Techdirt Podcast Episode 252: The Key To Encryption – Techdirt

from the or-lack-thereof dept

This week we've got another cross-post, with the latest episode of The Neoliberal Podcast from the Progressive Policy Institute. Host Jeremiah Johnson invited Mike, along with PPI's Alec Stapp, to discuss everything about encryption: the concept itself, the attempts at laws and regulations, and more.

Follow the Techdirt Podcast on Soundcloud, subscribe via iTunes or Google Play, or grab the RSSfeed. You can also keep up with all the latest episodes right here on Techdirt.

Thank you for reading this Techdirt post. With so many things competing for everyones attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise and every little bit helps. Thank you.

The Techdirt Team

Filed Under: alec stapp, encryption, jeremiah johnson, podcast

More here:
Techdirt Podcast Episode 252: The Key To Encryption - Techdirt

Researchers Develop Attacks Targeting End-to-End Encryption in Emails – Decipher

Attack Types

Researchers were able to show how an adversary could automatically install certificates contained in S/MIME communications. For example, the researchers identified a design flaw in a clients key update mechanism which could be abused to replace the public keys used in encrypted S/MIME communications. The researchers were able to silently replace the encryption key for six S/MIME-supporting email clients.

A man-in-the-middle attack would involve an internet or email provider, or a compromised SMTP or IMAP server.

Email clients could also be tricked into into decrypting ciphertext messages or signing arbitrary messages and then sending them to an IMAP server controlled by the attacker. For three OpenPGP-capable clients, the researchers exfiltrated the plaintext to an IMAP server controlled by an attacker, or misused the clients as signing oracles.

The researchers tested 20 popular email clients, supporting either S/MIME or OpenPGP, from a list of more than 50 clients across major platforms (Windows, Linux, macOS, Android, and iOS), as well as web-based applications. As the table (Table 2 from the paper) shows, researchers were able to replace the keys in the Windows versions of Microsoft Outlook. "For Microsoft Outlook, we could verify theexistence of this dangerous feature since at least Outlook 2007," the researchers wrote.

An evaluation shows that 8 out of 20 tested email clients are vulnerable to at least one attack, the researchers found. More specifically, five out of 18 OpenPGP-capable email clients and six out of 18 S/MIME-capable clients were vulnerable to at least one attack.

The researchers were also able to abuse the mailto: URI method, which allows third-party applications to open a separate email client to compose a message, to secretly attach local files to email messages and sent to an attackers address. The mailto method is often used on websites, where clicking on a link can launch the locally installed email client with the recipient field (To) pre-populated with the email address the message is going to. It is possible to pre-populate other fields, such as a subject line and even the body of the message.

The issue lies in how email clients implemented RFC6068, the technical standard describing mailto. The researchers found that several standard parameters the mailto URI passes to the email client could be abused to trick the email client into decrypting ciphertext messages, or signing messages and sending them to attackers, the researchers said. One example of this is how the mailto method uses the attach or attachment parameters to open up an email window with a file already attached. If the user does not notice that the email window has the file attached, the user could inadvertently send sensitive information such as encryption (PGP) keys, SSH private keys, configuration files, and other sensitive information.

Researcher Mller posted a video on Twitter illustrating how mailto parameters could be abused. The researchers were able to perform this attack on four of the tested clients.

The researchers were able to attach files by knowing the exact file paths for the desired files, using wildcard characters to attach multiple files in a given location, or using URLs pointing to internal network shares. They were also able to use IMAP links to steal email messages from a user's IMAP email inbox.

The vulnerabilities have been reported to the affected vendors back in February. The list includes IBM/HCL Notes (CVE-2020-4089), GNOME Evolution (CVE-2020-11879), and KDE KMail (CVE-2020-11880). The details for CVE-2020-12618, and CVE-2020-12619 have not been made public. Thunderbird versions 52 and 60 for Debian/Kali Linux were affected as they had problems with the mailto parameter allowing local files (such as an SSH private key) to be attached to outgoing messages. Recent versions of Thunderbird are not vulnerable, as the issue with the mailto?attach= parameter was fixed in Thunderbird last year.

While our attacks do not target the underlying cryptographic primitives, they raise concerns about the practical security of OpenPGP and S/MIME email applications, the researchers wrote.

Visit link:
Researchers Develop Attacks Targeting End-to-End Encryption in Emails - Decipher

Global Encryption Software Market 2020: Industry Analysis by Size, Share, Demand, Growth rate and Forecasts Till 2025 – The News Brok

This report focuses on the global Encryption Software status, future forecast, growth opportunity, key market and key players. The study objectives are to present the Encryption Software development in United States, Europe and China.

In 2017, the global Encryption Software market size was million US$ and it is expected to reach million US$ by the end of 2025, with a CAGR of during 2018-2025.

The key players covered in this study

IBM

Microsoft

Sophos Ltd

Gemalto

Net App Inc

Hewlett- Packard

Vormetric

Oracle

Intel

Symantec

Market segment by Type, the product can be split into

Encryption for Data-at-rest

Full Disc Encryption (FDE)

File Level Encryption

Others

Market segment by Application, split into

IT & Telecom

BFSI

Government & Public Utilities

Manufacturing Enterprise

Others

Market segment by Regions/Countries, this report covers

United States

Europe

China

Japan

Southeast Asia

India

Central & South America

The study objectives of this report are:

To analyze global Encryption Software status, future forecast, growth opportunity, key market and key players.

To present the Encryption Software development in United States, Europe and China.

To strategically profile the key players and comprehensively analyze their development plan and strategies.

