Once starving GnuPG crypto project gets a windfall. Now comes the hard part

Aurich Lawson / Thinkstock

For almost two decades, the open source GnuPG encryption project has teetered on the brink of insolvency. Now, following word of that plight, the lone developer keeping the project alive has received more than $135,000in a single day, no less.

Short for Gnu Privacy Guard, GnuPG or simply GPG was first conceived in 1997. It makes upthe guts that run GpG4Win, GPG Tools, and Enigmail, encryption programs that run on Windows, Macs, and as a plugin for the Thunderbird e-mail program respectively. An open source version of Phil Zimmermann's PGP, GnuPG quickly surged in popularity. Because it was written by a German citizen outside the US, it wasn't subject to then-draconian US laws restricting the export of strong cryptography technologies. Former NSA whistleblower Edward Snowden relied on the program to evade monitoring as he carried out his massive leak of top-secret documents. Many journalists and security professionals also swear by it.

Despite the popularity of the program, Werner Koch has struggled to make ends meet. According to a profile published Thursday by ProPublica, the 53-year-old resident of Erkrath, Germany, grew so impatient with the lack of funding that he considered abandoning the project and taking a better paying programming job. When documents leaked in 2013 by Snowden showed the extent of NSA surveillance, he decided the time wasn't right to drop the project. He has been stuck in limbo ever since.

Things took a dramatic about-face following the ProPublica post. According to the GnuPG front page, the project brought in 120,000 (the equivalent of about $135,600) in donations in the first 24 hours following publication. That didn't include a 60,000 infusion that was recently donated from a group called the Core Infrastructure Initiative and payments of 50,000 each from Facebook and payment service Stripe.

The financial strain Koch has endured underscores a cruel irony that has only recently come to light. Developers of some of the most sensitive and mission-critical software often struggle to maintain their projects, while many who sell smartphone apps and other comparatively less crucial software are flush with cash. It wasn't until last year's surfacing of the catastrophic Heartbleed vulnerability in the OpenSSL crypto library that it became common knowledge the project had just one employee working full time and typically received just $2,000 per year in donations. In response, the Linux Foundation spearheaded the Core Infrastructure Initiative to fund OpenSSL and similar projects. The initiative gets financial support from the likes of HP, IBM, Red Hat, Intel, Oracle, Google, Cisco, and others.

It's encouraging to see the GnuPG project benefitting from similar largess. But it also raises the question: how is the money best spent? Matt Green, a professor specializing in cryptography at Johns Hopkins University, said he has looked at the GnuPG source code and found it in such rough shape that he regularly assigns chunks of it to his students for review.

"At the end I ask how they felt about it and they all basically say: 'God, please I never want to do something like this again,'" Green told Ars.

The main problem with the code, he said, is it hasn't been properly maintained over the years.

"It's overly complex," he explained. "It's not maintained by enough people, given how big it is, and it contains a lot of old cruft that should be gotten rid of. When it got re-engineered from version 1 to version 2, version 2 got re-engineered in this abstract way [so] that it's hard to figure out what's going on on the back end."

See the original post:
Once starving GnuPG crypto project gets a windfall. Now comes the hard part

Why even strong crypto wouldn’t protect SSNs exposed in Anthem breach

Steven M. Bellovin is a professor in the computer science department at Columbia University. This post was originally published on his blog. This essay quickly generated a vigorous debate among security experts on Twitter.

Another day, another data breach, and another round of calls for companies to encrypt their databases. Cryptography is a powerful tool, but in cases like this, it's not going to help. If your OS is secure, you don't need the crypto; if it's not, the crypto won't protect your data.

In a case like the Anthem breach, the really sensitive databases are always in use. This means that they're effectively decrypted: the database management systems (DBMS) are operating on cleartext, which means that the decryption key is present in RAM somewhere. It may be in the OS, it may be in the DBMS, or it may even be in the application itself (though that's less likely if a large relational database is in use, which it probably is). What's to stop an attacker from obtaining that key, or perhaps from just making database queries?

