Category Archives: Encryption

Encryption: Why security threats coast under the radar – Philstar.com

Philstar.com

October 14, 2021 | 9:29am

MANILA, Philippines One of the most dangerous security vectors facing enterprises is also one of the least understood.

Research into Encrypted Traffic Threats shows that 41% of businesses do not have a solid understanding of the existence and nature of encrypted traffic threats, and the harm that they can cause.

However, encryption has gradually become one of the most substantial vehicles for cyber threats organizations now have to deal with.

Encrypted traffic became a potential hazard precisely because so much data is now encrypted. In 2016 just over a half (53%) of all web traffic was encrypted, but by 2019, that percentage had grown to a massive 87%, opening an opportunity that is almost the size of the entire Internets data for hackers to slip malicious code into enterprise networks.

The risk that encrypted traffic threats pose is simple; they are hard to see. Cybercriminals find this pathway to be one of the most effective ways to bypass firewalls, intrusion prevention systems, unified threat management, secure web gateways, data loss prevention, anti-malware and most other security solutions.

One way to protect against this is to deploy decryption solutions, but even here, there are some concerns, with 36% of those surveyed citing concern over data privacy, 29% worried about decryption causing performance bottlenecks and 18% worried about having a lack of available skills to manage such a security solution.

Consequently, nearly one-half (48%) of organizations have yet to implement decryption solutions.

The best way to address these issues is to have an automated solution that can proactively monitor and analyze encrypted data.

When the Czech Republics National Cyber and Information Security Agency sought a more robust way to fortify the countrys selected government institutions against modern advanced threats, it turned to Flowmon and the Flowmon Anomaly Detection System for threat-hunting capability.

The system uses 44 detection methods comprising 200+ algorithms to immediately spot and alert the IT teams of any anomalies that had been hidden in network traffic, encrypted or not. (More about the National Cyber and Information Security Agency experience here.)

This application of AI became a valuable source IT expertise that multiplied staff bandwidth to manage the solution and allowed for full and complex monitoring of the entire networked environment.

With Flowmon ADS in place, the institute has a comprehensive, yet noise-free overview of suspicious behaviors in the partner networks, flawless detection capability, and a platform for the validation of indicators of compromise.

Flowmons solution works at scale, too. GANT, a pan-European data network for the research and education community,is running one of the worlds largest data networks, and transfers over 1,000 terabytes of data per day over the GANT IP backbone.

For something of that scale, there is simply no way to manually monitor the entire network for aberrant data. With a redundant application of two Flowmon collectors deployed in parallel, GANT was able to have a pilot security solution to manage the data flow of this scale live in just a few hours.

With a few months of further testing, integration and algorithmic learning, the solution was then ready to protect GANTs entire network from encrypted data threats. (More about the GANT experience here.)

Uncertainty and a lack of understanding are driving the hesitancy for enterprises to adopt encrypted traffic threat response solutions.

Furthermore, for a response to this threat to be effective, it is critical that network operations and security operations (NetOps + SecOps = NetSecOps) work in collaboration, but according to the study, 40% of enterprises do not currently have these teams working closely together.

By adopting tools that are built with the NetSecOps philosophy in mind in order to foster collaboration between the two teams, companies can greatly cut down on incident resolution time and save expenditure on tools with functional overlap.

In 2020, Kemp Technologies announced the acquisition of Flowmon. In doing so, the company has been able to bring together holistic solutions that allow partners to become a one-stop-shop for robust network security.

We are excited to extend the value offered to customers in the areas of infrastructure security, network observability and automated incident response by welcoming Flowmon to the Kemp family, Kemp Technologies CEO Ray Downes said.

The expansion of Kemps portfolio to include Flowmons solutions will provide customers the ideal combination of network analysis, pre-emptive threat detection and workload delivery for optimal, uninterrupted user and application experience, he added.

Kemps two product families comprising the LoadMaster load balancer and the Flowmon NetSecOps suite allows companies to take full control of their digital environment, with load balancing, network performance monitoring and response solutions. The solution is easy to deploy and configure and boasts data on the dashboard within 30 minutes.

With government regulation and privacy concerns demanding that corporations show ever-greater responsibility around data and encryption, Flowmon and Kemp are proving to be an essential response in also protecting the network from cybercrime.

