Govt looks to break into encrypted messages – The Indian Express

By: Express News Service | New Delhi | Updated: January 25, 2020 7:24:53 am Suggested changes currently need production of a court order before a messaging intermediary is required to break encryption.

The Information Technology Intermediaries Guidelines (Amendment) Rules, 2018, the new set of rules on regulation of social media which the government is to submit to the Supreme Court later this month, will push for traceability of content which in effect means breaking end-to-end encryption, even of messaging intermediaries.

This will make it difficult for large social media intermediaries, mostly international business conglomerates, to give in without a battle.

The guidelines, which are not being discussed or debated publicly with only a few in the government privy to the details, are meant to control online content deemed unlawful. But these will raise fundamental questions on both freedom of speech and privacy of ordinary users.

Suggested changes currently need production of a court order before a messaging intermediary is required to break encryption.

The Indian Express has been told that there could be two levels of online intermediaries defined in the new set of rules, each with different regulations, for social and non-social media.

Non-social media may have relatively lighter regulations given that there could be mandatory local legal incorporation for large social media intermediaries. Non-social media intermediaries will still have to appoint a local office for grievance redressal.

On November 21 last year, Sanjay Dhotre, Minister of State for Electronics and Information Technology, in a written reply to a question in Rajya Sabha, confirmed that the Centre was going ahead with new amended rules for social media. He said social media companies have to follow certain due diligence as laid out in the Information Technology (Intermediary Guidelines) Rules, 2011 under Section 79 of the Information Technology Act.

The issue of messaging apps being required to break end-to-end encryption has been a sticky point between governments and messaging apps like Facebook-owned WhatsApp, especially after revelations last year on the use of spy software being used by governments to break into phones and conduct surveillance into private conversations of activists, journalists and lawyers, including in India.

The need to conduct surveillance for reasons of security versus the right to privacy of citizens and users has been a heated debate, and remains unresolved the government appears to be pushing for more and intermediaries are insisting on greater transparency in the rules-framing process.

On December 24, 2018, The Indian Express reported that in the draft of The Information Technology Intermediaries Guidelines (Amendment) Rules, 2018, Rule 3 (9) required intermediaries, or online platforms, to deploy technology-based automated tools or appropriate mechanisms, with appropriate controls, for proactively identifying or removing or disabling access to unlawful information or content.

It is now learnt that automatic proactive filtering for all unlawful content could be replaced by a re-upload prevention provision it will prevent re-uploading of certain specific categories of content deemed illegal and taken down by platforms.

Social media intermediaries will still be required to provide user data within 72 hours in response to a government surveillance request, and have content-takedown timelines of 24 hours for content declared unlawful.

For all the latest India News, download Indian Express App

See the original post:
Govt looks to break into encrypted messages - The Indian Express

D-Link Expands Family Of Cameras With 128-bit Encryption – SmartHouse

D-Link has expanded its family of mydlink cameras with the company announcing new devices featuring built-in Bluetooth for quick setup, remote monitoring and 128-bit encryption the latest industry standard.

Announced at CES 2020, the new cameras include the DCS-8630LH and DCS-8627LH Full HD Outdoor Wi-Fi Spotlight Cameras, the DCS-8526LH Full HD Pan/Tilt Pro Wi-Fi Camera, the DCS-8302LH Full HD Indoor/Outdoor Wi-Fi Camera and the DCS-8000LHV2 Mini Full HD Wi-Fi Camera.

Availability and pricing for Australia will be announced later this year.

Each of the new cameras features 128-bit wireless encryption, allowing users to create a 26 character HEX key for superior digital protection.

In addition, edge-based person detection has also been added, meaning these cameras wont miss a thing.

The IP65 waterproof DCS-8630LH and DCS-8627LH Full HD Outdoor Wi-Fi Spotlight Cameras sport a 400 lumen LED spotlight, with colour and infra-red night vision.

A Zigbee smart home hub has also been included inside the DCS-8630LH, making the device compatible with a range of smart assistants like Alexa and Google.

The DCS-8526LH Full HD Pan/Tilt Pro Wi-Fi Camera is auto motion tracking camera with a 360 horizontal view, 340 of pan and 105 of tilt.

The indoor/outdoor DCS-8302LH also features the same edge-based detection feature, with a splash-proof design and a built-in microphone and speaker with siren for real-time alerts.

