Ray Dalio Calls for Investment Diversification, But Not in Bitcoin – Cointelegraph

Ray Dalio, multi-billionaire and founder of investment firm Bridgewater Associates, said investors should not miss out on traditional markets, CNBC reported on Jan. 21.

Dalio warned from holding Bitcoin, saying that its neither a medium of exchange nor a store of value.

Dalio was interviewed at the World Economic Forum in Davos, Switzerland, where he advised investors to hold a global and diversified portfolio in this market, while increasing their stake in stock markets.

While Dalio acknowledged recession concerns, he argued that cash is trash due to the governments ability to print it at will something he believes they will be forced to do during a market downturn. Due to this, jumping into cash just before the eventual market fall is ill-advised, according to Dalio.

The billionaire still cautions balance, advising investors to hold a certain amount of gold in their portfolios.

His stance on Bitcoin (BTC) was far more negative, however, noting that it is not currently functioning as money:

Theres two purposes of money, a medium of exchange and a store hold of wealth, and Bitcoin is not effective in either of those cases now.

He added that the volatility of Bitcoin makes it unattractive for serious investment, while something like Libra could be a better option. Elaborating on his preference of gold as a store of value, he noted that central banks are some of the largest metal holders:

What are they going to hold as reserves? What has been tried and true? Are they going to hold Bitcoin digital cash Theyre going to hold gold. That is a reserve currency.

Bitcoin is often touted as digital gold, a reserve asset independent from government control.

But while many believe in the store of value thesis of Bitcoin, its performance so far has not indicated meaningful correlation with global markets. While it does appear to have slightly positive correlation to gold, the indexes are small enough that they can be attributed to coincidence.

These may still be teething problems due to the relative novelty of cryptocurrencies. As noted by Duke University professor Campbell Harvey, the sample size is still too small. Over thousands of years of history, even gold was not always a reliable safe-haven asset.

Read the original:
Ray Dalio Calls for Investment Diversification, But Not in Bitcoin - Cointelegraph

Iran Thinks It Can Outwit Trump. The Key? Bitcoin – newsBTC

As tensions mount between the United States Trump administration and the Iran regime, the rogue state has been working on a strategy to outwit the US President and get around his economic sanctions and political pressure and it all relies heavily on Bitcoin and cryptocurrencies.

While World War III may have thus far been averted, the tensions between the United States and Iran continue to increase and come to a boiling point.

Earlier this month, the US Trump administration completed a drone missile strike that claimed the life of Iranian General Qasem Soleimani.

Related Reading | FinCEN Issues Advisory On Irans Illicit Use of Crypto to Bypass Sanctions

In retaliation, Irans Islamic Revolutionary Guard Corps launched ballistic missile attacks at the Ayn al-Asad airbase in Iraq, killing American citizens.While Trump said the damage done was minimal, as many as 80 deaths were recorded of US citizens.

But the attacks are just the latest in an ongoing saga between the United States and Iran, dating back decades.

Even President George W. Bush had dubbed Iran as one of the three countries in the axis of evil nearly twenty years ago, and the turmoil dates back much further than that.

Among the ways that the United States Trump Administration applies pressure to these rogue states, is by enforcing economic sanctions.

According to data, the strategy has been working and has diminished the Iranian economy by as much as 10 to 20 percent.

However, Iran has recently discovered one simple trick to outwit President Donald Trump and the rest of the United States government officials: evading sanctions with Bitcoin and cryptocurrencies.

Interviews with anonymous Iranian citizens claim that Bitcoin is the only way to move money out of the country, so its becoming more popular within the country.

This could be the reason why following the attacks on Iran, Bitcoin rallied and Iranians began paying as much as a 3x premium just to buy Bitcoin from website LocalBitcoins.

But its not just Iranian citizens relying on Bitcoin and crypto. Two Iranian individuals have had their Bitcoin addresses added to the Specially Designated Nationals List kept up to date by the US Treasury Departments Office of Foreign Assets Control.

And Iran is said to have been planning a digital version of the countrys native fiat currency, the rial, specifically to evade Trump-imposed economic sanctions.

While this hasnt yet happened, the situation in Iran, North Koreas increasing interest in crypto, and even the implications of Facebooks Libra have caused the Trump administration and the US Treasury office to look closer at cryptocurrencies and their illicit use.

