far between. For instance, authorities temporarily lifted the ban during Expo 2020, Dubais worlds fair, only to shut down the app afterwards.
In 2019, during an interview with CNBC, the director of UAEs National Electronic Security Authority hinted that the ban might soon be lifted, pointing to increased collaboration with WhatsApp. However, three years on, WhatsApp is still banned.
As mentioned earlier, the UAE government has banned WhatsApp calling and other Voice over Internet Protocol (VoIP) calls because of privacy and national security reasons. However, thats just the tip of the iceberg.
At the heart of these bans is a desire to control the telecommunications sector in the country and rake in more profits. Thats why UAE authorities drive people to use the homegrown BOTIM app.
A VPN can unblock WhatsApp calling because it can spoof your location by routing your traffic through a server in another country. That way, you can bypass geoblocks and make calls anonymously.
Unblocking WhatsApp in Dubai is not difficult. All you need to do is to choose a good VPN, install it and connect to a nearby server. Heres an example.
Open your app store (Google Play Store or Apple Store) and download a VPN. For this example, well use ExpressVPN on Android. Click the install tab and it should download and install on your phone in a few minutes.
Open the VPN app and connect to a VPN server. Look for a server in a country where WhatsApp is not banned and connect to one nearest to you, because a nearby server will give you faster connection speeds.
Now, you can open your WhatsApp and start making calls.
When choosing a VPN to unblock WhatsApp, look for ones that offer fast speeds, server locations near the UAE and solid security features. Here are our top picks.
ExpressVPN is the best VPN for unbanning WhatsApp.
ExpressVPN is the best VPN for unblocking WhatsApp in Dubai, mainly because its lightning-fast. For VPNs, the closer the server, the faster your browsing speed. Of its over 3,000 servers in 94 countries, ExpressVPN has a few in countries close to Dubai, including Pakistan, Israel, Egypt and India.
Further, ExpressVPN comes with military-grade AES-256 encryption, DNS leak protection and obfuscated servers, which ensure that the UAE government cant detect and monitor your traffic. ExpressVPNs main drawback is that its pricey, but theres a 30-day money-back guarantee to test it out. If youre looking for a cheaper option, consider NordVPN or Windscribe.
NordVPN can help you bypass Dubais WhatsApp ban.
With 5,200 servers in 60 countries, NordVPN is also a good choice for using WhatsApp in Dubai. It has servers in nearby countries such as Turkey, Israel and India. In addition, NordVPNs obfuscated servers make it an excellent choice if you want fast, anonymous browsing. Because such servers conceal the fact that youre using a VPN, theyre perfect for heavily censored areas like Dubai.
Whats more, NordVPN offers features including double VPN and onion over VPN that provide extra layers of security. However, we wouldnt really recommend it to new VPN users, since all those advanced features can be confusing to use. Thankfully, NordVPN is a bit more affordable than ExpressVPN if you subscribe to one of its long-term plans.
Windscribe is a free VPN for unblocking WhatsApp in Dubai.
Windscribe also has servers in countries close to the UAE, including Israel and Turkey. However, Windscribe makes this list because of its encapsulated protocols, named Stealth and WStunnel. While using them can slow down your internet connection, theyre helpful because they hide the fact that youre using a VPN from prying government servers.
Its worth noting that Windscribes claim to fame is that it has one of the most generous free plans. Its one of the few free VPNs that we wholeheartedly recommend, so if youre on a tight budget, its worth a try.
Build a Plan
Pro Plan
If you want to use WhatsApp in Dubai, youll need a VPN, because WhatsApp calls are banned there. For our money, ExpressVPN is the best, thanks to its extensive server network and reliability. However, you can also use cheaper alternatives like NordVPN and Windscribe.
Have you ever tried getting past the WhatsApp ban in Dubai? Which VPN worked best? Share your thoughts with us in the comments section below, and as always, thanks for reading!
Let us know if you liked the post. Thats the only way we can improve.
