Page 3,406«..1020..3,4053,4063,4073,408..3,4203,430..»

Activate these 4 WhatsApp settings NOW to stop snoopers including face-lock and encryption – The Sun

AS messaging apps go, WhatsApp is a pretty safe way to talk to your friends online.

However, there are lots of little ways you can protect yourself further from WhatsApp snoopers and we've rounded up a few below.

2

Two-factor authentication is very useful to have setup on any device that contains personal data like photos and messages.

It just means adding an extra security step before you can access an app or device.

Open WhatsApp, go to Settings, then click "Two-Step Verification".

The click "Enable" and enter a PIN of your choose.

2

WhatsApp will occasionally ask for this PIN when you use the app to double check it is you.

This is useful if your phone is hacked or if someone knows the password to your handset but not your WhatsApp PIN.

Then PIN will also be required to add contacts.

This step is useful if you don't want people to know you've read their message.

It just means if you do open a message, the person who sent it won't see two blue ticks to indicate you've seen it.

Go to Settings, click "Privacy" and then turn the "Read Receipts" toggle off.

This means you won't be able to see if other people have read your messages.

Bear in mind that read receipts are always visible on group chats.

WhatsApp has a Face ID feature that means you can only unlock the app with your own face.

To turn it on, go to Settings, click "Privacy and then "Screen Lock".

You'll see a "Require Face ID" toggle that you can turn on and off.

There's also a message that explains: "When enabled, you'll need to use Face ID to unlock WhatsApp.

"You can still reply to messages from notifications and answer calls if WhatsApp is locked."

WhatsApp is already encrypted so your messages are already pretty safe.

This means only you and the chat you're sending messages to can see the conversation unless they happen to be 'screenshotting'.

However, if you back up your chats to the cloud then they aren't protected in the same way.

Law enforcement could ask Google or Applefor access to your backed up chats and there's a chance they could be handed over.

Alternatively, a hacker could enter your cloud backup.

To turn off cloud backup go to Settings, then click "Chats", "Chat Backup", "Auto Backup" and then turn the toggle off.

WhatsApp a quick history

Here's what you need to know...

Hot Deals

LISTEN UPSpotify is giving away FREE Google Nest Mini smart speakers to subscribers

CHANGING PLACESFind YOUR town 750million years ago with mind-blowing Earth map

ROCKY HORRORNASA tracking huge asteroid which will 'hit Earth's orbit next month'

HOLEY HELLGiant hole that appeared in Siberia was caused by enormous methane explosion

FREE NETFLIXWatch Netflix for FREE with no subscription thanks to a global promotion

In other news, Facebook has sparked widespread fury over a threat to ban news stories in Australia.

Rumours suggest the iPhone XR, iPhone 11 Pro and iPhone 11 Pro Max could be decommissioned when the iPhone 12 arrives.

And, Facebook messenger has started to merge with Instagram chat.

What's your favourite app to message on? Let us know in the comments...

We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at tech@the-sun.co.uk

See more here:
Activate these 4 WhatsApp settings NOW to stop snoopers including face-lock and encryption - The Sun

Read More..

What to do in the event of a ransomware attack – Charity Digital News

Youre working away on your charitys computer when suddenly a message pops up on your screen.

"Your important files are encrypted. If you want to decrypt them you need to pay us."

Youve just fallen victim to a ransomware attack.

The first thing to do is take a deep breath. Dont panic. Multiple businesses and charities fall victim to a ransomware attack every minute, according to CyberSecurity Ventures, so you are not alone.

What you do next may be the difference between minor inconvenience and a catastrophe for your charity. By following these steps you can maximise the chance or retrieving your data, and minimise the impact of the ransomware attack to you and your charity.

As soon as you are aware of a ransomware attack, disconnect your computer from the network and any attached storage systems such as external hard drives or USB sticks. This is to try to prevent the ransomware spreading to any other of your charitys computer systems, or to externally stored data such as backup drives.

Once you have disconnected your computer, take a photograph of the ransom note on your screen. This is important in case your charity needs to make a cyber insurance or some other insurance claim.

Since ransomware can spread from one machine to another, its important to tell your charitys IT department, if it has one, or your colleagues about the attack.

That will enable them to take steps to ensure that more of your charitys computer systems do not fall victim to the ransomware. You are also encouraged to report cyber crime and fraud to Action Fraud. It may also be necessary to inform the Information Commissioners Office (ICO) and the Charity Commission.

Different strains of ransomware use different methods to encrypt your data, so if you want to be able to decrypt it then its important to identify exactly what you have fallen victim to.

There are a number of free online services which can identify the ransomware for you after you to upload an encrypted file or the ransom note. These include ID Ransomware and Crypto Sheriff. Alternatively, if you have access to another computer, you can download a free identification tool such as the Bitdefender Ransomware Recognition Tool

Before making any attempts to retrieve your data, it is vital that you remove the ransomware infection from your computer. If you dont, the ransomware will simply re-encrypt any data you recover and you will be back in the same situation as before. Most good endpoint protection products from vendors such as Avast, Bitdefender, or Norton should be able to do this.

Some strains of ransomware copy data, encrypt the copies, and then delete the original data. If thats the case then it may be possible to recover some of your data using a tool such as ShadowExplorer or Recuva.

