Page 2,126«..1020..2,1252,1262,1272,128..2,1402,150..»

Whats the Best Wi-Fi Encryption to Use in 2022? – How-To Geek

Vladimir Sukhachev/Shutterstock.com

Wi-Fi encryption standards change over time as new ones are developed and older ones become insecure and obsolete. Heres a look at the best encryption you should be using to secure your Wi-Fi router in 2022.

As of February 2022, the best Wi-Fi security standard is called Wi-Fi Protected Access Version 3, or WPA3 for short. Introduced in 2018 by the Wi-Fi Alliance, there are several variations of the WPA3 standard:

For home Wi-Fi users, the best choice is WPA3-Personal, since it wont require a deep knowledge of wireless security to configure properly. If youre running a business or organization with high data security needs, consult IT experts that can help you set up WPA3-Enterprise wherever possible.

The Wi-Fi Alliance also promotes a standard called Wi-Fi Enhanced Open that seamlessly applies a low-level of encryption (called OWE) to open Wi-Fi access spots (those that dont require a password). However, OWE has already been compromised by researchers. Even if it had not been compromised, we do not recommend running an open Wi-Fi access point.

RELATED: What Is WPA3, and When Will I Get It On My Wi-Fi?

Since WPA3 is still moderately new, you may own some older devices that dont support connecting to a router configured to use WPA3 encryption. Or maybe your router doesnt support it either. If thats the case, you have several options:

$327.99 $349.99 Save 6%

$113.53 $149.99 Save 24%

$399.99 $449.99 Save 11%

$219.00 $299.00 Save 27%

$365.00$499.99 Save 27%

Now that youve read about the best Wi-Fi encryption, weve created a rogues gallery of obsolete and insecure wireless security standards to avoid. There are more out there, but these are the most prominent ones:

To check or change your router or access points Wi-Fi security settings, youll need to log in to the devices configuration interface. Most devices allow you to connect through a special local web address in a browser (such as 192.168.0.01), and others also allow you to configure them through a smartphone app. Check your routers documentation to find out how to do this.

Once youre logged in, look for labels like Wireless Security, Wireless Configuration, Security Level, SSID Setup, or something similar. Click it, and youll likely see a drop-down menu where you can choose the encryption method used on your router.

After choosing the strongest encryption your router supports, apply the changes and restart your router. When your router or access point starts up again, youre ready to go.

If your router doesnt support WPA2, you definitely need to upgrade to a new router immediately. If it doesnt support WPA3, its time to strongly consider an upgrade as well. Stay safe out there!

RELATED: How to Access Your Router If You Forget the Password

See the original post:
Whats the Best Wi-Fi Encryption to Use in 2022? - How-To Geek

Read More..

How to Encrypt Files with gocryptfs on Linux – BollyInside

This tutorial is about the How to Encrypt Files with gocryptfs on Linux. We will try our best so that you understand this guide. I hope you like this blog How to Encrypt Files with gocryptfs on Linux. If your answer is yes then please do share after reading this.

Gocryptfs is a file-level encryption utility built on Filesystem in Userspace (FUSE). FUSE-mounted means that the encrypted files are stored in a single directory tree, which is mounted like a USB stick via the FUSE interface. This allows any user to mount, you dont need to be root. Because gocryptfs encrypts at the file level, sync operations that copy your files can work efficiently for each file. This is in contrast to disk-level encryption, which encrypts the entire disk as a single large binary blob.

When you use gocryptfs in normal mode, your files are stored on your hard drive in an encrypted format. However, if you provide the encrypted files, you gain unencrypted access to your files, just like any other files on your computer. That means all your regular tools and programs can use your unencrypted files. Changes, new files and deletions are reflected in real time in the encrypted version of the files stored on your hard drive.

Gocryptfs comes with a deb package and is available in the Debian and Ubuntu repository, which means you can easily install it with the command:

The same applies to Arch Linux. You can install gocryptfs via Pacman:

For other Linux distributions, you can download the binary from their Github site.

To use gocryptfs on macOS, you must first install Homebrew:

Then use the following command to install gocryptfs:

Gocryptfs is not natively supported on Windows due to its lack of FUSE support. However, cppcryptfs is an implementation of the gocryptfs encrypted overlay file system in C++ for Windows, so you can still get it to work on Windows. Follow the build instructions here.

To start using gocryptfs, you must first create two empty folders:

Next, initialize gocryptfs:

Lastly, mount the encrypted folder to the plain folder:

Now all the files you put in the plain folder will be encrypted and stored in the encrypted folder.

As an example, if you want to store the encrypted file in Dropbox and mount it to a Private folder in your home directory, you can run the following commands:

Every file you put in the private folder will be encrypted in the Encrypted folder and uploaded to the Dropbox server.

SiriKali is a GUI tool that can be used to encrypt with gocryptfs and other standards. It is available for Linux, macOS, and Windows, although the Windows version does not support gocryptfs.

Once the commands are done, its a good idea to run this to trust the key and allow updates.

I hope you understand this article How to Encrypt Files with gocryptfs on Linux, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.

View original post here:
How to Encrypt Files with gocryptfs on Linux - BollyInside

Read More..

How to turn on End-to-End Encryption on Zoom – BollyInside

This tutorial is about the How to turn on End-to-End Encryption on Zoom. We will try our best so that you understand this guide. I hope you like this blog How to turn on End-to-End Encryption on Zoom. If your answer is yes then please do share after reading this.