YesNo
Original post:
WhatsApp Ban in Dubai [What You Need to Know in 2022] - Cloudwards
Key Senators Have Voted For The Anti-Encryption EARN IT Act – EFF
Earlier today, the Senate Judiciary Committee voted to advance the dangerous EARN IT bill. Were disappointed to see the committee advance this misguided bill. If enacted, EARN IT will put massive legal pressure on internet companies both large and small to stop using encryption and instead scan all user messages, photos, and files.
The bill could now be voted on by the full Senate at any time, or worse, included as part of a different must-pass legislative package. We need you to contact your representatives in Congress today to tell them to vote against this bill.
TAKE ACTION
TELL CONGRESS TO REJECT THE EARN IT ACT
We have expanded our action tool to contact both Senators and members of the House of Representatives. If you have already taken our action to contact your Senators, please take it again to make sure you contact lawmakers in both houses.
The bill sponsors have falsely stated that the EARN IT Act is needed to protect children. But the kind of abusive images theyre concerned about are already highly illegal under federal law. Any internet platforms that knows about child sexual abuse material (CSAM) being distributed or received are required to take action on it, and can be prosecuted if they do not.
EARN IT will allow states to lower the legal standard required for prosecutions over CSAM, and it will let the use of encryption be evidence in lawsuits and criminal trials. The overt goal of EARN IT is to pressure internet companies to start doing widespread scanning of user messages and photos. This scanning is incompatible with strong encryption.
The harms will fall on the most vulnerable people. Once we allow encryption to be compromised to scan for CSAM,, authoritarian regimes will demand the same capabilities to track information shared by activists and journalists. People subject to domestic abuse, including children, wont have secure channels of communication to report and reach out for trusted help.
Were glad to see that several senators echoed concerns raised by human rights groups throughout the U.S. and the world. They suggested they might not support the bill if it doesnt strike a proper balance between fighting crimes against children, and user rights to privacy and encryption.
But the current bill does not strike a balance because there isnt one to strike. The sponsors of the bill have made it clear they want to surveil user messages, and have even distributed literature suggesting which software they prefer be used.
EARN IT threatens to punish companies that dont start following a specific list of law enforcement demands. Among them: start scanning messages. End-to-end encryption is simply not compatible with the type of surveillance that states will demand, and that the bills sponsors have explicitly suggested. Just this week, bill sponsor Sen. Richard Blumenthal told The Washington Post that he rejected the idea of creating a broad exemption in the bill for the use of encryption, because he didnt want encryption to be a get out of jail free card.
We can still stop this bill if theres enough public pushback. We all have a right to privacy, and to use encrypted services to protect our privacy. Dont let Congress take that away.
TAKE ACTION
TELL CONGRESS TO REJECT THE EARN IT ACT
Here is the original post:
Key Senators Have Voted For The Anti-Encryption EARN IT Act - EFF
Whats the Best Wi-Fi Encryption to Use in 2022? – How-To Geek
Vladimir Sukhachev/Shutterstock.com
Wi-Fi encryption standards change over time as new ones are developed and older ones become insecure and obsolete. Heres a look at the best encryption you should be using to secure your Wi-Fi router in 2022.
As of February 2022, the best Wi-Fi security standard is called Wi-Fi Protected Access Version 3, or WPA3 for short. Introduced in 2018 by the Wi-Fi Alliance, there are several variations of the WPA3 standard:
For home Wi-Fi users, the best choice is WPA3-Personal, since it wont require a deep knowledge of wireless security to configure properly. If youre running a business or organization with high data security needs, consult IT experts that can help you set up WPA3-Enterprise wherever possible.
The Wi-Fi Alliance also promotes a standard called Wi-Fi Enhanced Open that seamlessly applies a low-level of encryption (called OWE) to open Wi-Fi access spots (those that dont require a password). However, OWE has already been compromised by researchers. Even if it had not been compromised, we do not recommend running an open Wi-Fi access point.
RELATED: What Is WPA3, and When Will I Get It On My Wi-Fi?