Finally, the DCS-8000LHV2 Mini Full HD Wi-Fi Camera features a compact design (3.7 x 4.5 x 9.5 cm), capable of recording Full HD video at 30fps with a 138 FOV.

Follow this link:
D-Link Expands Family Of Cameras With 128-bit Encryption - SmartHouse

Useful Innovation of Cloud Encryption Market with Growth, Size, Share, Trends and Key Region – Vital News 24

According to the prospects of the Industry research report on packaging for inCloud Encryption Market, this study is a systematic and detailed study of the worldwide Industry. In addition, the report on in Cloud Encryption Market also focuses on elements such as research and industry trends, analysis of the Industry share for in Cloud Encryption Market, associated with profiles. Important business, which basically contains the details related to the basic views. the Industry situation, the emerging and fast-growing sectors of the in Cloud Encryption Market Industry, the predominant regions, the constraints and the Industry drivers.

This research study focuses on the evaluation of the in Cloud Encryption Market Industry and its possible advances in different sectors and regions of the world. The main objective of this report is to estimate the recent Industry size and growth potential of the in Cloud Encryption Market industry in various sections, segments and applications.

The inCloud Encryption MarketIndustry analysis provides a comprehensive overview of the industrys key players, as well as their business profiles, business plans, breakthroughs, SWOT analysis and more, again.

GlobalCloud Encryption Market is valued at USD XX million in 2019 and is projected to reach USD XX million by the end of 2026, growing at a CAGR of XX% during the period 2019 to 2026.

**Download FREE Sample Copy (with Full TOC, Figures and Tables) https://www.coherentmarketinsights.com/insight/request-sample/1344

We also offer customization on reports based on specific client requirement:

1-country level analysis forany 5 countriesof your choice.

2-Competitive analysis of any market players.

3-40 analyst hoursto cover any other data points

** List of companies mentioned may vary in the final report subject to Name Change / Merger etc.

Cipher Cloud Inc. (U.S.)

Can we add or profiled new company as per our need?Yes, we can add or profile new company as per client need in the report. Final confirmation to be provided by research team depending upon the difficulty of survey.** Data availability will be confirmed by research in case of privately held company. Upto 3 players can be added at no added cost.

Detail section covered in the market report Cloud Encryption Market:

Market Overview: The report begins with this section which provides an overview of the product and highlights of the product and application segments.

Competition by company: Here the competition in the market is analyzed Cloud Encryption Market, based on price, revenue, sales and market share by company, market rate, competitive situations Landscape with and latest trends, merger, expansion, acquisition and market shares of the best companies.

State of the market and prospects by region: In this section, the report discusses gross margin, sales, revenue, production, market share, CAGR and market size by region. Here, the market is deeply analyzed based on regions and countries such as North America, Europe, China, India, Japan and MEA.

Application or end user:This section of the research study shows how the various application segments of the end user contribute to the sector.

Market forecasts:Here, the report offers a complete forecast of the global market Cloud Encryption Market by product, application and region.

Results of the research and conclusions:This is one of the last sections of the report in which the results of the analysts and the conclusion of the research study are given.

Appendix: Here we have provided a disclaimer, our data sources, data triangulation, research programs, market breakdown and planning and our research approach.

Get PDF Brochure @ https://www.coherentmarketinsights.com/insight/request-pdf/1344

You can get a point by point of the whole research here. If you have any special requirements, dont mind, let us know and we will offer you the report as you need. Contact Here [emailprotected]||US+12067016702 /UK+4402081334027(US-UK Toll Free).Visit Our Blogs: https://blog.coherentmarketinsights.com

RELATED TOPICS: Information and Communication Technology Smart Technologies Automotive and Transportation

Read the original here:
Useful Innovation of Cloud Encryption Market with Growth, Size, Share, Trends and Key Region - Vital News 24

Hardware Encryption Market Analysis (2020 2026)| Expert Guide to Boost the Industry in Global Market Share| Esticast Research and Consulting …

Greater consistency and momentum always keeps up the Esticast Research and Consulting research reports trending and far more reachable to the client. The research report keeps the testimonials across the world based on classifications, conjectures, the technology that is showcased by makers, type, applications, and local. The report further presents the data on percentage volume and market share value by players, by product type, applications, regions, and also price variations.