Kemp is currently offering Free Network Assessment. To learn more, emailsales@acw-group.com.ph, call (+632) 8706 5592 or visitwww.acw-distribution.com.ph.

REFERENCES:

Encrypted Traffic Threats Research:https://www.flowmon.com/en/idg-research-encrypted-traffic-threats

Case Studies:https://www.flowmon.com/en/our-customers

Read more here:
Encryption: Why security threats coast under the radar - Philstar.com

Encryption Management Solutions Market 2021 : Industry Analysis ,Size, Share, Revenue, Prominent Players, Developing Technologies, Tendencies and…

The Encryption Management Solutions market research includes a market evaluation, trends, segments, and regional markets. A summary and dynamics were also given in the report. The report provides specific production numbers for each region in terms of revenue and volume over a long period of time. The report also provides COVID-19s impact for an analogous period, as well as statistics on recovery and production capacity.

Get a Sample Report of Encryption Management Solutions Market @ https://www.intelligencemarketreport.com/report-sample/90891

Key Companies Included in this report are:

Cisco SystemsIBMMicrosoftOracleSymantec

The research covers a wide range of market aspects in depth. The study goes into great detail on the elements that drive worldwide market growth as well as technical advancements. The report also examines the Encryption Management Solutions markets present constraints, which limit growth and have long-term consequences. The influence of increased consumer demand on global economic growth is also discussed in the report.

Report details available @ https://www.intelligencemarketreport.com/market-report/encryption-management-solutions-market

COVID-19 Impact Analysis

The outbreak of COVID-19 has impacted a number of businesses. Furthermore, the COVID Pandemic has opened up a limited number of new commercial options for the Encryption Management Solutions market. The epidemic has changed the competitive landscape and market dynamics in general. All of these disruptions and repercussions have been quantified in this research, which is backed up by market trends, events, and revenue change analysis.

Encryption Management Solutions Market Segmentation, By Type:Disk EncryptionFolder EncryptionCloud EncryptionCommunication Encryption

Encryption Management Solutions Market Segmentation, By Application:BFSIHealthcareGovernmentRetailIT and telecom

Enquiry about report @ https://www.intelligencemarketreport.com/send-an-enquiry/90891

Competitive Scenario

The competitive landscape of the Encryption Management Solutions market gives in-depth information on the markets major competitors. A firm overview, finances, incomes generated, market potential, and investment in R&D are among the details. Other information includes new market initiatives, regional presence, corporate strengths and weaknesses, product launch, product width and scope, and applications. Only market-related companies are included in the above data points. The report also includes a summary of key players achievements in the global Encryption Management Solutions market. It also shows the most important market trends that are worth following.

Buy Single User PDF Research Report On Encryption Management Solutions Market @

https://www.intelligencemarketreport.com/checkout/90891

Regional Analysis

The Encryption Management Solutions market is separated into geographical areas based on locations like North America, Latin America, Europe, Asia Pacific, the Near East, and Africa. Production and consumer ratios, market size and market share, import and export ratios, supply and demand, consumer demand ratios, technological advancements, research and development, infrastructure development, economic growth, and a strong market presence in every region are all covered by research.

Report Conclusion

The findings of this study are a valuable resource for fulfilling all company objectives, including crucial missions. The outcomes have improved the performance of business stakeholders and industry entities demonstrably. The outcomes are tailored to meet the needs of stakeholders. The Encryption Management Solutions market study also includes current case studies on how companies dealt with various issues on their way to consolidation.

Contact US:

Akash Anand

Head of Business Development & Strategy

sales@intelligencemarketreport.com

Phone: +44 20 8144 2758

Website: http://www.intelligencemarketreport.com

Follow us @ https://www.linkedin.com/company/intelligence-market-report

Here is the original post:
Encryption Management Solutions Market 2021 : Industry Analysis ,Size, Share, Revenue, Prominent Players, Developing Technologies, Tendencies and...

TLS Support Redis

SSL/TLS is supported by Redis starting with version 6 as an optional feature that needs to be enabled at compile time.

To build with TLS support you'll need OpenSSL development libraries (e.g. libssl-dev on Debian/Ubuntu).