The growing popularity of Zoom video conferencing software can safely be described as a meteoric rise. In a matter of weeks, it went from being a go-to app for virtual meetings, family reunions, and even social events. However, after the boom in new users, the company admitted that its privacy and security standards have not lived up to expectations.

It now addresses this issue by introducing end-to-end encryption, ensuring that no one but the participants (not even Zoom itself) has access to a meeting. In typical meetings, the Zoom cloud generates encryption keys and distributes them to meeting participants via Zoom apps when they join. With Zoom E2EE, the meeting host generates encryption keys and uses public key cryptography to distribute those keys to other meeting participants.

Zooms servers become blind relays, never seeing the encryption keys needed to decrypt meeting content. You probably already use end-to-end encryption in one way or another. Its enabled by default for iMessage and WhatsApp, a staple of encrypted messaging platforms like Signal, and an optional feature on Facebook Messenger. For video chats, your options are slimmer. Apple offers it for up to 32 FaceTime participants, while WhatsApp allows up to eight people at a time. Signal can currently only handle encrypted one-to-one calls.

To enable E2EE, you must change an account setting that is possible by signing in only from the web version of Zoom. You can change it at the user, group, or account level.

I hope you understand this article How to turn on End-to-End Encryption on Zoom, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.

Continue reading here:
How to turn on End-to-End Encryption on Zoom - BollyInside

Read More..

How Google is allowing publishers to keep their cookies – AdAge.com

Google has been quietly rolling out a program that allows publishers to use encrypted advertising identifiers in their online advertising transactions while the search giant phases out such tracking tools in other parts of its business.

The program is called Encrypted Signals for Publishers, and it allows websites to work with online advertising identifiers in Googles ad platform in the post-cookie era. Ad tech executives said encrypted IDs could be a lifeline for publishers in programmatic advertising, which is the way many websites deliver ads to visitors who often show up to their sites without logging in or otherwise identifying themselves. Google has been experimenting with a slew of new tools to replace cookies and other forms of online IDs, which have been the bedrock of programmatic advertising for more than a decade.

Encrypted signals is a way for publishers to work with their preferred ad technology partners in Google Ad Manager to swap data through a secure back channel. The encryption prevents data from leaking.

Because of publisher pressure, they launched this program, which enables publishers to share their ID with buyers, said Mathieu Roche, CEO of ID5, one of the digital ad ID companies that is starting to test encrypted signals this month.

Publishers are worried new internet privacy rules could blind their ad targeting systems and decrease the value of ads. ID5, LiveRamp and OpenX are a few of the ad tech companies experimenting with Googles encrypted signals.

Related:12 ad leaders planning for the cookieless future

Deepti Bhatnaga, director of product for Google Ad Manager, said that over the past several months the ad platform has been expanding some of the capabilities for publishers to use their data in programmatic ad auctions. Its no secret that third-party cookies are going to be deprecated and in general I think there is a lot of emphasis on privacy, Bhatnaga said. Ad Manager is working to support publishers once these cookies are deprecated.

The encrypted signals is one of those initiatives that lets publishers use their data to work with ID providers and ad buyers. We want to make sure publishers who have trusted relationships with their users are able to use that data in order to monetize it, Bhatnaga said.

Bhatnaga said publishers use the encrypted signals to pass along data to bidders in internet ad auctions in a way that Google never gets to see that data.

The encrypted ID program rolled out on a small scale last year, when Google started allowing publishers to work with them in direct ad deals. Programmatic direct is when a publisher knows exactly who is buying the inventory ahead of time, and the IDs are used to reach the right customer. The program is expanding to the open web, so publishers can send data signals to more exchanges to find ad matches for their audience. Publishers share their IDs with ad exchanges like OpenX through Google Ad Manager.

Its a nuanced message, said Travis Clinger, senior VP of addressability and ecosystem at LiveRamp. I dont think Google is anti-ID, Googles point is publishers have the right to use IDs.

Google is eliminating third-party IDs and cookies in its Display and Video 360 demand-side platform, which mostly affects advertisers online. The encrypted IDs are on the publishing side, the sell side, of the equation.

On Github, the online developer forum, the programmatic ad network OpenX said it was testing Encrypted Signals for Publishers, which allows OpenX to send encrypted signals directly from the page to our server-side bidder, said the post from July. For the pilot we will test with our 3rd party cookie.

In the future, if the pilot becomes generally available, we will expand the amount of signals we can support to improve match rate of other identifiers, the post said.

Match rate is a measurement of how successful publishers are serving ads to the intended target audience. The match happens when ad identifiersa cookie or other IDconnect buyers and sellers in internet ad auctions, which occur behind the scenes every time a visitor loads a web page.

Encrypted signals fits into Googles wider experiments known as Privacy Sandbox, which is a series of new standards that the company is creating to move beyond cookies and third-party IDs. Google wants to implement stricter privacy controls within its ubiquitous online advertising ecosystem, but it also has to be careful not to create an advantage for its own business.

Dont miss the latest news. Sign up for Ad Age newsletters here.

They realize that this strategy has limits, Roche said, especially because for the rest of the world, identification is very important, especially for publishers."When publishers can identify users, their ads are worth two to three times as much, he added.

Google has said it will kill third-party cookies in Chrome web browsers by the end of 2023. The move will affect the types of data websites collect when viewers visit through Chrome. Publishers have already been dealing with similar changes to Apple Safari and Mozillas Firefox browsers.