About Hardware Encryption Market

Hardware Encryption Market was valued at $52.45 billion in 2016, and is projected to reach $1,085 billion by 2024, having a CAGR of 46.3% during the forecast period of 2017 to 2024. The technology which encrypts the data stored in a hard drive using appropriate and specific mathematical functions is called as hardware encryption. Hardware encryption restricts the unauthorized entities from accessing the important data. The hardware encryption market is majorly driven by reduced cost of encryption and increasing complexity & volume of data breaches.

For Better Understanding, Try Sample PDF Brochure of Report (including full TOC, Tables and Figures) @https://www.esticastresearch.com/report/hardware-encryption-market/#request-for-sample

Market Overview

The new report titled Global Hardware Encryption Market is one of the vast depositories added in the directory of Esticast Research and Consulting. The market research report collects data on the basis of extensive research tools based on primary research as well as in-depth study of the qualitative and quantitative aspects made available by various industry experts, specialists, and professionals to offer a deeper insight into the market landscape.

The report prepared on the Hardware Encryption market offers a complete view of the market by a thorough understanding of the positive as well as a negative impact. The analysis is projected by using various analytics techniques and accessing the influence on the market by measurement. The accessing is monitored by technological advancements, diversified investment habits, in-depth study on a product by defining overview and specifications.

The report further shifts the focus on the global Hardware Encryption market through industry status, growth opportunities, forecasts, key participants, and key players.

Important facts about the Hardware Encryption market report

Competitive Landscape

Key players profiled in the report include:

Certes Networks Inc.IBM CorporationImation Corp.Kingston Technology Corporation Inc.Maxim Integrated Products Inc.Micron Technology Inc.NetApp Inc.Samsung Electronics Co. Ltd.SanDisk CorporationSeagate Technology LLCToshiba Corporation

The prominent industry players profiled in the report that are functional in the Hardware Encryption market are profiled on the basis of quality, product differentiation, product portfolio, and among others. The participants are shifting major focus towards research and product innovations coupled with technologies that ultimately enhances the efficiency and improvement in the shelf life of various products in the pipeline with proper services.

Inquire more or share questions if any before the purchasing this report: https://www.esticastresearch.com/report/hardware-encryption-market/#customization

Market Segmentation

Based on types, the global Hardware Encryption market is primarily split into

By UsageStorage DeviceNetwork

Based on application, the global Hardware Encryption market is primarily split into

Healthcare SectorMilitary & AerospaceAutomotive & TransportationBFSIIT & TelecomOthers (Retail, Education, Individual User)

Market Synopsis

The report produces data with the support of the existing tools based on SWOT analysis, Porters Five Forces analysis, secondary based data tools, and others. Based on the tools the report is designed such that it offers a deep-insight for the reader to make aware of the current market developments, drivers, stumbling blocks, market opportunities, and status of the global keyword market. The report of the global keyword market maintains momentum such as it covers both micro and macro-level analysis by the industry players with key segments. The report offers the data by proper integration of efficient tools and skilled employees at the workplace. The report covers the market forecast data and analysis until 2026. The report produced is based on a comprehensive analysis of both qualitative and quantitative.

The content of the study subjects includes a total of 8 chapters:

Navale ICON IT Park,

Office No. 407, 4th Floor, Mumbai Banglore Highway, Narhe, Pune

Maharashtra 411041

Phone +91-844-601-6060

Email [emailprotected]

Esticast Research & Consulting is a research firm providing research reports on various industries with a unique combination of authenticity, extensive research, and infallibility. We provide syndicated market research reports, customization services, and consulting services to help businesses across the world in achieving their goals and overcoming complex challenges. We specialize in providing 360 degree view of the markets to assist clients in determining new opportunities and develop business strategies for the future with data and statistics on changing market dynamics. Esticast Research & Consulting has expert analysts and consultants with an ability to work in collaboration with clients to meet their business needs and give opportunities to thrive in a competitive world. A comprehensive analysis of industries ranging from healthcare to consumer goods and ICT to BFSI is provided by covering hundreds of industry segments. The research reports offering market forecasts, market entry strategies, and customer intelligence will help clients across the world in harnessing maximum value on their investment and realize their optimum potential.

Read the original here:
Hardware Encryption Market Analysis (2020 2026)| Expert Guide to Boost the Industry in Global Market Share| Esticast Research and Consulting ...

