EARN IT: the US bill that could end all encryption – NS Tech

A bill currently wending its way through US Congress is ostensibly aimed at combating child sexual abuse material. But privacy organisations are warning that it could have the (perhaps not entirely unintended) consequence of endangering online encryption and providing the US government unfettered powers to comb through citizens comms.

The Eliminating Abusive and Rampant Neglect of Interactive Technologies (EARN IT) Act was first introduced by a group of US senators on 5 March. The basic premise of the bill is that tech companies will have to earn Section 230 protections rather than being granted them by default, as the Communications Decency Act has ensured for over twenty years.

The EARN IT Act would establish the National Commission on Online Child Sexual Exploitation Prevention, whose job it would be to create a set of best practices for online companies to follow, with regard to stopping child sexual abuse material. The agreed best practices would pass through a series of stages before being enacted by Congress. Companies would have to demonstrate that theyre adhering to those best practices in order to retain their Section 230 immunity.

The beleaguered Section 230 bill means that platform companies are not liable for the content thats posted on their sites. Its often considered a pillar upholding free speech on the internet. If the EARN IT act passed, it would effectively mean that tech companies could be held liable for the illegal content uploaded by their users.

The bill says nothing explicitly about encryption, but could indirectly call for a clamp-down on private channels putatively because they can be used as a means of ferrying illegal content. Its possible that in looking to weaken encryption, the bill could demand companies build back doors into their products.

Senate judiciary committee chairman Lindsey Graham, one of the bills cosponsors, hinted at this eventuality. Facebook is talking about end-to-end encryption which means they go blind, he said, later adding, Were not going to go blind and let this abuse go forward in the name of any other freedom.

Riana Pfefferkorn, the associate director of surveillance and cyber security at the Stanford Center for Internet and Society, wrote a blog post suggesting that this law could be a sneaky way of undermining another bit of legislation that has long been a thorn in the side of US intelligence agencies. This is the Communications Assistance for Law Enforcement Act of 1994 (CALEA).

Pfefferkorn writes: CALEA requires telecommunications carriers (e.g., phone companies) to make their networks wiretappable for law enforcement. However, that mandate does not cover information services: websites, email, social media, chat apps, cloud storage, and so on. Put another way, the providers of information services are not required to design to be surveillance-friendly. Lets call that the information services carve-out in CALEA. Plus, even covered entities are free to encrypt communications and throw away the keys to decrypt them. Lets call that the encryption carve-out.

She continues: Both DOJ and the Federal Bureau of Investigation (FBI) have been trying for at least a decade to close them. But Congress has shown no appetite for that. As said, CALEA has never once been amended in the quarter-century since it was passed. And even with the techlash in full swell, there isnt a furious public frenzy over CALEA. Politicians know that many Americans are fed up with tech companies hiding behind Section 230 of the CDA. But nobody is saying, Im fed up with tech companies hiding behind Section 1002 of CALEA!

So, how can law enforcement achieve its long-desired CALEA goal? By pushing a bill that talks about Section 230 instead.

Facebook and other platforms are increasingly under fire over insufficient moderation of the content posted on their sites. However, another amendment to Section 230, demonstrates the ways in which attacks on this piece of legislation can go awry.

FOSTA-SESTA, the last bill Congress passed to amend Section 230, was ostensibly about addressing sex trafficking online, and made companies liable for any content posted on their sites that could be related to the illegal practice. However, in practical terms, the amendment made life much harder for the consensual sex workers who used the internet to make their job safer, and drove many who had been using services like Backpage back onto the streets. Evidence that FOSTA-SESTA has done anything to curb sex trafficking is hard to locate.

Lobbying groups including TechNet and the Internet Association, as well as tech giants like Facebook, have signalled their opposition to the EARN IT law over concerns that the commission could force online services to weaken encryption in order to maintain Section 230 immunity.

Match Group the company behind Tinder and OKCupid has, however, come out in support of the bill.

Amnesty International wrote the following in a statement: In the digital age, access to and use of encryption is an essential component of the right to privacy. Encryption allows people to share their opinions with others without fear of reprisals. It also allows people to access information and to organize, even under repressive regimes. Strong encryption is an essential component of the rights to freedom of expression, information, opinion, and peaceful assembly. Encryption is a particularly critical tool for human rights defenders, activists and journalists, all of whom rely on it with increasing frequency to protect their security and that of others against unlawful surveillance.

In July 2019, US Attorney General William Barr demanded that internet giants build backdoors into their products to more easily facilitate intelligence snooping:

We are not talking about protecting the nations nuclear launch codes, Barr told the International Conference on Cyber Security at Fordham University.

Nor are we necessarily talking about the customized encryption used by large business enterprises to protect their operations. We are talking about consumer products and services such as messaging, smart phones, email, and voice and data applications.