To define, describe and forecast the market by product type, market and key regions.

In this study, the years considered to estimate the market size of Encryption Software are as follows:

History Year: 2013-2017

Base Year: 2017

Estimated Year: 2018

Forecast Year 2018 to 2025

For the data information by region, company, type and application, 2017 is considered as the base year. Whenever data information was unavailable for the base year, the prior year has been considered.

Table of Contents

Chapter One: Report Overview

1.1 Study Scope

1.2 Key Market Segments

1.3 Players Covered

1.4 Market Analysis by Type

1.4.1 Global Encryption Software Market Size Growth Rate by Type (2013-2025)

1.4.2 Encryption for Data-at-rest

1.4.3 Full Disc Encryption (FDE)

1.4.4 File Level Encryption

1.4.5 Others

1.5 Market by Application

1.5.1 Global Encryption Software Market Share by Application (2013-2025)

1.5.2 IT & Telecom

1.5.3 BFSI

1.5.4 Government & Public Utilities

1.5.5 Manufacturing Enterprise

1.5.6 Others

1.6 Study Objectives

1.7 Years Considered

Chapter Two: Global Growth Trends

2.1 Encryption Software Market Size

2.2 Encryption Software Growth Trends by Regions

2.2.1 Encryption Software Market Size by Regions (2013-2025)

2.2.2 Encryption Software Market Share by Regions (2013-2018)

2.3 Industry Trends

2.3.1 Market Top Trends

2.3.2 Market Drivers

2.3.3 Market Opportunities

Chapter Three: Market Share by Key Players

3.1 Encryption Software Market Size by Manufacturers

3.1.1 Global Encryption Software Revenue by Manufacturers (2013-2018)

3.1.2 Global Encryption Software Revenue Market Share by Manufacturers (2013-2018)

3.1.3 Global Encryption Software Market Concentration Ratio (CRChapter Five: and HHI)

3.2 Encryption Software Key Players Head office and Area Served

3.3 Key Players Encryption Software Product/Solution/Service

3.4 Date of Enter into Encryption Software Market

3.5 Mergers & Acquisitions, Expansion Plans

Chapter Four: Breakdown Data by Type and Application

4.1 Global Encryption Software Market Size by Type (2013-2018)

4.2 Global Encryption Software Market Size by Application (2013-2018)

Chapter Five: United States

5.1 United States Encryption Software Market Size (2013-2018)

5.2 Encryption Software Key Players in United States

5.3 United States Encryption Software Market Size by Type

5.4 United States Encryption Software Market Size by Application

Chapter Six: Europe

6.1 Europe Encryption Software Market Size (2013-2018)

6.2 Encryption Software Key Players in Europe

6.3 Europe Encryption Software Market Size by Type

6.4 Europe Encryption Software Market Size by Application

Chapter Seven: China

7.1 China Encryption Software Market Size (2013-2018)

7.2 Encryption Software Key Players in China

7.3 China Encryption Software Market Size by Type

7.4 China Encryption Software Market Size by Application

Chapter Eight: Japan

Originally posted here:
Global Encryption Software Market 2020: Industry Analysis by Size, Share, Demand, Growth rate and Forecasts Till 2025 - The News Brok

DatChat Rolls Out Fully Encrypted Social Media and Messaging Platform – CIOReview

DatChat has launched fully encrypted social media, and messaging platform that includes self-destructing features and more for assured privacy and security for users.

FREMONT, CA: DatChat gives users their privacy back when social media censorship is quickly spreading, Available for free for the iOS and Android mobile platforms, DatChat is a fully encrypted social media and messaging platform. DatChat enables users to change how long posts and messages can be viewed before or after they are shared, prevents screenshots, and help users to nuke conversations that disappear from the parties' devices.

DatChat's patented technology also provides users a conventional texting experience while providing total control and security for their messages. Once a message self-destructs on its own or the user choose to erase it, the message disappears forever. No record remains in DatChat or its servers. DatChat messages are double encrypted and cannot be read without the key that only the user has.

The DatChat private social network generates a secure and completely private space to post, share, and comment with friends and associates. Additionally, all posts are encrypted and can be permanently deletedwithout a trace. Based on patented technology, the DatChat social privacy platform creates a unique social network to safely share and talk without the worry of censorship, getting canceled, or the prying eyes of Big Data.

Features of DatChat includes it helps create multiple social networks which is easy to use and will always be private and secure, opt to nuke messages so that they instantly self-destruct without a trace, prevent screenshot and notification with unique anti-screenshot technology that allows users to view an entire message while protecting it from screenshots, encryption to ensure that posts and messages are only seen by the user and user's recipients, message security, biometric or facial recognition security to protect DatChat messages and set simple or complex passwords for added protection, and anonymity.

DatChat is a team dedicated to creating a personal privacy platform that provides privacy, control, and security. The DatChat Digital Rights Management Technology is the core of the platform.

Its initial products are the DatChat Messenger and Private Social Media Platform. The company is now focused on developing blockchain and DRM to remediate cyber-security issues, such as issues relating to messaging, social media, email, file storage, and financial transactions.

Read more here:
DatChat Rolls Out Fully Encrypted Social Media and Messaging Platform - CIOReview

Encryption Software Market- Global Outlook and Forecast 2018-2026 – Kentucky Journal 24

Market Scenario

Global Encryption Software Market was valued US$ 3.45 Bn in 2017 and is expected to reach US$ 9.23 Bn by 2026, at a CAGR of 14% during a forecast period.