Google is a dominant force in internet advertising, generating $209 billion in ad sales in 2021, making any changes to its platform consequential for publishers, ad tech partners and advertisers. Google is both a buyer and seller of programmatic ads, and it provides software that millions of websites use to manage their ad inventory.

There have been concerns from regulators in the U.S. and Europe that as Google applies new privacy practices, it could disadvantage ad tech rivals and publishers. Google has access to its own vast trove of data, while privacy changes could constrain the performance of competitors.

It is a tough predicament though for Google, because it also has to adjust to changing attitudes around online privacy. The overall programmatic ad business has taken heat for exposing peoples intimate internet profiles to third-party companies.

Google is being pragmatic, said an ad tech CEO, who spoke on condition of anonymity, because the program was still too nascent to discuss publicly. They said no IDs, but they are experimenting with tools for buyers and sellers that can work in the future.

Read more:
How Google is allowing publishers to keep their cookies - AdAge.com

Read More..

European rulings on the use of Google Analytics and how it may affect your business – Data Protection Report

Recent decisions out of the EU will impact the use of Google Analytics and similar non-European analytics services when targeting EU individuals, with the potential to put many organizations at risk of receiving GDPR fines.

At issue was the transfer of personal data from the EU to the US through the use of Google Analytics.

These decisions, like the Schrems decisions, make it clear that organizations must have a technical understanding of their data flows, with an emphasis on: (1) where the data is going; (2) who is receiving the data; and (3) how the data is protected. Many of our clients are using the firms technical tool suite, NT Analyzer, to assist with their data protection and privacy efforts.

It is important to remember that the analysis should not end with just cookies and Google Analytics. Cookies are only one of many ways to collect/transfer data, meaning Google Analytics and similar services can receive personal data through other means.

For example, even if a website or app is not utilizing these types of cookies/technologies, the website or app could still send personal data to Google via HTTP parameters, which are sent as part of query string (e.g., http://www.website.com/pg1/?name=John_Smith (emphasis added)). Additionally, the website or app operator could also use browser/device fingerprinting or other means to track users across web properties. Therefore, it is important to conduct a technical analysis to determine if and how a website or app utilizes these types of services to determine if mitigations are needed.

[For a useful primer and additional background on the Data Transfer schemes and Schrems II, please scroll down to the end of this article]

Like the Schrems cases, the recent Austrian NOYB case reviewed the transfer of personal data to the US. The NOYB complaint was aimed at Netdokter.at (Netdokter), an Austrian health website operator that uses Google Analytics and relies on Standard Contractual Clauses (SCCs) to govern transfers of personal data to Google in the US. NOYB argued that Google qualifies as an electronic communications service provider and is therefore subject to Section 702 of FISA, meaning that it can be ordered by public authorities to disclose personal data of EU citizens. Therefore, in light of the Schrems II decision, adequate protection of EU citizens personal data cannot be ensured, resulting in an unlawful transfer of personal data to the US.

Netdokters Austrian publishing company and Google, however, argued that the data provided to Google, which included IP addresses, other user identifiers, and browser parameters did not qualify as personal data and, even if it did, sufficient supplemental measures were put in place to safeguard the personal data. Safeguards taken by Google included: (1) transparency reporting on data requests from US authorities, (2) encryption at rest in the data centers and (3) pseudonymization of the data.

Ultimately, the Austrian DPA sided with NOYB over Netdokter and Google.

The Austrian DPA held that data transfers to Google in the US in the context of Google Analytics results in a breach of Chapter V of the GDPR, which may make it difficult for EU business and non-EU business having an EU facing website or app to use Google Analytics going forward. Specifically, according to the Ruling:

The French CNIL, through a press release, published a similar case last week. Although the CNIL has not yet made its decision public, the press release adopted similar reasoning as the Austrian DPA and ordered an unnamed French website operator to stop using Google Analytics.

In the meantime, there are several steps those impacted by these decisions should consider.

These decisions, like the Schrems decisions, make it clear that organizations must have a technical understanding of their data flows. Specifically: (1) where is the data going; (2) who is receiving the data; and (3) how is the data protected. As such, organizations should consider:

There are a few things to consider with respect to the decisions.

As was the takeaway from the Schrems II decision, any data transfer outside of the EEA should be assessed on a case-by-case basis. Therefore, the impact of these first European decisions on other US analytics services, and any kind of US data importer for that matter, should be reviewed in light of the specific additional safeguards taken by those companies to supplement the SCCs. By no means should these decisions be interpreted to mean that all personal data transfers to the US result in a breach of the GDPR.

The Austrian and French decisions are the first of many. This is not surprising given that NOYB filed 101 complaints with various EU DPAs in 2020 regarding EU companies use of Google Analytics and Facebook Connect integrations. Following these complaints, the European Data Protection Board (i.e. the European body in which the EU DPAs are represented and whose purpose is to ensure consistent application of the GDPR and to promote cooperation among the EU DPAs) formed a taskforce to coordinate the work with respect to the complaints.

Additionally, other privacy activists are following NOYBs approach. For example, InterHop issued a referral to the French CNIL asking it to consider the use of Google Analytics in the context of e-health.

Stay tuned, more to come.

Norton Rose Fulbrights Information Governance, Privacy and Cybersecurity team stands ready to assist with your data transfer needs.

If youre interested in learning more about NT Analyzer and the Data Transfer Scanner, please visit https://www.ntanalyzer.com or feel free to request a demo by clicking here.