There have been enough dogmatic pronouncements that lawful access simply cannot be done. It can be, and it must be.

The arrival of the EARN IT Act coincided with AG Barr announcing that members of the Five Eyes intelligence alliance made up of Australia, Canada, New Zealand, the UK and the US have agreed to a set of principles to guide internet companies in their efforts to combat child sexual abuse content. Representatives for six online companies including Facebook, Google, Microsoft, Roblox, Snap and Twitter, were present to endorse the initiative.

Follow this link:
EARN IT: the US bill that could end all encryption - NS Tech

Encryption Software Market Insights 2020: strong performance driven due to increase of cyberattacks, report – WhaTech Technology and Markets News

The Objective of the Global Encryption Software Market report is to depict the trends and upcoming for the Encryption Software industry over the forecast years. Encryption Software Market report data has been gathered from industry specialists/experts. Although the market size of the market is studied and predicted from 2019 to 2026 mulling over 2018 as the base year of the market study. Attentiveness for the market has increased in recent decades due to development and improvement in the innovation.

The growing number of data breaches is further boosting the encryption software industry growth, as organizations are focusing on securing the critical data to ensure the privacy of their information. While doing the encryption software market analysis, it is observed that, the targeted attacks on enterprises and their employees are now mainly focused on stealing confidential information from individuals machines or penetrating into networks with the motive of deeper-data thefts.

Thus, adopting encryption technologies are becoming a necessity for the organizations which is driving this market growth. The global encryption software market size is projected to reach $2.66 billion by 2022, growing at a CAGR of 15.0% from 2016 to 2022.

North America is expected to lead the encryption software market share during the forecast period, owing to higher adoption of end-point security solutions among organizations and the prevalence of higher data protection & compliance regulations. However, Asia-Pacific region is anticipated to grow at the fastest rate, due to the growing penetration of cloud computing and increasing workforce mobility.

This report provides a comprehensive analysis of,

Download Sample Report:www.alliedmarketresearch.com/request-sample/1100

Key questions answered in Encryption Software Market research study:

Access Inquiry:www.alliedmarketresearch.com/purchasquiry/1100

Major Key Players:

Similar Reports:

Intelligent Virtual Assistant (IVA) Market is Expected to reach $3.6 Billion by 2020

E-Commerce Logistics Market to Garner $535,895 Million by 2022

This email address is being protected from spambots. You need JavaScript enabled to view it.

See the rest here:
Encryption Software Market Insights 2020: strong performance driven due to increase of cyberattacks, report - WhaTech Technology and Markets News

ECS and QuantaNova Announce Sales and Delivery Partnership to Serve Shared Customers with Polymorphic Encryption Products – Benzinga

ARLINGTON, VA / ACCESSWIRE / March 12, 2020 / Today ECS (ASGN) a leading provider of solutions in science, engineering, and advanced technologies across the public and private sectors, and the QuantaNova division of Cipherloc Corporation (OTCQB:CLOK), a developer of advanced encryption technology, announced a go-to-market partnership making ECS an authorized reseller and delivery partner for Cipherloc's entire 2020 catalog of patented and FIPS 140-2 certified cryptographic solutions.

"With the necessary evolution of security compliance requirements, like the latest DoD Cybersecurity Maturity Model Certification (CMMC), it's important for organizations to leverage the latest tools and technology to protect their valuable data," said Steve Hittle, senior Vice President and CIO of ECS. "Our partnership with Cipherloc and their next-gen technology will help strengthen ECS' growing capabilities and toolset, as we tackle our customers' complex security needs."

"Working with ECS for sales and delivery is a major step towards more securely protecting the data that U.S. and allied military, national security, and industrial workforces rely on to keep us safe," said Andrew Borene, CEO of Cipherloc and QuantaNova. "This partnership will allow us to get our patented encryption technology to markets more efficiently and better serve customers today, while improving their ability to manage the unknown risks of tomorrow."

This new partnership will enable delivery of QuantaNova's patented and FIPS 140-2 certified, next-generation encryption technology to shared customers across the U.S. and allied defense, federal civilian, and commercial markets. With an eye towards shifting compliance frameworks and the unknown effects of a post-quantum future, these sectors require solutions that strengthen their current cybersecurity postures through the adoption of truly crypto-agile solutions.

Borene added, "With this partnership, we now have a leading federal systems integrator verifying our go-to-market plan, engaged with us as an authorized reseller of our polymorphic encryption technology. Additionally, ECS is a trusted member of the U.S. defense industrial base and aligns with our mission of putting U.S. and allied customers first."

The reseller agreement gives ECS customers access to all of Cipherloc's patented polymorphic encryption technology, as well as the 2020 catalog of CipherLoc's patented and FIPS 140-2 certified cryptographic module solutions.