Related Reading | Trump Tweet Timing Coincides With Bitcoin Breakdowns

Trump even tweeted about his distaste towards Bitcoin and crypto in early July, just as the 2019 parabolic rally topped out.

Trump is only bound to dislike Bitcoin even more if Iran is able to continue to use Bitcoin and other cryptocurrencies to skate around his sanctions and continue to make a mockery of the President.

See the original post:
Iran Thinks It Can Outwit Trump. The Key? Bitcoin - newsBTC

Data Shows $25 Billion Worth of Bitcoin and Ether Held by Seven Crypto Exchanges – Bitcoin News

On January 3, 2020, a small group of crypto enthusiasts celebrated the second annual Proof-of-Keys day with hopes to get people to withdraw funds from centralized digital currency exchanges. However, exchanges holding massive amounts of BTC only saw their reserves grow larger and data shows that Coinbase now holds 1 million BTC ($8.4 billion). Crypto users are still keeping large sums of digital asset holdings on trading platforms despite the fact that 2019 saw the most exchange hacks in one year over the last decade.

Also read: The Fallout From Onecoins Ponzi Scheme Continues to Impact Investors

2019 saw a significant amount of trading platform hacks and exchange losses according to a recent report authored by the blockchain surveillance firm Chainalysis. The company noted that even though there were more attacks there was less money stolen. However, Chainalysis highlighted that malicious hackers are becoming smarter. 2019 saw more cryptocurrency hacks than any other year, the report underlined. But of the 11 attacks that occurred this year, none of them came close to matching the scale of major heists such as [2018]s $534 million Coincheck hack. Last year digital currency exchanges lost approximately $283 million worth of cryptocurrency due to breaches and malicious hackers.

About a month before the second annual Proof-of-Keys day initiated by Trace Mayer, news.Bitcoin.com reported on the vast number of coins centralized exchanges held in reserve. The list was provided by Bituniverse using the firms Exchange Transparent Balance Rank (ETBR). The ETBR list had shown that Coinbase held roughly 966,000 BTC during the first week of December 2019. Today, the ETBR report from Bituniverse shows the San Francisco-based exchange now has 1.03 million BTC ($8.5 billion) held in reserves. The data from Bituniverse stems from onchain exchange balances recorded by Etherscan and Peckshield.

Additionally, the numbers from Bituniverse can also be cross-referenced with data from Chain.infos crypto exchange reserve list. Chain.infos data is slightly different, showing that Coinbase holds 983,000 BTC but most of the data is fairly consistent with the findings from the Bituniverse application. Figures indicate that Huobi is the second-largest cryptocurrency exchange by reserve count with 462,000 BTC ($3.8 billion), 1.8 million ETH, and a large number of USDT as well. Binance has around 307,000 BTC ($2.5 billion) as of Saturday and 2.6 million ETH held in reserves as well. Then theres Bitfinex (290,000 BTC or $2.8 billion), Bitmex (274,000 BTC or $2.28 billion), Bitstamp (242,000 BTC or $2 billion), Okex (211,000 BTC or $1.83 billion), Kraken (173,000 BTC or $1.8 billion), Bittrex (125,000 BTC or $1.2 billion), and Gemini (95,000 BTC or $922 million).

Other exchanges with a vast amount of digital assets held in reserves include Bitflyer, Gate.io, Poloniex, and Hitbtc. Bituniverse and Chain.infos data shows that overall the centralized exchanges accumulated more reserves since the first week of December. Not only are a few crypto advocates afraid that large exchanges could be compromised for billions in digital assets by hackers, but theres also the fear of fractionally reserving bitcoins.

There have been many articles and academic papers discussing the subject of proof-of-reserves when it comes to cryptocurrencies. Researchers from Stanford University published a report in 2015 called Provisions which tackles the subject of exchanges and reserve transparency. The Stanford researchers explained that proof-of-solvency demonstrates that the exchange controls sufficient reserves to settle each customers account. The paper introduces a privacy-preserving proof-of-solvency. Whereby an exchange does not have to disclose its Bitcoin addresses, the 33-page long academic paper notes.