Since WPA3 is still moderately new, you may own some older devices that dont support connecting to a router configured to use WPA3 encryption. Or maybe your router doesnt support it either. If thats the case, you have several options:
$327.99 $349.99 Save 6%
$113.53 $149.99 Save 24%
$399.99 $449.99 Save 11%
$219.00 $299.00 Save 27%
$365.00$499.99 Save 27%
Now that youve read about the best Wi-Fi encryption, weve created a rogues gallery of obsolete and insecure wireless security standards to avoid. There are more out there, but these are the most prominent ones:
To check or change your router or access points Wi-Fi security settings, youll need to log in to the devices configuration interface. Most devices allow you to connect through a special local web address in a browser (such as 192.168.0.01), and others also allow you to configure them through a smartphone app. Check your routers documentation to find out how to do this.
Once youre logged in, look for labels like Wireless Security, Wireless Configuration, Security Level, SSID Setup, or something similar. Click it, and youll likely see a drop-down menu where you can choose the encryption method used on your router.
After choosing the strongest encryption your router supports, apply the changes and restart your router. When your router or access point starts up again, youre ready to go.
If your router doesnt support WPA2, you definitely need to upgrade to a new router immediately. If it doesnt support WPA3, its time to strongly consider an upgrade as well. Stay safe out there!
RELATED: How to Access Your Router If You Forget the Password
See the original post:
Whats the Best Wi-Fi Encryption to Use in 2022? - How-To Geek
Thales Expands Relationship with Google Cloud to Increase Customer Trust in the Cloud – Business Wire
PARIS LA DFENSE--(BUSINESS WIRE)--Building on the two companies long standing partnership, Thales and Google Cloud are now working together to strengthen data security for customers migrating their workloads to the cloud. The Thales and Google Cloud solution enables Ubiquitous Data Encryption, a unified offering that provides complete control over data at-rest, in-use, and in-transit with comprehensive centralized key control owned and managed by the customer. It leverages the combined power of Google Clouds Confidential Computing, a breakthrough technology that encrypts data in-use while it is being processed, and Thaless CipherTrust Cloud Key Manager, to create and manage their encryption keys in Google Cloud.
Increasing trust in the cloud
According to the 2021 Thales Data Threat Report, more than half (51%) of all organisations surveyed are shifting their workloads and data to the public cloud, making data security and control even more important. The integrated Thales and Google Cloud solution ensures that data at-rest, in-transit and now data in-use cannot be accessed via the cloud service provider, offering confidentiality of the customers data.
As a result of Google Clouds Ubiquitous Data Encryption, organisations now have a way for highly-sensitive data to be used in GCP. This is achieved by only granting access to data usage via a confidential Virtual Machine (VM) with encryption keys hosted outside of GCP, and key management handled via an external cloud key manager, like CipherTrust.
To facilitate the future of secure data transfer, we must be able to put control entirely in the hands of the customer. Google Clouds Ubiquitous Data Encryption allows the end user to reduce the amount of implicit trust involved in data storage and transfer. By bringing in a trusted third-party platform like Thaless CipherTrust Data Security Platform, we can provide our customers with the data security solution they need to seamlessly encrypt and decrypt their sensitive and proprietary information, said Nelly Porter, Group Project Manager, Cloud Security at Google.
Ensuring strong key management
The integrated solution leverages Thaless CipherTrust Cloud Key Manager to allow users to create encryption keys and establish rules for wrapping and unwrapping each key, providing support for several specific confidential computing use cases.
Since 2017, we have been working together with Google Cloud to make it possible for enterprises to put their trust in the cloud with more sovereign control over their data security. Recently, we have announced in France the co-development a trusted cloud that will also rely on our CipherTrust solutions. Our support of Google Clouds Ubiquitous Data Encryption is another indication of our shared vision to deliver organisations around the globe with solutions that allow them to securely control and manage their data no matter where it resides, said Todd Moore, VP Encryption Products at Thales.
