The World Wide Whisper – WhatsApp Introduces End-to-End Encryption for 500 Million Users – Video


The World Wide Whisper - WhatsApp Introduces End-to-End Encryption for 500 Million Users
Today, on Dev, Rob talks about the new encryption being integrated into WhatsApp, the popular Facebook-owned messaging service, and explains how it keeps your messages private.

By: LearnToProgram: You Can Code.

Original post:
The World Wide Whisper - WhatsApp Introduces End-to-End Encryption for 500 Million Users - Video

Unofficial CM12 for Android One, Disabling Encryption on Nexus 6, Jolla Tablet Announced! – Video


Unofficial CM12 for Android One, Disabling Encryption on Nexus 6, Jolla Tablet Announced!
Android One devices have received an Unoffical CyanogenMod 12 build! That and much more news is covered by Jordan when he reviews all the important stories from this weekend. Included in this...

By: xdadevelopers

Original post:
Unofficial CM12 for Android One, Disabling Encryption on Nexus 6, Jolla Tablet Announced! - Video

Hacker Lexicon: What Is End-to-End Encryption?

Plenty of companies brag that their communications app is encrypted. But that marketing claim demands a followup question: Who has the key? In many cases, the company itself holds the cryptographic key data that lets it decrypt your messagesand so, therefore, does any hacker who compromises the company or government official standing over its shoulder.

But increasingly, privacy-conscious communications tools are rolling out a feature known as end-to-end encryption. That end-to-end promise means that messages are encrypted in a way that allows only the unique recipient of a message to decrypt it, and not anyone in between. In other words, only the endpoint computers hold the cryptographic keys, and the companys server acts as an illiterate messenger, passing along messages that it cant itself decipher.

That notion of the decryption key never leaving the users device might seem like a paradox. If the companys server can never see the key, then how does it get onto the device when the user installs the app in the first place?

The answer is possible because of another crypto trick known as public-key encryption. In public key crypto systems, a program on your computer mathematically generates a pair of keys. One, called the private key or secret key, is used for decrypting messages sent to you and never leaves your device. The other, called the public key, is used for encrypting messages that are sent to you, and its designed so that only the corresponding private key can decrypt those messages. That key can be shared with anyone who wants to encrypt a message to you. Think of the system like a lockbox on your doorstep for the UPS delivery man: anyone with your public key can put something in the box and lock it, but only you have the private key to unlock it.

The first free, widely used end-to-end encrypted messaging software was PGP, or Pretty Good Privacy, a program coded by Phil Zimmermann and released in 1991. But its taken decades for that complete encryption tunnel to reach the masses. Programs like the Off The Record plugin for Jabber instant-messaging applications and TextSecure for text messaging have made end-to-end encryption far easier to use. Apple uses a form of end-to-end encryption in its iMessage app. (Though some security researchers have pointed to flaws in its implementation that might allow its messages to be decrypted.) Google is experimenting with an end-to-end encryption email plugin for Chrome. And just last week smartphone messaging app Whatsapp integrated TextSecure into its Android software, turning on end-to-end encryption for hundreds of millions of users.

Even end-to-end encryption isnt necessarily impervious from snooping. Rather than try to actually break the encryption, for instance, an eavesdropper may try to impersonate a message recipient so that messages are encrypted to their public key instead of the one the sender intended. After decrypting the message, the snoop can then encrypt it to the recipients actual public key and send it on again to avoid detection; this is whats known as a man-in-the-middle attack. To combat that tactic, some end-to-end encryption programs generate unique one-time strings of characters based on the two users public keys. The two people communicating read out that passphrase to each other before starting their conversation. If the characters match, they can be reassured theres no man in the middle.

Of course, there are still two vulnerable points left in even perfect end-to-end encryption systems: the ends. Each users computer can still be hacked to steal his or her cryptographic key or simply read the recipients decrypted messages. Even the most perfectly encrypted communication pipe is only as secure as the mailbox on the other end.

Hacker Lexicon is WIREDs explainer series that seeks to de-mystify the jargon of information security, surveillance and privacy.

More:
Hacker Lexicon: What Is End-to-End Encryption?

Lollipop’s Encryption Takes a Hefty Toll

The new full-disk encryption feature that's enabled by default in Android 5.0 Lollipop comes at a hefty price in terms of performance, according to a recent benchmark report.

In fact, when full-disk encryption is enabled, random read performance drops by 62.9 percent, while random write performance falls by 50.5 percent, AnandTech reported late last week. Sequential read performance, meanwhile, drops by a whopping 80.7 percent.

The bottom line is "serious negative implications for device performance in any situation where applications are reading or writing to disk," the report concludes.

With full-disk encryption, all information is encrypted before it's written to disk. Accessing the information requires decryption, which is protected by the device's lockscreen passcode.

A Nexus 6 was the device evaluated in this latest benchmark report. Normally it's not available without full-disk encryption, but Motorola reportedly provided a build with the feature disabled for the purpose of comparison testing.

Instructions for disabling Lollipop's encryption feature on the Nexus 6 are now available on the XDA developers' forum.

"There's a cost that comes with encrypting and decrypting stuff," said Ronald Gruia, director of emerging telecoms at Frost & Sullivan.

In the wake of the Edward Snowden leaks and "rampant security breaches" throughout the year, Apple took the lead and closed the "final back door" in its platform with iOS 8, he told TechNewsWorld.