During the last few months, platforms like Bituniverse and Chain.info have published reserve lists based on data provided by independent parties like Peckshield. Exchanges shown on these lists have neither confirmed or denied the bitcoin reserve data is legitimate. A number of community members within the cryptosphere believe trading platforms should provide their own reserve numbers so they can exemplify transparency themselves. Meanwhile, even though a lot of crypto influencers and proponents tell people regularly to store cryptos in a noncustodial fashion, the great majority of digital asset owners continue to store them on centralized trading platforms.

What do you think about the billions worth of BTC held on centralized digital currency exchanges? Let us know what you think about this subject in the comments section below.

Image credits: Shutterstock, Bituniverse App, Stanford, Chainalysis, Chain.info, Wiki Commons, Fair Use, and Pixabay.

Did you know you can buy and sell BCH privately using our noncustodial, peer-to-peer Local Bitcoin Cash trading platform? The Local.Bitcoin.com marketplace has thousands of participants from all around the world trading BCH right now. And if you need a bitcoin wallet to securely store your coins, you can download one from us here.

Jamie Redman is a financial tech journalist living in Florida. Redman has been an active member of the cryptocurrency community since 2011. He has a passion for Bitcoin, open source code, and decentralized applications. Redman has written thousands of articles for news.Bitcoin.com about the disruptive protocols emerging today.

View original post here:
Data Shows $25 Billion Worth of Bitcoin and Ether Held by Seven Crypto Exchanges - Bitcoin News

Split Hearings: The Assange Extradition Case Drags On – Pressenza, International Press Agency

By Dr Binoy Kampmark

It is being increasingly larded with heavy twists and turns, a form of state oppression in slow motion, but the Julian Assange extradition case now looks like it may well move into the middle of the year, dragged out, ironically enough, by the prosecution. Curiously, this is a point that both the prosecutors, fronted by the US imperium, and the WikiLeaks defence team, seem to have found some inadvertent agreement with. This is the biggest case of its kind, and will determine, for an era, how journalism and the publication of nationally classified information is treated. Neither wish to misstep in this regard.

The last procedural hearing ahead of the full extradition trial of Assange over 17 counts of espionage and one of conspiracy to commit computer intrusion was trained on the issue of logistics. The prosecutors seemed to be bellyaching in their discontent, lamenting matters of availability for their staff. Onestriking exampleconcerned the US governments chief barrister, James Lewis, who would be taken up with a trial in Northern Ireland of a great deal of substance and importance. This would make him unavailable for up to three months after the commencement of the extradition case.

Clair Dobbin, representing the US, was the first to make an application that the substantive hearing be split. Various legal rulings,she argued, would have to be made subsequent to the full February proceedings, including the ticklish issue of whether certain witnesses were to remain anonymous or not. WikiLeaks wishes that they remain so; the prosecution would like that cloak removed.

Despite already furnishing the court with a meaty affidavit, Dobbin claimed that more needed to be done in responding to the defence evidence. (Good of them to give a sense of formality that are doing so.) Besides all that, experts sought by the prosecution were extremely busy practitioners and academics with very full diaries, many still chewing over the issue of where Assange fitted in the security paradigm. This statement of itself is odd, as is so much of the entire effort against the WikiLeaks publisher.

Procedural dragging was also a matter of importance for the Assange team. Despite working with manic dedication over Christmas, the issue of access remains crippling for the defence. We simply cannot get in as we require to see Mr Assange and to take his instruction, argued one of Assanges lawyers, Edward Fitzgerald. Frankly, we require more time before calling the main body of our evidence.

The point of journalism, and its legitimate pursuit in this nasty, brutish and rather long encounter, lies at the heart of the battle. The framing of the US indictment purports to negate journalism as a factor in the case, with the prosecutors honing in on the issue of espionage and hacking. Spies cannot be journalists, so goes the claim; espionage and publication should not be seen as comparable or even linked matters. This very claim suggests that any form of national security journalism, the sort that exposes abuses of power, is illegal.

This round of submissions merely confirmed the point, though it is one sharpened to specifically exclude foreigners. In other words, press protections enshrined by the First Amendment of the US Constitution cannot apply to non-US nationals, a daringly dangerous assertion.