The global encryption software market based on component, application, deployment type, organization size, vertical, and region. In terms of component, the encryption software market is classified into solution and services. Based on application, the encryption software market is categorized into disk encryption, file/folder encryption, communication encryption, and cloud encryption. On the basis of deployment type, the encryption software market is segregated into on-premises and cloud. In terms of organization size, the encryption software market is classified into large enterprises, small and medium-sized enterprises (SMEs). Based on vertical, the encryption software market is divided into Banking, Financial Services, and Insurance (BFSI), healthcare, government, and public utilities, telecom and IT, retail, aerospace and defense, and others. Region wise into North America, Europe, Asia Pacific, Middle East & Africa, and Latin America.

The growing concerns of data breaches and privacy compliance regulations are making companies keener to adopt software-based encryption solutions to achieve compliance, improved data security, and better flexibility in operations. Encryption software allows the organizations to safeguard their intellectual property and other sensitive data, thus escalating the market growth over the forecast period. Although this encryption software offer significant benefits, their adoption may experience challenges terms of budget. The deployment options for these solutions are complex and time-consuming, however, the benefits offered by them often overshadow the challenges pertaining to the complexity and the time associated with their deployment.

Get Access to sample pages @ https://www.trendsmarketresearch.com/report/sample/11379

Global Encryption Software Market

In terms of deployment type, the on-premise segment emerged as a dominant deployment segment. However, the cloud-based segment is anticipated to grow considerably over the forecast period. The establishment of new businesses in the developing economies is further expected to propel the demand for cloud-based solutions.

Based on application, the cloud solutions segment is anticipated to witness growth. Data storage is one of the major resources for several industries including banking & financial, retail, and others to move to the cloud. The growing mobile theft and cyber-attacks have led to mandated regulatory standards related to data transfer and its security.

In terms of region, North America leading the global encryption software market, followed by Europe. Owing to rising adoption of technologies and strict data privacy regulatory compliance, North America is anticipated to retain its leadership in the global encryption software market during the forecast period.

Some of the key players in the global encryption software market are Symantec, Microsoft Corporation, Bloombase, Cisco Systems, EMC Corporation, Check Point Software Technologies, IBM Corporation, Intel Security, Trend Micro, and Sophos.

Scope of the Global Encryption Software Market

Global Encryption Software Market by Component

Solution Services

Global Encryption Software Market by Application

Disk Encryption File/Folder Encryption Communication Encryption Cloud Encryption

Global Encryption Software Market by Deployment Type

On-premises CloudGlobal Encryption Software Market by Organization Size

Large Enterprises Small and Medium-sized Enterprises (SMEs)

Global Encryption Software Market by Vertical

Banking, Financial Services, and Insurance (BFSI) Healthcare Government and public utilities Telecom and IT Retail Aerospace and defense Others

Global Encryption Software Market by Geography

North America Europe Asia-Pacific Middle East & Africa Latin America

Key Players operating in the Global Encryption Software Market

Symantec Microsoft Corporation Bloombase Cisco Systems EMC Corporation Check Point Software Technologies IBM Corporation Intel Security Trend Micro Sophos SAS Institute Inc. WinMagic Inc. OpenPuff Cryptocat KeePass

Read this article:
Encryption Software Market- Global Outlook and Forecast 2018-2026 - Kentucky Journal 24

Analyzing Impacts Of COVID-19 On Data Encryption Market Effects, Aftermath And Forecast To 2026 – The Daily Chronicle

The global Data Encryption market focuses on encompassing major statistical evidence for the Data Encryption industry as it offers our readers a value addition on guiding them in encountering the obstacles surrounding the market. A comprehensive addition of several factors such as global distribution, manufacturers, market size, and market factors that affect the global contributions are reported in the study. In addition the Data Encryption study also shifts its attention with an in-depth competitive landscape, defined growth opportunities, market share coupled with product type and applications, key companies responsible for the production, and utilized strategies are also marked.

This intelligence and 2026 forecasts Data Encryption industry report further exhibits a pattern of analyzing previous data sources gathered from reliable sources and sets a precedented growth trajectory for the Data Encryption market. The report also focuses on a comprehensive market revenue streams along with growth patterns, analytics focused on market trends, and the overall volume of the market.

Download PDF Sample of Data Encryption Market report @ https://hongchunresearch.com/request-a-sample/15986

The study covers the following key players:Symantec Corporation (U.S.)IBM Corporation (U.S.)Vormetric Inc. (U.S.)Intel Security (U.S.)OthersOracle Corporation (U.S.)HP (U.S.)FireEye, Inc. (U.S.)Netapp Inc. (U.S.)Gemalto (Netherlands)Microsoft Corporation, (U.S.)

Moreover, the Data Encryption report describes the market division based on various parameters and attributes that are based on geographical distribution, product types, applications, etc. The market segmentation clarifies further regional distribution for the Data Encryption market, business trends, potential revenue sources, and upcoming market opportunities.

Market segment by type, the Data Encryption market can be split into,File System EncryptionApplication Level Encryption

Market segment by applications, the Data Encryption market can be split into,BFSIHealthcareGovernmentTelecom & ITRetail

The Data Encryption market study further highlights the segmentation of the Data Encryption industry on a global distribution. The report focuses on regions of North America, Europe, Asia, and the Rest of the World in terms of developing business trends, preferred market channels, investment feasibility, long term investments, and environmental analysis. The Data Encryption report also calls attention to investigate product capacity, product price, profit streams, supply to demand ratio, production and market growth rate, and a projected growth forecast.