Run make BUILD_TLS=yes.

To run Redis test suite with TLS, you'll need TLS support for TCL (i.e. tcl-tls package on Debian/Ubuntu).

Run ./utils/gen-test-certs.sh to generate a root CA and a server certificate.

Run ./runtest --tls or ./runtest-cluster --tls to run Redis and Redis Cluster tests in TLS mode.

To manually run a Redis server with TLS mode (assuming gen-test-certs.sh was invoked so sample certificates/keys are available):

To connect to this Redis server with redis-cli:

In order to support TLS, Redis must be configured with a X.509 certificate and a private key. In addition, it is necessary to specify a CA certificate bundle file or path to be used as a trusted root when validating certificates. To support DH based ciphers, a DH params file can also be configured. For example:

The tls-port configuration directive enables accepting SSL/TLS connections on the specified port. This is in addition to listening on port for TCP connections, so it is possible to access Redis on different ports using TLS and non-TLS connections simultaneously.

You may specify port 0 to disable the non-TLS port completely. To enable only TLS on the default Redis port, use:

By default, Redis uses mutual TLS and requires clients to authenticate with a valid certificate (authenticated against trusted root CAs specified by ca-cert-file or ca-cert-dir).

You may use tls-auth-clients no to disable client authentication.

A Redis master server handles connecting clients and replica servers in the same way, so the above tls-port and tls-auth-clients directives apply to replication links as well.

On the replica server side, it is necessary to specify tls-replication yes to use TLS for outgoing connections to the master.

When Redis Cluster is used, use tls-cluster yes in order to enable TLS for the cluster bus and cross-node connections.

Sentinel inherits its networking configuration from the common Redis configuration, so all of the above applies to Sentinel as well.

When connecting to master servers, Sentinel will use the tls-replication directive to determine if a TLS or non-TLS connection is required.

Additional TLS configuration is available to control the choice of TLS protocol versions, ciphers and cipher suites, etc. Please consult the self documented redis.conf for more information.

TLS adds a layer to the communication stack with overheads due to writing/reading to/from an SSL connection, encryption/decryption and integrity checks. Consequently, using TLS results in a decrease of the achievable throughput per Redis instance (for more information refer to this discussion).

I/O threading is currently not supported with TLS.

Read more:
TLS Support Redis

Signal >> Documentation

XEdDSA and VXEdDSA

This document describes how to create and verify EdDSA-compatible signatures using public key and private key formats initially defined for the X25519 and X448 elliptic curve Diffie-Hellman functions. This document also describes "VXEdDSA" which extends XEdDSA to make it a verifiable random function, or VRF.

X3DH

This document describes the "X3DH" (or "Extended Triple Diffie-Hellman") key agreement protocol. X3DH establishes a shared secret key between two parties who mutually authenticate each other based on public keys. X3DH provides forward secrecy and cryptographic deniability.

Double Ratchet

This document describes the Double Ratchet algorithm, which is used by two parties to exchange encrypted messages based on a shared secret key. The parties derive new keys for every Double Ratchet message so that earlier keys cannot be calculated from later ones. The parties also send Diffie-Hellman public values attached to their messages. The results of Diffie-Hellman calculations are mixed into the derived keys so that later keys cannot be calculated from earlier ones. These properties give some protection to earlier or later encrypted messages in case of a compromise of a party's keys.

Sesame

This document describes the Sesame algorithm for managing message encryption sessions in an asynchronous and multi-device setting.

Read more:
Signal >> Documentation

Encryption Consulting announces their first-ever virtual conference – "Encryption Consulting Virtual conference 2021." – Tyler Morning…

PROSPER, Texas, Oct. 11, 2021 /PRNewswire/ -- Is Applied cryptography your passion? Then, you've come to the right place, Encryption Consulting has something for you. Encryption consulting is hosting the first ever Encryption Consulting Virtual Conference 2021 on Nov 3rd and 4th, 2021. #ECconference2021

Encryption Consulting's Virtual Conference 2021 will provide you with an opportunity to keep up with widespread changes in cryptography, PKI, Encryption, Data protection, Cloud key management, and other cryptography-related topics. The event is a unique, technical event that brings together cyber security leaders worldwide.