An Open Source Effort to Encrypt the Internet of Things – WIRED

End-to-end encryption is a staple of secure messaging apps like WhatsApp and Signal. It ensures that no oneeven the app developercan access your data as it traverses the web. But what if you could bring some version of that protection to increasingly ubiquitousand notoriously insecureinternet-of-things devices?

The Swiss cryptography firm Teserakt is trying just that. Earlier this month, at the Real World Crypto conference in New York, it introduced E4, a sort of cryptographic implant that IoT manufacturers can integrate into their servers. Today most IoT data is encrypted at some point as it moves across the web, but it's challenging to keep that protection consistent for the whole ride. E4 would do most of that work behind the scenes, so that whether companies make home routers, industrial control sensors, or webcams, all the data transmitted between the devices and their manufacturers can be encrypted.

Tech companies already rely on web encryption to keep IoT data secure, so it's not like your big-name fitness tracker is transmitting your health data with no protection. But E4 aims to provide a more comprehensive, open-source approach that's tailored to the realities of IoT. Carmakers managing dozens of models and hundreds of thousands of vehicles, or an energy company that takes readings from a massive fleet of smart meters, could have more assurance that full encryption protections really extend to every digital layer that data will cross.

"What we have now is a whole lot of different devices in different industries sending and receiving data," says Jean-Philippe Aumasson, Teserakt's CEO. "That data might be software updates, telemetry data, user data, personal data. So it should be protected between the device that produces it and the device that receives it, but technically it's very hard when you don't have the tools. So we wanted to build something that was easy for manufacturers to integrate at the software level."

Being open source is also what gives the Signal Protocol, which underpins Signal and WhatsApp, so much credibility. It means experts can check under the hood for vulnerabilities and flaws. And it enables any developer to adopt the protocol in their product, rather than attempting the fraught and risky task of developing encryption protections from scratch.

"At the end of the day we know that's the right thing to do."

Jean-Philippe Aumasson, Teserakt

Aumasson says that the Signal Protocol itself doesn't literally translate to IoT, which makes sense. Messaging apps involve remote but still direct, human-to-human interaction, whereas populations of embedded devices send data back to a manufacturer or vice versa. IoT needs a scheme that accounts for these "many-to-one" and "one-to-many" data flows. And end-to-end encryption has different privacy goals when it is applied to IoT versus secure messaging. Encrypted chat apps essentially aim to lock the developer, internet service providers, nation state spies, and any other snoops out. But in the IoT context, manufacturers still have access to their customers' data; the goal instead is to protect the data from other entities and Teserakt itself.

It also only hardens IoT defenses against a specific type of problem. E4 looks to improve defenses for information in transit and offer protection against data interception and manipulation. But just like encrypted chat services can't protect your messages if bad actors have access to your smartphone itself, E4 doesn't protect against a company's servers being compromised or improve security on IoT devices themselves.

"I think it's a good idea, but developers would need to keep in mind that it covers only one part of data protection," says Jatin Kataria, principal scientist at the IoT security firm Red Balloon. "Whats the security architecture of the embedded device itself and the servers that are receiving this data? If those two endpoints are not that secure then end-to-end encryption will only get you so far."

Teserakt has been consulting with big tech companies in aerospace, health care, agriculture, and the automotive and energy sectors to develop E4 and plans to monetize the tool by charging companies to customize implementations for their specific infrastructure. The company has not yet open-sourced full server code for E4 alongside the protocol details and cryptography documentation it released, but says that final step will come as soon as the documentation is complete. Given the glacial pace of investment in IoT security overall, you probably shouldn't expect E4 to be protecting the whole industry anytime soon, anyway.

Link:
An Open Source Effort to Encrypt the Internet of Things - WIRED

Global IoT Security Solution for Encryption Market 2020 Industry Growth, Competitive Analysis, Future Prospects and Forecast 2025 Dagoretti News -…

The research report on Global IoT Security Solution for Encryption Market offers the regional as well as global market information which is estimated to collect lucrative valuation over the forecast period. The Global IoT Security Solution for Encryption Market report also comprises the registered growth of Global IoT Security Solution for Encryption Market over the anticipated timeline and also covers a significant analysis of this space. Additionally, the Global IoT Security Solution for Encryption Market report focuses on the number of different crucial aspects to the remuneration recently which are held by the industry. Moreover, the Global IoT Security Solution for Encryption Market report analyzes the market segmentation as well as the huge number of lucrative opportunities offered across the industry.