In addition, the Data Encryption market study also covers several factors such as market status, key market trends, growth forecast, and growth opportunities. Furthermore, we analyze the challenges faced by the Data Encryption market in terms of global and regional basis. The study also encompasses a number of opportunities and emerging trends which are considered by considering their impact on the global scale in acquiring a majority of the market share.

The study encompasses a variety of analytical resources such as SWOT analysis and Porters Five Forces analysis coupled with primary and secondary research methodologies. It covers all the bases surrounding the Data Encryption industry as it explores the competitive nature of the market complete with a regional analysis.

Brief about Data Encryption Market Report with [emailprotected]https://hongchunresearch.com/report/data-encryption-market-15986

Some Point of Table of Content:

Chapter One: Data Encryption Market Overview

Chapter Two: Global Data Encryption Market Landscape by Player

Chapter Three: Players Profiles

Chapter Four: Global Data Encryption Production, Revenue (Value), Price Trend by Type

Chapter Five: Global Data Encryption Market Analysis by Application

Chapter Six: Global Data Encryption Production, Consumption, Export, Import by Region (2014-2019)

Chapter Seven: Global Data Encryption Production, Revenue (Value) by Region (2014-2019)

Chapter Eight: Data Encryption Manufacturing Analysis

Chapter Nine: Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter Ten: Market Dynamics

Chapter Eleven: Global Data Encryption Market Forecast (2019-2026)

Chapter Twelve: Research Findings and Conclusion

Chapter Thirteen: Appendix continued

Check [emailprotected] https://hongchunresearch.com/check-discount/15986

List of tablesList of Tables and FiguresFigure Data Encryption Product PictureTable Global Data Encryption Production and CAGR (%) Comparison by TypeTable Profile of File System EncryptionTable Profile of Application Level EncryptionTable Data Encryption Consumption (Sales) Comparison by Application (2014-2026)Table Profile of BFSITable Profile of HealthcareTable Profile of GovernmentTable Profile of Telecom & ITTable Profile of RetailFigure Global Data Encryption Market Size (Value) and CAGR (%) (2014-2026)Figure United States Data Encryption Revenue and Growth Rate (2014-2026)Figure Europe Data Encryption Revenue and Growth Rate (2014-2026)Figure Germany Data Encryption Revenue and Growth Rate (2014-2026)Figure UK Data Encryption Revenue and Growth Rate (2014-2026)Figure France Data Encryption Revenue and Growth Rate (2014-2026)Figure Italy Data Encryption Revenue and Growth Rate (2014-2026)Figure Spain Data Encryption Revenue and Growth Rate (2014-2026)Figure Russia Data Encryption Revenue and Growth Rate (2014-2026)Figure Poland Data Encryption Revenue and Growth Rate (2014-2026)Figure China Data Encryption Revenue and Growth Rate (2014-2026)Figure Japan Data Encryption Revenue and Growth Rate (2014-2026)Figure India Data Encryption Revenue and Growth Rate (2014-2026)Figure Southeast Asia Data Encryption Revenue and Growth Rate (2014-2026)Figure Malaysia Data Encryption Revenue and Growth Rate (2014-2026)Figure Singapore Data Encryption Revenue and Growth Rate (2014-2026)Figure Philippines Data Encryption Revenue and Growth Rate (2014-2026)Figure Indonesia Data Encryption Revenue and Growth Rate (2014-2026)Figure Thailand Data Encryption Revenue and Growth Rate (2014-2026)Figure Vietnam Data Encryption Revenue and Growth Rate (2014-2026)Figure Central and South America Data Encryption Revenue and Growth Rate (2014-2026)Figure Brazil Data Encryption Revenue and Growth Rate (2014-2026)Figure Mexico Data Encryption Revenue and Growth Rate (2014-2026)Figure Colombia Data Encryption Revenue and Growth Rate (2014-2026)Figure Middle East and Africa Data Encryption Revenue and Growth Rate (2014-2026)Figure Saudi Arabia Data Encryption Revenue and Growth Rate (2014-2026)Figure United Arab Emirates Data Encryption Revenue and Growth Rate (2014-2026)Figure Turkey Data Encryption Revenue and Growth Rate (2014-2026)Figure Egypt Data Encryption Revenue and Growth Rate (2014-2026)Figure South Africa Data Encryption Revenue and Growth Rate (2014-2026)Figure Nigeria Data Encryption Revenue and Growth Rate (2014-2026)Figure Global Data Encryption Production Status and Outlook (2014-2026)Table Global Data Encryption Production by Player (2014-2019)Table Global Data Encryption Production Share by Player (2014-2019)Figure Global Data Encryption Production Share by Player in 2018Table Data Encryption Revenue by Player (2014-2019)Table Data Encryption Revenue Market Share by Player (2014-2019)Table Data Encryption Price by Player (2014-2019)Table Data Encryption Manufacturing Base Distribution and Sales Area by PlayerTable Data Encryption Product Type by PlayerTable Mergers & Acquisitions, Expansion PlansTable Symantec Corporation (U.S.) ProfileTable Symantec Corporation (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table IBM Corporation (U.S.) ProfileTable IBM Corporation (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table Vormetric Inc. (U.S.) ProfileTable Vormetric Inc. (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table Intel Security (U.S.) ProfileTable Intel Security (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table Others ProfileTable Others Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table Oracle Corporation (U.S.) ProfileTable Oracle Corporation (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table HP (U.S.) ProfileTable HP (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table FireEye, Inc. (U.S.) ProfileTable FireEye, Inc. (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table Netapp Inc. (U.S.) ProfileTable Netapp Inc. (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table Gemalto (Netherlands) ProfileTable Gemalto (Netherlands) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table Microsoft Corporation, (U.S.) ProfileTable Microsoft Corporation, (U.S.) Data Encryption Production, Revenue, Price and Gross Margin (2014-2019)Table Global Data Encryption Production by Type (2014-2019)Table Global Data Encryption Production Market Share by Type (2014-2019)Figure Global Data Encryption Production Market Share by Type in 2018Table Global Data Encryption Revenue by Type (2014-2019)Table Global Data Encryption Revenue Market Share by Type (2014-2019)Figure Global Data Encryption Revenue Market Share by Type in 2018Table Data Encryption Price by Type (2014-2019)Figure Global Data Encryption Production Growth Rate of File System Encryption (2014-2019)Figure Global Data Encryption Production Growth Rate of Application Level Encryption (2014-2019)Table Global Data Encryption Consumption by Application (2014-2019)Table Global Data Encryption Consumption Market Share by Application (2014-2019)Table Global Data Encryption Consumption of BFSI (2014-2019)Table Global Data Encryption Consumption of Healthcare (2014-2019)Table Global Data Encryption Consumption of Government (2014-2019)Table Global Data Encryption Consumption of Telecom & IT (2014-2019)Table Global Data Encryption Consumption of Retail (2014-2019)Table Global Data Encryption Consumption by Region (2014-2019)Table Global Data Encryption Consumption Market Share by Region (2014-2019)Table United States Data Encryption Production, Consumption, Export, Import (2014-2019)Table Europe Data Encryption Production, Consumption, Export, Import (2014-2019)Table China Data Encryption Production, Consumption, Export, Import (2014-2019)Table Japan Data Encryption Production, Consumption, Export, Import (2014-2019)Table India Data Encryption Production, Consumption, Export, Import (2014-2019)Table Southeast Asia Data Encryption Production, Consumption, Export, Import (2014-2019)Table Central and South America Data Encryption Production, Consumption, Export, Import (2014-2019)continued