There will be 30 minute presentations from 18 experts at leading global companies such as Thales, Protigrity, Entrust, Comforte, DigiCert, AppviewX, Primekey, Utimaco, FutureX, Fortanix, Akeyless, and many other reputed and leading organizations. There will also be a live Q&A session after the presentation on the virtual conference day.

Hurry up and register for your favorite topic(s).

We also have hands-on lab sessions scheduled on Nov 3rd and 4th, 2021 for our code signing tool (CodeSign Secure 3.0) and deploying a PKI on an AWS environment.

For information about the speakers, schedule, and conference,

visit http://www.encryptionconsulting.com/ecconf/

Media contact: Ashleigh Nalley, ashleigh@encryptionconsulting.com

View original content:https://www.prnewswire.com/news-releases/encryption-consulting-announces-their-first-ever-virtual-conference--encryption-consulting-virtual-conference-2021-301396178.html

SOURCE Encryption Consulting

Recent Stories You Might Have Missed

View original post here:
Encryption Consulting announces their first-ever virtual conference - "Encryption Consulting Virtual conference 2021." - Tyler Morning...

[Update: Rolling out] WhatsApp adds end-to-end encryption for Android cloud backups – 9to5Google

After being hinted at and after testing in previous beta builds, WhatsApp has confirmed that end-to-end encryption for cloud backups is set to roll out soon.

[Update 10/11]: After being officially announced, WhatsApps long-awaited encrypted backups are now beginning to roll out with the latest beta update for the Android and iOS apps. As the original post (below) notes, youll need to choose between a password or 64-bit key. Losing either will result in your backup being lost be that on Android or iOS.

Spotted by WABetaInfo, the option is said to be available as of v2.21.21.5 of WhatsApp for Android. However, after updating were not yet seeing the option when heading to Settings > Chats > Chat backup. This hints that the feature is not yet widely available but likely coming very soon to most users of the messaging platform.

When you do enable the feature, the backups are encrypted before upload. Which is why a cloud-based key or a password is required to recover when you sign in to a new device. The latest beta update should be rolling out right now via the Google Play Store provided that you are enrolled.

Original article posted 09/10 below

Announced in a Facebook Engineering blog post, end-to-end encryption has been missing from cloud backups despite the fact that the messages in chat gained the added security layer way back in 2016. The current implementation has relied heavily on iCloud and Google Drive for cloud backup storage, but security was only offered with 2FA when restoring on your device.

If you are a WhatsApp user, Facebook confirmed that end-to-end encryption for your future cloud backups will begin rolling out in the coming weeks. WhatsApp says that once the feature is enabled, neither WhatsApp nor the backup service provider will be able to access your backups or the encryption key used for backups:

People can already back up their WhatsApp message history via cloud-based services like Google Drive and iCloud. WhatsApp does not have access to these backups, and they are secured by the individual cloud-based storage services.

But now, if people choose to enable end-to-end encrypted (E2EE) backups once available, neither WhatsApp nor the backup service provider will be able to access their backup or their backup encryption key.

You will be able to choose between two options, either manually storing the 64-digit encryption key or setting a password:

This should make cloud backups and the backup process much more secure with WhatsApp, but it is worth noting that end-to-end encryption still doesnt guarantee 100% security for your data. Its also important to note that should you choose to use a 64-digit encryption key and lose the key, you will lose access to your backup. However, you can change or reset your password if you forget it.

Multi-device support has recently rolled out, but its worth noting that encrypted backups will only be available on your main or primary device. You can read the full white paper on WhatsApp and the end-to-end encrypted cloud backups here.

FTC: We use income earning auto affiliate links. More.

Check out 9to5Google on YouTube for more news:

The rest is here:
[Update: Rolling out] WhatsApp adds end-to-end encryption for Android cloud backups - 9to5Google

Homomorphic Encryption Market New Coming Industry to Witness Great Growth Opportunities in Coming Years From 2021 to 2027: Microsoft (US), IBM…

An overview of the Homomorphic Encryption Market will help you provide scope and definitions, key findings, growth drivers, and a variety of dynamics.