By way of background, under the GDPR data may flow freely within the EEA, consisting of the EU countries and Iceland, Lichtenstein and Norway. Personal data may also be freely transferred to countries outside the EEA (i.e. so-called third countries) that received an adequacy decision from the European Commission. Examples are New Zealand, Japan and the UK that recently received an adequacy decision following its departure from the EU.

Transfers to other third countries are subject to the more burdensome requirements of Chapter V of the GDPR, meaning that the transfer should be subject to appropriate safeguards, and on condition that enforceable data subject rights and effective legal remedies for data subjects are available. Reasons for this is that the protection provided by the GDPR should be upheld wherever in the world the personal data is being transferred to. Appropriate safeguards may be provided by various means indicated in the GDPR, and these include the Standard Contractual Clauses (SCCs) adopted by the European Commissions and approved certification mechanisms, such as the EU US Privacy shield that was valid until the Schrems II decision of the Court of Justice of the European Union (CJEU).

The Schrems II decision, which related to the transfers of personal data from Facebook Ireland to Facebook US, also impacted the use of SCCs. The CJEU ruled that US surveillance laws, in particular section 702 of the Foreign Intelligence Surveillance Act (FISA) and Executive Order 12333, do not limit or effectively oversee public authorities access to EU personal data. Given that the SCCs only bind the parties who have entered into them, public authorities are still able to mandate the data importer to provide personal data, or obtain personal data without the cooperation of the data importer.

Based on the Schrems II judgment it is clear that, in order to transfer personal data to third countries that did not receive an adequacy decision, including the US, it is necessary to:

These supplementary measures can either be contractual, organizational and technical, but the technical measures (such as encryption or pseudonymization) are considered the most effective.

Special thanks to Nicole Sakin for her assistance in the preparation of this content.

Read the original post:
European rulings on the use of Google Analytics and how it may affect your business - Data Protection Report

Read More..

Hardware Encryption Technology Market Insights 2022, Analysis and Forecast to 2030 Talking Democrat – Talking Democrat

Understand the influence of COVID-19 on the Hardware Encryption Technology Market with our analysts monitoring the situation across the globe.

Market Strides published report titled Hardware Encryption Technology Market By Type, By Application, Regional Analysis, Growth Opportunity and Industry Forecast 2022-2030. The Hardware Encryption Technology Market Report provides a comprehensive overview including Current scenario and the future growth prospects. The Hardware Encryption Technology market report analyzes the various factors and trends in forthcoming years and key factors behind the growth and demand of this market is analyzed detailed in this report.

Some of the prominent players in the global Hardware Encryption Technology market are Western Digital CorpSeagate Technology PLCSamsung ElectronicsThalesMicron Technology IncNetAppKingston Technology CorpToshibaGemaltoCertes Networks Inc.Kanguru SolutionsIBM CorporationImationMaxim Integrated ProductsSanDisk Corporation

Our research methodology constitutes a mix of secondary & primary research which ideally starts from exhaustive data mining, conducting primary interviews (suppliers/distributors/end-users), and formulating insights, estimates, growth rates accordingly. Final primary validation is a mandate to confirm our research findings with Key Opinion Leaders (KoLs), Industry Experts, Hardware Encryption Technology includes major supplies & Independent Consultants among others.

The Hardware Encryption Technology market is segmented on the basis of type, application, end-use industry, and region & country.

Encrypted Hard Disk DrivesEncrypted Solid-State DrivesHardware Security ModuleOthers

Hardware Encryption Technology markets sub-segment is expected to hold the largest market share during the forecast period. The growing concern about the market and industry is expected to boost the Hardware Encryption Technology market.

IT & TelecomBFSIGovernment & Public UtilitiesManufacturing EnterpriseOthersHardware Encryption Technology application valves are one of the most basic and indispensable components of todays modern technological society. Market segment is expected to hold the largest market share in the global Hardware Encryption Technology market.

North America (U.S., Canada) Europe (U.K., Germany, France, Italy) Asia Pacific (China, India, Japan, Singapore, Malaysia) Latin America (Brazil, Mexico) Middle East & Africa

Market Strides is a Global aggregator and publisher of Market intelligence development reports, equity reports, database directories, and economic reports. Our repository is diverse, spanning virtually every industrial sector and even more every category and sub-category within the industry.

Our pre-onboarding strategy for publishers is perhaps, what makes us stand out in the market space. Publishers & their market Share, reports are meticulously validated by our in-house panel of consultants, prior to a feature on our website. These in-house panel of consultants are also in charge of ensuring that our website features the most updated reports only.

Market Strides have team of professionals that assist you in many advanced industry specific trends, content and tests different strategies and implements the most productive one for the business.

Excerpt from:
Hardware Encryption Technology Market Insights 2022, Analysis and Forecast to 2030 Talking Democrat - Talking Democrat

Read More..

Global Data at Rest Encryption Market 2021 Analysis By Future Demand, Top Players, Revenue and Growth Rate Through 2027 Sox Sphere – Sox Sphere

The most recent MarketsandResearch.biz research, titled Global Data at Rest Encryption Market from 2021 to 2027, gives a complete overview of the industry, covering various components of product description, market segmentation supported by numerous variables, and therefore the current vendor landscape. The study evaluates the potential and existing market conditions, giving insights and updates on the corresponding segments engaged in the worldwide Data at Rest Encryption market for the forecast period of 2021-2027. The study is a modest attempt by subject matter experts and professionals to convey market forecasting and analysis.