About HongChun Research:HongChun Research main aim is to assist our clients in order to give a detailed perspective on the current market trends and build long-lasting connections with our clientele. Our studies are designed to provide solid quantitative facts combined with strategic industrial insights that are acquired from proprietary sources and an in-house model.

Contact Details:Jennifer GrayManager Global Sales+ 852 8170 0792[emailprotected]

See the rest here:
Analyzing Impacts Of COVID-19 On Data Encryption Market Effects, Aftermath And Forecast To 2026 - The Daily Chronicle

Encryption Software Market Global Industry Perspective, Comprehensive Analysis and Forecast 20202027 | IBM Corporation, Microsoft Corporation,…

The in-depth study on the Encryption Software industry covers a comprehensive analysis of the historical data, present and emerging market trends, technological advancements, and the overall market scenario. The report titled Global Encryption Software Market analyzes the current market scene, market share, growth rate, future trends, market drivers, opportunities, and challenges, risks, and entry barriers.

The report is up to date with the latest happenings due to the COVID-19 pandemic. The pandemic has affected every segment of the market and has brought dynamic changes in the demand and supply patterns. The report assesses the impact of the crisis on the industry and provides a futuristic outlook of a post-COVID scenario.

Get a Sample of the Report @ https://www.reportsanddata.com/sample-enquiry-form/1516

The report provides statistical data in an organized manner by sorting key data into tables, graphs, charts, figures, and diagrams. The graphical representation allows the reader to easily understand the key features of the market. The report further analyses the key market players and their global position.

The report covers extensive analysis of the key market players in the market, along with their business overview, expansion plans, and strategies. The key players studied in the report include:

IBM Corporation, Microsoft Corporation, Symantec Corporation, Intel Security, EMC Corporation, Sophos Holdings Ltd, Check Point Software Technologies, McAfee, Proofpoint, and Trend Micro.

The Encryption Software market report covers the estimation of the market size and market volume and provides a detailed estimation of the various segments of the Encryption Software market. The report presents an 8-year forecast starting 2020 and ending in 2027 with a comprehensive analysis of the supply and demand ratio, dominant players, driving factors, restraints, and challenges. The report covers market revenue, sales, production, and manufacturing costs, and helps the reader in gaining a deeper understanding of the industry.

Request a discount on the report @ https://www.reportsanddata.com/discount-enquiry-form/1516

Encryption Software market report contains industrial chain analysis and value chain analysis to provide a comprehensive view of the global Encryption Software market. The study is composed of market analysis along with a detailed analysis of the application segments, product types, market size, growth rate, and current and emerging trends in the industry.

Component Type Outlook (Revenue, USD Billion; 2016-2026)

Usages type Outlook (Revenue, USD Billion; 2016-2026)

Deployment type Outlook (Revenue, USD Billion; 2016-2026)

Application areaType Outlook (Revenue, USD Billion; 2016-2026)

End-use Type Outlook (Revenue, USD Billion; 2016-2026)

Request customization of the report @ https://www.reportsanddata.com/request-customization-form/1516

The Encryption Software report is a comprehensive analysis of the Encryption Software market with regards to benefits, limitations, supply and demand, developments in technologies and products. The report also covers SWOT analysis, Porters Five Forces Analysis, feasibility analysis, and investment return analysis.

Regional Outlook:

On the basis of geographical segmentation, the market is analyzed in key regions such as North America, Latin America, Europe, Asia-Pacific, and Middle East & Africa. The regional analysis covers production and consumption ratio, revenue generation, market share, market growth rate, and a forecast for 2020-2027.