Modern encryption techniques, when properly implemented, result in encrypted files which are effectively impossible to decrypt without the encryption key which only the ransomware author possesses. (It may be possible to guess the encryption key, but a fast computer making millions of guesses per second could take thousands of years to chance upon the correct key).

The good news is that in some cases the ransomware authors have not implemented the encryption correctly, or the decryption keys (or ways to generate them) have leaked out into the public domain. That means that if you have fallen victim to one of these strains of ransomware then it is possible to decrypt your files and restore access to your data. To make this easy many security researchers have created decryption tools.

To decrypt your data, head to a decryption tool repository such as NoMoreRansom or Heimdal Securitys decryption tool directory. If the strain of ransomware you identified in step 4 above is listed then download the decryption tool, and then follow the instructions to decrypt your data.

If no decryption tool exists for the ransomware that has encrypted your files, then the next course of action is to delete the encrypted data files (or better still store them somewhere offline in case a decryption tool becomes available at a later date) and restore it from a backup.

This, of course, presupposes that an up-to-date backup of your data exists, and the backup has not also been encrypted or infected by the ransomware. Backups are more likely to be out of date or encrypted if they are carried out manually (perhaps every evening) and stored on a second hard drive or a connected external drive than they are if they are carried out automatically to a backup storage service in the cloud such as Livedrive or Carbonite.

To ensure that no trace of the ransomware remains on your computer, some security experts recommend completely wiping your hard drive and reinstalling the operating system and all applications before restoring your data.

If no decryption tool exists and restoring data from a backup is not possible (or the data is too far out of date to be useful) then the final option is to consider paying the ransom.

There are a number of important things to consider carefully:

Read the rest here:
What to do in the event of a ransomware attack - Charity Digital News

Read More..

TLS Is Only as Strong as Its Weakest Link – Hashed Out by The SSL Store – Hashed Out by The SSL Store

Weak encryption is a real risk to data privacy and security. This article, based on Packet Detectives episode The case of the unknown TLS versions, shows how you can use packet capture (via Endace) and Wireshark to discover the outdated & vulnerable devices that exist on your network

Updates to TLS have significantly strengthened data privacy over the Internet with the introduction of perfect forward secrecy and stronger crypto ciphers in TLS 1.2 and TLS 1.3. Stronger cyphers, which are almost impossible to crack using modern computers, protects the privacy of sensitive data as it traverses the Internet.

Weak cyphers can leave sensitive transactions exposed to brute force attacks and man-in-the-middle (MitM) attacks. For example, your login credentials, password, or sensitive data that displays in your web browser may be exposed if a cybercriminal decrypts a TLS session can be decrypted. Its for this reason that the industry is rapidly moving to deprecate TLS 1.0 and 1.1.

Back in 2018, Google, Microsoft, Apple and Mozilla announced that their browsers will remove support for these outdated versions of TLS. Many cloud services, such as Office 365, have pledged to do the same.

To reduce the threat of these attacks and the consequences that accompany them, its essential that all of your devices, servers and applications are using the most recent versions of TLS (TLS 1.2 or later). But how can you tell what version of TLS encryption is being used? And how can you ensure that all of your connected devices and endpoints arent using outdated versions of the TLS protocol? Well walk you through the process of collecting network packet data using Endace and Wireshark.

Lets hash it out.

Its important to ensure recent versions of TLS are being used by all devices, servers and applications in the enterprise to reduce these threats. August 2020 data from SSL Labs shows that 65.5% of sites support TLS 1.2, whereas 32.8% support TLS 1.3. This data is based on the 150,000 most popular sites in the world (according to Alexas list).

But what decides which version of TLS the client and server use to communication? The version of TLS thats used to encrypt data is defined through a negotiation between the server and client where a handshake agrees on the strongest encryption that both can handle.

Hashed Out has broken down the TLS handshake process before. However, heres a visual overview of how that process works and the communications that take place between the client and the server as a quick reminder.

Every device that uses SSL/TLS including applications, networking elements, servers, IoT devices and endpoints must be updated with the latest software and/or OS that supports TLS 1.2 or greater. Furthermore, each device must be configured to deny connection requests at TLS 1.1 and lower.

Manage Digital Certificates like a Boss

14 Certificate Management Best Practices to keep your organization running, secure and fully-compliant.

Thats because outdated and legacy devices become the weakest link for security and data privacy. Needless to say, tracking down all the devices in your enterprise and updating them can be a daunting task especially when just about every device connects to Wi-Fi and has a web interface!

Some firewalls can detect and block traffic by TLS version, so one solution is to block older TLS traffic in your network. However, blocking older versions of TLS without certain knowledge of who or what is using them can lead to nasty (and unintended) surprises.

Updating web browsers may not be enough to remove older TLS traffic. Many endpoints on the network use TLS including servers, software agents and IoT devices and all of these can also be outdated. Another approach is to observe what is happening on the network and identify where older TLS traffic is originating. Outdated TLS agents can then be identified and, if needed, updated or replaced before blocking traffic.

Server logs, event logs and monitoring systems dont necessarily track the TLS version, so an EndaceProbe is used to capture the TLS version negotiations. Packet capture gives a true and accurate picture of all network activity so nothing is missed or altered, and its hard to argue with (should that become necessary). The downside is without good methodology, a huge amount of data (thats difficult to use) can be collected and thats a lot of noise to sort through. But with the right steps, this process is easily managed.

