Yahoo turns on encryption between data centers

Yahoo said Wednesday it was encrypting traffic flowing between its data centers, several months after leaked documents revealed the government had been sniffing those links.

Traffic moving between Yahoo data centers is fully encrypted as of March 31, the company announced on its Tumblr blog. Last October, documents provided by former U.S. National Security Agency contractor Edward Snowden said the NSA had penetrated the main communications links that connect Yahoo and Googles data centers.

Though it comes after those revelations, the encrypted data links is in keeping with a previous promise by CEO Marissa Mayer to encrypt all information between its data centers by the end of March.

Yahoo said Wednesday that it had also turned on encryption for a range of other services. For one, encryption of mail between its servers and other mail providers that support the SMTPLS standard was enabled in the last month, the company said. Yahoo only just turned on encryption by default between users and its email service in January.

Yahoo said its homepage and all search queries that run on it and most other Yahoo properties now also have HTTPS encryption enabled by default.

But if users want an encrypted session for Yahoo News, Yahoo Sports, Yahoo Finance or Good Morning America on Yahoo, they must manually type https into the sites URL on their browsers, Yahoo said.

Yahoo has faced pressure to encrypt more of its services for years. In 2012, the Electronic Frontier Foundation and other privacy activists called on CEO Marissa Mayer to enable HTTPS encryption for the companys communications services. Yahoo began offering HTTPS encryption for mail in 2012, but on an opt-in basis.

Since then other companies like Google and Facebook have introduced more forms of encryption.

Last month, another leak of documents said that GCHQ, Britains surveillance agency, had captured webcam images from more than 1.8 million users of Yahoos Messenger product.

Yahoo said Wednesday that a new, encrypted version of Messenger would be rolled out in the coming months.

Read more:
Yahoo turns on encryption between data centers

Yahoo Faces Balancing Act Between Ads, Encryption

Yahoo is facing a challenge as it seeks to encrypt its vast network of websites and services to block hackers and government spooks: data security can clash with its business model.

The same is true for all Internet companies, but particularly so for Yahoo, the original search giant that has disappointed investors with weak revenue in recent quarters.

Yahoo on Wednesday announced new progress in previously announced efforts to beef up encryption, partly as a response to last years Edward Snowden leaks. The company now encrypts all traffic between its data centers and turned on encryption by default for the Yahoo homepage, said Alex Stamos, Yahoos new chief information security officer and a former security researcher who used to point out holes in commercial software.

Google made a similar announcement about mail traffic between its data centers last month.

But for now, there are limits as to how far Yahoo can take that encryption, Stamos said. Websites for Good Morning America on Yahoo, Yahoo News, Yahoo Sports and Yahoo Finance wont feature the encryption by default, for now, because the company still needs to bring advertisers on board, he said.

At issue is the fact that technology being used, called HTTPS, is an all-or-nothing proposition.

When a website uses HTTPS, it prevents outsiders from watching data people submit to the site or watch what articles they are reading. But if the site is going to use such encryption, it has to persuade every advertising network running ads on that page to do the same.

For large media companies that rely on lots of ad networks, that can take a lot of coordination.

Its a little harder than to just flip a switch, Stamos said. Its just a bigger project than I expected.

(Full disclosure: The Wall Street Journal doesnt use HTTPS encryption either.)

See the original post here:
Yahoo Faces Balancing Act Between Ads, Encryption

Cloud Security Strategy: Encryption Keys

A strong cloud security strategy is important for midsize firms to truly innovate with the cloud. One way of approaching that strategy is by using encryption keys. Midsize firms that have a better understanding of encryption can better protect their cloud data.

The Key

According to a recent article on Cloud Tech, there is an ever-changing world of regulatory and compliance requirements to achieve data privacy. Companies will always need improved ways of protecting cloud data, and encryption key technology is one possible solution. Cloud data encryption makes corporate data unreadable. Only a key can switch it back to readable form. Many cloud providers use this mathematical method to protect a firm's data from the growing threat of cybercrime.

The article points to a Gartner report that emphasizes a trend, familiar to midsize firms, that shows companies as having a limited amount of time and staff to dedicate to becoming experts in a given solution such as encryption. Too many cryptographic solutions offered by security vendors can lead to an increasing amount of complexity and misunderstandings and may even put more constraints on staff resources when deployed at midsize firms. As a result, companies are putting cloud data encryption completely in the hands of cloud services providers, and that leads to less control of their corporate data. Maintaining a level of control over encryption keys, however, can help IT professionals verify how information is shared.

Clouds and Control

Any firm can strike a good balance between encryption and the cloud. Midsize firms can retain control of their encryption keys while freely sending data to trusted cloud providers. The consumerization of IT and the rise of mobility and third-platform technologies are forcing IT professionals at midsize firms to think seriously about their cloud security strategy, and encryption keys are part of that process. IT professionals that work with their security teams and experienced cloud security vendors can ensure that the type and strength of encryption being used is well understood by all.