The global Homomorphic Encryption market focuses on covering key statistical evidence of the Homomorphic Encryption industry. This is to add value to our readers as a guide in the face of market obstacles. Studies have reported a comprehensive addition of several factors, including global distribution, manufacturers, market size, and market factors that influence global contributions. In addition, the Homomorphic Encryption study focuses on detailed competitive environments, clear growth opportunities, market share combined with product types and applications, key production companies, and usage strategies.

Request a Sample PDF Brochure to Understand More Details about Homomorphic Encryption Market:https://www.worldwidemarketreports.com/sample/homomorphic-encryption

This intelligence and forecast for 2030 The Homomorphic Encryption industry report further show patterns that analyze previous data sources collected from trusted sources and sets a precedent growth trajectory for the Homomorphic Encryption market. The report also focuses on comprehensive market revenue flows, along with growth patterns, market trend-focused analysis, and overall market volume.

In addition, the Homomorphic Encryption report describes market segmentation based on various parameters and attributes based on geographic distribution, product type, application, and more. Market segmentation further clarifies the Homomorphic Encryption market, business trends, potential sources of revenue, and future regional distribution. Market opportunity.

Profiles of top industry players covered in this report:

Microsoft (U.S.), IBM Corporation (U.S.), Galois Inc (U.S.), CryptoExperts (France)

Global Homomorphic Encryption Market Trends: By Type

Partially Homomorphism, Somewhat Homomorphism, Fully Homomorphism

Global Homomorphic Encryption Business Analysis: By Application

Industrial, Government, Financial & Insurance, Health Care, Others

Regional analysis:

The report comes up with an accurate representation of the geographic extent of the global Homomorphic Encryption market, including a graphical description of popular product hotspots and the performance of various products and services in line with user preferences and priorities.

North America (US, Canada, and Mexico)Europe (Germany, UK, France, Italy, Russia, Spain, etc.)Asia Pacific (China, Japan, South Korea, India, Australia, Southeast Asia, etc.)South America (Brazil, Argentina, Colombia, etc.)The Middle East and Africa (South Africa, United Arab Emirates, Saudi Arabia, etc.)

Due to the ongoing COVID-19 pandemic around the world, the Homomorphic Encryption survey figures presented in this study may differ along with capacity and other mentioned aspects. Also, please note that there is a possibility of a cool-down period after the pandemic, and the data may differ as the world economy catches up.

Get Sample Report Containing Special COVID 19 Segments:https://worldwidemarketreports.com/covid19/homomorphic-encryption

The Homomorphic Encryption market research further emphasizes the fragmentation of the Homomorphic Encryption industry in global distribution. The report focuses on North America, Europe, Asia, and other regions in terms of business trend development, priority market channels, investment feasibility, long-term investment, and environmental analysis. The Homomorphic Encryption report also calls attention to investigating product capacity, product prices, profit flows, supply-to-demand ratios, production and market growth rates, and projected growth forecasts.

In addition, Homomorphic Encryption Market Research covers several factors such as market conditions, key market trends, growth forecasts, and growth opportunities. In addition, we analyze the challenges facing the Homomorphic Encryption market from a global and regional perspective. The survey also includes many opportunities and new trends to be considered considering the global impact of gaining a majority of market share.

Some of the features of this report:

Market Size Estimate: Homomorphic Encryption Market Size Estimate (value $ M).

Trend and Forecast Analysis: Market trends and forecasts by end-use and industry.

Segmentation analysis: Homomorphic Encryption market size by application and headset in terms of value and shipment volume.

Regional Analysis: Breakdown of the Homomorphic Encryption market by major regions such as North America, Europe, Asia, and other regions.

Growth Opportunities: Analysis of various applications in the Homomorphic Encryption market and growth opportunities in the region.

Strategic Analysis: This includes M & A, new product development, and the competitive environment of the Homomorphic Encryption market.

Analysis of fierce competition in the industry based on Porters Five Forces,SWOT Analysis, and PESTLE Analysis.

Get this Report on Discounted Price to Access Full Vital Information:https://www.worldwidemarketreports.com/discount/homomorphic-encryption

Continue reading here:
Homomorphic Encryption Market New Coming Industry to Witness Great Growth Opportunities in Coming Years From 2021 to 2027: Microsoft (US), IBM...