About ECS

ECS, a segment of ASGN, delivers advanced solutions in cloud, cybersecurity, artificial intelligence (AI), machine learning (ML), application and IT modernization, science, and engineering. The company solves critical, complex challenges for customers across the U.S. public sector, defense, intelligence, and commercial industries. ECS maintains partnerships with leading cloud, cybersecurity, and AI/ML providers and holds specialized certifications in their technologies. Headquartered in Fairfax, Virginia, ECS has more than 3,000 employees throughout the United States. For more information, visit ECStech.com

About QuantaNova, a division of Cipherloc Corporation

QuantaNova provides advanced technology and expertise to secure your data and safeguard your privacy with the speed you need today and the agility you'll need tomorrow. Our patented polymorphic encryption technology provides a layer of security that is stronger, adaptable, and scalable across a variety of applications and systems. Learn more at http://www.quantanova.com, and view our FIPS 140-2 certification here.

Forward-Looking Statements

This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. All forward-looking statements are inherently uncertain as they are based on current expectations and assumptions concerning future events or future performance of the Company. Readers are cautioned not to place undue reliance on these forward-looking statements, which are only predictions and speak only as of the date hereof. In evaluating such statements, prospective investors should review carefully various risks and uncertainties identified in this release and matters set forth in the Company's SEC filings. These risks and uncertainties could cause the Company's actual results to differ materially from those indicated in the forward-looking statements.

QuantaNova Contact:

Loren MahlerVP, Communications and External Affairs703-201-1692lmahler@cipherloc.net

Cipherloc Investor Contact:

Matt KrepsDarrow Associates, Investor Relations214-597-8200mkreps@darrowir.com

ECS Contact:

Shab NassirpourVP, Marketing and Communications(443) 745-3433Shab.Nassirpour@ecstech.com

SOURCE: Cipherloc Corporation

View source version on accesswire.com: https://www.accesswire.com/580468/ECS-and-QuantaNova-Announce-Sales-and-Delivery-Partnership-to-Serve-Shared-Customers-with-Polymorphic-Encryption-Products

See the rest here:
ECS and QuantaNova Announce Sales and Delivery Partnership to Serve Shared Customers with Polymorphic Encryption Products - Benzinga

Encryption Key Management Software Market 2020 By Top Key Players/Manufacturers, Type and Application, Regions, Industry Analysis, Growth, Size,…

The latest research report on the Encryption Key Management Software Market published by Verified Market Research provides a profound awareness of the various market dynamics such as Trends, drivers, challenges and opportunities. The report explains in more detail the micro and macroeconomic elements that are expected to influence the growth of the Encryption Key Management Software Market over the forecast period (2020-2026).

The Global Encryption Key Management Software Market is growing at a faster pace with substantial growth rates over the last few years and is estimated that the market will grow significantly in the forecasted period i.e. 2019 to 2026.

This study highlights the key indicators of market growth that accompany a comprehensive analysis of this value chain, CAGR development, and Porters Five-Force Analysis. This data can enable readers to understand the quantitative growth parameters of this international industry, which is Encryption Key Management Software.

The report also highlights the opportunities and future scope of the Encryption Key Management Software Market on a global and regional level. The study includes a market attractiveness analysis in which the Service is evaluated based on Market Size, Growth Rate and general bioinformatics software industry share.

Segmentation:

The Encryption Key Management Software Market has been divided into several important areas, including applications, types and regions. Each market segment is intensively examined in the report to take into account its market acceptance, value, demand and growth prospects. The segmentation analysis helps the customer to adapt their marketing approach so that they better master each Segment and identify the most potential customer base.

Regional insights into the Encryption Key Management Software market

In terms of Region, this research report covers almost all major regions of the world, such as North America, Europe, South America, the Middle East, Africa and the Asia-Pacific region. Growth is expected for the regions of Europe and North America in the coming years. While the Encryption Key Management Software Market in the regions in the Asia-Pacific region is expected to show remarkable growth in the forecast period. Cutting-edge technology and innovation are the key features of the North America Region, and this is why the US dominates global markets most of the time. The Encryption Key Management Software Market in the South America region is also expected to grow in the near future.

Important questions answered in the report:

What is the main factor that takes this market to the next level?

What will the market demand and what will be growth?

What are the latest opportunities for the Encryption Key Management Software Market in the future?

What are the strengths of the main players?

What is the key to the Encryption Key Management Software Market?

The Encryption Key Management Software Market report provides future growth drivers and the competitive landscape. This will be beneficial for buyers of the market report in order to obtain a clear overview of the important growth and subsequent market strategy. The detailed information on the market will help to monitor future profitability and make important decisions for growth.

Ask for Discount @ https://www.marketresearchintellect.com/ask-for-discount/?rid=182608&utm_source=ME&utm_medium=888

Our study report offers:

Market share analysis for the segments at regional and country level.