As WikiLeaks editor-in-chief Kristinn Hrafnssoncrisply put it, We have now learned from submissions and affidavits presented by the United States to the court that they do not consider foreign nationals to have a first amendment protection. To the AAP,he surmisedthat the US had also decided that they can go after journalists wherever they are residing in the world, they have universal jurisdiction, and demand extradition like they are doing by trying to get an Australian national from the UK from publishing that took place outside US borders.

The US case also insists that, should the extradition be successful, Assange will be subject to that troubling euphemism of special administrative measures. Even in a bureaucratic penal system, such language entails a formal and legal disappearance of the subject.

Italian journalist Stefania Maurizisuggestswith understandable gloominess that Pandoras box will open if the prosecutors make their case fly in court. The extradition of an Australian or Italian journalist by the US would just as easily justify the same action by Saudi Arabia and Russia. This terrifying precedent is reiterated as a distinct possibility across the spectrum of commentary, an extra-territorial extension of US power to punish the worlds scribblers, bloggers and publishers.

The outcome of this set of stuttered proceedings seemed to irritate District Judge Vanessa Baraitser, who conceded to the split, but sternly spoke of disfavour regarding any other requests for moving dates. Shedid relentto another case management hearing scheduled for February 19. The full extradition hearing is now set to open on February 24 at Londons Woolwich Crown Court, adjourning after one week, then continuing in May 18 with a three-week hearing. The chess pieces in this critical encounter have again been moved.

In this dark turn, a smattering of light seemed to shine through. Having been held in withering solitary confinement in the prison medical wing of Belmarsh, news came that Assange will be moved to an area with other inmates. Joseph Farrell of WikiLeaksdescribed itas a dramatic climbdown, a huge victory for Assanges legal team and for campaigners, who have been insisting for weeks that the prison authorities end the punitive treatment of Assange. The same could not be said about legal and medical access, both of which have been sorely lacking.

The decision to initiate the move seems to have sprung from prisoners within Belmarsh itself. The prison governor has been petitioned on no less than three occasions by a group of convicts insisting that the treatment being afforded Assange smacked of injustice. Human rights activist Craig Murraysubsequently reflectedon this small victory for basic humanity and it took criminals to teach it to the British state.

Such victories in penal terms do tend to be mixed. Assange will hope that those inmates he keeps company remain sympathetic to his cause. The new quarters will house some 40 of them, and the risks to his being remain. Even in prison, Assanges case and plight never ceases to astonish.

Dr. Binoy Kampmarkwas a Commonwealth Scholar at Selwyn College, Cambridge. He lectures at RMIT University, Melbourne. Email:bkampmark@gmail.com

Read more:
Split Hearings: The Assange Extradition Case Drags On - Pressenza, International Press Agency

Apple Wanted the iPhone to Have End-to-End Encryption. Then the FBI Stepped In – Popular Mechanics

Apple had intended to make end-to-end encryption of an entire device's data, which would then be uploaded to iCloud, available to customers. But then the FBI stepped in and put the kibosh on those plans.

The problem, according to law enforcement: Fully locked-down iPhones could be a roadblock to investigations, like the probe into a Saudi Air Force officer who shot three people dead at a Pensacola, Florida naval base last month.

U.S. Attorney General William Barr publicly asked Apple to unlock the two iPhones the shooter had in his possession. The company eventually did hand over backups from his iCloud account, but the whole ordeal shone a light on the back-and-forth dialogue going on between the U.S. government and tech companies that disagree about whether or not end-to-end encryption should be allowed. Just last month, both Democratic and Republican senators considered legislation to ban end-to-end encryption, using unrecoverable evidence in crimes against children as an example.

Apple had been planning to introduce end-to-end encryption for over two years and even told the FBI, according to a Reuters report that cited one current and three former Bureau officials, as well as one current and one former Apple employee. Shortly thereafter, the FBIs cybercrime agents and its operational technology division came out as staunchly opposed to those plans because it would make it impossible for Apple to recover people's messages for use in investigations.

"Legal killed it, for reasons you can imagine," another former Apple employee told Reuters. "They decided they werent going to poke the bear anymore."

In this case, the bear is the government. In 2016, a nearly identical showdown between the FBI and Apple took place after the two parties got into a legal battle over access to an iPhone owned by a suspect in the San Bernardino, California mass shooting.

