Email Encryption Software Market: Global Industry Share, Size, Trends, Growth, Investment Analysis, Development Factors, Future Scope, Challenges and…

Transparency Market Research, in its latest market intelligence study, finds that the global Automotive Inner Fenders market registered a value of ~US$ xx Mn/Bn in 2018 and is spectated to grow at CAGR of xx% during the foreseeable period 2019-2029. In terms of product type, segment holds the largest share, while segment 1 and segment 2 hold significant share in terms of end use.

The Automotive Inner Fenders market study outlines the key regions Region 1 (Country 1, Country 2), region 2 (Country 1, Country 2), region 3 (Country 1, Country 2) and region 4 (Country 1, Country 2). All the consumption trends and adoption patterns of the Automotive Inner Fenders are covered in the report. Prominent players, including player 1, player 2, player 3 and player 4, among others, account for substantial shares in the global Automotive Inner Fenders market.

Request For Discount On This Report @ https://www.transparencymarketresearch.co/sample/sample.php?flag=D&rep_id=27377

Market segments and sub-segments

The regional analysis covers:

The report has been compiled through extensive primary research (through interviews, surveys, and observations of seasoned analysts) and secondary research (which entails reputable paid sources, trade journals, and industry body databases). The report also features a complete qualitative and quantitative assessment by analyzing data gathered from industry analysts and market participants across key points in the industrys value chain.

A separate analysis of prevailing trends in the parent market, macro- and micro-economic indicators, and regulations and mandates is included under the purview of the study. By doing so, the report projects the attractiveness of each major segment over the forecast period.

Highlights of the report:

Note:Although care has been taken to maintain the highest levels of accuracy in TMRs reports, recent market/vendor-specific changes may take time to reflect in the analysis.

The Automotive Inner Fenders market research answers important questions, including the following:

Request Sample Report @ https://www.transparencymarketresearch.co/sample/sample.php?flag=B&rep_id=27377

The Automotive Inner Fenders market research serves a platter of the following information:

Why go for Transparency Market Research?

Transparency Market Research stays aligned with the fact the organization lands among the leading market research firms in India. Our analysts work irrespective of the time-zone, the result, we are being recognized worldwide. We abide by the notion that each client has his/her own set of requirements. With extensive primary and secondary research, our experts churn out the most accurate information regarding the desired the market.

RequestTOC For ThisReport @ https://www.transparencymarketresearch.co/sample/sample.php?flag=T&rep_id=27377

About TMR

Transparency Market Research (TMR) is a global market intelligence company providing business information reports and services. The companys exclusive blend of quantitative forecasting and trend analysis provides forward-looking insight for thousands of decision makers. TMRs experienced team of analysts, researchers, and consultants use proprietary data sources and various tools and techniques to gather and analyze information.

Contact

Mr. Rohit BhiseyTransparency Market ResearchState Tower90 State Street,Suite 700,Albany, NY 12207United StatesTel: +1-518-618-1030USA Canada Toll Free: 866-552-3453Email: [emailprotected]Website: http://www.transparencymarketresearch.com

Continued here:
Email Encryption Software Market: Global Industry Share, Size, Trends, Growth, Investment Analysis, Development Factors, Future Scope, Challenges and...

Encryption battle reignited as US govt at loggerheads with Apple – Times Now

(Representational photo)  |  Photo Credit: IANS

Apple and the US government are at loggerheads for the second time in four years over unlocking iPhones connected to a mass shooting, reviving debate over law enforcement access to encrypted devices.

Attorney General Bill Barr said Monday that Apple failed to provide "substantive assistance" in unlocking two iPhones in the investigation into the December shooting deaths of three US sailors at a Florida naval station, which he called an "act of terrorism."

Apple disputed Barr's claim, while arguing against the idea of "backdoors" for law enforcement to access its encrypted smartphones.

"We reject the characterization that Apple has not provided substantive assistance in the Pensacola investigation," the company said in a statement.

"Our responses to their many requests since the attack have been timely, thorough and are ongoing."

Late on Tuesday, President Donald Trump weighed in on Twitter, saying the government was helping Apple on trade issues "yet they refuse to unlock phones used by killers, drug dealers and other violent criminal elements."

"They will have to step up to the plate and help our great Country, NOW!" he added.

The standoff highlighted the debate between law enforcement and the tech sector about encryption -- a key way to protect the privacy of digital communications, but which can also make investigations difficult, even with a court order.

The latest battle is similar to the dispute between Apple and the US Justice Department after the December 2015 mass shooting in San Bernardino, California, when the iPhone maker rejected a request to develop software to break into the shooter's iPhone.

That fight ended in 2016 when the government paid an outside party a reported $1 million for a tool that circumvented Apple's iPhone encryption.

Barr last year called on Facebook to allow authorities to circumvent encryption to fight extremism, child pornography and other crimes. The social network has said it would move ahead with strong encryption for its messaging applications.