SmartKargo Incorporates EDIfly Advanced Aviation Messaging At No Cost for Customers of its E-Commerce Logistics Solution – Yahoo Finance

SmartKargo has now embedded EDIfly into its end-to-end e-commerce solution to support free encrypted messaging for its airline clients.

CAMBRIDGE, Mass., Oct. 12, 2021 /PRNewswire-PRWeb/ -- SmartKargo has now embedded EDIfly into its end-to-end e-commerce solution to support free encrypted messaging for its airline clients. Air Asia Cargo, a cornerstone customer of SmartKargo, recently implemented the EDI-messaging solution with its ground handling partners in Indonesia. Air Asia is the leading low-cost carrier in Asia and a leading integrated logistics provider facilitating the movement of goods and e-commerce packages, through its Teleport cargo subsidiary, across Southeast Asia and beyond.

The EDIfly messaging platform is the signature tool of Luxembourg-based Innovative Software. Innovative Software SARL recently joined the IATA EPIC Platform and has now added logistics.cloud to support encrypted connectivity options through its low-cost EDIfly messaging technology based on open-source components. The platforms are facilitating exchanges for a growing number of partners in ground handling and warehouse management, airline trucking, forwarding, logistics, cargo community systems, or even some governments.

"EDIfly enables our airline customers like Air Asia to securely exchange operational messages with their logistics partners, which is so vital in the fulfillment of e-commerce transactions," said Milind Tavshikar, CEO of SmartKargo. "SmartKargo is pleased to provide the advanced benefits of EDIfly SM messaging at no cost to customers of our e-commerce solution."

The implementation of EDIfly is simple for SmartKargo's customers of SmartKargo's platform, as EDIfly relies on the same addresses already in use by legacy aviation messaging providers such as SITA, ARINC, Cargo-Community-Systems, and others. EDIfly SM also adds value to these exchanges with instant proof of delivery through a digital signature. This means comprehensive process control for business partners and a secured exchange not available with other traditional means, including email.

Story continues

"In addition to the significant cost reduction over alternative messaging methods, EDIfly provides Air Asia with the utmost in data security for our messaging, and it is based on IATA standards," said Javed Malik, title, AirAsia.

SmartKargo's customers now benefit from complete tracking without the volume-related pricing typically incurred. EDIfly is the only solution today that can be GDPR and PCI/DSS compliant with certifiable encryption end-to-end, including into the application of the customer.

"EDIfly uniquely allows seamless integration and allows for self-administration capabilities," said Ingo Ressler, Chief Commercial Officer at EDIfly. "In addition, the messaging provides full transparency on performance and message delivery, and guarantees the delivery order through end-to-end sequencing of messages."

For more information, please visit http://www.smartkargo.com or http://www.edifly.com.

About SmartKargo SmartKargo delivers advanced digital technology to facilitate the efficient digital transformation of an airline's cargo business. With deep expertise in air cargo, technology, and e-commerce, SmartKargo empowers airlines to open new revenue streams through e-commerce package shipping and delivery, as recently featured in Forbes. The company is headquartered in Cambridge, Massachusetts (in what The New York Times called "the most innovative square mile on the planet"), with key offices in India, the Philippines, Brazil, and Canada. Learn more at http://www.smartkargo.com or on our social media at Linkedin, Twitter, or Instagram.

About EDIfly EDIfly, a product of Innovative Software SARL, provides innovative software for seamless integrated messaging in aviation and logistics since 2010. The company provides banking-like data security, superior rule-based message routing + monitoring based on IATA standards. EDIfly uses standard RSA/AES encryption and obtains a real-time non-repudiation proof-of-delivery from the receiving address. Innovative Software SARL has partnered with industry initiatives including IATA EPIC and logistics.cloud to support low-cost connectivity options through its EDIfly messaging technology based on open-source components. EDIfly promotes seamless migration away from legacy and fixed-link connectivity using the existing addressing Type B, Type X, Cargo: XML, PIMA schema, etc., while supporting high-level encryption to exchanges without applications changes. For more information contact http://www.edifly.com.