The nixed encryption plans are a loss for iPhone users because end-to-end encryption is more advanced than today's industry standard for security: basic encryption. Loads of companies use encryption, which basically scrambles the contents of a message or some other snippet of data, rendering it completely useless without the decryption key, which can unshuffle the jargon and restore the original.

Under this framework, a company usually has the cryptographic encryption key, which means the data isn't truly safe if a government or hacker gets their hands on the key. End-to-end encryption, though, means only the, well, end computerthe one receiving the datahas the encryption key stored. In theory, that person's computer could still be hacked and the encryption key could be forfeited, but it really reduces those odds.

But that limitation on who has access to the encryption key is the very crux of law enforcement's issue with end-to-end encryption: If Apple doesn't have the encryption key to access backups of a person's iPhone on the cloud, then the government can't access that data either.

Still, it's not entirely clear that the government is to blame for this project being killed. It's entirely possible Apple didn't want to have to deal with the headache of its customers accidentally locking themselves out of their own data.

For the rest of the world's smartphone users who rely on the Android operating system, end-to-end encryption is an option. Back in October 2018, Google announced that customers could use a new capability that would keep backed-up data from their phones completely locked down by using a decryption key that's randomly generated on that user's phone, using their lock screen pin, pattern, or passcode.

"By design, this means that no one (including Google) can access a user's backed-up application data without specifically knowing their passcode," the company wrote in a blog post. This end-to-end encryption offering is still available.

See the original post here:
Apple Wanted the iPhone to Have End-to-End Encryption. Then the FBI Stepped In - Popular Mechanics

Amazon Engineer Leaked Private Encryption Keys. Outside Analysts Discovered Them in Minutes – Gizmodo

An Amazon Web Services (AWS) engineer last week inadvertently made public almost a gigabytes worth of sensitive data, including their own personal documents as well as passwords and cryptographic keys to various AWS environments.

While these kinds of leaks are not unusual or special, what is noteworthy here is how quickly the employees credentials were recovered by a third party, whoto the employees good fortune, perhapsimmediately warned the company.

On the morning of January 13, an AWS employee, identified as a DevOps Cloud Engineer on LinkedIn, committed nearly a gigabytes worth of data to a personal GitHub repository bearing their own name. Roughly 30 minutes later, Greg Pollock, vice president of product at UpGuard, a California-based security firm, received a notification about a potential leak from a detection engine pointing to the repo.

Despite the privacy concerns, labor strikes, and reports that Amazon is selling literal trash on

An analyst began working to verify what specifically had triggered the alert. Around two hours later, Pollock was convinced the data had been committed to the repo inadvertently and might pose a threat to the employee, if not AWS itself. In reviewing this publicly accessible data, I have come to the conclusion that data stemming from your company, of some level of sensitivity, is present and exposed to the public internet, he told AWS by email.

AWS responded gratefully about four hours later and the repo was suddenly offline.

Since UpGuards analysts didnt test the credentials themselveswhich would have been illegalits unclear what precisely they grant access to. An AWS spokesperson told Gizmodo on Wednesday that all of the files were personal in nature and unrelated to the employees work. No customer data or company systems were exposed, they said.

At least some of the documents in the cache, however, are labeled Amazon Confidential.

Alongside those documents are AWS and RSA key pairs, some of which are marked mock or test. Others, however, are marked admin and cloud. Another is labeled rootkey, suggesting it provides privileged control of a system. Other passwords are connected to mail services. And there are numerous of auth tokens and API keys for a variety of third-party products.

AWS did not provide Gizmodo with an on-the-record statement.

It is possible that GitHub would have eventually alerted AWS that this data was public. The site itself automatically scans public repositories for credentials issued by a specific list of companies, just as UpGuard was doing. Had GitHub been the one to detect the AWS credentials, it would have, hypothetically, alerted AWS. AWS would have then taken appropriate action, possibly by revoking the keys.

But not all of the credentials leaked by the AWS employee are detected by GitHub, which only looks for specific types of tokens issued by certain companies. The speed with which UpGuards automated software was able to locate the keys also raises concerns about what other organizations have this capability; surely many of the worlds intelligence agencies are among them.