Increasing customer control
Thaless CipherTrust Data Security Platform allows the end user to maintain strong ownership of their data on-premises and in the cloud, as well as when moving sensitive workflows and data to the cloud. The new, integrated solution for GCP represents a new use case for Hold Your Own Key (HYOK), stemming from Thaless extensive experience building HYOK solutions for customers migrating their workloads to the public cloud.
Google Cloud customers using the Confidential VMs powered by AMD EPYC processors can encrypt data in use using the advanced security feature, Secure Encrypted Virtualization, which is available on AMD EPYC CPUs. With confidential computing, customers can be confident that their data will stay private and encrypted even while being processed.
Confidential Computing addresses key security concerns many organizations have today in migrating their sensitive applications to public cloud. Google Confidential VMs, powered by AMD EPYC processors and using its Secure Encrypted Virtualization (SEV) feature, enables protection thats transparent from applications, helping customers safeguard their most valuable information while in-use by applications in the public cloud, added Raghu Nambiar, corporate vice president, Data Center Ecosystems and Solutions, AMD.
Additional information
About Thales
Thales (Euronext Paris: HO) is a global leader in advanced technologies, investing in digital and deep tech innovations connectivity, big data, artificial intelligence, cybersecurity and quantum computing to build a confident future crucial for the development of our societies. The Group provides its customers businesses, organisations and governments in the defense, aeronautics, space, transport, and digital identity and security domains with solutions, services and products that help them fulfil their critical role, consideration for the individual being the driving force behind all decisions.
Thales has 81,000 employees in 68 countries. In 2020 the Group generated sales of 17 billion.
PLEASE VISIT
Thales Group Security
See the original post here:
Thales Expands Relationship with Google Cloud to Increase Customer Trust in the Cloud - Business Wire
How to turn on End-to-End Encryption on Zoom – BollyInside
This tutorial is about the How to turn on End-to-End Encryption on Zoom. We will try our best so that you understand this guide. I hope you like this blog How to turn on End-to-End Encryption on Zoom. If your answer is yes then please do share after reading this.
The growing popularity of Zoom video conferencing software can safely be described as a meteoric rise. In a matter of weeks, it went from being a go-to app for virtual meetings, family reunions, and even social events. However, after the boom in new users, the company admitted that its privacy and security standards have not lived up to expectations.
It now addresses this issue by introducing end-to-end encryption, ensuring that no one but the participants (not even Zoom itself) has access to a meeting. In typical meetings, the Zoom cloud generates encryption keys and distributes them to meeting participants via Zoom apps when they join. With Zoom E2EE, the meeting host generates encryption keys and uses public key cryptography to distribute those keys to other meeting participants.
Zooms servers become blind relays, never seeing the encryption keys needed to decrypt meeting content. You probably already use end-to-end encryption in one way or another. Its enabled by default for iMessage and WhatsApp, a staple of encrypted messaging platforms like Signal, and an optional feature on Facebook Messenger. For video chats, your options are slimmer. Apple offers it for up to 32 FaceTime participants, while WhatsApp allows up to eight people at a time. Signal can currently only handle encrypted one-to-one calls.
To enable E2EE, you must change an account setting that is possible by signing in only from the web version of Zoom. You can change it at the user, group, or account level.
I hope you understand this article How to turn on End-to-End Encryption on Zoom, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.
Continue reading here:
How to turn on End-to-End Encryption on Zoom - BollyInside
How to Encrypt Files with gocryptfs on Linux – BollyInside
This tutorial is about the How to Encrypt Files with gocryptfs on Linux. We will try our best so that you understand this guide. I hope you like this blog How to Encrypt Files with gocryptfs on Linux. If your answer is yes then please do share after reading this.
Gocryptfs is a file-level encryption utility built on Filesystem in Userspace (FUSE). FUSE-mounted means that the encrypted files are stored in a single directory tree, which is mounted like a USB stick via the FUSE interface. This allows any user to mount, you dont need to be root. Because gocryptfs encrypts at the file level, sync operations that copy your files can work efficiently for each file. This is in contrast to disk-level encryption, which encrypts the entire disk as a single large binary blob.