The answer, in theory, is other forms of access control. Perhaps the DBMS requires authentication, or operating system permissions will prevent the attacker from getting at the keys. Unfortunatelyand as these many data breaches showthese defenses are not configured properly or aren't doing the job. If that's the case, though, adding encryption isn't going to help; the attacker will just go around the crypto. There's a very simple rule of thumb here:Encryption is most useful when OS protections cannot work.

What do I mean by that? The most obvious situation is where the attacker has physical access to the device. Laptop disks should always be encrypted; ditto flash drives, backup media, etc. Using full disk encryption on your servers' drives isn't a bad idea, since it protects your data when you discard the media, but you then have to worry about where the key comes from if the server crashes and reboots.

Cloud storage is a good place for encryption, since you don't control the machine room and you don't control the hypervisor. Again, your own operating system isn't blocking a line of attack. (Note: I'm not saying that the cloud is a bad idea; if nothing else, most cloud sysadmins are better at securing their systems than are folks at average small companies.) E-mail is another good use for encryption, unless you control your own mail servers. Why? Because the data is yours, but you're storing it on someone else's computer.

Encryption is a useful tool (and a fun research area), but like all tools, it's only useful if properly employed. If used in inappropriate situations, it won't provide protection and will create operational headaches and perhaps data loss from mismanaged keys.

Protecting large databases like Anthem's is a challenge. We need better software security, and we need better structural tools to isolate the really sensitive data from average, poorly protected machines. There may even be a role for encryption, but simply encrypting the social security numbers isn't going to do much.

Original post:
Why even strong crypto wouldn’t protect SSNs exposed in Anthem breach

(118) Free Knowledge-ISA-NT Security Controls (Cryptography)-Part 8-Version 1 – Video


(118) Free Knowledge-ISA-NT Security Controls (Cryptography)-Part 8-Version 1
Study material of DISA made easy: This is the Fourth part of the Module 3 Chapter 5 " Network Security Controls" wherein "Cryptography" are explained. This is the Post Qualification course...

By: Chandra Shekhar

Original post:
(118) Free Knowledge-ISA-NT Security Controls (Cryptography)-Part 8-Version 1 - Video

New business collaboration platform secures data with personalized cryptography

Data security is a big concern for both individuals and businesses. This doesn't only apply to the public face of a business, but to exchange of information and collaboration between employees too.

Canadian company Witkit is launching a new platform that allows the creation of teams and groups within industries, companies, and departments to tackle projects and solve problems collectively, with the safety and security of knowing their data cannot be breached.

"Our intention with Witkit is to make the first fully encrypted global collaboration platform so that companies and individuals can more easily reap the benefits that socialized teamwork brings to their business challenges," says Sean Merat, president and CEO of Witkit.

Witkit is a modular platform that works by allowing users to create tailored workspaces. These center on 'Kits' -- virtual groups based on specific topics or projects. Within each Kit, members can upload and access shared files, initiate and contribute to group discussions, post and respond to team tasks, and use a single synchronized calendar.

Additional features include secure storage using proprietary encryption, along with messenger and video conferencing services.

Kits can be made private or public and users are able to participate in multiple Kits at the same time. A single dashboard and news feed collates all of a user's memberships in one place.

"The vast majority of breaches today happen on a centralized system which contains sensitive user data," says Merat. "WitCrypt technology ensures that the encryption and decryption of user data is only done on user devices locally. All data that is sent to the Witkit servers is fully encrypted and can only be decrypted by the user's WitCrypt passphrase. We can confidently say that we've minimized most, if not all the risk, to user data being hacked. That is to say that in the unlikely event that the Witkit servers are compromised, there will be no decrypted data to be found".

For more information visit the Witkit website, the first 50,000 people who sign up for the platform will get 50GB of encrypted storage and all available applications for free.

Image Credit: Tischenko Irina / Shutterstock

Read the rest here:
New business collaboration platform secures data with personalized cryptography