Digital rights activists argue that any privileged access for law enforcement would weaken security and make it easier for hackers and authoritarian governments to intercept messages.

"We have always maintained there is no such thing as a backdoor just for the good guys," Apple's statement said.

"Backdoors can also be exploited by those who threaten our national security and the data security of our customers."

Apple and others argue that digital "breadcrumbs" make it increasingly easy to track people, even without breaking into personal devices.

The government's latest demand "is dangerous and unconstitutional, and would weaken the security of millions of iPhones," Jennifer Granick of the American Civil Liberties Union said in a statement.

"Strong encryption enables religious minorities facing genocide, like the Uighurs in China, and journalists investigating powerful drug cartels in Mexico, to communicate safely."

Granick added that Apple cannot allow the FBI access to encrypted communications "without also providing it to authoritarian foreign governments and weakening our defenses against criminals and hackers."

Kurt Opsahl of the Electronic Frontier Foundation echoed that sentiment, saying Apple "is right to provide strong security" for its devices.

"The AG (attorney general) requesting Apple re-engineer its phones to break that security is a poor security trade-off, and imperils millions of innocent people around the globe," Opsahl tweeted.

James Lewis of the Center for Strategic and International Studies, a Washington think tank, said he believes it's possible to allow law enforcement access without sacrificing encryption.

"You're not weakening encryption, you're making it so it's not end-to-end," Lewis told AFP.

"It means that there's a third party who can look at it under appropriate authority."

But Lewis said he does not expect either side to come out a winner in the battle, and that US officials will likely find another outside party to crack the two iPhones belonging to the shooter, Royal Saudi Air Force 2nd Lieutenant Mohammed Saeed Alshamran, who died in the attack.

"It's a repeat of the movie we saw in San Bernardino," he said.

"It's going to be harder because Apple probably fixed the trick that worked in San Bernardino."

The rest is here:
Encryption battle reignited as US govt at loggerheads with Apple - Times Now

Hardware Encryption Market Set To Register A CAGR Growth Of XX% Over The Forecast Period 2017 2025 – Fusion Science Academy

Study on the Global Hardware Encryption Market

A recent market study published by TMRR provides resourceful business insights pertaining to the growth prospects of the Hardware Encryption market during the considered forecast period, 2019-2029. According to the report, owing to the growing demand for product 1 and product 2 from region 1 and region 2, significant advances in Hardware Encryption technology, and growing investment for research and development activities, the Hardware Encryption market is projected to grow at CAGR of XX% through the forecast period.

The data collected by our analysts from credible primary and secondary sources provides answers to some top queries related to the global Hardware Encryption market.

Request For Discount On This Report @ https://www.tmrresearch.com/sample/sample?flag=D&rep_id=647&source=atm

Some of the questions related to the Hardware Encryption market addressed in the report are:

in the current Hardware Encryption market?

The market study bifurcates the global Hardware Encryption market on the basis of product type, regions, application, and end use industry. The insights are backed by accurate and easy to understand graphs, tables, and figures.

segmentation, applications, technological advancements, and the regional segments of the global hardware encryption market. In addition, the limitations and challenges that are being faced by the prominent players in the overall market have been discussed in the research study.

Global Hardware Encryption Market: Drivers and Restraints

The rising concerns related to the privacy of data and data security and tremendous expansion of the digital content are anticipated to encourage the growth of the global hardware encryption market throughout the forecast period. In addition, several advantages offered by hardware encryption in comparison with software encryption technology and the rising need of regulatory framework are some of the other factors estimated to accelerate the growth of the overall market in the near future.

On the contrary, the need for high capital investment and the lack of awareness among consumers reading the benefits of hardware encryption technology are projected to restrict the growth of the global hardware encryption market in the next few years. Nevertheless, the emergence of economical and compact hardware encryption technique and the rising adoption of cloud computing are expected to offer promising opportunities for market players in the coming years.

Global Hardware Encryption Market: Region-wise Outlook

The global market for hardware encryption has been divided on the basis of geography into Europe, the Middle East and Africa, North America, Latin America, and Asia Pacific. The research study has provided a detailed analysis of the leading regional segment, highlighting the market share and anticipated growth rate. In addition, the key factors that are encouraging the growth of these segments have been discussed in the scope of the research study.

According to the research study, Asia Pacific is anticipated to witness strong growth throughout the forecast period, owing to the robust development of the IT industry. In addition, a substantial contribution from China, India, Malaysia, and South Korea is expected to accelerate the growth of the hardware encryption market in Asia Pacific throughout the forecast period. Furthermore, with the presence of a large number of established hardware encryption manufacturing companies, North America is anticipated to witness healthy growth in the next few years.