GitHubs efforts to identify the leaked credentials its users uploadwhich began in earnest around five years agoreceived scrutiny last year after a study at North Carolina State University (NCSU) unearthed over 100,000 repositories hosting API tokens and keys. (Notably, the researchers only examined 13 percent of all public repositories, which alone included billions of files.)

While Amazon access key IDs and auth tokens were among the data examined by the NCSU researchers, a majority of the leaked credentials were linked to Google services.

GitHub did not respond to a request for comment.

UpGuard says it chose to make the incident known to demonstrate the importance of early detection and underscore that cloud security is not invulnerable to human error.

Amazon Web Services is the largest provider of public cloud services, claiming about half of the market share, Pollock said. In 2019, a former Amazon employee allegedly stole over a hundred million credit applications from Capital One, illustrating the scale of potential data loss associated with insider threats at such large and central data processors.

In this case, Pollock added, theres no evidence that the engineer acted maliciously or that any customer data was affected. Rather, this case illustrates the value of rapid data leaks detection to prevent small accidents from becoming larger incidents.

The rest is here:
Amazon Engineer Leaked Private Encryption Keys. Outside Analysts Discovered Them in Minutes - Gizmodo

iPhone War: The Justice Department Is Taking On Apple Over Encryption (Again) – Yahoo News

In the wake of last months shooting at a Pensacola, Florida, naval base, Attorney General William Barr isputting pressureon Apple to help FBI investigators unlock two of the shooters iPhones. Followers of these issues will recall a similarpressure campaignin 2016 to force Apple to decrypt the San Bernardino, California, shooters iPhone. In that case, the FBI ultimatelyhiredan external company to break the encryption, at a cost of over $1 million.

One might think that the FBIs current efforts mean that iPhone encryption has advanced such that only Apple has the capability to unlock the shooters iPhones, but depending on the exact model of the Pensacola shooters phone, the FBI could payas little as$15,000 to reach the data locked inside. However, if commercially available solutions dont work, its likely there isno way for Appleto unlock the phone without its passcode.

Read the original article.

Read the original:
iPhone War: The Justice Department Is Taking On Apple Over Encryption (Again) - Yahoo News

Deployed 82nd Airborne unit told to use these encrypted messaging apps on government cell phones – Military Times

A brigade of paratroopers deployed in early January to the Middle East in the wake of mounting tensions with Iran has been asked by its leadership to use two encrypted messaging applications on government cell phones.

The use of the encrypted messaging applications Signal and Wickr by the 82nd Airbornes Task Force Devil underscores the complexity of security and operations for U.S. forces deployed to war zones where adversaries can exploit American communications systems, cell phones and the electromagnetic spectrum.

But it also raises questions as to whether the Department of Defense is scrambling to fill gaps in potential security vulnerabilities for American forces operating overseas by relying on encrypted messaging apps available for anyone to download in the civilian marketplace.

All official communication on government cell phones within TF Devil has been recommended to use Signal or Wickr encrypted messaging apps, Maj. Richard Foote, a spokesman for the 1st Brigade Combat Team, told Military Times.

These are the two apps recommended by our leadership, as they are encrypted and free for download and use, Foote said.

Foote added that there is no operational discussions via the apps and an extra layer of security is provided because users must go through virtual private networks.

However, there are government transparency concerns with the use of encrypted messaging apps like Signal and Wickr, which feature auto-delete functions where messages are erased after a set period of time. Electronic communications and text messages sent as part of official government business are part of the public record, and should be accessible via a Freedom of Information Act request.

The Department of Defense did not respond to queries from Military Times regarding government records keeping policies and whether Signal and Wickr have been audited for security flaws by the DoD. Military Times has reached out to the National Security Agency, and has yet to receive a response.

Get the military's most comprehensive news and information every morning.