Request a sample of this report @ https://www.orbismarketreports.com/sample-request/61552

According to the Global IoT Security Solution for Encryption Market report, the multi-featured product offerings may have a high positive influence on the Global IoT Security Solution for Encryption Market and it contributes to the market growth substantially during the prediction period. The Global IoT Security Solution for Encryption Market research report also covers many other significant market trends and crucial market drivers which will impact on the market growth over the forecast period.

This study covers following key players:Cisco SystemsIntel CorporationIBM CorporationSymantec CorporationTrend MicroDigicertInfineon TechnologiesARM HoldingsGemalto NVKaspersky LabCheckPoint Software TechnologiesSophos PlcAdvantechVerizon Enterprise SolutionsTrustwaveINSIDE Secure SAPTC Inc.AT&T Inc.

The Global IoT Security Solution for Encryption Market report includes substantial information related to the market driving forces which are highly influencing the vendor portfolio of the Global IoT Security Solution for Encryption Market and its impact on the market share in terms of revenue of this industry. Likewise, the Global IoT Security Solution for Encryption Market report analyzes all the current market trends by classifying them in a group of challenges as well as opportunities that the Global IoT Security Solution for Encryption Market will present into the coming years.

In addition, the shift in customer focus towards alternate products may restrict the demand for the Global IoT Security Solution for Encryption Market among consumers. Hence, such factors are responsible for hindering the growth of the Global IoT Security Solution for Encryption Market. Furthermore, the Global IoT Security Solution for Encryption Market is highly concentrated as the few leading players present in the market. However, major players in this market are continually concentrating on innovative or multi-featured solutions which will offer huge benefits for their business.

The Global IoT Security Solution for Encryption Market research report focuses on the manufacturers data such as price, gross profit, shipment, business distribution, revenue, interview record, etc., such information will help the users to know about the major players of competitor better. In addition, the Global IoT Security Solution for Encryption Market report also focuses on the countries and regions of the globe, which presents a regional status of the market including volume and value, market size, and price structure.

Market segment by Type, the product can be split intoSoftware PlatformsService

Access Complete Report @ https://www.orbismarketreports.com/global-iot-security-solution-for-encryption-market-size-status-and-forecast-2019-2025

Additionally, the Global IoT Security Solution for Encryption Market report will assist the client to recognize fresh and lucrative growth opportunities and build unique growth strategies through a complete analysis of the Global IoT Security Solution for Encryption Market and its competitive landscape and product offering information provided by the various companies. The Global IoT Security Solution for Encryption Market research report is prepared to offer the global as well as local market landscape and the number of guidelines related to the contemporary market size, market trends, share, registered growth, driving factors, and the number of dominant competitors of the Global IoT Security Solution for Encryption Market.

The Global IoT Security Solution for Encryption Market report covers all the significant information about market manufacturers, traders, distributors, and dealers. However, this information helps clients to know the product scope, market driving force, market overview, market risk, technological advancements, market opportunities, challenges, research findings, and key competitors. In addition, the Global IoT Security Solution for Encryption Market report will offer an in-depth analysis of the upstream raw material as well as downstream demand of the Global IoT Security Solution for Encryption Market.

Market segment by Application, split intoHealthcareInformation Technology (IT)TelecomBankingFinancial Services, And Insurance (BFSI)AutomotiveOthers

For Enquiry before buying report @ https://www.orbismarketreports.com/enquiry-before-buying/61552

Some TOC Points:

1 Report Overview2 Global Growth Trends3 Market Share by Key Players4 Breakdown Data by Type and Application

Continued

About Us:

With unfailing market gauging skills, Orbis Market Reports has been excelling in curating tailored business intelligence data across industry verticals. Constantly thriving to expand our skill development, our strength lies in dedicated intellectuals with dynamic problem solving intent, ever willing to mold boundaries to scale heights in market interpretation.

Contact Us:Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

Read the original post:
Global IoT Security Solution for Encryption Market 2020 Industry Growth, Competitive Analysis, Future Prospects and Forecast 2025 Dagoretti News -...