First, create a filter on the EndaceProbe (for example, Port443) in a Wireshark-compatible syntax to capture Port 443 traffic. Set the filter to ignore any other traffic that you dont need.

Using smart truncation in addition to filtering will reduce the data volume even further by truncating data packets and leaving TLS handshake negotiations intact. This reduces the size of the capture file, which is easier to store and manage.

Apply the Port443 filter to a data pipe on the EndaceProbe and let that capture for a full day to get a typical traffic sample. Port 443 is strictly for HTTPS traffic.

You are now ready to analyze. You can get a quick overview, using the built-in investigation tool, where traffic on Port 443 is going. Microsoft One Drive traffic tops the list, which is not unexpected but take a look at that Tik Tok (musical.ly) traffic!

To get into more detail and look into the fields of the TLS Hello packets, youll need to use a tool like Wireshark. Limit the time window to work hours and extract the capture from the EndaceProbe. This results in a 48GB capture file.

You can further reduce the amount of data by applying a Wireshark read filter when opening the capture file. This limits what is read into tls.handshake.type packets with a type of 1 or 2 the handshake types for client and server Hellos and ignores items like certificate and key exchanges. This reduces the number of packets loaded into Wireshark from more than 5 million to about 42,000.

You can save time in Wireshark by using a profile. These examples use a Wireshark profile that has been created to filter by TLS version on the client or server. You can download this Wireshark profile from the Endace website.

During the handshake, the server will only go to the highest TLS version that the client supports. This means that a good starting point is to examine the Client Hellos first. If you look at the packet detail of a Client Hello packet, you can see the TLS version and maximum version capabilities of that client.

The capture shows the actual TLS version in use and the clients using it. Many things can influence the TLS version used. For example, a web browser requesting an older TLS version may be due to a cookie from the last conversation, or maybe a non-browser software agent or device is in use.

If outdated clients are found, there may be much work yet to be done, but at least you now know with some certainty where the problem areas are.

The server makes the final determination of which TLS version is used by selecting the highest version that both client and server support. You can list servers using Wiresharks statistics and endpoints, and then apply Limit to display using the filter, so only those servers using TLS 1.1 or older are listed. This will allow you to further narrow down on the specific traffic youre targeting.

At this stage, you can export a list of servers from Wireshark (in CSV or YAML format) that might need updates. By switching your filters and endpoints, you can identify other areas that may need attention. The best case is to get everything up to TLS version 1.3. However, there is some urgency to eliminate the use of TLS versions below 1.2 (and the vulnerabilities that accompany them).

Applying Wireshark with a sound methodology and filtering gives an effective and efficient way to analyze TLS use in your network. When combined with untamperable packet capture, you can build a detailed, complete and certain picture of what is going on in your network that enables change without guess work. As a result, you can start addressing TLS issues where they originate, before blocking activity at the network level.

By identifying the weakest links in your network, you get on with eliminating them, without any unpleasant surprises and without managing irate users complaints.

This article was co-written with Betty DuBois, Chief Detective for Packet Detectives, an application and network performance consulting and training firm based in Atlanta, GA. DuBois has been solving mysteries since 1997. Experienced with a range of hardware and software packet capture solutions, she captures the right data, in the right place, and at the right time to find the real culprit. Check out bettydubois.com to learn more or to contact her.

Read the rest here:
TLS Is Only as Strong as Its Weakest Link - Hashed Out by The SSL Store - Hashed Out by The SSL Store

Read More..

Encryption Management Solutions Market Trends, Size, Share, Status, Analysis And Forecast To 2025 – The News Brok

Encryption Management Solutions Market

UpMarketResearch, 02-09-2020: The research report on the Encryption Management Solutions Market is a deep analysis of the market. This is a latest report, covering the current COVID-19 impact on the market. The pandemic of Coronavirus (COVID-19) has affected every aspect of life globally. This has brought along several changes in market conditions. The rapidly changing market scenario and initial and future assessment of the impact is covered in the report. Experts have studied the historical data and compared it with the changing market situations. The report covers all the necessary information required by new entrants as well as the existing players to gain deeper insight.

Furthermore, the statistical survey in the report focuses on product specifications, costs, production capacities, marketing channels, and market players. Upstream raw materials, downstream demand analysis, and a list of end-user industries have been studied systematically, along with the suppliers in this market. The product flow and distribution channel have also been presented in this research report.

Get a PDF Copy of the Sample Report for Free @ https://www.upmarketresearch.com/home/requested_sample/75062

The Major Manufacturers Covered in this Report:Check Point Software TechnologiesCisco SystemsIBMMicrosoftOracleSymantec

The Research Study Focuses on:

By Types:Disk EncryptionFolder Encryption Communication EncryptionCloud Encryption

By Applications:BFSIHealthcareGovernmentRetailIT and telecom

By Regions:

To get this report at incredible Discounts, visit @ https://www.upmarketresearch.com/home/request_for_discount/75062

The Encryption Management Solutions Market Report Consists of the Following Points:

Make an Inquiry of the Encryption Management Solutions Market Report @ https://www.upmarketresearch.com/home/enquiry_before_buying/75062

In conclusion, the Encryption Management Solutions Market report is a reliable source for accessing the research data that is projected to exponentially accelerate your business. The report provides information such as economic scenarios, benefits, limits, trends, market growth rate, and figures. SWOT analysis is also incorporated in the report along with speculation attainability investigation and venture return investigation.