The study focuses on the critical elements and complexity of geographical areas while adhering to the notion of a competent global Data at Rest Encryption market analysis. The market study investigates market size, subdivision market growth, market players, recent events, and projected evaluation.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketsandresearch.biz/sample-request/223627

The report includes a comprehensive review of the present market environment as well as various data on the overall key trends, dangers, and challenges that appear to have a significant impact on market revenue generating.

Competitors in the worldwide market who are significant and evolving:

The studys goal is to discuss the following main product categories:

The studys objective is to focus on the following key application types:

The following countries are covered in the market research:

ACCESS FULL REPORT: https://www.marketsandresearch.biz/report/223627/global-data-at-rest-encryption-market-2021-by-company-regions-type-and-application-forecast-to-2026

The report defines, categorises, and assesses the markets capabilities, drivers, constraints, opportunities, challenges, and global Data at Rest Encryption competitive dynamics. The research emphasises the main features and complexity of geographical areas by referring to the framework of the global Data at Rest Encryption market competency study. The market study examines provincial and national market size, market segmentation, international market competitors, exchange guidelines, recent events and developments, potential investigation, and essential business development research. For those looking for complete market penetration, the market research delivers ready-to-refer investment suggestions.

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team (sales@marketsandresearch.biz), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: sales@marketsandresearch.biz

More:
Global Data at Rest Encryption Market 2021 Analysis By Future Demand, Top Players, Revenue and Growth Rate Through 2027 Sox Sphere - Sox Sphere

Read More..

In Perspective | Online child safety and the dangers of false equivalence – Hindustan Times

Last week, a committee of lawmakers approved a draft law to advance further in the United States (US) Senate. Called the EARN IT bill, it brings in additional obligations for tech companies, which can if the law is enacted be criminally liable for child pornography on their services.

On the surface, the law makes sense. Child pornography, or child sexual abuse material (CSAM), has found avenues to exist and proliferate, first with the arrival of the internet and then with social media, and particularly, encrypted communications.

But security technologists have compared the debate around online CSAM and the evolving argument on how to combat it to false equivalences and pedophrasty. (Lebanese-American commentator Nassim Taleb describes pedophrasty as a narrative tool in which potential harms to children are cited to diminish opposing arguments by playing to human parental instincts).

This is because, at the heart of it, the solutions being advocated to combat CSAM have to do with weakening or incentivising the weakening of end-to-end encryption, the bedrock of privacy online.

End-to-end encryption, or E2EE, is what ensures the messages we send over WhatsApp are not readable by even the company that owns the application, or how secure emails can allow scientists and government officials to exchange top secret information.

The anti-encryption narrative

The child abuse threat plugs into what is now a decades-old debate around law enforcement in the digital age. When distilled, the heart of the debate boils down to a question of which is more important: privacy or safety? In recent years, several countries notably western countries and their allies have made a case for encryption to be weakened.

Five Eyes (plus India and Japan) 2020 joint statement: The most strident of these arguments was made in an October 2020 joint statement by countries that are part of the informal grouping called the Fives Eyes nations the US, the United Kingdom (UK), Canada, Australia and New Zealand with India and Japan as co-signatories. The statement disputed the criticism that weakening or tweaking end-to-end encryption will necessarily lead to risks to cyber security and privacy.

The UKs No Place to hide 2022 campaign: In January this year, the UK Home office funded a publicity blitz opposing ultra-secure messaging applications, particularly Facebooks plans to enforce E2EE on its Messenger application. Launching the campaign, a spokesperson said E2EE will amount to turning the lights off on the ability to identify child sex abusers online, the BBC reported at the time.

Indias 2021 IT Rules: In February, the government unveiled the new Information Technology rules for social media companies and online publishers. Among these was an obligation on communication services providers to allow for the identification of who sent a particular message for the first time a feature that will not be possible within the design of E2EE. The rules have since been suspended by multiple high courts, and among the first legal challenges to it came from WhatsApp, which likened the rules to effectively putting all users under a surveillance mechanism. The rules themselves followed a 2020 report by a parliamentary committee that wanted encryption to be broken in order to combat CSAM abuses.

The EARN IT act, while not explicitly attacking encryption, will in effect incentivise companies to build mechanisms that are outside of the E2EE paradigm, online advocacy groups have said, while adding that it will do little to combat the actual problem it is intended to.

Is E2EE absolutely indispensable?

To understand the role of encryption today is to revisit the events of 2013, when US National Security Agency contractor Edward Snowden blew the whistle on a planet-scale digital surveillance dragnet run by the US and the UK, which pored over all unencrypted internet traffic. This dragnet at the time allowed these countries to spy on anyone, irrespective of whether or not they were a threat, to peak into their communications as well as access their devices.

Within months, tech companies responded to begin a shift to encryption by default. The HTTPS (or a closed padlock) that you see at the top of your browser while you read this article is a direct outcome of that push. HTTPS implies your connection to the Hindustan Times website is encrypted, meaning anyone intercepting your network traffic will not be able to determine what you are reading.

Since then, E2EE has helped protect liberties and allowed essential functions like e-commerce to be carried out with better security. These are functions that are arguably improved by the current paradigm of encryption in the global internet. And experts point out that in its absence, there is a threat not just to the individual but to national security.

E2EE and CSAM rise: A tenuous connection?

In response to the No Place to Hide campaign, the UKs own data watchdog has said that encryption helps protect children more than it harms them. Stephen Bonner, the British Information Commissioners Office executive director for innovation and technology, told BBC that end-to-end encryption helped keep children safe online by not allowing "criminals and abusers to send them harmful content or access their pictures or location".