IT professionals at midsize firms must grapple with using limited time, resources and knowledge to truly understand the latest encryption offerings available. Cloud services partners can help apply various algorithms that are used for encryption, including hashing, private-key and public-key. Understanding algorithms and cryptography-based security is important for IT professionals to be comfortable with their cloud security solutions.

As security and compliance needs continue to change and evolve, firms are ultimately responsible for keeping their most sensitive data safe. Firms that utilize encryption keys can also maintain control of those keys to help hold on to cloud data. By working with trusted cloud computing vendors that understand their security concerns, IT professionals at midsize firms will be on their way to implementing the best solutions that work for them.

This post was written as part of the IBM for Midsize Business program, which provides midsize businesses with the tools, expertise and solutions they need to become engines of a smarter planet. Like us on Facebook. Follow us on Twitter.

Excerpt from:
Cloud Security Strategy: Encryption Keys

It Takes a Village To Raise a Child – One That is Interoperable | Collaboration Summit 2014 – Video


It Takes a Village To Raise a Child - One That is Interoperable | Collaboration Summit 2014
In this keynote address, AllSeen Alliance Chairman Liat Ben-Zur, will discuss how collaboration and open source software accelerates technology innovation an...

By: TheLinuxFoundation

Read more here:
It Takes a Village To Raise a Child - One That is Interoperable | Collaboration Summit 2014 - Video

Free and open source software [European Internet Governance and Beyond] – Video


Free and open source software [European Internet Governance and Beyond]
Stefano Zacchiroli (Debian), Simon Phipps (Open Source Initiative), Matthias Kirschner (Free Software Foundation Europe). Moderator: Radek Pietro. Panel session at "European Internet Governance...

By: Piratpartiet Youtube

Original post:
Free and open source software [European Internet Governance and Beyond] - Video

Range Networks Unveils Enhanced OpenBTS Platform

Software Allows Deployment of Mobile Networks by Open Source Cellular Developers

SAN FRANCISCO Range Networks, the leading provider of commercial open source cellular systems and leader of the OpenBTS software project, today announced the release of OpenBTS 4.0. The software is now shipping in Range Networks laboratory development kits and commercial base stations and is also available to the OpenBTS community as a free download.

The latest generation of OpenBTS offers significant improvements in processing capacity and system management features, including multi-node network scaling enhancements to Range Networks' commercial systems. These enhancements further the migration of radio access network (RAN) infrastructure to low cost, standard hardware using open source software.

OpenBTS 4.0 Key Facts:

-- Expanded capacity: Concurrent registration processing capacity has been increased by 14x, providing improved SIP authentication and service for over 1000 subscribers on a single node. -- Frequency scanning and system management API: Includes a built-in channel-scanning tool for transmission frequency selection whendeploying systems. Also included is a newly implemented JSON API that allows mobile network operators to easily configure and manage the software remotely. This is done through a browser-based administrative console and provides third parties with an effective way to develop tools and interfaces for OpenBTS and other components. -- Seamless handover and enhanced encryption: A completely new Layer 3 architecture has significantly improved network scalability, including improved handover for multi-node networks. The software now supports the A5/1 and A5/3 GSM link encryption algorithms for enhanced security. -- 4.0 field-tested by small carrier in French overseas territory: Following several weeks of field trials, OpenBTS 4.0 is the foundation of a new, multi-node, low-cost commercial network being implemented by French carrier GlobalTel that will cover the island and city of St. Pierre (pop. 7000) of the French territory St. Pierre & Miquelon, located off the coast of Newfoundland. -- Platform for open source innovation: With its improved performance, Range Networks expects to see an increase in new and interesting applications, services and OEM integration based upon the OpenBTS 4.0 platform. -- Enhanced open source program: Range Networks is also announcing the assignment of a senior engineer, Michael Iedema, as a technical resource dedicated to inciting innovation in the OpenBTS open source community.

SUPPORTING QUOTES:

Christophe Boutin, CEO of GlobalTel, said: "Range Networks' OpenBTS 4.0 and base stations have been fundamental in helping us build a cost-effective carrier network in the remote territory of St. Pierre & Miquelon. We have been testing the network thoroughly for weeks as we prepare to launch this service and are impressed by the improvements in overall stability and performance in this new release."

Edward Kozel, CEO of Range Networks, said: "This launch represents a significant milestone in Range Networks' product development. In addition to the new features, OpenBTS continues to provide stability, reliability and scalability. We see this as a major leap forward in terms of what OpenBTS can do for expanding the reach of non-traditional mobile networks."

About Range Networks Range Networks is developing the future of cellular networks. Founded by the inventors of OpenBTS, the company is the leader in commercial open source cellular systems. Range Networks' systems are simple to deploy and manage at a fraction of the cost of traditional solutions. Based on OpenBTS, Range Networks delivers mobile connectivity for rural communities, remote industries and emergency responders, and supplies development networks to commercial labs and universities. Additional information is available at: http://www.rangenetworks.com.

MEDIA CONTACT: Kim Dearborn Nadel Phelan, Inc. +1-831-440-2407 kim.dearborn@nadelphelan.com

Read more here:
Range Networks Unveils Enhanced OpenBTS Platform