When you use gocryptfs in normal mode, your files are stored on your hard drive in an encrypted format. However, if you provide the encrypted files, you gain unencrypted access to your files, just like any other files on your computer. That means all your regular tools and programs can use your unencrypted files. Changes, new files and deletions are reflected in real time in the encrypted version of the files stored on your hard drive.
Gocryptfs comes with a deb package and is available in the Debian and Ubuntu repository, which means you can easily install it with the command:
The same applies to Arch Linux. You can install gocryptfs via Pacman:
For other Linux distributions, you can download the binary from their Github site.
To use gocryptfs on macOS, you must first install Homebrew:
Then use the following command to install gocryptfs:
Gocryptfs is not natively supported on Windows due to its lack of FUSE support. However, cppcryptfs is an implementation of the gocryptfs encrypted overlay file system in C++ for Windows, so you can still get it to work on Windows. Follow the build instructions here.
To start using gocryptfs, you must first create two empty folders:
Next, initialize gocryptfs:
Lastly, mount the encrypted folder to the plain folder:
Now all the files you put in the plain folder will be encrypted and stored in the encrypted folder.
As an example, if you want to store the encrypted file in Dropbox and mount it to a Private folder in your home directory, you can run the following commands:
Every file you put in the private folder will be encrypted in the Encrypted folder and uploaded to the Dropbox server.
SiriKali is a GUI tool that can be used to encrypt with gocryptfs and other standards. It is available for Linux, macOS, and Windows, although the Windows version does not support gocryptfs.
Once the commands are done, its a good idea to run this to trust the key and allow updates.
I hope you understand this article How to Encrypt Files with gocryptfs on Linux, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.
View original post here:
How to Encrypt Files with gocryptfs on Linux - BollyInside
How Google is allowing publishers to keep their cookies – AdAge.com
Google has been quietly rolling out a program that allows publishers to use encrypted advertising identifiers in their online advertising transactions while the search giant phases out such tracking tools in other parts of its business.
The program is called Encrypted Signals for Publishers, and it allows websites to work with online advertising identifiers in Googles ad platform in the post-cookie era. Ad tech executives said encrypted IDs could be a lifeline for publishers in programmatic advertising, which is the way many websites deliver ads to visitors who often show up to their sites without logging in or otherwise identifying themselves. Google has been experimenting with a slew of new tools to replace cookies and other forms of online IDs, which have been the bedrock of programmatic advertising for more than a decade.
Encrypted signals is a way for publishers to work with their preferred ad technology partners in Google Ad Manager to swap data through a secure back channel. The encryption prevents data from leaking.
Because of publisher pressure, they launched this program, which enables publishers to share their ID with buyers, said Mathieu Roche, CEO of ID5, one of the digital ad ID companies that is starting to test encrypted signals this month.
Publishers are worried new internet privacy rules could blind their ad targeting systems and decrease the value of ads. ID5, LiveRamp and OpenX are a few of the ad tech companies experimenting with Googles encrypted signals.
Related:12 ad leaders planning for the cookieless future
Deepti Bhatnaga, director of product for Google Ad Manager, said that over the past several months the ad platform has been expanding some of the capabilities for publishers to use their data in programmatic ad auctions. Its no secret that third-party cookies are going to be deprecated and in general I think there is a lot of emphasis on privacy, Bhatnaga said. Ad Manager is working to support publishers once these cookies are deprecated.
The encrypted signals is one of those initiatives that lets publishers use their data to work with ID providers and ad buyers. We want to make sure publishers who have trusted relationships with their users are able to use that data in order to monetize it, Bhatnaga said.
Bhatnaga said publishers use the encrypted signals to pass along data to bidders in internet ad auctions in a way that Google never gets to see that data.
The encrypted ID program rolled out on a small scale last year, when Google started allowing publishers to work with them in direct ad deals. Programmatic direct is when a publisher knows exactly who is buying the inventory ahead of time, and the IDs are used to reach the right customer. The program is expanding to the open web, so publishers can send data signals to more exchanges to find ad matches for their audience. Publishers share their IDs with ad exchanges like OpenX through Google Ad Manager.