"The discussion on end-to-end encryption use is too unbalanced to make a wise and informed choice. There is too much focus on the costs without also weighing up the significant benefits," he said.

In Analysing the National Security Implications of Weakening Encryption, researchers at Indian policy thinktank Deepstrat framed the debate around E2EE not just as a matter of security versus privacy, but also one involving security versus security.

They account for the nature of modern devices and communication architectures, as well as the nature of cybersecurity threats.

Take some of the specific anti-encryption solutions to the CSAM problem that has been advocated recently. Client-side scanning, similar to what Apple attempted to do by scanning a fingerprint of images people store on their iPhones or Mac computers, will for example set the foundation for China model of surveillance, which can be theoretically tweaked to identify any content on anyones device.

Then there is the traceability requirement that India proposes. DeepStrats report identified its flaws as being fundamentally against the nature of E2EE and creating architectural vulnerabilities that can be exploited by bad actors. Another common idea, to create backdoors for law-enforcement agencies, poses a very significant risk that malicious hackers will find it and wield it, if not unaccounted state agents themselves in an abuse of power.

The risks are not merely theoretical: there is evidence and history. For example, in 2010, China-based hackers broke into Gmail, leveraging backdoors coded in to allow lawful interceptions. Prior to that, between 2004 and 2005, phones of the Greek prime minister and his aides were tapped when an unknown attacker found backdoors built by telecommunications company Ericsson to, again, allow for lawful interception.

Official misuses are bad enough, but it's the unofficial uses that worry me more. Any surveillance and control system must itself be secured. An infrastructure conducive to surveillance and control invites surveillance and control, both by the people you expect and by the people you don't, wrote security expert Bruce Schneier, in a 2020 opinion piece for CNN.

Tinkering with E2EE, thus, requires an appreciation of all that is at stake. There have been instances where tech companies have aided law enforcement in taking more offensive measures against child sex abusers, such as the revelations in 2020 when it came to light that Facebook spent money and resource to develop hacking tools to help the FBI catch a notorious abuser.

Indeed, such examples are uncomfortably few and far in between, and the threat from CSAM large. It may be time to look at the problem beyond being that of E2EE alone but of efforts by tech companies and governments alike.

In Perspective takes a deep dive into current issues, the visible and invisible factors at play, and their implications for our future

The views expressed are personal

Read more:
In Perspective | Online child safety and the dangers of false equivalence - Hindustan Times

Read More..

UCF Researchers use Engineering Expertise to Solve Problems of the Heart – UCF

UCFs engineers do more than develop innovative space technology or reimagine the next generation of wind turbines they also solve matters of the heart.

Several mechanical and aerospace engineers at UCF focus their expertise on finding creative solutions to various heart conditions. Heart disease is the leading cause of death for men and women in the United States with one person dying every 36 seconds, according to the Centers for Disease Control.

Its rewarding to work on such interesting problems at the interface of engineering and medicine with the precise aim to improve quality of life, says Alain Kassab, a professor and director of the UCF biomedical engineering program.

Removing the Defects From Pediatric Open-heart Surgery

When children are born with a defective ventricle, they typically undergo a series of three surgeries to reconfigure the heart and the circulatory system. During the final procedure, a new system known as Fontan circulation is established. This allows the blood that returns from the body to flow directly to the lungs without passing through the heart, while the single functioning ventricle pumps blood to the body.

Children typically undergo the Fontan procedure between the ages of 1 and 3. While it may help them survive infancy, it doesnt guarantee that theyll live a long life.

A substantial proportion of patients with the Fontan circulation do not do well as a consequence of having taken the pumping right ventricle out of the pulmonary or Fontan side of the circulation, says Kassab. Although this surgical treatment began nearly 30 years ago, the mortality rate is still elevated with nearly half of patients not surviving beyond the age of 20.

Physicians believe that a substantial proportion of patients with the Fontan circulation do not do well because the pumping right ventricle has been taken out of the pulmonary side of the circulation, says Kassab. Although the first Fontan surgery was performed nearly 50 years ago, the mortality rate is still elevated with nearly half of patients not surviving beyond the age of 20.

To improve upon the defects created by Fontan circulation, Kassab is collaborating with a team of multidisciplinary researchers to develop a self-powered injection jet shunt that utilizes the hearts own energy to alleviate the increase in pressure caused by the rerouted circulatory system.

The team which includes William DeCampli, the chief of pediatric cardiac surgery at Arnold Palmer Childrens Hospital and a professor of surgery at the UCF College of Medicine; Ray Prather 13 15MS 18PhD, a senior research associate at Arnold Palmer Childrens Hospital; and Eduardo Divo 98PhD, the chair of the Department of Mechanical Engineering at Embry-Riddle Aeronautical Engineering initiated this project in 2015. Together, theyve secured more than $700,000 in grants from the American Heart Association, the Childrens Heart Foundation, and Additional Ventures, a nonprofit that supports research on single ventricle heart defects.

Our close collaboration with Dr. DeCampli and Arnold Palmer Childrens Hospital is the key to effectively addressing such a complex multi-disciplinary problem, says Kassab. Each team member brings key expertise to bear on the critical aspects of the physics and physiology of the problem.

The latest research data was published in Scientific Reports on Feb. 9.

Monitoring Heart Failure Through Sound

Patients who have been diagnosed with heart failure may be able to monitor their heart health with the aid of a credit card-sized device in the near future. This innovative, non-invasive heart monitor will use acoustic technology to monitor the deterioration of heart function, which could reduce the need for patient hospitalization and even prevent death.