Media Contact

Jennifer Pemberton, SmartKargo, 214-701-8655, jen@smartkargo.com

SOURCE SmartKargo

More here:
SmartKargo Incorporates EDIfly Advanced Aviation Messaging At No Cost for Customers of its E-Commerce Logistics Solution - Yahoo Finance

No outages, no data leaks: The new WhatsApp killer built on the blockchain creates privacy-focused encrypted messenger – Cointelegraph

Oxen is a privacy-focused platform built on top of a proof-of-stake (PoS) network. It has also built a secure and anonymous messaging platform Session.

The companys chief technical officer Kee Jefferys talked to Cointelegraph about its platform, its technology and how important privacy and data protection are for the end-user.

1. Hello! Tell us about Oxen and Session.

OXEN is a private, stakeable cryptocurrency. The Oxen coin(OXEN) has brought a lot of innovation to the CryptoNote space (CN), including instant transactions and a large-scale PoS system. However, the real magic is the service node network. Its powering a whole range of decentralized privacy applications all incentivized by OXEN.

So far, our shining star is Session.

Session is an encrypted messenger that takes an uncompromising stance on preserving user privacy. No phone numbers, email addresses, or any identifying information are needed to sign up for Session. The messenger lets people benefit from the best bits of blockchain without needing to run a node, hold any cryptocurrency, or even being familiar with what blockchain is. Because of that, its already getting mainstream adoption, and Session currently has over 200,000 active users. The app is available for free on iOS, Android, Mac, Windows and Linux.

2. Whats wrong with messaging giants like Messenger and WhatsApp?

Messenger and WhatsApp are both owned by Facebook, a company known for aggregating user data to be sold for profit to advertising companies at the expense of the end users privacy, putting very little energy into maximizing privacy and security for users.

So heres what we know about Facebook Messenger and WhatsApp:

WhatsApp and Facebook Messenger are the most popular messaging applications in the world, which technically means that encrypted messaging applications are the most popular form of communication. However, there is uncertainty about WhatsApps end-to-end encryption implementation because their closed source code makes it impossible to verify the quality of their encryption.

In addition to this, the centralized servers used by WhatsApp give them a central point of failure. Apps like Session that are built on a decentralized network can be more resilient to attacks and have less downtime.

3. How does Session plan to get ahead in this competitive space?

A primary focus early on for Session was to reach out to journalists, activists and NGOs to test the app and provide feedback.

Now, the encrypted platform is used all the way from Boston to Baghdad by well over 200,000 people across more than 200 countries. Activists, journalists and human rights defenders rely on Session to be able to communicate safely and effectively and continue doing their pivotal work. Users are able to have conversations with their friends and family without worrying whether their conversation is secure.

4. Why is anonymity in messaging so important?

Anonymity is privacy, and privacy, according to the United Nations, is a human right everyone should be entitled to see Article 12 of the UNs Declaration on Human Rights.

Around the world, people are persecuted for their opinions, beliefs and conversations. And even if its not your job, anyone posting on social media these days can be a whistleblower, activist, or revolutionary. That opens a lot of people up to being targeted and makes anonymity a huge issue for every single person on the internet.

5. How many people currently use Session?

Session has been downloaded over 500,000 times and currently has over 200,000 monthly active users, according to recent estimations. Due to the decentralized nature of Session, were unable to see the exact number of users we have. Apps like WhatsApp and Telegram have access to more accurate information regarding user numbers and activity.

6. What are the premium paid features that Session is planning to offer?

We strongly believe that the apps core functionality a hardcore private messenger should remain free. Secure messaging is an incredibly difficult challenge to solve, and the monetization features we add should improve the apps user experience and not restrict it behind a paywall.

That said, some of the paid features that Session may offer in the future:

All decentralized core components of Session are free. Some additional features and services that would consume OPTF resources to provide or put additional strain on the Oxen network will be included among Sessions premium features.

Sessions monetization strategy includes premium features that can be used to buy back and burn OXEN from the open market, adding additional deflationary pressure to the OXEN cryptocurrency.

7. Is it possible to migrate from other platforms to Session?

Community groups from other apps can easily shift from, lets say, the centralized Telegram to decentralized Session. However, there is no means of porting users directly from Telegram to Session.