Overview of the Encryption Software Market Report:

To read more about the report, visit @ https://www.reportsanddata.com/report-detail/encryption-software-market

Thank you for reading our report. Please get in touch with us to know more about the report, and our team will provide excellent assistance and make sure the report is well suited to your needs.

Follow this link:
Encryption Software Market Global Industry Perspective, Comprehensive Analysis and Forecast 20202027 | IBM Corporation, Microsoft Corporation,...

Commercial Encryption Software Market Analysis And Demand With Forecast Overvie – News by aeresearch

The Commercial Encryption Software market report underlines the significant growth opportunities, drivers, and challenges that are slated to formulate the growth orbit of this industry vertical in the upcoming years.

As per the report, the Commercial Encryption Software market is projected to record XX% CAGR over the 2020-2025 and is anticipated to accrue notable returns by the end of analysis timeframe.

The coronavirus outbreak has disrupted business operations across all industry verticals. Apart from revenue uncertainties in the near future, some businesses are expected to face difficulties even after the economy revives from the pandemic.

Request Sample Copy of this Report @ https://www.aeresearch.net/request-sample/278722

Almost all companies have restructured their budget to reinstate the profit curve for the following years. Our examination of this business landscape can improve your action plan and help you design flexible contingency plans.

In addition, the research report offers a granular assessment of the market segmentations to help you identify the top revenue prospects of this industry.

Key pointers from the Commercial Encryption Software market report:

Commercial Encryption Software Market segmentations included in the report:

Regional landscape: North America, Europe, Asia-Pacific, South America, Middle East & Africa, South East Asia

Product types: Disk Encryption, File/folder Encryption, Database Encryption, Communication Encryption and Cloud Encryption

Applications spectrum: Financial, Electric Power, Government, IT, Transport, Education and Others

Competitive outlook: The major players covered in Commercial Encryption Software are:, Dell, Sophos, IBm, Eset, Pkware, Gemalto, Thales E-Security, Microsoft, Mcafee, Symantec, Zhongfu, Trend Micro, Venustech, Sangfor Technologies Inc., Cryptomathic, FEITIAN and Stormshield

Highlights of the Report:

The scope of the Report:

The report offers a complete company profiling of leading players competing in the global Commercial Encryption Software marketSize with a high focus on the share, gross margin, net profit, sales, product portfolio, new applications, recent developments, and several other factors. It also throws light on the vendor landscape to help players become aware of future competitive changes in the global Commercial Encryption Software market.

Reasons to Buy the Report:

Major Points Covered in Table of Contents:

Request Customization on This Report @ https://www.aeresearch.net/request-for-customization/278722

View original post here:
Commercial Encryption Software Market Analysis And Demand With Forecast Overvie - News by aeresearch

WikiLeaks – The Podesta Emails

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

Originally posted here:

WikiLeaks - The Podesta Emails

Trump Wants to Build a Wall Around the Internet, How Worried Should The U.S. Be? – Gizmodo Australia

Early this month, U.S. Secretary of State Mike Pompeo announced the Clean Network plan, a trade war offensive aiming to cut Chinese tech companies off from United States consumers. Before a numb and beleaguered public could wrap its head around such a plan, Trump dispatched a pair of chaotic executive orders effectively aiming to ban TikTok and WeChat from American app stores within 45 days and then lobbed on a third executive order last Friday, extending the deadline for TikToks China-based parent company ByteDance to sell off its assets that support the operation of TikTok in the U.S. to 90 days. Together, this sounded to some like a blueprint for a Great Firewall, Chinas own bulwark against foreign internet services.

The executive orders ban U.S. companies from doing business with the apps, but the initial TikTok order additionally leaves room for a forced sale of TikToks American arm to a domestic company (likely Microsoft or Twitter). The WeChat executive order offers less leeway, banning all transactions with WeChat itself, no matter who owns it, which will cut off a major avenue of communication between people in the U.S. and mainland China.

Both apps pose legitimate risks, and the Chinese government can demand that the companies hand over data. But the vague language of the executive orders and the Clean Network plan sounds a lot like Trumps attitude toward immigration: All apps from one country are bad and dangerous. Or, in the words of the Clean Network plan, Chinese apps threaten our privacy, proliferate viruses, and spread propaganda and disinformation. The State Department billed the Clean Network plan as new lines of effort, which include: disconnecting Chinese carriers from U.S. telecoms; removing Chinese apps from U.S. app stores and doing the same to U.S. apps on Chinese stores or devices; removing U.S. data from Chinese company-provided cloud storage; and, oddly for a new policy, ensuring the security of undersea cables. (Presumably, the government would have already been working on that last one.)

Its more of a vision board for racism and xenophobia than a plan, but Trump & Co. have already meddled with internet freedom at home. Republicans have salivated over rolling back Section 230 of the Communications Decency Act, which frees internet platforms from liability over user-generated content. Its the foundational law that allows vital resources like Wikipedia, social media platforms, and even comments sections to exist; Trump most recently attempted to bludgeon it by executive order, after Twitter wounded him with a bit of extremely lenient moderation.

Given all of that, lets entertain the possibility that Trump really, really wants a Great Firewall, meaning A) cutting off foreign platforms and B) censoring speech at home. How close could he get?

In simplest terms, Chinas Great Firewall involves a combination of infrastructure patrolled by an army of human guards.

First, in order to land on gizmodo.com, for example, your computer has to communicate with a DNS root name server, which converts gizmodo.com to an IP address, a string of numbers necessary to retrieve the data which materialises as this website in your browser. (Read here for a more detailed explanation.) The Chinese state owns DNS root name servers, allowing it to block IP addresses, return the wrong address, and block search terms such as Winnie the Pooh. China also employs thousands of online censors and internet police, who show up at your doorstep for critiquing censorship or the president.