Bioinformatics software market share analysis of the best business players.

Strategic proposal for new entrants.

Market forecasts for the next five years of all segments, sub-segments and together of the regional markets.

Market opportunities, Trends, constraints, threats, challenges, drivers, investments, and proposals.

The Strategic Management in key business areas supported the market estimates.

Competitive landscape design that reflects the most important common Trends.

Company identification with careful methods, financial data and previous developments.

Provide chain trends that reflect the most important technological advances of recent times.

The conclusion of the report shows the overall scope of the global Encryption Key Management Software Market in terms of the feasibility of investments in the various market segments, as well as a descriptive Passage describing the feasibility of new projects that could be successful in the market in the near future.

Request Report Customization @ https://www.marketresearchintellect.com/product/global-encryption-key-management-software-market-size-forecast/?utm_source=ME&utm_medium=888

If you have special requirements, please let us know that we offer you a report according to your wishes.

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

TAGS: Encryption Key Management Software Market Size, Encryption Key Management Software Market Growth, Encryption Key Management Software Market Forecast, Encryption Key Management Software Market Analysis, Encryption Key Management Software Market Trends, Encryption Key Management Software Market

Continue reading here:
Encryption Key Management Software Market 2020 By Top Key Players/Manufacturers, Type and Application, Regions, Industry Analysis, Growth, Size,...

IoT Security Solution For Encryption Market 2020 By Top Key Players/Manufacturers, Type and Application, Regions, Industry Analysis, Growth, Size,…

The latest research report on the IoT Security Solution For Encryption Market published by Verified Market Research provides a profound awareness of the various market dynamics such as Trends, drivers, challenges and opportunities. The report explains in more detail the micro and macroeconomic elements that are expected to influence the growth of the IoT Security Solution For Encryption Market over the forecast period (2020-2026).

The Global IoT Security Solution For Encryption Market is growing at a faster pace with substantial growth rates over the last few years and is estimated that the market will grow significantly in the forecasted period i.e. 2019 to 2026.

This study highlights the key indicators of market growth that accompany a comprehensive analysis of this value chain, CAGR development, and Porters Five-Force Analysis. This data can enable readers to understand the quantitative growth parameters of this international industry, which is IoT Security Solution For Encryption.

The report also highlights the opportunities and future scope of the IoT Security Solution For Encryption Market on a global and regional level. The study includes a market attractiveness analysis in which the Service is evaluated based on Market Size, Growth Rate and general bioinformatics software industry share.

Segmentation:

The IoT Security Solution For Encryption Market has been divided into several important areas, including applications, types and regions. Each market segment is intensively examined in the report to take into account its market acceptance, value, demand and growth prospects. The segmentation analysis helps the customer to adapt their marketing approach so that they better master each Segment and identify the most potential customer base.

Regional insights into the IoT Security Solution For Encryption market

In terms of Region, this research report covers almost all major regions of the world, such as North America, Europe, South America, the Middle East, Africa and the Asia-Pacific region. Growth is expected for the regions of Europe and North America in the coming years. While the IoT Security Solution For Encryption Market in the regions in the Asia-Pacific region is expected to show remarkable growth in the forecast period. Cutting-edge technology and innovation are the key features of the North America Region, and this is why the US dominates global markets most of the time. The IoT Security Solution For Encryption Market in the South America region is also expected to grow in the near future.

Important questions answered in the report:

What is the main factor that takes this market to the next level?

What will the market demand and what will be growth?

What are the latest opportunities for the IoT Security Solution For Encryption Market in the future?

What are the strengths of the main players?

What is the key to the IoT Security Solution For Encryption Market?

The IoT Security Solution For Encryption Market report provides future growth drivers and the competitive landscape. This will be beneficial for buyers of the market report in order to obtain a clear overview of the important growth and subsequent market strategy. The detailed information on the market will help to monitor future profitability and make important decisions for growth.

Ask for Discount @ https://www.marketresearchintellect.com/ask-for-discount/?rid=170784&utm_source=ME&utm_medium=888

Our study report offers:

Market share analysis for the segments at regional and country level.

Bioinformatics software market share analysis of the best business players.

Strategic proposal for new entrants.

Market forecasts for the next five years of all segments, sub-segments and together of the regional markets.

Market opportunities, Trends, constraints, threats, challenges, drivers, investments, and proposals.

The Strategic Management in key business areas supported the market estimates.

Competitive landscape design that reflects the most important common Trends.

Company identification with careful methods, financial data and previous developments.

Provide chain trends that reflect the most important technological advances of recent times.

The conclusion of the report shows the overall scope of the global IoT Security Solution For Encryption Market in terms of the feasibility of investments in the various market segments, as well as a descriptive Passage describing the feasibility of new projects that could be successful in the market in the near future.