(please select a country) United States United Kingdom Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Congo, The Democratic Republic of The Cook Islands Costa Rica Cote D'ivoire Croatia Cuba Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Territories Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guinea Guinea-bissau Guyana Haiti Heard Island and Mcdonald Islands Holy See (Vatican City State) Honduras Hong Kong Hungary Iceland India Indonesia Iran, Islamic Republic of Iraq Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kiribati Korea, Democratic People's Republic of Korea, Republic of Kuwait Kyrgyzstan Lao People's Democratic Republic Latvia Lebanon Lesotho Liberia Libyan Arab Jamahiriya Liechtenstein Lithuania Luxembourg Macao Macedonia, The Former Yugoslav Republic of Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia, Federated States of Moldova, Republic of Monaco Mongolia Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestinian Territory, Occupied Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Reunion Romania Russian Federation Rwanda Saint Helena Saint Kitts and Nevis Saint Lucia Saint Pierre and Miquelon Saint Vincent and The Grenadines Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia and Montenegro Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Georgia and The South Sandwich Islands Spain Sri Lanka Sudan Suriname Svalbard and Jan Mayen Swaziland Sweden Switzerland Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand Timor-leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States United States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Venezuela Viet Nam Virgin Islands, British Virgin Islands, U.S. Wallis and Futuna Western Sahara Yemen Zambia Zimbabwe

Subscribe

By giving us your email, you are opting in to the Early Bird Brief.

Operational planners and military commanders rely on government cell phones for basic menial tasks from scheduling and daily muster even when deployed overseas.

Foote told Military Times that there is no requirement for extensive use of cell phones for work communication for the deployed 82nd paratroopers.

If cell phones are used, we have taken the best steps, readily available, to ensure the best security of our transmissions, Foote explained

To be clear, the term official communication in this setting refers to coordination of assets, sharing of meeting time changes, etc. There is no operational discussion on these platforms, Foote said.

Adversaries like Iran, which boast robust cyber and electronic warfare capabilities can glean much information from phone collections and basic text messages that could highlight daily patterns on an installation or sudden shifts and changes in schedules potential indications of pending operations.

But Foote explained to Military Times that the 82nds government cell communications include an extra layer of security.

When official business is being conducted via cell, it is done on the apps over VPN-protected [virtual private network] connectionssystems reviewed and recommended by our Communications and Cyber sections, Foote said.

In 2016, Signal received a positive security review when it was audited by the International Association for Cryptologic Research.

We have found no major flaws in the design, IACR said in its 2016 security audit of Signal.

A former military intelligence operator who has extensive experience working with the special operations community told Military Times that the Signal app was very secure with no known bugs.

He explained that the 82nd Airbornes reliance on the app for government cell communications wasnt necessarily an indication that the DoD was behind the curve on protecting cellphone security for deployed troops. The former intelligence operator said he believed the DoD was just being lazy.

Unfortunately, those apps are more secure than texting in the clear, which is more or less the alternative. Granted, if a hostile party has access to the handset, that encryption isnt particularly helpful, a former U.S. defense official told Military Times.

The former U.S. defense official, who spoke to Military Times on condition of anonymity because he was not authorized to speak on the record, said the DoD should use commercial applications as long as they are tested and meet security requirements.

I dont have confidence that DoD could build a unique texting system with proper security protocols that would beat any commercial, off the shelf, version, the former official said.

With regards to transparency and records keeping requirements, Foote said he cannot confirm if any personnel have Signal or Wickr settings which allow auto-delete of messages at this time.

Military Times has not been able to confirm if Signal and Wickr have been audited for security flaws and vulnerabilities by the DoD.

Officials from Signal and Wickr did not immediately respond to requests for comment.

Continue reading here:
Deployed 82nd Airborne unit told to use these encrypted messaging apps on government cell phones - Military Times

Govt looks to break into encrypted messages – The Indian Express

By: Express News Service | New Delhi | Updated: January 25, 2020 7:24:53 am Suggested changes currently need production of a court order before a messaging intermediary is required to break encryption.

The Information Technology Intermediaries Guidelines (Amendment) Rules, 2018, the new set of rules on regulation of social media which the government is to submit to the Supreme Court later this month, will push for traceability of content which in effect means breaking end-to-end encryption, even of messaging intermediaries.

This will make it difficult for large social media intermediaries, mostly international business conglomerates, to give in without a battle.

The guidelines, which are not being discussed or debated publicly with only a few in the government privy to the details, are meant to control online content deemed unlawful. But these will raise fundamental questions on both freedom of speech and privacy of ordinary users.

Suggested changes currently need production of a court order before a messaging intermediary is required to break encryption.

The Indian Express has been told that there could be two levels of online intermediaries defined in the new set of rules, each with different regulations, for social and non-social media.