About UpMarketResearch:Up Market Research (https://www.upmarketresearch.com) is a leading distributor of market research report with more than 800+ global clients. As a market research company, we take pride in equipping our clients with insights and data that holds the power to truly make a difference to their business. Our mission is singular and well-defined we want to help our clients envisage their business environment so that they are able to make informed, strategic and therefore successful decisions for themselves.

Contact Info UpMarketResearchName Alex MathewsEmail [emailprotected]Organization UpMarketResearchAddress 500 East E Street, Ontario, CA 91764, United States.

See the original post:
Encryption Management Solutions Market Trends, Size, Share, Status, Analysis And Forecast To 2025 - The News Brok

Read More..

Cloud Encryption Market Insights Business Opportunities, Current Trends And Restraints Forecast 2026 – Reports Watch

Cloud Encryption Market research report provides insightful information about the Global Cloud Encryption Market for the base year 2019 and the forecast between 2020 and 2026. The market value, market share, market size, and revenue have been estimated based on the product types, application outlook, and regional segmentation of the industry. The analysis of the key segments of the industry has been provided for the global and regional markets.

The impact of the COVID-19 pandemic has been observed across all the sectors in all the industries. The economic landscape has been dynamically altered owing to the crisis, and a change in the demands and trends has also been observed. The report studies the impact of COVID-19 on the market and analyses the key changes in the trends and growth patterns. It also provides an estimation of the current and future impact of COVID-19 on the overall growth of the industry.

Get a sample of the report @ https://www.reportsanddata.com/sample-enquiry-form/2224

The report gives a comprehensive analysis of the Cloud Encryption market at the global and regional level, and the forecast has been presented in terms of value and price for the period of 8 years from 2020-2027. The report covers an extensive study of the market drivers and restraints on the global scale and provides an impact analysis of those market drivers and restraints on the demand and supply ratio for the Cloud Encryption market throughout the forecast period.

The report covers extensive analysis of the key market players in the market, along with their business overview, expansion plans, and strategies. The key players studied in the report include:

Sophos Group Plc., Thales e-Security, Gemalto N.V., Skyhigh Networks, Symantec Corporation, CipherCloud, Netskope Inc., Trend Micro Incorporated, HyTrust Inc., and Vaultive Inc., among others.

The report on the Cloud Encryption market provides a deeper understanding and a comprehensive view of the Cloud Encryption business sphere. Porters Five Forces Analysis and SWOT analysis have been covered by the report to provide relevant data on the competitive landscape. The study also covers the market analysis, and an in-depth analysis of the application segment is offered based on their market size, rate of growth, and trends.

Request a discount on the report @ https://www.reportsanddata.com/discount-enquiry-form/2224

The research report is an investigative study providing a conclusive view of the Cloud Encryption business sphere by an in-depth segmentation of the market into key applications, types, and regions. These segments are analyzed on the basis of present, emerging, and future trends. The regional segmentation provides a current and gives demand estimation for the Cloud Encryption industry in the key regions of North America, Europe, Asia Pacific, Latin America, and Middle East & Africa.

Component Type Outlook Revenue, USD Billion; 2016-2026)

Service Type Outlook (Revenue, USD Billion; 2016-2026)

Deployment Outlook (Revenue, USD Billion; 2016-2026)

End-Users Outlook (Revenue, USD Billion; 2016-2026)

Request customization of the report @ https://www.reportsanddata.com/request-customization-form/2224

Overview of the TOC of the Report:

To read more about the report, visit @ https://www.reportsanddata.com/report-detail/cloud-encryption-market

Thank you for reading our report. To know more about the details of the report or inquire about customization, please connect with us. Our team will ensure the report is customized accordingly to meet your requirements.

Read the original post:
Cloud Encryption Market Insights Business Opportunities, Current Trends And Restraints Forecast 2026 - Reports Watch

Read More..

9 ways to build privacy into cloud applications – Reseller News

Privacy is one of those nebulous ideas that everyone loves. Delivering it, though, is a job thats full of nuance and tradeoffs.

Turn the dial too far to one side and the databases are useless. Turn it too far in the other direction and everyone is upset about your plan to install camera arrays in their shower to automatically reorder soap.

The good news is that there is a dial to turn. In the early days, everyone assumed that there was just a switch. One position delivered all of the wonderful magic of email, online ordering, and smartphones. The other position was the cash-only world of living off the grid in a cabin wearing an aluminum foil hat.

Privacy enhancing technologies let you control how much privacy to support but limit that control to preserve functionality. They mix in encryption functions with clever algorithms to build databases that can answer some questions correctly but only for the right people.

In my book, Translucent Databases, I explored building a babysitter scheduling service that could let parents book babysitters without storing personal information in the central database. The parents and babysitters could get the correct answer from the database, but any attacker or insider with root privileges would get only scrambled noise.