Request Report Customization @ https://www.marketresearchintellect.com/product/global-iot-security-solution-for-encryption-market-size-forecast/?utm_source=ME&utm_medium=888

If you have special requirements, please let us know that we offer you a report according to your wishes.

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

TAGS: IoT Security Solution For Encryption Market Size, IoT Security Solution For Encryption Market Growth, IoT Security Solution For Encryption Market Forecast, IoT Security Solution For Encryption Market Analysis, IoT Security Solution For Encryption Market Trends, IoT Security Solution For Encryption Market

Follow this link:
IoT Security Solution For Encryption Market 2020 By Top Key Players/Manufacturers, Type and Application, Regions, Industry Analysis, Growth, Size,...

Krk WiFi vulnerability affected WiFi encryption on over a billion devices – Privacy News Online

A vulnerability in Broadcom and Cypress WiFi chips makes it possible for attackers on your local WiFi network to decrypt your WPA2 encrypted internet traffic. The vuln, known as the Krk (kr00k) vulnerability, has the designation CVE-2019-15126, ESET, the discoverer of the kr00k vulnerability, estimated that over a billion devices were affected. Apple products such as iPhone, iPad, and Macs were all affected; however, Apple has since patched the issue for iOS and MacOS so make sure that you are up to date on your updates. Even with quick action to correct the vulnerability by affected parties, there will still be millions of devices that wont be patched and will remain vulnerable. What Krk really does is remind us as internet users why properly implemented encryption is important.

Apple described the impact of the kr00k vulnerability as such when they patched this vulnerability in October 2019:

An attacker in Wi-Fi range may be able to view a small amount of network traffic.

The Broadcom and Cypress WiFi chips have a built in feature that resets the encryption key to all zeroes in the event of a connection break between the access point and the target device. The thing is, some WPA2 encrypted packets from the target device would still continue to be sent during that time and an attacker could intercept and decrypt those by using an all-zeroes encryption key. Since the disconnection can be triggered at will by the attacker, this attack can be extremely targeted to decrypt a WiFi users internet activity at will.

While the attacker might not be able to decrypt HTTPS encrypted data and information that is sent to HTTPS sites that youre visiting like your banking website they still would be able to intercept domain name system (DNS) or server name indication (SNI) requests and know what websites youre visiting even if theyre otherwise secured through HTTPS.

While the CVE worked as intended and the main companies with affected chips were able to push out patches to fix the vuln, its still possible that there are unpatched devices out there for whatever reason. The researchers at ESET emphasized in their reporting:

Krk affects devices with Wi-Fi chips by Broadcom and Cypress that havent yet been patched. These are the most common Wi-Fi chips used in contemporary Wi-Fi capable devices such as smartphones, tablets, laptops, and IoT gadgets.

Its best to assume that WiFi encryption is incomplete and that WPA2 is not enough encryption to protect your internet traffic when youre on WiFi. Before kr00k, there was also the KRACK WPA2 WiFi vulnerability which affected even more devices. Even when youre on 4G networks, there are 4G vulnerabilities that allow decryption, tracking, spoofing, and spamming and some of them even remain unpatched. This isnt the first and it wont be the last vulnerability affecting WiFi encryption.

Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization. Caleb holds a Master's in Digital Currency from the University of Nicosia as well as a Bachelor's from the University of Virginia. He feels that the world is moving towards a better tomorrow, bit by bit by Bitcoin.

Read the rest here:
Krk WiFi vulnerability affected WiFi encryption on over a billion devices - Privacy News Online

Senators dispute industry claims that a bill targeting tech’s legal shield would prohibit encryption – CNBC

Sen. Richard Blumenthal (D-CT) announces a bipartisan agreement on Turkey sanctions during a news conference on Capitol Hill in Washington, October 17, 2019.

Erin Scott | Reuters

Senators disputed the tech industry's claims that a bipartisan bill targeting tech's long-standing legal shield would prohibit encryption by necessity.

"This bill says nothing about encryption," Sen. Richard Blumenthal, D-Conn., said at a hearing Wednesday to discuss the legislation. Blumenthal introduced the EARN IT Act last week with Senate Judiciary Committee Chairman Lindsey Graham, R-S.C., ranking member Dianne Feinstein, D-Calif., and Sen. Josh Hawley, R-Mo.

As the name suggests, the bill aims to make tech platforms "earn" a the legal immunity they've long enjoyed for third-party content posted to their services under Section 230 of the Communications Decency Act. If enacted, online platforms would no longer be automatically protected, but would be able to win back immunity by certifying compliance with a set of best practices for detecting and reporting child sexual exploitation materials to law enforcement.

Industry groups slammed the legislation when it was announced, warning the bill "would erodeboth security andtrustby potentially forbidding the use of end-to-end encryption in order to comply with the law," as Information Technology Industry Council President and CEO Jason Oxman put it in a statement. The group represents members including Amazon, Apple, Facebook, Google, Microsoft and Twitter.