Its a nuanced message, said Travis Clinger, senior VP of addressability and ecosystem at LiveRamp. I dont think Google is anti-ID, Googles point is publishers have the right to use IDs.
Google is eliminating third-party IDs and cookies in its Display and Video 360 demand-side platform, which mostly affects advertisers online. The encrypted IDs are on the publishing side, the sell side, of the equation.
On Github, the online developer forum, the programmatic ad network OpenX said it was testing Encrypted Signals for Publishers, which allows OpenX to send encrypted signals directly from the page to our server-side bidder, said the post from July. For the pilot we will test with our 3rd party cookie.
In the future, if the pilot becomes generally available, we will expand the amount of signals we can support to improve match rate of other identifiers, the post said.
Match rate is a measurement of how successful publishers are serving ads to the intended target audience. The match happens when ad identifiersa cookie or other IDconnect buyers and sellers in internet ad auctions, which occur behind the scenes every time a visitor loads a web page.
Encrypted signals fits into Googles wider experiments known as Privacy Sandbox, which is a series of new standards that the company is creating to move beyond cookies and third-party IDs. Google wants to implement stricter privacy controls within its ubiquitous online advertising ecosystem, but it also has to be careful not to create an advantage for its own business.
Dont miss the latest news. Sign up for Ad Age newsletters here.
They realize that this strategy has limits, Roche said, especially because for the rest of the world, identification is very important, especially for publishers."When publishers can identify users, their ads are worth two to three times as much, he added.
Google has said it will kill third-party cookies in Chrome web browsers by the end of 2023. The move will affect the types of data websites collect when viewers visit through Chrome. Publishers have already been dealing with similar changes to Apple Safari and Mozillas Firefox browsers.
Google is a dominant force in internet advertising, generating $209 billion in ad sales in 2021, making any changes to its platform consequential for publishers, ad tech partners and advertisers. Google is both a buyer and seller of programmatic ads, and it provides software that millions of websites use to manage their ad inventory.
There have been concerns from regulators in the U.S. and Europe that as Google applies new privacy practices, it could disadvantage ad tech rivals and publishers. Google has access to its own vast trove of data, while privacy changes could constrain the performance of competitors.
It is a tough predicament though for Google, because it also has to adjust to changing attitudes around online privacy. The overall programmatic ad business has taken heat for exposing peoples intimate internet profiles to third-party companies.
Google is being pragmatic, said an ad tech CEO, who spoke on condition of anonymity, because the program was still too nascent to discuss publicly. They said no IDs, but they are experimenting with tools for buyers and sellers that can work in the future.
Read more:
How Google is allowing publishers to keep their cookies - AdAge.com
European rulings on the use of Google Analytics and how it may affect your business – Data Protection Report
Recent decisions out of the EU will impact the use of Google Analytics and similar non-European analytics services when targeting EU individuals, with the potential to put many organizations at risk of receiving GDPR fines.
At issue was the transfer of personal data from the EU to the US through the use of Google Analytics.
These decisions, like the Schrems decisions, make it clear that organizations must have a technical understanding of their data flows, with an emphasis on: (1) where the data is going; (2) who is receiving the data; and (3) how the data is protected. Many of our clients are using the firms technical tool suite, NT Analyzer, to assist with their data protection and privacy efforts.
It is important to remember that the analysis should not end with just cookies and Google Analytics. Cookies are only one of many ways to collect/transfer data, meaning Google Analytics and similar services can receive personal data through other means.
For example, even if a website or app is not utilizing these types of cookies/technologies, the website or app could still send personal data to Google via HTTP parameters, which are sent as part of query string (e.g., http://www.website.com/pg1/?name=John_Smith (emphasis added)). Additionally, the website or app operator could also use browser/device fingerprinting or other means to track users across web properties. Therefore, it is important to conduct a technical analysis to determine if and how a website or app utilizes these types of services to determine if mitigations are needed.