Non-social media may have relatively lighter regulations given that there could be mandatory local legal incorporation for large social media intermediaries. Non-social media intermediaries will still have to appoint a local office for grievance redressal.

On November 21 last year, Sanjay Dhotre, Minister of State for Electronics and Information Technology, in a written reply to a question in Rajya Sabha, confirmed that the Centre was going ahead with new amended rules for social media. He said social media companies have to follow certain due diligence as laid out in the Information Technology (Intermediary Guidelines) Rules, 2011 under Section 79 of the Information Technology Act.

The issue of messaging apps being required to break end-to-end encryption has been a sticky point between governments and messaging apps like Facebook-owned WhatsApp, especially after revelations last year on the use of spy software being used by governments to break into phones and conduct surveillance into private conversations of activists, journalists and lawyers, including in India.

The need to conduct surveillance for reasons of security versus the right to privacy of citizens and users has been a heated debate, and remains unresolved the government appears to be pushing for more and intermediaries are insisting on greater transparency in the rules-framing process.

On December 24, 2018, The Indian Express reported that in the draft of The Information Technology Intermediaries Guidelines (Amendment) Rules, 2018, Rule 3 (9) required intermediaries, or online platforms, to deploy technology-based automated tools or appropriate mechanisms, with appropriate controls, for proactively identifying or removing or disabling access to unlawful information or content.

It is now learnt that automatic proactive filtering for all unlawful content could be replaced by a re-upload prevention provision it will prevent re-uploading of certain specific categories of content deemed illegal and taken down by platforms.

Social media intermediaries will still be required to provide user data within 72 hours in response to a government surveillance request, and have content-takedown timelines of 24 hours for content declared unlawful.

For all the latest India News, download Indian Express App

See the original post:
Govt looks to break into encrypted messages - The Indian Express

FBI bullied Apple into dropping plans for end-to-end encryption on iCloud backups – News Landed

Apple has come a long way building a reputation of having what is arguably the most secure mobile operating system iOS. Whether this is true or not, we can all agree that its very difficult to hack into an iPhone or infect it with malware. When it comes to security, Apple makes no compromises. This is very reassuring, unless of course, you work for the FBI.

In a recently released report from Reuters, Apple had planned on offering end-to-end encryption for iCloud backups two years ago. However, it scrapped those plans after heavy protests from the FBI. According to them, such a feature would hamper FBI investigations in cases where iCloud data could be used as evidence during criminal prosecutions.

Join our writing teamand develop your writing skills, as you see your articles featured onApple News,Google News, and allaround the world.

Basically, end-to-end encryption is a communication system that allows only the sender and receiver to read messages. Essentially, this cuts out third parties and eavesdroppers from the communication cycle, even Apple itself. Messages sent using end-to-end encryption cannot even be deciphered by the server facilitating the communication as only the devices carrying out the communication hold the decryption keys.

- Advertisement -

The FBI has a history of twisting Apples arm into handing over private iCloud information. With a court order, the FBI can request to access any users iCloud data from Apple, even without the users knowledge. They can also get assistance from Apple to retrieve iCloud data from an iPhone during an investigation, as seen in 2019 when Apple was forced to provide iCloud data of two of Mohammed Saeed Alshamranis iPhones, after he was implicated of perpetrating the attack on Naval Air Station in Pensacola, Florida. Had Apple already implemented end-to-end encryption at the time, not even they would have been able to access Alshamranis iCloud information.

It is yet to be determined if Apple wishes to implement end-to-end encryption in the future, or whether it will bow to the FBIs requests for a backdoor.

Join our writing teamand develop your writing skills, as you see your articles featured onApple News,Google News, and allaround the world. Subscribe to our newsletter,What Just Happened, where we dive deep into the hottest topics from the week!

+ United Nations to investigate reports on Saudi Crown Prince behind the hack of Jeff Bezos phone

- Advertisement -

+ Qualcomm is still focusing on 4G amid the 5G craze

+ More cities restrict travel as death toll rises from Chinese coronavirus

+ Robotic hearts may end the need for a heart transplant in 10 years

Read more from the original source:
FBI bullied Apple into dropping plans for end-to-end encryption on iCloud backups - News Landed