Global Encryption Software Market is slated to grow rapidly in the coming years: Dell, Eset, Gemalto, IBM, Mcafee – Galus Australis

Encryption Software Market Industry Forecast To 2026

Encryption software is segmented on the basis of components (solution and services), applications, deployment types, organization sizes, verticals, and regions. The services segment is expected to grow at the highest CAGR during the forecast period and the solution segment is estimated to have the largest market size in 2017 in the market. Professional services have been widely adopted by organizations, as these services involve expert consulting, support and maintenance, and optimization and training for cybersecurity. However, the managed services segment is expected to grow at the highest CAGR during the forecast period, as managed security vendors provide extensive reporting capabilities for validating the regulatory compliance with internal security policies for the users.The disk encryption application is estimated to hold the largest market share in 2017. The importance of encrypting a disk is that, if the encrypted disk is lost or stolen, the encrypted state of the drive remains unchanged, and only an authorized user will be able to access its contents. The cloud encryption application is expected to grow at the fastest rate during the forecast period.

This Research report comes up with the size of the global Encryption Software Market for the base year 2020 and the forecast between 2020 and 2026.

Major Manufacturer Detail:Dell, Eset, Gemalto, IBM, Mcafee, Microsoft, Pkware, Sophos, Symantec, Thales E-Security, Trend Micro, Cryptomathic, Stormshield

Geta PDF SampleCopy (including TOC, Tables, and Figures) @https://garnerinsights.com/Global-Encryption-Software-Market-Size-Status-and-Forecast-2019-2025#request-sample

Types of Encryption Software covered are:On-premises, Cloud

Applications of Encryption Software covered are:Disk encryption, File/folder encryption, Database encryption, Communication encryption, Cloud encryption

The Global Encryption Software Market is studied on the basis of pricing, dynamics of demand and supply, total volume produced, and the revenue generated by the products. The manufacturing is studied with regards to various contributors such as manufacturing plant distribution, industry production, capacity, research and development. It also provides market evaluations including SWOT analysis, investments, return analysis, and growth trend analysis.

To get this report at a profitable rate, Click Herehttps://garnerinsights.com/Global-Encryption-Software-Market-Size-Status-and-Forecast-2019-2025#discount

Regional Analysis For Encryption SoftwareMarket

North America(the United States, Canada, and Mexico)Europe(Germany, France, UK, Russia, and Italy)Asia-Pacific(China, Japan, Korea, India, and Southeast Asia)South America(Brazil, Argentina, Colombia, etc.)The Middle East and Africa(Saudi Arabia, UAE, Egypt, Nigeria, and South Africa)

Get Full Report Description, TOC, Table of Figures, Chart, etc. @https://garnerinsights.com/Global-Encryption-Software-Market-Size-Status-and-Forecast-2019-2025

What does this report deliver?

Reasons to buy:

Get Full Report @ https://garnerinsights.com/Global-Encryption-Software-Market-Size-Status-and-Forecast-2019-2025

In conclusion, the Encryption Software Market report is a reliable source for accessing the Market data that will exponentially accelerate your business. The report provides the principle locale, economic scenarios with the item value, benefit, supply, limit, generation, request, Market development rate, and figure and so on. Besides, the report presents a new task SWOT analysis, speculation attainability investigation, and venture return investigation.

Contact Us:Mr. Kevin Thomas+1 513 549 5911 (US)+44 203 318 2846 (UK)Email: sales@garnerinsights.com

Continued here:
Global Encryption Software Market is slated to grow rapidly in the coming years: Dell, Eset, Gemalto, IBM, Mcafee - Galus Australis

D-Link Expands Family Of Cameras With 128-bit Encryption – ChannelNews

D-Link has expanded its family of mydlink cameras with the company announcing new devices featuring built-in Bluetooth for quick setup, remote monitoring and 128-bit encryption the latest industry standard.

Announced at CES 2020, the new cameras include the DCS-8630LH and DCS-8627LH Full HD Outdoor Wi-Fi Spotlight Cameras, the DCS-8526LH Full HD Pan/Tilt Pro Wi-Fi Camera, the DCS-8302LH Full HD Indoor/Outdoor Wi-Fi Camera and the DCS-8000LHV2 Mini Full HD Wi-Fi Camera.

Availability and pricing for Australia will be announced later this year.

Each of the new cameras features 128-bit wireless encryption, allowing users to create a 26 character HEX key for superior digital protection.

In addition, edge-based person detection has also been added, meaning these cameras wont miss a thing.

The IP65 waterproof DCS-8630LH and DCS-8627LH Full HD Outdoor Wi-Fi Spotlight Cameras sport a 400 lumen LED spotlight, with colour and infra-red night vision.