Associate Professor Hansen Mansy, who runs the Biomedical Acoustics Research Laboratory, is developing this device in collaboration with Richard Sandler of the UCF College of Medicine. The pair received a $1.3 million grant from the National Institutes of Health in 2017 to complete the project.

The device is designed to be used by patients, but it will provide important data to physicians who can determine if further medical intervention is necessary. Patients will place the small device over their chests and a sensor will detect the chest vibrations caused by their heart activity. That recorded activity can then be uploaded to a mobile phone or computer and sent to physicians daily via a secure patient portal.

Physicians can use the data to determine if a patients heart heath is worsening. If it is, they can implement a more effective treatment plan that can prevent hospitalization and improve the patients quality of life.

Mansy and his research team have already begun clinical testing on the device.

Although the clinical testing has been slowed down due to COVID-19, initial results are encouraging and suggest that early detection of the need for hospital readmission may be feasible using our proposed methods, Mansy says.

The team has used advanced signal processing methods to measure the electromechanical signals of the heart. The features of those signals are extracted and the data is put into a machine learning algorithm that builds the model that can predict heart function deterioration.

Mansy and Sandler are collaborating with AdventHealth and the Biomedical Acoustics Research Company on the project. Mansy says that the next steps for the team include further analysis and additional clinical testing.

Creating Faster and More Accurate Diagnoses

In the Computational Biomechanics Lab, Assistant Professor Luigi Perotti and his team are using computational modeling to develop a new non-invasive method of detecting the biomarkers of cardiac deformation, which could lead to faster and more accurate diagnoses of heart disease.

One of our main focuses is to analyze imaging data to determine the biomarkers of cardiac health, Perotti says. These biomarkers could then be extracted from patient-specific data and indicate the onset or progression of cardiac diseases.

By using patient data that is already available in the clinic rather than data acquired through a research setting, Perotti says that physicians can diagnose their patients much faster. He believes their diagnoses can also be more accurate by using aggregate cardiomyocyte strains made of the cells responsible for contracting the heart and pumping blood through the circulatory system as biomarkers for cardiac health.

Perotti is collaborating on this project with researchers from Stanford University and the University of Lyon.

How Biomechanical Forces Influence Heart Disease

While his colleagues look for solutions to the problems caused by heart disease, Assistant Professor Robert Steward uses his engineering expertise to explore the problems that cause heart disease.

With the support of a $738,000 grant from the National Institutes of Health, Steward has spent the past five years investigating the biomechanical forces that can influence the early stages of heart disease known as atherosclerosis. This stage is characterized by an excessive buildup of white blood cells and bad cholesterol in the arteries. Steward found that blood flow induces mechanical stress that allows white blood cells to enter weak areas of the heart.

The findings yielded from this work have the potential to lead to novel, mechanics-based therapeutics for cardiovascular disease, Steward says.

Steward collaborated with Sampath Parthasarathy from the UCF College of Medicine on the project, which officially concludes in May. He plans to publish the findings in an academic journal in the coming months.

In the meantime, Steward will use his CAREER grant, sponsored by the U.S. National Science Foundation, to pick up where the NIH project left off. He was one of five UCF researchers to receive the award this past year.

He says the NSF project will focus on the basic science of how biomechanical forces influence the endothelium, a group of cells that line the blood vessels in the body, including the arteries. With this knowledge, better therapies for heart disease could be developed, or the disease could potentially be eliminated.

Over the past few months, Steward and his Cellular Biomechanics Lab have been exploring the use of machine learning algorithms to predict the biomechanical response of the endothelium, but he says further refinement is needed for this portion of the project.

About the Researchers

Kassab joined UCF in 1991 and has received numerous awards and distinctions since then, including the titles of Pegasus Professor and UCF Trustee Chair. His research spans several disciplines in computational heat transfer and fluid dynamics, inverse problems, boundary element and meshless methods. He has been funded by the American Heart Association, Orlando Health, Siemens, the U.S. National Science Foundation,and NASA, to name a few. He earned his bachelors degree in engineering sciences and his masters and doctoral degrees in mechanical engineering, all from the University of Florida. He is also a fellow of the American Society of Mechanical Engineers and the American Institute for Medical and Biological Engineering.

Mansy received his Ph.D. at the Illinois Institute of Technology and bachelor and masters degrees at Cairo University in Cairo, Egypt. He was associate professor of bioengineering at Rush Medical College before joining UCF. He has been developing vibro-acoustic medical technologies for the past 20 years with continuous support from the National Institutes of Health. He has supervised bioengineering student projects at Rush Medical College, University of Illinois at Chicago and UCF and has developed bioinstrumentation, and mechanical and aerospace engineering measurements lab facilities at UCF and Illinois Institute of Technology.

Perotti received his undergraduate degree in civil engineering from Politecnico di Milano in Italy and his masters and doctoral degrees from the California Institute of Technology. He served as an America Heart Association postdoctoral fellow at UCLA and in 2017, he received an NIH K25 Mentored Quantitative Research Career Development Awardto continue his research on combining computational models with MRI data and conduct pre-clinical studies.He joined UCF as an assistant professor in 2019.