The field has grown dramatically over the years and there are now a number of approaches and strategies that do a good job of protecting many facets of our personal lives. They store just enough information for businesses to deliver products while avoiding some of the obvious dangers that can appear if hackers or insiders gain access.

The approaches all have their limits. They will defend against the most general attacks but some start to crumble if the attackers are better equipped or the attacks are more targeted. Often the amount of protection is proportional to the amount of computation power required for the encryption calculations. Basic protections may not add noticeable extra load to the system, but providing perfect security may be out of reach for even the cloud companies.

But these limits shouldnt stop us from adding the basic protections. The perfectly secure approach may not be out there, but adding some of these simpler solutions can protect everyone against some of the worst attacks that can be enabled by the new cloud services.

Here are nine strategies for balancing privacy with functionality.

Use the features

The cloud providers understand that customers are nervous about security and theyve slowly added features that make it easier to lock up your data. Amazon, for instance, offers more than two dozen products that help add security. The AWS Firewall Managerhelps make sure the firewalls let in only the right packets.

AWS Macie will scan your data looking for sensitive data thats too open. Google Cloud and Microsoft Azure have their own collections of security tools. Understanding all of these products may take a team but its the best place to start securing your cloud work.

Watch the secrets

Securing the passwords, encryption keys, and authentication parameters is hard enough when were just locking down our desktops. Its much trickier with cloud machines, especially when theyre managed by a team.

A variety of different tools are designed to help. Youve still got to be careful with source code management, but the tools will help juggle the secrets so they can be added to the cloud machines safely. Tools like Hashicorps Vault, Dopplers Enclave, AWSs Key Management System, and Oktas API management tools are just some of the options that simplify the process. All still require some care but they are better than writing down passwords in a little notebook and locking it in someones office.

Consider dedicated hardware

Its hard to know how paranoid to be about sharing computer hardware with others. Its hard to believe that an attacker may finagle a way to share the right machine and then exploit some of the different extreme approaches like rowhammer, but some data might be worth the hard work.

The cloud companies offer dedicated hardware just for occasions like this. If your computing load is fairly constant, it may even make economic sense to use local servers in your own building. Some embrace the cloud companys hybrid tools and others want to set up their own machines. In any case, taking complete control of a computer is more expensive than sharing, but it rules out many attacks.

Hashing

One of the simplest solutions is to use a one-way function to hide personal information. These mathematical functions are designed to be easy to compute but practically impossible to reverse. If you replace someones name with f(name), someone browsing the database will only see the random encrypted noise that comes out of the one-way function.

This data may be inscrutable to casual browsers, but it can still be useful. If you want to search for Bobs records, you can compute f(Bob) and use this scrambled value in your query.

This approach is secure against casual browsers who may find an interesting row in a database and try to unscramble the value of f(name). It wont stop targeted browsing by attackers who know they are looking for Bob. More sophisticated approaches can add more layers of protection.

The most common one-way functions may be the Secure Hash Algorithmor SHA, a collection of functions approved by the US National Institute of Standards and Technology. There are several different versions, and some weaknesses have been found in the earlier versions, so make sure you use a new one.

Pure encryption

Good encryption functions are built into many layers of the operating system and file system. Activating them is a good way to add some basic security against low-level attackers and people who might gain physical access to your device. If youre storing data on your laptop, keeping it encrypted saves some of the worry if you lose the machine.

Regular encryption functions, though, are not one-way. Theres a way to unscramble the data. Choosing regular encryption is often unavoidable because youre planning on using the data, but it leaves another pathway for the attackers. If you can apply the right key to unscramble the data, they can find a copy of that key and deploy it too. Make sure you read the section above about guarding secrets.

Fake data

While some complain about fake news corrupting the world, fake data has the potential to protect us. Instead of opening up the real data set to partners or insiders who need to use it for projects like AI training or planning, some developers are creating fake versions of the data that have many of the same statistical properties.

RTI, for instance, created a fake version of the US Census complete with more than 110 million households holding more than 300 million people.

Theres no personal information of real Americans but the 300 million fake people are more or less in the same parts of the country and their personal details are pretty close to the real information. Researchers predictingthe path of infectious diseases were able to study the US without access to real personal data.

An AI company, Hazy, is delivering a Python-based tool that will run inside secure data centers and produce synthetic versions of your data that you can share more freely.

Differential privacy

The term describes a general approach to adding just enough noise to the data to protect the private information in the data set while still leaving enough information to be useful. Adding or subtracting a few years to everyones age at random, for instance, will hide the exact birth years of the people but the average wont be affected.

The approach is most useful for larger statistical work that studies groups in aggregate. The individual entries may be corrupted by noise, but the overall results are still accurate.

Microsoft has started sharing White Noise, an open source tool built with Rust and Python, for adding a finely tuned amount of noise to your SQL queries.

Homomorphic encryption

Most encryption algorithms scramble the data so completely that no one can make any sense of the results without the proper key. Homomorphic approaches use a more sophisticated framework so that many basic arithmetic operations can be done on the encrypted data without the key. You can add or multiply without knowing the underlying information itself.

The simplest schemes are practical but limited. Chapter 14 ofTranslucent Databasesdescribes simple accounting tools that can, for instance, support addition but not multiplication. More complete solutions can compute more arbitrary functions, but only after much more expensive encryption.