A Zigbee smart home hub has also been included inside the DCS-8630LH, making the device compatible with a range of smart assistants like Alexa and Google.

The DCS-8526LH Full HD Pan/Tilt Pro Wi-Fi Camera is auto motion tracking camera with a 360 horizontal view, 340 of pan and 105 of tilt.

The indoor/outdoor DCS-8302LH also features the same edge-based detection feature, with a splash-proof design and a built-in microphone and speaker with siren for real-time alerts.

Finally, the DCS-8000LHV2 Mini Full HD Wi-Fi Camera features a compact design (3.7 x 4.5 x 9.5 cm), capable of recording Full HD video at 30fps with a 138 FOV.

Read more:
D-Link Expands Family Of Cameras With 128-bit Encryption - ChannelNews

EncryptOnClick is a freeware tool that can encrypt files and folders – Ghacks Technology News

EncryptOnClick is a freeware tool that you can use to encrypt files and folders. The application offers an extra layer of security to protect data and uses military grade 256-bit AES encryption for protection.

The program's interface is very simple as it displays a handful of buttons only. It lists two encrypt actions and decrypt actions which can be run on files or folders.

Let's encrypt some files. Click on the File button and it will open an "Encrypt Password" window. You are prompted to enter a password and confirm it. Optionally, you can add a comment thought I didn't see any being displayed while decrypting the files.

Important: Don't forget the password, as there is no way to recover it.

Before clicking on the Ok button, decide if you wish to encrypt the filenames and enable the option, or skip it. This depends on how you're using the data, and how sensitive it is. If you select to encrypt the filename, it is modified so that it is no longer possible to get information just by looking at it.

Warning: If you are just testing the program, make sure to check the box next to the "Do not delete file after encrypting" option.

Hit Ok and the encryption process will begin. The time it takes for this depends on the size of the files that you're encrypting. The files are saved in the EOC format (named after the program). Okay, so if we remove the EOC from the name, will the file be readable? Of course not. You may have noticed that the encrypted file is smaller than the source file's size, that's because EncryptOnClick compresses the files while encrypting them. This is quite handy in case you want to email the files to your contact. When the file is decrypted, it will be restored to its original state and size.

Note: If you select the "Folders" option, the program will encrypt the files inside the folder, not the folder itself.

There are two ways to decrypt the contents. Either use the program and select the Decrypt option (Files or Folders), or just try opening the files (if the program is installed) and it should ask for the password. Once again, remember to check the "Do not delete file after decrypting" option, else the encrypted copy will be deleted. Regardless of the option, the uncompressed file will be saved in the same folder, so it's not a real loss.

The program doesn't have a portable archive ready to download, but you can create a portable version by copying three files from the installation directory: EncryptOnClick.exe, EncryptOnClick.exe.manifest and XceedZip.dll to a memory stick and use it anywhere. I tested this as well, and it works perfectly.

Do I need EncryptOnClick installed to open the files? Yes, according to the documentation, or WinZip 9 or above. The portable version works fine too. Since I'm a 7-Zip user, I wanted to check if it can decrypt it, and I can confirm that it works. This screenshot is from a friend's computer whom I sent the encrypted file to, he was able to open it with 7z.

Note: You can rename the extension of the encrypted files to anything you want, you can still decrypt it. It can be a good way to prevent others from opening your files.

EncryptOnClick can be very useful for protecting financial documents, personal data, pictures, etc. The simplicity of the program makes it suitable for people of all skill levels.

Author Rating

Operating System

Windows

Software Category

Security

Price

Free

Landing Page

Read the rest here:
EncryptOnClick is a freeware tool that can encrypt files and folders - Ghacks Technology News

Apple Is Right to Refuse to Help the FBI Hack into iPhones – National Review

A customer compares an iPhone XS and iPhone XS Max at the Apple Store in Singapore, September 21, 2018. (Edgar Su/Reuters)The federal government cant be trusted with additional surveillance powers.

Some political dilemmas come to down to: Whom should we trust more? In the case of Apple vs. the FBI, the question is: Whom should we distrust less?

Advantage: Cupertino.

As the proverb has it, Hard cases make bad law. But they sometimes make pretty good politics.