Steward joined UCF as an assistant professor in 2015. He previously served as a postdoctoral scholar at the Harvard T.H. Chan School of Public Health, where he investigated the influence of fluid shear stress on endothelial biomechanics. He earned his doctoral degree at Carnegie Mellon University and his bachelors degree at Clark Atlanta University. Steward currently runs the Cellular Biomechanics lab located on UCFs Health Science Campus at Lake Nona, where he has multiple projects with the ultimate goal of linking mechanics and medicine.

See the article here:

UCF Researchers use Engineering Expertise to Solve Problems of the Heart - UCF

Read More..

Engineering smart and sustainable cities of the future at Northeastern University – Study International News

Drones autonomously inspect bridges and skyscrapers, reaching places that humans cannot safely. Artificial intelligence and machine learning aid in predicting weather extremes from hurricanes to earthquakes to help save lives. Smart technologies optimize transportation systems and roadways in fast-growing urban cities, while floating wind turbines hold promise to power the grid and mitigate climate change. These are just a few of the many ways civil and environmental engineers are transforming the built environment for a new generation of exciting possibilities.

According to the American Society of Civil Engineers (ASCE), demands for sustainable energy, fresh water, clean air, and safe waste disposal are driving infrastructure development on a global scale. Addressing these challenges requires interdisciplinary knowledge and integrating technology, data, science, and policy. You can learn more about the ASCEs Vision for Civil Engineering here.

Northeastern University College of Engineering, a top ranked, R1 top-tier research university in Boston, Massachusetts, with a global network of campuses, is a leader in civil and environmental engineering education, research, and experiential learning.

The Department of Civil and Environmental Engineering offers a Master of Science in Civil Engineering, and students can delve into their area of interest by selecting from six concentrations. A Master of Science in Environmental Engineering is also offered as is a Doctor of Philosophy degree in Civil and Environmental Engineering and in Interdisciplinary Engineering. Specialized interdisciplinary masters degrees include the MS in Sustainable Building Systems and the MS in Engineering and Public Policy.

With a constant eye on the emerging needs of industry, Northeastern recently added a concentration in Data and Systems to its civil and environmental engineering portfolio. Artificial intelligence and machine learning open exciting new opportunities for researchers to learn from and leverage data, while the increasing availability of affordable sensors is changing the way cities and the environment are measured and monitored. Buildings, transportation networks, energy utilities, and water resource infrastructure are designed with increasingly complicated smart technology. The curriculum is designed to give the engineers of tomorrow the interdisciplinary knowledge, and technical and analytical skills to build, maintain, and learn from AI and smart systems and the large quantities of data they produce.

Aravind Uthaman graduated with a masters degree in civil engineering with a concentration in structural engineering in 2019. He credits his career as a structural engineer to Northeasterns emphasis on experiential learning, which began on his first day of orientation.

He worked on the pioneering research that brought his faculty advisor, CDM Smith Professor and Chair Jerome Hajjar, national attention in his field improving human safety by using drones to inspect bridges. The drones capture high-resolution 3D images of the bridges that are then used to conduct inspections.

My work with Professor Hajjar helped me sharpen my software skills such as Revit, Tekla, AutoCAD, and STAAD, says Aravind. These were important skills to have on my resume. I also had an opportunity to contribute to two published papers. Companies want this because it shows dedication to the field.

Co-op was another key experience for Aravind, who spent seven months working as part of the academic curriculum at Lemessurier Consultants, a Boston-based structural engineering firm. I went there expecting to be assigned mostly routine tasks, but on the contrary, they gave me several actual projects to handle. In all, I had the opportunity to work on 24 projects, he said. Northeastern is ranked No. 1 in cooperative education and is one of only a few that offer graduate students the opportunity to participate in co-op.

In addition to Northeasterns extensive research enterprise, in 2021 the Department of Civil and Environmental Engineering opened a unique Smart Cities Laboratory to advance their vision of urban engineering. To meet the needs of a rapidly urbanizing society and a changing planet, the cities of the future need to utilize emerging technologies to create resilient, sustainable, and highly livable urban spaces.

The Smart Cities Lab is designed to enable interdisciplinary research coupling the disciplinary fields in civil and environmental engineering with the advancing methods of artificial intelligence, machine learning, Big Data analytics, and computer sciences. The lab features a living lab for urban environmental temperature experimentation and control, virtual reality/drone research, and an electronic fabrication and build space.

The Smart Cities Lab is where the disciplinary fields of civil and environmental engineering collide with the advancing methods of artificial intelligence, machine learning, Big Data analytics, and computer sciences. Source: Shutterstock

Interdisciplinary research being conducted by Northeasterns civil and environmental engineering faculty spans civil infrastructure security, environmental health, and sustainable resource engineering. Here are just a few examples. With a National Science Foundation CAREER Award, Assistant Professor Michael Kane is designing smart thermostats that model human response to temperature changes and use that data to satisfy the competing objectives of energy management and occupant comfort.

Assistant Professor Amy Mueller is creating an innovative new sensor solution to marine aquaculture water quality monitoring. Professor Jim Chen tracks hurricane data as part of a federally funded project to help coastal communities prepare their shorelines for future storms. Associate Professor Andrew Myers is designing lightweightoffshore wind turbinesthat he envisions will allow the US to take advantage of the enormous wind energy potential off the US East Coast.

These are just some of the highlights of research and experiential learning opportunities at Northeastern Universitys College of Engineering. Take the next step in your career journey by learning more and applying today.

Follow Northeastern University on Facebook, Twitter, Instagram, YouTube, and LinkedIn

View post:

Engineering smart and sustainable cities of the future at Northeastern University - Study International News

Read More..