IBM is now sharing an open source toolkitfor embedding homomorphic encryption in iOS and MacOS applications with the promise that versions for Linux and Android will be coming soon. The tools are preliminary, but they offer the ability to explore calculations as complicated as training a machine learning model without access to the unencrypted data.

Keep nothing

Programmers may be packrats who keep data around in case it can be useful for debugging later. One of the simplest solutions is to design your algorithms to be as stateless and log-free as possible. Once the debugging is done, quit filling up the disk drives with lots of information. Just return the results and stop.

Keeping as little information as possible has dangers. Its harder to detect abuse or fix errors. But on the flip side, you dont need to worry about attackers gaining access to this digital flotsam and jetsam. They cant attack anyones personal data if it doesnt exist.

Error: Please check your email address.

Tags privacyCloudsecurity

Visit link:
9 ways to build privacy into cloud applications - Reseller News

Read More..

Russia’s New Blockchain Voting System Isn’t Ready, but It’ll Be Used This Month Anyway – Business Blockchain HQ

Russias new blockchain-based voting system needs more work before it can be used in nationwide elections, according to the nations Central Election Commission.

While recent user tests were promising, the commission concluded improvements are still needed regarding how voters are identified, Russian newspaper Kommersant reported Tuesday.

The e-voting system is built on the enterprise version of the Waves blockchain and was developed under the auspices of the state-backed telecommunications giant Rostelecom, as CoinDesk has reported. The blockchains nodes will be hosted on the companys servers.

Despite the issues, the solution will be used for remote voting during by-elections for seats in the national parliament on Sept. 13 in two Russian regions: Kurskaya oblast and Yaroslavskaya oblast. About 15,000 people have already registered to vote electronically, and some 3,500 participated in the test, Ella Pamfilova, head of the Central Election Commission, told Kommersant.

The solution is built with some technologies that have not been battle-tested yet, a source in the election commission told Kommersant. For example, the system uses homomorphic encryption, so votes remain encrypted until the voting is over. Only the final result can be then decrypted, they said.

However, the encryption tech poses a challenge for checking the identity of voters, a problem that still needs to be resolved.

Sergey Prilutsky, cybersecurity expert and co-founder of blockchain startup MixBytes, said homomorphic encryption is indeed better than the type used during electronic voting in Moscow this summer. Even so, it could still potentially allow the authorities to meddle with the results if they control the list of voters, he said.

Waves Enterprise Chief Product Officer Artem Kalikhov told CoinDesk the system allows observers to watch how many electronic ballots have been issued in real time, helping prevent possible manipulation.

However, this type of encryption algorithm cannot currently be certified in Russia, meaning it cant pass the lengthy and complicated procedure necessary for government blockchain systems, Prilutsky said.

It uses elliptic curves that are not considered secure by the FSB, he said. The FSB is the Federal Security Service, a counter-intelligence agency in charge of certifying encryption tools in Russia.

Kalikhov said the solution has yet to be certified, though the company is working on it. Some other components of the system, like the electronic signature, have already been certified by the FSB, he said.

While the need to certify the homomorphic encryption aspect of the system could potentially hold up development, Kalikhov said it was unlikely to be an issue.

The Central Election Commission has already tested the blockchain voting system several times, according to Kalikhov said, but this was the first time real future voters were involved. Previous tests were run by Rostelecom and involved government staff, he added.

According to Rostelecom spokesperson Natalia Bakrenko, the system is being constantly enhanced, and the voting in two regions this autumn will be the first step toward a nationwide expansion.

More:
Russia's New Blockchain Voting System Isn't Ready, but It'll Be Used This Month Anyway - Business Blockchain HQ

Read More..

Amazon’s Blink Unveils New Wireless Security Cameras with HD Video, Flexible Storage Options, and New Battery Expansion Pack Cameras Start at $79.99…

SEATTLE--(BUSINESS WIRE)--(NASDAQ: AMZN)Amazon today announced Blink Outdoor and Blink Indoor Blinks all-new wireless smart home security cameras that run on two AA lithium batteries for up to two years with normal use, making them easy to use and maintain. The cameras boast a sleek new hardware design and offer 1080p HD video, IR night vision, motion detection, and two-way audio. Blink also announced today a new battery expansion pack which doubles the camera battery life to up to four years in total with normal use, helping customers never miss an important moment.

Using a smartphone and the Blink Home Monitor app, Blink Outdoor and Indoor customers can see a live view of their home, receive motion detection alerts, and use two-way audio to speak to people or pets around their home. Customers can create custom activity zones to cut down on unnecessary alerts in high-traffic areas as well as remove sections in their cameras field-of-view from video recording using Blinks all-new privacy zone feature.

For Blink, providing peace-of-mind and exciting new products to our customers is everything, said Mike Harris, General Manager of Blink. While Blinks Outdoor and Indoor cameras include many of the innovative features our customers have come to love and expect like a powerful two-year battery life we now offer more options and customizations than ever. From new features like privacy zones to a new battery expansion pack that provides up to two additional years of battery power, were excited to deliver our new cameras to our customers.