[For a useful primer and additional background on the Data Transfer schemes and Schrems II, please scroll down to the end of this article]
Like the Schrems cases, the recent Austrian NOYB case reviewed the transfer of personal data to the US. The NOYB complaint was aimed at Netdokter.at (Netdokter), an Austrian health website operator that uses Google Analytics and relies on Standard Contractual Clauses (SCCs) to govern transfers of personal data to Google in the US. NOYB argued that Google qualifies as an electronic communications service provider and is therefore subject to Section 702 of FISA, meaning that it can be ordered by public authorities to disclose personal data of EU citizens. Therefore, in light of the Schrems II decision, adequate protection of EU citizens personal data cannot be ensured, resulting in an unlawful transfer of personal data to the US.
Netdokters Austrian publishing company and Google, however, argued that the data provided to Google, which included IP addresses, other user identifiers, and browser parameters did not qualify as personal data and, even if it did, sufficient supplemental measures were put in place to safeguard the personal data. Safeguards taken by Google included: (1) transparency reporting on data requests from US authorities, (2) encryption at rest in the data centers and (3) pseudonymization of the data.
Ultimately, the Austrian DPA sided with NOYB over Netdokter and Google.
The Austrian DPA held that data transfers to Google in the US in the context of Google Analytics results in a breach of Chapter V of the GDPR, which may make it difficult for EU business and non-EU business having an EU facing website or app to use Google Analytics going forward. Specifically, according to the Ruling:
The French CNIL, through a press release, published a similar case last week. Although the CNIL has not yet made its decision public, the press release adopted similar reasoning as the Austrian DPA and ordered an unnamed French website operator to stop using Google Analytics.
In the meantime, there are several steps those impacted by these decisions should consider.
These decisions, like the Schrems decisions, make it clear that organizations must have a technical understanding of their data flows. Specifically: (1) where is the data going; (2) who is receiving the data; and (3) how is the data protected. As such, organizations should consider:
There are a few things to consider with respect to the decisions.
As was the takeaway from the Schrems II decision, any data transfer outside of the EEA should be assessed on a case-by-case basis. Therefore, the impact of these first European decisions on other US analytics services, and any kind of US data importer for that matter, should be reviewed in light of the specific additional safeguards taken by those companies to supplement the SCCs. By no means should these decisions be interpreted to mean that all personal data transfers to the US result in a breach of the GDPR.
The Austrian and French decisions are the first of many. This is not surprising given that NOYB filed 101 complaints with various EU DPAs in 2020 regarding EU companies use of Google Analytics and Facebook Connect integrations. Following these complaints, the European Data Protection Board (i.e. the European body in which the EU DPAs are represented and whose purpose is to ensure consistent application of the GDPR and to promote cooperation among the EU DPAs) formed a taskforce to coordinate the work with respect to the complaints.
Additionally, other privacy activists are following NOYBs approach. For example, InterHop issued a referral to the French CNIL asking it to consider the use of Google Analytics in the context of e-health.
Stay tuned, more to come.
Norton Rose Fulbrights Information Governance, Privacy and Cybersecurity team stands ready to assist with your data transfer needs.
If youre interested in learning more about NT Analyzer and the Data Transfer Scanner, please visit https://www.ntanalyzer.com or feel free to request a demo by clicking here.
By way of background, under the GDPR data may flow freely within the EEA, consisting of the EU countries and Iceland, Lichtenstein and Norway. Personal data may also be freely transferred to countries outside the EEA (i.e. so-called third countries) that received an adequacy decision from the European Commission. Examples are New Zealand, Japan and the UK that recently received an adequacy decision following its departure from the EU.
Transfers to other third countries are subject to the more burdensome requirements of Chapter V of the GDPR, meaning that the transfer should be subject to appropriate safeguards, and on condition that enforceable data subject rights and effective legal remedies for data subjects are available. Reasons for this is that the protection provided by the GDPR should be upheld wherever in the world the personal data is being transferred to. Appropriate safeguards may be provided by various means indicated in the GDPR, and these include the Standard Contractual Clauses (SCCs) adopted by the European Commissions and approved certification mechanisms, such as the EU US Privacy shield that was valid until the Schrems II decision of the Court of Justice of the European Union (CJEU).