This model surely wouldnt hold up in court against the First Amendment, and DNS root name servers arent owned here by a single government entity. But the government has successfully shut down websites, most recently via FOSTA-SESTA, a package of bills that outlawed the operating of websites perceived as facilitating sex trafficking by amending Section 230 of the Communications Decency Act, which, as I mentioned earlier, shields platform operators from liability for user-posted content. So far, FOSTA-SESTA enforcement has directly come down on few sites, namely the well-publicised seizure of Backpage with a showy FBI raid, relative to the reach of its chilling effect causing preemptive shutdowns of sites like Craigslist personals and cancellations of real-world events like an annual sex worker conference. (The proposed EARN IT Act, a bipartisan FOSTA-SESTA 2.0, could now satiate Attorney General William Barrs desire to strip encryption protections under the auspices of preventing child sexual abuse.)

But the U.S.s internet infrastructure is vastly more complicated than Chinas, after decades of support for the free flow of information.

I used to describe it to people this way, Mieke Eoyang, former sta member of the House Permanent Select Committee on Intelligence, told Gizmodo. Its like China is on an island; the traffic to the island gets there via a handful of bridges, and they can put toll booths on the bridges. And the United States is on the mainland, and its surrounded by other countries. The data flows easily and quickly all throughout, and it is co-mingled.

A wall would require tearing down and rebuilding the internet, Eoyang explained, and the squandered time and effort would be an economically disastrous halt to whatever growth and innovation a nationalist blockade would supposedly aim to accomplish.

I think its inevitable that whenever we are discussing a plan for internet regulation, especially when China is involved, even on the other side, that the Great Firewall gets brought up, James Griffiths, author of The Great Firewall of China: How to Build and Control an Alternative Version of the Internet, told Gizmodo. But the comparison is flawed, Griffiths said, because the blockage of foreign services is a minor function compared to the censorship and surveillance that happens inside it, safeguarding a propaganda apparatus that stifles critics. (This includes WeChat, which does the same inside, and to some extent, beyond the wall.)

The concerns here are legitimate, Griffiths reiterated. Gathering vast troves of data is par for the course in Silicon Valley, but that doesnt necessarily make it acceptable for TikTok to do so. TikTok may never be able to convince U.S. regulators that as a Chinese company they could resist an illegal order from Beijing, when push comes to shove, but if they werent hoovering up so much data in the first place, that wouldnt be such a concern, Griffiths said. WeChat was likely overdue a reckoning given long-running accusations that its been censoring users outside of China.

The Clean Network plan does resemble cyber sovereignty, Griffiths noted, the concept that a country can shape and govern the internet within its borders, which might involve banning foreign apps, banning VPNs, or fencing in citizens data. Russia and China are codifying it into authoritarian policy, though even non-authoritarian governments might control the flow of data in the interest of economic protectionism or to prevent NSA spying on their citizens.

But China similarly invokes national security as a justification to censor speech and ice out foreign competition. He does find the moves concerning as a trial balloon for similarly broad executive orders for targets that may be far less legitimate or reasons that are more self-serving.

As has become customary with Trumps executive actions, the legal challenges were swift. TikTok is reportedly expected to sue on the grounds that the Trump regime unconstitutionally neglected to give TikTok a chance to respond, and its U.S.-based employees, who may lose their jobs, are reportedly planning to sue over workers rights.

Also as usual, the chaotic executive orders are constitutionally shaky: Banning communicative apps raises First Amendment issues, the Electronic Frontier Foundation was quick to note. The U.S. Supreme Court has recognised software as a protected means of expression. Banning distributing the app in [an] app store would raise the First Amendment rights of the app stores to distribute software, EFF Deputy Executive Director Kurt Opsahl told Gizmodo. Of course, it would be up to Apple and Google whether to assert that in the face of a purported distribution ban.

In this light, forcing a sale of TikTok sounds a lot like robbery, especially after Trump threw in a gangsterish suggestion that the government would get a cut of any buyout.

The [Clean Network] plan cites no legal authority, so Id be interested to see if the State Department has coordinated this with the Department of Justice, Eoyang told Gizmodo. Eoyang added that there are huge, troubling legal issues here including sidestepping the Constitution, which gives only Congress the power to regulate foreign commerce. [F]or the President to take an action like this, hed need specific statutory authority to do so, Eoyang said. Absent the statutory authority, the President is acting by fiat, and not according to the Constitution to which he swore an oath.

Rules are anathema to the Trump regime, and though many executive orders have been put on hold or tied up in court for years (or are just meaningless), hes issued revisions, and the Supreme Courts conservative majority has been generous. Who would have imagined that a president could oppose funding for the U.S. Postal Service with the stated mission of preventing citizens from voting by mail? More often than not, Trump bulldozes expectations that actually turn out to be norms rather than laws.

It is true that the president has no inherent, unilateral authority to create legally-binding rules relating to foreign investment in the United States, Bobby Chesney, a law professor specializing in national security, has explained on the blog Lawfare, but Congress can and has delegated that authority to the president in various ways.

Namely, Chesney writes, in 1988, Congress passed an amendment to the Defence Production Act, which gives the president the power to block mergers, acquisitions, or takeovers that pose a national security threat. Trump could work through the Committee on Foreign Investment in the United States which reviews transactions past and present between foreign actors and U.S. companies to exercise that power. In TikToks case, Trump has targeted the foreign transaction that China-based ByteDance made when it acquired TikToks predecessor, Musical.ly, in 2017.