Blink Outdoor and Indoor are available for pre-order today in the U.S. and Canada on Amazon and in select retailers in the U.S. like Best Buy, Lowes, and The Home Depot. Shipping to customers begins later this month. Blink Outdoor and Indoor will also be available in select European countries soon.

Flexible Storage Options

Customers want choices when it comes to how their video clips are stored. Thats why Blink now offers two video storage options: cloud and local storage. All Blink Outdoor and Indoor cameras include a free trial to Blinks cloud storage plan valid through Dec. 31, 2020. After that date, customers who prefer the convenience and added benefits of cloud storage can continue their subscription starting at $3 a month for one camera or $10 a month for unlimited cameras at a single location, with no long-term contract required. More information about Blinks cloud storage plan can be found here.

Customers can also choose to store video clips locally, with no monthly fees, using the included Sync Module 2 and a USB flash drive (sold separately). Blinks Sync Module 2 connects up to 10 Blink cameras, allowing customers to create a robust network of devices they can control with ease and right from their smartphone.

Extended Battery Life

Blinks all-new battery expansion pack allows cameras to run on four AA lithium batteries instead of two doubling the camera battery life to up to four years in total with normal use. While Blinks cameras already have a powerful two-year battery life due to Blinks proprietary chip technology, the new battery expansion pack is especially compelling to customers with cameras placed in high-traffic or hard-to-reach areas who want the convenience and flexibility of a wireless solution without the hassle of frequently replacing batteries.

Works with Alexa

Blink Outdoor and Indoor are Alexa compatible. Customers can ask Alexa to arm and disarm their cameras, watch recorded motion clips, or say Alexa, show me the front door camera to see a live view through an Echo Show, Fire TV, or Fire tablet. Customers can also set up motion announcements and customized routines, like turning on smart lights when a smart home camera detects motion. For hassle-free battery maintenance, customers can have Alexa send reminders when batteries run low and set up smart reorders.

Pricing and Availability

Blink Indoor and Outdoor cameras are available for preorder starting today at $79.99 and $99.99, respectively. Blinks all-new battery expansion pack (sold separately) will be available later this year.

About Amazon

Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. Customer reviews, 1-Click shopping, personalized recommendations, Prime, Fulfillment by Amazon, AWS, Kindle Direct Publishing, Kindle, Fire tablets, Fire TV, Amazon Echo, and Alexa are some of the products and services pioneered by Amazon. For more information, visit https://www.aboutamazon.com/ and follow @AmazonNews.

See original here:
Amazon's Blink Unveils New Wireless Security Cameras with HD Video, Flexible Storage Options, and New Battery Expansion Pack Cameras Start at $79.99...

Read More..

Stand Alone Cloud Storage Market Current Industry Size and Future Prospective with Key Players, Drivers and Trends – The Daily Chronicle

Stand Alone Cloud Storage Market Forecast 2020-2026 research report is a professional and in-depth research on the current state of the Stand Alone Cloud Storage Industry. This report presents in-intensity insight of Production, Consumption, Revenue, Gross, Gross Margin, Cost, CAGR, Market Size and Market Shares for topmost prime key manufactures (AT&T, Amazon Web Services, Google, HP, IBM, Microsoft). Beside, this Stand Alone Cloud Storage industry report firstly introduced the Stand Alone Cloud Storage basics:Definitions, Applications, Classifications, and Stand Alone Cloud Storage Market Overview; manufacturing processes; product specifications; cost structures, raw materials and so on.

Target Audience of Stand Alone Cloud Storage Market:Suppliers, Channel Partners,Production Companies, Market Consultants,Marketing Authorities, Research Institutions, Subject Matter Experts, Financial Institutions, Government Authorities.

Get Free Sample PDF (including COVID19 Impact Analysis, full TOC, Tables and Figures)of Stand Alone Cloud Storage[emailprotected]https://www.researchmoz.us/enquiry.php?type=S&repid=2040017

Scope of Stand Alone Cloud Storage Market:Cloud storage allows enterprises to store data on remote servers that can be accessed through internet. These remote servers are maintained, operated and managed by cloud storage service providers. Cloud storage is basically a virtual mode of data storage. The data stored on cloud can be accessed and shared across devices through internet.

Business enterprises are increasingly using Internet to run their business and drive revenue growth. The cloud is one of the most effective alternatives for the traditional on-premises storage by which enterprise users can access applications and data stored in the cloud through the internet. Standalone cloud storage is one among several cloud-based storage service offerings, which is utilized by many enterprises to reduces data storage costs, improves efficiency, and ensures easy access to data from anywhere and at any time. In addition, it helps the enterprises to reduce their IT infrastructural costs significantly.

Increase in need for cost-efficient storage solutions specifically by small and medium size organizations drive the market. In addition, increased need for enhanced storage of both structured and unstructured data as well as continuous rise in volume of data generated by enterprises propels the growth of the market. However, data security and privacy issues limits the growth of the market. Furthermore, increase in outsourcing of storage services and rise in need for more efficient data storage options is expected to provide numerous opportunities for the market.