Then, "Google had to match that," Gruia said. "It had offered full-disk encryption since version 3.0 'Honeycomb,' but only now is it on by default."

In general, the idea is to improve privacy by making snooping more and more difficult -- including even for law enforcement, Gruia noted.

See original here:
Lollipop's Encryption Takes a Hefty Toll

Android Lollipop’s default encryption devastates storage performance, tests show

If you feel your snazzy new Nexus 6 just isn't performing as quickly and smoothly as it should be, Android 5.0's default full-disk encryption could be to blame. AnandTech recently ran storage performance benchmark tests on two Nexus 6 devices: one with and one without full-disk encryption (FDE) enabled.

The Nexus 6 comes with FDE enabled by default, which you can't turn disable, but the site was able to grab a non-encrypted phone from Motorola.

The results of the tests were staggering. With encryption enabled on the device, the site's benchmark tests saw a 62.9 percent drop in random read performance, a 50.5 percent drop in random write, and 80.7 percent in sequential read.

Long story short: there appears to be an issue with performance lag due to Android Lollipop's FDE. And with the Nexus 6 you pay that performance hit whether you've got your lock screen enabled or not.

Why this matters: Beefed up device encryption is a big deal with the latest generation of smartphones in the wake of Edward Snowden's revelations and rampant security breaches throughout 2014. Apple closed the door on its final back door with the iPhone 6 and iOS 8. Google, which has offered FDE since Android 3.0 Honeycomb, turned it on by default beginning with Android 5.0 (Lollipop) and the Nexus 6.

The idea is to improve privacy by making it harder for general snoops (and law enforcement) to peer into your device without permission. But if FDE means poor device performance, not many people will be willing to pay the price required for extra privacy.

The issue, says AnandTech, is that many components commonly used in Android devices just aren't up to the task of incorporating FDE without a performance hit. That will probably change over time, but for now it appears to be a big issue.

For Android encryption to be useful, you also must have the lock screen enabled. Without it, FDE is enabled but it doesn't kick inyet the cost penalty remains. In other words, you could be experiencing lag on your device even if you're not effectively using FDE.

Older phones that receive Lollipop as an over the air update or flash it to their devices do not get FDE turned on automatically.

Does this mean you shouldn't pick-up the Nexus 6? Probably not. As we said in our review, the 2.7GHz SoC and 3GB RAM makes for snappy performance, including with games. Other sites have also given the Nexus 6 top marks, although The Verge and Droid-Life did notice moments of strange lag.

The rest is here:
Android Lollipop's default encryption devastates storage performance, tests show

Why Open Leadership Has Become Essential

You would not be reading this if open source software did not exist. Without open source standards, the Internet would not exist. This article would not exist. Those of you whose parents met on Match.com would not exist. All of you should be thankful for open source software. Now, as the world has changed, open source softwares principles of openness, transparency and meritocracy have become essential standards for leadership in general.

Mike Milinkovich of Eclipse, a community for individuals and organizations who wish to collaborate on commercially-friendly open source software, took me through his thoughts on those principles during a conversation at the HATCH experience.

Openness

Open source software design is open to all comers. Anyone can contribute. Everyone is invited to contribute. This is about the wisdom of crowds with each contributing in their own way.

Transparency

Complete transparency. To every line of code. To every project parameter. To every decision. The objective is for anyone coming in to be able to see what has been done before and why. This way newcomers can get onboard and contribute faster.

Meritocracy

Everyone has to earn his or her way in. Those most committed and most deserving are invited in once they have earned those invitations.

See the article here:
Why Open Leadership Has Become Essential

Interview: Open source software is poised to oust proprietary solutions

Business continuity, quality and control eclipse cost savings as the top reasons IT professionals prefer open source to proprietary software. According to a new study by the Ponemon Institute and Zimbra, more than 75% of IT professionals agree that code transparency increases the trustworthiness of a software application. And two-thirds believe it improves security and reduces privacy risks.

For "The Open Source Collaboration Study: Viewpoints on Security & Privacy in the US & EMEA", the Ponemon Institute interviewed IT and IT security practitioners about their companies' usage and perceptions of open source messaging and collaboration solutions.

We caught up with Larry Ponemon, the founder and chairman of the Ponemon Institute, to find out more about the study's contents.

TechRadar Pro: The average percentage of commercial open source used in EMEA is 25% and the US it's 30%. What factors are contributing to the slow adoption of open source?

Larry Ponemon: The report didn't explore the reason behind the slow adoption. But we did learn that Zimbra, whose messaging and collaboration solution is open source, was deployed in 40% of US and 30% of EMEA organisations.

Control over the software and ensuring business continuity are the most beneficial aspects of open source, according to the report. Security and privacy were also found to greatly benefit from open source's transparency.

Overall, the perceptions of open source were more positive than those of proprietary software, and more than half of the EMEA and US organisations surveyed are planning to replace their existing solutions with open source ones over the next two years.

TRP: EMEA organisations are more concerned with the privacy consequences of messaging and collaboration while US organisations focus more on security. Why are EMEA organisations more likely to enforce security and data privacy policies than their US counterparts?

LP: The regulatory regimes across EMEA and the US are very different. This is largely a function of the regulatory compliance landscape in the regions, and what the legislation and mandates of each prioritise.

EMEA legislation leads to strict data protection/privacy compliance, regardless of the industry vertical, and encompasses the entire citizenry.

More:
Interview: Open source software is poised to oust proprietary solutions