Instead of the anticipated avenue, Trump used the International Emergency Economic Powers Act, which grants the president power to regulate or prohibit foreign exchange under unusual and extraordinary threat with respect to which a national emergency has been declared. (The Act has previously been invoked during national emergencies such as the aftermath of the 9/11 terrorist attacks.)

Its safe to assume the considerable executive privilege wasnt originally granted with a short-form video sharing app popular with teens in mind. Eoyang finds the justifications for the use of the act specious, and the potential enforcement mechanisms baffling. There may be some question over the constitutionality of the use of the IEEPA because weve not really had courts peer behind the declaration of national emergencies. Plus, this is already weird, she said: The executive orders against TikTok and WeChat assign regulation to the Secretary of Commerce, not the Secretary of State, who published the Clean Network plan.

I just dont understand how implementation is going to work, Eoyang said. Is [Trump] going to seek an injunction against an app store and say you cannot sell apps from China? And then what does it mean to be from China under the national security definition? How is an operator of an app store to know what meets the definition without much more than that? Are you going to shut down these app stores? Are you going to fine people? All the enforcement mechanisms here seem really vague and unknown and problematic and certainly beyond what was envisioned in the [IEEPA].

She added: I dont think they really understand what theyre trying to accomplish here.

It feels squishy, Andrew Grotto, former U.S. National Security Council cybersecurity official under both the Obama and Trump administrations, told Gizmodo just after the announcement of the Clean Network plan. One gaping hole is the legal definition of the national security risk; the Clean Network plan and the executive orders barely pinpoint the exact rules Chinese apps are breaking. (Nor have most TikTok critics, who point to data collection as a nefarious practice, but dont really spell out the threat posed by collecting an average middle schoolers information.)

A glaring hole in the Clean Network plan and the executive orders is the absence of clear delineation of the national security risks the apps pose and the policies they violate. Data collection in itself isnt unusual, and unlike the EU, the U.S. doesnt have federal legislation regulating data collection and privacy; nor does the U.S. have a law dictating that data cant be shared with foreign governments. The government cant enforce rules that dont yet exist.

Whats tricky is that we dont have a baseline for what an acceptable level of data protection looks like, Grotto told Gizmodo. Its hard to say how much additional risk foreign ownership poses.

Grotto agreed that its fair to say that TikTok aggressively collects data, but how much more aggressively than Facebook? He added that he has no doubt that the Chinese government exercises its authority to collect data, but then again, the Chinese government already steals a ton of data. Its just not obvious to me which is a bigger risk, he said, the fact that China has this authority to collect data from companies that it has jurisdiction over versus their ability to just go out and steal.

We called Grotto a second time after Trump released the executive orders; he noted that the action is blunt, the language is fuzzy, and the justification is loose. The IEEPA is highly amenable to executive action, and the president loves executive action, Grotto noted, adding that it gives Trump enormous leverage and discretion to wield power.

As usual, Trump doesnt leverage that power with long-term planning and stability in mind, just blowing up his enemies. Grotto pointed out that, rather than target two mainstream companies, other administrations might have created a set of guidelines for the Treasury Department to follow in order to pinpoint individuals and companies now and in the future at its own discretion.

The text of the Executive Order is very informal, Grotto noticed, particularly the chapeau the introductory paragraphs that describe the rationale of the action. The language, which is typically drafted in order for lawyers to comply with requirements, is rather a statement on the nefariousness of the Chinese Communist Party for example, that WeChat captures personal information for Chinese nationals outside the country, thereby allowing the Chinese Communist Party a mechanism for keeping tabs on Chinese citizens who may be enjoying the benefits of a free society for the first time in their lives. Its true, but it sounds more like a thesis for a manifesto than a legal guideline.

And then, Grotto noted, the use of the word reportedly in this line from the TikTok executive order is just really weird:

TikTok, a video-sharing mobile application owned by the Chinese company ByteDance Ltd., has reportedly been downloaded over 175 million times in the United States and over one billion times globally.

It either does or doesnt censor content, Grotto said, and for an Executive Order from the President of the United States who has a vast surveillance intelligence-gathering infrastructure to use the word reportedly seems incredibly weak to me. It raises a lot of red flags. Im in the camp where it wouldnt surprise me at all if the Chinese communist party requires companies to support their censorship regime, but why say reportedly?

Most experts agree that the racially loaded language speaks for itself. The bans more likely signal economic decoupling from China, rather than a closed internet.

Trains are computers on wheels, Grotto pointed out, noting that they potentially surveil riders perhaps even more than TikTok they have wifi networks, cameras, in some cases audio recorders, body scanners, and face recognition on the horizon and lately Congress and Trump have floated the idea of banning the Chinese state-owned train manufacturer CRRC from selling to U.S. metro systems. Other Chinese enterprises that present an interesting kind of matrix of risks that I could see the president taking more interest in, Grotto said.

The legal hurdles standing in the way of the Clean Network and the limited months before the next presidential election mean full implementation is probably a project for a second term, if Trump gets one, Grotto explained. Though Trump may not have time to build a wall around the American internet, we should remain concerned about how much of the existing infrastructure hes capable of destroying on his way out.

Have information about the ongoing TikTok or WeChat situation? Wed love to hear from you. Send an email to our tipline, contact our reporters individually, or send sensitive documents to our Secure Drop server.

Read more here:
Trump Wants to Build a Wall Around the Internet, How Worried Should The U.S. Be? - Gizmodo Australia