"Weakeningencryption andthe security of technology products, including through the EARN IT Act, does nothing to advanceonline safety," Oxman said.

While the bill does not explicitly address encryption, ITI argued it would allow the Department of Justice to require "back doors" to encrypted products, which scramble messages so that they are not readable to anyone outside of the sender and recipient. Tech companies like Apple have previously told government officials that creating such an entry point or key would weaken privacy standards for all users.

The DOJ has recently stepped up its critique of tech companies implementing encryption, including Facebook, which has announced plans to integrate and encrypt its three messaging services, Messenger, Instagram and WhatsApp. Attorney General William Barr previously said he feared that encryption of the apps would greatly hurt law enforcement's ability to detect instances of child sexual exploitation given Facebook comprises the vast majority of reports to the U.S. National Center for Missing and Exploited Children (NCMEC).

The Department also recently hosted experts to discuss Section 230 where Attorney General William Barr said tech's scale and power raises "valid questions" about whether the industry still needs the immunity.

Wednesday's hearing demonstrated that broad support exists in Congress for revising Section 230 alongside support for encryption.

"End-to-end encryption must be able to exist with robust law enforcement and I'm not going to support anything that does not protect the integrity of encryption for users, I can promise you that," said Hawley.

Blumenthal referenced a letter Facebook sent in response to questions from a group of Senators saying it is "committed to designing strong prevention, detection, and reporting systems to ensure that private and secure messaging services provide users with industry-leading privacy and security while safeguarding them and others from online abuse."

Blumenthal said the response showed encryption and enforcement could be compatible.

"Strong law enforcement is compatible with strong encryption," Blumenthal said. "I believe it, Big Tech knows it and either is Facebook is lying and I think they're telling us the truth when they say that law enforcement is consistent with strong encryption or Big Tech is using encryption as a subterfuge to oppose this bill."

Subscribe to CNBC on YouTube.

WATCH: Why the U.S. government is questioning your online privacy

Read the original:
Senators dispute industry claims that a bill targeting tech's legal shield would prohibit encryption - CNBC

The Benefits of Encryption and the Implications of Creating Backdoors – American Action Forum

Encryption technology has allowed consumers to keep their data and communication private, but it has also allowed criminals to evade surveillance. Policymakers are once again considering whether law enforcement agencies need new tools to handle this technology, such as a backdoor or built-in access to encrypted data into their apps. Yet the federal government and law enforcement often already have the ability to access needed digital evidence, and reforms should not endanger the benefits of encryption technology that consumers and businesses enjoy, argues AAFs Director of Technology and Innovation Policy Jennifer Huddleston.

An excerpt:

Law enforcement should have the resources to address concerns about illegal activity, including those conducted via encrypted technologies. In providing these tools, however, policies should not create greater risk that undermine security and civil liberties. Rather than creating a risky and expansive policy by requiring a backdoor, policymakers and law enforcement should seek to better use existing tools and to focus on the underlying problematic behavior.

Read the analysis.

View post:
The Benefits of Encryption and the Implications of Creating Backdoors - American Action Forum

The EARN IT Act Is a Sneak Attack on Encryption – WIRED

A bipartisan pair of US senators today introduced long-rumored legislation known as the EARN IT Act. Meant to combat child sexual exploitation online, the bill threatens to erode established protections against holding tech companies responsible for what people do and say on their platforms. It also poses the most serious threat in years to strong end-to-end encryption.

As the final text of the bill circulated, the Department of Justice held a press conference about its own effort to curb online child predation: a set of 11 "voluntary principles" that a growing number of tech companiesincluding Facebook, Google, Microsoft, Roblox, Snap, and Twitterhave pledged to follow. Though the principles the companies are pledging to adopt don't specifically impact encryption themselves, the event had an explicit anti-encryption message. The cumulative effect of this morning's announcements could define the geography of the next crypto wars.

Child predators "communicate using virtually unbreakable encryption," US attorney general William Barr said during the press conference. "The department for one is prioritizing combatting child sexual exploitation and abuse in our prosecution efforts. And we are also addressing child exploitation in our efforts on retaining lawful access and in analyzing the impact of Section 230 of the Communications Decency Act on incentives for platforms to address these crimes."

EARN IT focuses specifically on Section 230, which has historically given tech companies freedom to expand with minimal liability for how people use their platforms. Under EARN IT, those companies wouldn't automatically have a liability exemption for activity and content related to child sexual exploitation. Instead, companies would have to "earn" the protection by showing that they are following recommendations for combatting child sexual exploitation laid out by a 16-person commission.

"This is a profoundly awful proposal on multiple levels."