The Schrems II decision, which related to the transfers of personal data from Facebook Ireland to Facebook US, also impacted the use of SCCs. The CJEU ruled that US surveillance laws, in particular section 702 of the Foreign Intelligence Surveillance Act (FISA) and Executive Order 12333, do not limit or effectively oversee public authorities access to EU personal data. Given that the SCCs only bind the parties who have entered into them, public authorities are still able to mandate the data importer to provide personal data, or obtain personal data without the cooperation of the data importer.
Based on the Schrems II judgment it is clear that, in order to transfer personal data to third countries that did not receive an adequacy decision, including the US, it is necessary to:
These supplementary measures can either be contractual, organizational and technical, but the technical measures (such as encryption or pseudonymization) are considered the most effective.
Special thanks to Nicole Sakin for her assistance in the preparation of this content.
Read the original post:
European rulings on the use of Google Analytics and how it may affect your business - Data Protection Report
Hardware Encryption Technology Market Insights 2022, Analysis and Forecast to 2030 Talking Democrat – Talking Democrat
Understand the influence of COVID-19 on the Hardware Encryption Technology Market with our analysts monitoring the situation across the globe.
Market Strides published report titled Hardware Encryption Technology Market By Type, By Application, Regional Analysis, Growth Opportunity and Industry Forecast 2022-2030. The Hardware Encryption Technology Market Report provides a comprehensive overview including Current scenario and the future growth prospects. The Hardware Encryption Technology market report analyzes the various factors and trends in forthcoming years and key factors behind the growth and demand of this market is analyzed detailed in this report.
Some of the prominent players in the global Hardware Encryption Technology market are Western Digital CorpSeagate Technology PLCSamsung ElectronicsThalesMicron Technology IncNetAppKingston Technology CorpToshibaGemaltoCertes Networks Inc.Kanguru SolutionsIBM CorporationImationMaxim Integrated ProductsSanDisk Corporation
Our research methodology constitutes a mix of secondary & primary research which ideally starts from exhaustive data mining, conducting primary interviews (suppliers/distributors/end-users), and formulating insights, estimates, growth rates accordingly. Final primary validation is a mandate to confirm our research findings with Key Opinion Leaders (KoLs), Industry Experts, Hardware Encryption Technology includes major supplies & Independent Consultants among others.
The Hardware Encryption Technology market is segmented on the basis of type, application, end-use industry, and region & country.
Encrypted Hard Disk DrivesEncrypted Solid-State DrivesHardware Security ModuleOthers
Hardware Encryption Technology markets sub-segment is expected to hold the largest market share during the forecast period. The growing concern about the market and industry is expected to boost the Hardware Encryption Technology market.
IT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthersHardware Encryption Technology application valves are one of the most basic and indispensable components of todays modern technological society. Market segment is expected to hold the largest market share in the global Hardware Encryption Technology market.
North America (U.S., Canada) Europe (U.K., Germany, France, Italy) Asia Pacific (China, India, Japan, Singapore, Malaysia) Latin America (Brazil, Mexico) Middle East & Africa
Market Strides is a Global aggregator and publisher of Market intelligence development reports, equity reports, database directories, and economic reports. Our repository is diverse, spanning virtually every industrial sector and even more every category and sub-category within the industry.
Our pre-onboarding strategy for publishers is perhaps, what makes us stand out in the market space. Publishers & their market Share, reports are meticulously validated by our in-house panel of consultants, prior to a feature on our website. These in-house panel of consultants are also in charge of ensuring that our website features the most updated reports only.
Market Strides have team of professionals that assist you in many advanced industry specific trends, content and tests different strategies and implements the most productive one for the business.
Excerpt from:
Hardware Encryption Technology Market Insights 2022, Analysis and Forecast to 2030 Talking Democrat - Talking Democrat