The platforms open groups facilitate real-time group chats with an unlimited number of users, while the closed group feature where users can chat with up to 100 people with the same metadata protections as Sessions one-on-one conversations.

8. What are Sessions plans for the coming 12 months?

Our main objectives for the next 12 months are to increase the number of users and improve the monetization model. Were planning to add user-generated sticker packs, increase file size limits, remote device wiping, local message editing and more.

The biggest upgrade on the horizon is Lokinet integration, which will bring lower latency communication and better, non-Apple/Google-like push notifications as well as onion-routed voice and video calls.

Disclaimer. Cointelegraph does not endorse any content or product on this page. While we aim at providing you all important information that we could obtain, readers should do their own research before taking any actions related to the company and carry full responsibility for their decisions, nor this article can be considered as an investment advice.

Go here to see the original:
No outages, no data leaks: The new WhatsApp killer built on the blockchain creates privacy-focused encrypted messenger - Cointelegraph

Mosyle’s $ 16M Series A Drives Growth by Launching the Mosyle Business with the Market’s First Encrypted DNS Filtering and Security Solution -…

Mosyle, the leader in modern Apple MDM and security, today introduced its Encrypted Domain Name System (DNS) Filtering & Security Solution, the markets first offering built to automate web filtering and encryption exclusively on Apple endpoints. By focusing on the device instead of the network, Mosyle provides K-12, higher education and enterprise customers with fast, secure, and reliable web filtering and end user privacy for Apple devices at school, home, work, or on the go.

The past 18 months have put a major spotlight on the industrys outdated approach to web filtering, said Alcyr Araujo, founder and CEO, Mosyle. Nearly every school and enterprise IT department was forced to pivot and retrofit their network-focused solution to work on the endpoint, creating a slow, unstable and insecure content filtering solution when devices were not on an approved network. Mosyle believes the future of management and protection is in the endpoint and thats the key to our latest DNS filtering and security offering.

The new offering is built within the companys expanding portfolio of Apple MDM and security solutions and hinges on Mosyles heritage of innovation and automation. Built within the Mosyle solutions ecosystem, the Encrypted DNS & Security Solution is a new product category that leverages features from web filtering and security, MDM, and endpoint security to create completely new workflows.

Purpose-built for K-12 schools, colleges and universities, and enterprises, Mosyles latest innovation helps simplify Apple device management, web filtering and security with:

Maximum Privacy: Mosyles solution only leverages DoH (DNS over HTTPS) and DoT (DNS over TLS) protocols to enforce highly efficient filtering controls at the operating system and applications levels with full DNS encryption protecting sensitive information. The solution also gives customers full control of what information is logged.

Automated and Frictionless Deployment: Mosyles DNS offering eliminates the time-consuming process of configuring and deploying web filtering agents on devices. With a few clicks, services are up and running, providing uniform rule enforcement across web browsers. By leveraging the endpoint, Mosyles solution also removes the friction of deploying updates and ensures all devices are running on the latest operating system without waiting for a providers agent to be deemed compatible.

Apple First Focus: Mosyles new solution leverages the companys deep level of specialization with Apple devices by combining key web filtering functionality with MDM and endpoint security to deliver a proven Apple first offering.

The quick shift to remote learning and work left education systems exposed to students accessing inappropriate content on school-owned devices and business devices unprotected. And legacy web filtering solutions are to blame, said Joshua Martin, Information Security Director, Mosyle. Mosyles DNS Filtering & Security Solution addresses these concerns and helps resolve content filtering challenges while providing smooth upgrades, protection and management for Apple devices anytime, anywhere.

Mosyles Encrypted DNS Filtering & Security Solution will be available under a private beta program for K-12 education customers in the coming weeks. The company will announce a public beta access program for higher education and enterprise customers in early 2022. About Mosyle

Mosyle is the leader in modern mobile device management (MDM) and security for Apple enterprise and education customers. By combining a cloud-native architecture with a focus on usability, automation and the best support on the market, Mosyle delivers a new approach to Apple device management that is more powerful, efficient and affordable than legacy solutions.

News Summary:

Here is the original post:
Mosyle's $ 16M Series A Drives Growth by Launching the Mosyle Business with the Market's First Encrypted DNS Filtering and Security Solution -...