Julian Sanchez, Cato Institute

The bill, written by South Carolina Republican senator Lindsey Graham and Connecticut Democrat Richard Blumenthal, would create a way for law enforcement officials, attorneys general, online child sexual exploitation survivors and advocates, constitutional law scholars, consumer protection and privacy specialists, cryptographers, and other tech experts to collectively decide what digital companies should do to identify and reduce child predation on their platformsand then require companies to actually do it. The safeguards the committee might recommend would likely include things like proactive, dynamic content scanning to identify abusive photos and videos, but also communication surveillance to watch for predators who could be forming relationships with potential victims and "grooming" them for exploitation.

Though it seems wholly focused on reducing child exploitation, the EARN IT Act has definite implications for encryption. If it became law, companies might not be able to earn their liability exemption while offering end-to-end encrypted services. This would put them in the position of either having to accept liability, undermine the protection of end-to-end encryption by adding a backdoor for law enforcement access, or avoid end-to-end encryption altogether.

Facebook has most prominently made the argument in recent months that it can adequately identify child predation threats without eliminating or undermining user data protections like end-to-end encryption. The safeguard only makes data readable on the sender's and receiver's devices, boxing companies out of accessing user data directly.

Law enforcement officials and members of Congress have countered, though, that tech companies can't do enough to stop child predation and distribution of illegal content on their platforms if they can't access their users' data.

"We share the EARN IT Act sponsors commitment to child safety and have made keeping children safe online a top priority by developing and deploying technology to thwart the sharing of child abuse material," Thomas Richards, a Facebook spokesperson, said in a statement. "Were concerned the EARN IT Act may be used to roll back encryption, which protects everyones safety from hackers and criminals, and may limit the ability of American companies to provide the private and secure services that people expect."

Read more here:
The EARN IT Act Is a Sneak Attack on Encryption - WIRED

Encryption Software Market is expected to see growth rate of 18.1% and may see market size of USD11.2 Billion by 2024 – MENAFN.COM

(MENAFN - GetNews) Encryption Software Comprehensive Study by Type (Encryption for Data-at-rest, Full Disc Encryption (FDE), File Level Encryption, Others), Application (Disk Encryption, File/Folder Encryption, Data Base Encryption, Web Communication Encryption, Network Traffic Encryption, Cloud Encryption, Others), Deployment Mode (On-premises, Cloud), Enterprise Size (Small and Medium-sized Enterprises (SMEs), Large Enterprises), Industry Vertical (BFSI, IT & Telecom, Retail, G&PA, Healthcare, Defense & Aerospace, Education, Manu

Encryption software is a cryptographic program that avoids unauthorized access to digital data. Cryptography is used primarily to protect data digital information. This digital information is sent over the Internet to other computers. Portable document format is one of the world's most widely used file formats and to maintain the privacy of records, this file format supports the encryption of files. Portable document format encryption is an important desktop tool that allows the user to change the security of existing acrobat portable document format files by password. This ensures that with 128-bit encryption users can secure portable document format files and also users can easily remove existing password protection. According to AMA, the Global Encryption Software market is expected to see growth rate of 18.1% and may see market size of USD11.2 Billion by 2024.

Advance Market Analytics released a new market study on Global Encryption Software Market with 100+ market data Tables, Pie Chat, Graphs & Figures spread through Pages and easy to understand detailed analysis. At present, the market is developing its presence. The Research report presents a complete assessment of the Market and contains a future trend, current growth factors, attentive opinions, facts, and industry validated market data. The research study provides estimates for Global Encryption Software Forecast till 2025*. Some are the key players taken under coverage for this study are IBM (United States), Microsoft (United States), Symantec (United States), Thales e-Security (France), Trend Micro (Japan), Sophos (United Kingdom), Check Point (Israel), Micro Focus (United Kingdom), McAfee (United States) and Dell (United States).

Click to get Global Encryption Software Market Research Sample PDF Copy Here @: https://www.advancemarketanalytics.com/sample-report/9364-global-encryption-software-market

Market Leaders and their expansionary development strategies

In December 2018, the Symantec (United States) Company has partnered with Fortinet (United States) Company, which provider of integrated and automated cybersecurity solutions. Hence, this partnership will affect the growth of the market.In June 2018, the Sophos Company has launched Sophos Email Advanced, which is an email protection solution. Therefore, this launch will increase the product portfolio of the company.

Market Trend

Market Drivers

Opportunities

Restraints

Challenges

Important Features that are under offering & key highlights of the report:

1) what all companies are currently profiled in the report? Following are list of players that are currently profiled in the the report 'IBM (United States), Microsoft (United States), Symantec (United States), Thales e-Security (France), Trend Micro (Japan), Sophos (United Kingdom), Check Point (Israel), Micro Focus (United Kingdom), McAfee (United States) and Dell (United States)

** List of companies mentioned may vary in the final report subject to Name Change / Merger etc.

2) Can we add or profiled new company as per our need? Yes, we can add or profile new company as per client need in the report. Final confirmation to be provided by research team depending upon the difficulty of survey.** Data availability will be confirmed by research in case of privately held company. Upto 3 players can be added at no added cost.