Notionally, the dispute here is about the case of Second Lieutenant Mohammed Saeed Alshamrani of the Royal Saudi Air Force, who shot eleven people, killing three, at Naval Air Station Pensacola, where he was undergoing training courtesy of the U.S. government, whose agents assure us that they are competent to vet would-be immigrants and visitors for jihadist sympathies.

The feds tend to be more effective after the fact. Twenty-one of the nearly 900 Saudi military trainees in the United States are being sent home after a federal investigation revealed them to be in possession of derogatory material ranging from anti-American literature to child pornography.

There will be no trial of Alshamrani, who was liberated from this vale of tears at the scene of his crime by the marksmanship of Escambia County sheriffs deputies. But there is an ongoing investigation. Alshamrani was the sole shooter, but he did not act alone: The evening before the massacre, he entertained Saudi friends at a dinner party at which they watched videos of mass shootings, and three of them took video of the incident while it was underway. The FBI rightly wants to understand this incident in the broader context of jihadist radicalization with an eye toward preventing future atrocities.

And so the FBI would like to have a look at Alshamranis iPhone. But they cannot access it, and they want assistance from Apple, which has declined to give the U.S. government what it really wants: a backdoor to defeat the encryption in Apple products, something it has been seeking for years and pressing for in similar cases such as that of the San Bernardino terrorists. As Ben Wizner of the ACLU argues in Wired, The Department of Justice is trying to identify the most politically advantageous case in which to press a longstanding desire, which is that companies reengineer their products to allow easy surveillance.

In the San Bernardino case, a third party was able to provide access to the phones. The FBIs crime lab is hard at work on Alshamranis two iPhonesin a truly impressive feat, they apparently have managed to get the devices into operational condition in spite of the fact that Alshamrani shot them. But they are not confident that they can access them. Apple, for its part, has provided access to a great deal of cloud data but declines to provide the means for defeating its encryption on the grounds that there is no way for them to prevent hackers and other criminals from exploiting such a backdoor.

But bad actors outside the government are not the only concern here. There are plenty of bad actors inside our government as well. From the Obama administrations politicization of the IRS and other federal agencies with easily weaponized investigatory powers to the abuses of surveillance protocols in the investigation of the Trump campaign (antithetical to the heightened duty of candor in the sterile language of Rosemary Collyer, the presiding judge at the FISA court), the federal government has shown itself incapable of deploying its awesome powers in an honest and politically neutral fashion.

The ethical lapses of the federal government must be considered in the context of its general incompetence in the matter of deploying the powers it already has to prevent terrorist attacks such as the one in Pensacola. Return your minds for a moment to the fact that at least 21 of the Saudi military personnel brought here for training were in possession of anti-American propaganda, which should have raised counterterrorism concerns, and child pornography, which is a regular old workaday felony.

Performing background checks on military personnel, who are under certain obligations that supersede ordinary privacy expectations, is a relatively easy task. And we are not talking here about members of the Norwegian military but members of the military of Saudi Arabia, the government of which is not famous for its interest in the privacy of its subjects or their civil liberties.

No humility about its shortcomings stopped the U.S. government from providing these men training in the killing arts at the expense of the U.S. taxpayer. Nor did it stop the U.S. government from importing a terrorist who carried out a deadly attack on U.S. soil.

Mature judgment requires us to balance the likelihood that additional powers will be abused against the likelihood that some good will come of them, and in this calculation, Washington is found wanting.

Apple is right to look after the privacy interests of its customers, and to assist law enforcement where doing so is not detrimental to those interests. And the U.S. governments law-enforcement and intelligence operatives are right to do what they can to learn what can be learned from the communications of terrorists such as Mohammed Saeed Alshamrani. But they are the ones who have to do their jobit is not desirable that Apple should be deputized to do it for them, or that Apple should give them a master key to Americans private communicationsbecause the U.S. government already has shown on many occasions that it simply cannot be trusted with such power.

It is worth remembering that Senator Barack Obama was a civil libertarian who worried that the PATRIOT Act would undermine the privacy of American citizens, and that President Obama, only a few blinks of the eye later, decided that the so-called war on terror invested him with the unilateral authority to order the assassination of American citizens without so much as a legislative by-your-leave.

Political power is always growing and generally metastatic, and the case of Mohammed Saeed Alshamrani is not onlyor even mainlyabout Mohammed Saeed Alshamrani.

Follow this link:
Apple Is Right to Refuse to Help the FBI Hack into iPhones - National Review