On the basis on the end users/applications, this report focuses on the status and outlook for major applications/end users, sales volume, market share and growth rate of Stand Alone Cloud Storage market for each application, including-

BFSI Retail and E-commerce Government Travel and Hospitality IT and Telecommunication Healthcare Education Others

On the basis of product, this report displays the sales volume, revenue (Million USD), product price, market share and growth rate of each type, primarily split into-

Primary Storage Cloud Storage Gateway Data Archiving Disaster Recovery and Back Up Storage

The report offers in-depth assessment of the growth and other aspects of theStand Alone Cloud Storage market in important countries (regions), including:

The Stand Alone Cloud Storage Market Report Can Answer The Following Questions:

What is the (North America, South America, Europe, Africa, Middle East, Asia, China, Japan) production, production value, consumption, consumption value, import and export of Stand Alone Cloud Storage market?

Who are the key manufacturers of Stand Alone Cloud Storage market? How are their operating situation (capacity, production, price, cost, gross and revenue)?

What are the upstream raw materials and manufacturing equipment of Stand Alone Cloud Storage? What is the manufacturing process of Stand Alone Cloud Storage?

Economic impact on Stand Alone Cloud Storage industry and development trend of Stand Alone Cloud Storage industry.

What will the Stand Alone Cloud Storage market size and the growth rate be in 2026?

What are the key market trends impacting the growth of the Stand Alone Cloud Storage market?

What are the Stand Alone Cloud Storage market challenges to market growth?

What are the Stand Alone Cloud Storage market opportunities and threats faced by the vendors in the Stand Alone Cloud Storage market? Etc.

Do You Have Any Query Or Specific Requirement? Ask to Our Industry [emailprotected]https://www.researchmoz.us/enquiry.php?type=E&repid=2040017

Contact:

ResearchMozMr. Rohit Bhisey,Tel: +1-518-621-2074USA-Canada Toll Free: 866-997-4948Email:[emailprotected]

Browse More Reports Visit @https://bit.ly/2Sepby2

See original here:
Stand Alone Cloud Storage Market Current Industry Size and Future Prospective with Key Players, Drivers and Trends - The Daily Chronicle

Read More..

Cloud Storage Software Market Will Raise Beyond Imagination over Period 2025 | Microsoft, Oracle, Rackspace Hosting, Red Hat, IBM – Scientect

Global Cloud Storage Software Market Analysis to 2025 is a specialized and in-depth study of the Cloud Storage Software industry with a focus on the global market trend. The research report on Cloud Storage Software Market provides comprehensive analysis on market status and development pattern, including types, applications, rising technology and region. Cloud Storage Software Market report covers the present and past market scenarios, market development patterns, and is likely to proceed with a continuing development over the forecast period. A number of analysis tools such as SWOT analysis and Porters five forces analysis have been employed to provide an accurate understanding of this market.

Get Sample Copy of this Report @ https://www.reportsweb.com/inquiry&RW00013566740/sample

Some of the key players of Cloud Storage Software Market:

The Global Cloud Storage Software Market research report offers an in-depth analysis of the global market, providing relevant information for the new market entrants or well-established players. Some of the key strategies employed by leading key players operating in the market and their impact analysis have been included in this research report.

Segmentation by Solution:

The report provides a detailed overview of the industry including both qualitative and quantitative information. It provides overview and forecast of the global Cloud Storage Software market based on product and application. It also provides market size and forecast till 2025 for overall Cloud Storage Software market with respect to five major regions, namely; North America, Europe, Asia-Pacific (APAC), Middle East and Africa (MEA) and South America (SAM), which is later sub-segmented by respective countries and segments.

Get Discount for This Report @ https://www.reportsweb.com/inquiry&RW00013566740/discount

The report evaluates market dynamics effecting the market during the forecast period i.e., drivers, restraints, opportunities, and future trend and provides exhaustive PEST analysis for all five regions.

Fundamentals of Table of Content:

1 Report Overview1.1 Study Scope1.2 Key Market Segments1.3 Players Covered1.4 Market Analysis by Type1.5 Market by Application1.6 Study Objectives1.7 Years Considered

2 Global Growth Trends2.1 Cloud Storage Software Market Size2.2 Cloud Storage Software Growth Trends by Regions2.3 Industry Trends

3 Market Share by Key Players3.1 Cloud Storage Software Market Size by Manufacturers3.2 Cloud Storage Software Key Players Head office and Area Served3.3 Key Players Cloud Storage Software Product/Solution/Service3.4 Date of Enter into Cloud Storage Software Market3.5 Mergers & Acquisitions, Expansion Plans

4 Breakdown Data by Product4.1 Global Cloud Storage Software Sales by Product4.2 Global Cloud Storage Software Revenue by Product4.3 Cloud Storage Software Price by Product

5 Breakdown Data by End User5.1 Overview5.2 Global Cloud Storage Software Breakdown Data by End User

Inquiry About Report @ https://www.reportsweb.com/inquiry&RW00013566740/buying

About ReportsWeb:ReportsWeb.com is a one stop shop of market research reports and solutions to various companies across the globe. We help our clients in their decision support system by helping them choose most relevant and cost effective research reports and solutions from various publishers. We provide best in class customer service and our customer support team is always available to help you on your research queries.

Contact Us:Call: +1-646-491-9876Email: [emailprotected]

Read more here:
Cloud Storage Software Market Will Raise Beyond Imagination over Period 2025 | Microsoft, Oracle, Rackspace Hosting, Red Hat, IBM - Scientect

Read More..