3) Can inclusion of additional Segmentation / Market breakdown is possible? Yes, inclusion of additional segmentation / Market breakdown is possible subject to data availability and difficulty of survey. However a detailed requirement needs to be shared with our research before giving final confirmation to client.

** Depending upon the requirement the deliverable time and quote will vary.

Enquire for customization in Report @ https://www.advancemarketanalytics.com/enquiry-before-buy/9364-global-encryption-software-market

The Global Encryption Software Market segments and Market Data Break Down are illuminated below:

by Type (Encryption for Data-at-rest, Full Disc Encryption (FDE), File Level Encryption, Others), Application (Disk Encryption, File/Folder Encryption, Data Base Encryption, Web Communication Encryption, Network Traffic Encryption, Cloud Encryption, Others), Deployment Mode (On-premises, Cloud), Enterprise Size (Small and Medium-sized Enterprises (SMEs), Large Enterprises), Industry Vertical (BFSI, IT & Telecom, Retail, G & PA, Healthcare, Defense & Aerospace, Education, Manufacturing), Component (Software, Services {Consulting Services, Training and Education Services, Support and Maintenance Services, Managed Services})

To comprehend Global Encryption Software market dynamics in the world mainly, the worldwide Encryption Software market is analyzed across major global regions. AMA also provides customized specific regional and country-level reports for the following areas.

North America: United States, Canada, and Mexico. South & Central America: Argentina, Chile, and Brazil. Middle East & Africa: Saudi Arabia, UAE, Turkey, Egypt and South Africa. Europe: UK, France, Italy, Germany, Spain, and Russia. Asia-Pacific: India, China, Japan, South Korea, Indonesia, Singapore, and Australia.

Buy Full Copy Global Encryption Software Report 2018 @ https://www.advancemarketanalytics.com/buy-now?format=1 & report=9364 Try a limited scope research document specific to Country or Regional matching your objective. GET FULL COPY OF United States Encryption Software market study @ USD 2000

And, Europe Encryption Software market study @ USD 2500

Strategic Points Covered in Table of Content of Global Encryption Software Market:

Chapter 1: Introduction, market driving force product Objective of Study and Research Scope the Encryption Software market

Chapter 2: Exclusive Summary the basic information of the Encryption Software Market.

Chapter 3: Displayingthe Market Dynamics- Drivers, Trends and Challenges of the Encryption Software

Chapter 4: Presenting the Encryption Software Market Factor Analysis Porters Five Forces, Supply/Value Chain, PESTEL analysis, Market Entropy, Patent/Trademark Analysis.

Chapter 5: Displaying the by Type, End User and Region 2013-2018

Chapter 6: Evaluating the leading manufacturers of the Encryption Software market which consists of its Competitive Landscape, Peer Group Analysis, BCG Matrix & Company Profile

Chapter 7: To evaluate the market by segments, by countries and by manufacturers with revenue share and sales by key countries in these various regions.

Chapter 8 & 9: Displaying the Appendix, Methodology and Data Source

finally, Encryption Software Market is a valuable source of guidance for individuals and companies.

Browse for Full Report at @: https://www.advancemarketanalytics.com/reports/9364-global-encryption-software-market

Key highlights of the Study:

Actual Numbers & In-Depth Analysis, Business opportunities, Market Size Estimation Available in Full Report.

Thanks for reading this article, you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

About Author:

Advance Market Analytics is Global leaders of Market Research Industry provides the quantified B2B research to Fortune 500 companies on high growth emerging opportunities which will impact more than 80% of worldwide companies' revenues.

Our Analyst is tracking high growth study with detailed statistical and in-depth analysis of market trends & dynamics that provide a complete overview of the industry. We follow an extensive research methodology coupled with critical insights related industry factors and market forces to generate the best value for our clients. We Provides reliable primary and secondary data sources, our analysts and consultants derive informative and usable data suited for our clients business needs. The research study enable clients to meet varied market objectives a from global footprint expansion to supply chain optimization and from competitor profiling to M & As.

Media Contact Company Name: AMA Research & Media LLP Contact Person: Craig Francis Email: Send Email Phone: +1 (206) 317 1218 Address: Unit No. 429, Parsonage Road Edison, NJ New Jersey USA - 08837 City: New Jersey State: New Jersey Country: United States Website: https://www.advancemarketanalytics.com

MENAFN1103202000703268ID1099830955

Originally posted here:
Encryption Software Market is expected to see growth rate of 18.1% and may see market size of USD11.2 Billion by 2024 - MENAFN.COM