Key Players Mentioned in the Research Report are:

The global hardware encryption market is projected to witness a high level of competition in the coming few years. The leading players in the market are focusing on offering new products to consumers in order to enhance their market penetration and maintain their dominant position throughout the forecast period. Some of the prominent players operating in the hardware encryption market across the market are Netapp, Maxim Integrated Products, Inc., Toshiba Corp., Gemalto NV., Micron Technology, Inc., Samsung Electronics Co. Ltd., Kanguru Solutions, Thales (E-Security), Winmagic Inc., Kingston Technology Corp., Western Digital Corp., and Seagate Technology PLC.

Furthermore, the research study has provided a detailed analysis of the competitive landscape of the global hardware encryption market. An in-depth overview of company profiles and their financial overview have been discussed at length in the scope of the research study. Additionally, the business strategies, SWOT analysis, and the recent developments have been included to offer a clear understanding of the overall market.

Request Sample Report @ https://www.tmrresearch.com/sample/sample?flag=B&rep_id=647&source=atm

Competitive Outlook

The competitive outlook segment tracks the activities of the leading market players operating in the global Hardware Encryption market. In addition, the report provides an extensive analysis of the product portfolio and marketing strategies adopted by each market players in the Hardware Encryption market.

Key findings included in the report:

Customize This Report @ https://www.tmrresearch.com/sample/sample?flag=CR&rep_id=647&source=atm

Go here to see the original:
Hardware Encryption Market Set To Register A CAGR Growth Of XX% Over The Forecast Period 2017 2025 - Fusion Science Academy

Instagram starts DMs on the web, going against Facebook end-to-end encryption policy – News Landed

Facebook-owned Instagram just began rolling out a test of its Direct Messages on the web version of the popular social media app. The feature will allow users to access their DMs and message their friends using their computers, which contradicts Facebook announcement for end-to-end encryption in all its messaging services. E2E encryption secures your messages so that government agencies (and even Facebook/Instagram) cant see what you send.

The feature is being tested only with a small percentage of users for now. Instagram says that you can create a new group, start a new chat, continue existing chats, like messages, and even share photos from the desktop through the web version of Instagram DMs. You can even receive notifications for messages that you receive in DMs through your browser.

- Advertisement -

Facebook announced that the company was going to integrate end-to-end encryption in all its messaging services, which include WhatsApp, Instagram, Messenger, etc. However, Instagrams latest move to publicly test DMs on the web app contradicts Facebooks goal.

Alex Stamos, former Facebook Chief Security Officer, tweeted that end-to-end has never been securely built on a web-based messenger. He even said that he was expecting Facebook to drop web support for Messenger in favor of end-to-end encryption.

He also further says that there hasnt been a secure way to store cryptographic secrets in JavaScript until now, though it is an active area of development.

- Advertisement -

Facebook even announced its ambition to eventually combine all its messaging services into a single app, allowing cross-platform communication between WhatsApp, Instagram, and Facebook. Instagrams web DMs ambitions make it unclear how everything will fit in.

However, as someone who spends hours working on a computer, using Instagram DMs without having to pick up your phone would be amazing. Though I am a fan of end-to-end encryption, lets be real: DMs on your laptop are amazing. Though there are third-party apps that allow this functionality, it is not wise to trust your accounts with anything other than the original Instagram app.

What do you think about the whole situation? Would you prefer DMs on your laptop or end-to-end encryption? Let us know in the comments!

- Advertisement -

Source: TechCrunch

Read our summaryof the most popular stories of previous weeks, in on our newsletter,What Just Happened!

Apply to write for usif you love writing and want to see your articles featured onApple News, Google News, and more.Subscribe to our newsletter,What Just Happened, where we dive deep into the hottest topics from the week!

+ Tinder, Grindr, and other dating apps share your personal data with advertisers, study shows

+ Xenobots: The worlds computer-designed living, self-healing robots created from stem cells

+ Tesla official Cybertruck merch is expensive and made specifically for Tesla fans

+New Discovery: The oldest material on Earth is older than the solar system

Read more:
Instagram starts DMs on the web, going against Facebook end-to-end encryption policy - News Landed

Laminar Growth to be Witnessed by Mobile Encryption Market – Technology Magazine

The research report on Mobile Encryption market now available with Market Study Report, LLC, offers a detailed analysis of the factors influencing the global business sphere. This report also provides precise information pertaining to market size, commercialization aspects and revenue estimation of this business. The report further elucidates the status of leading industry players thriving in the competitive spectrum of the Mobile Encryption market.

As per the Mobile Encryption market report, the industry is likely to amass significant returns while recording a lucrative annual growth rate during the estimated time period. The report also presents details regarding the complete valuation that market retains, as well as analysis of the Mobile Encryption market, and the growth opportunities in the business vertical.

Request a sample Report of Mobile Encryption Market at:https://www.marketstudyreport.com/request-a-sample/1630215?utm_source=technologymagazine&utm_medium=Kunal

What ideas and concepts are covered in the report?

Region-based analysis of the Mobile Encryption market:

An analysis of the market division:

. The market share of each product along with the project valuation is presented in the report.

. The market share of each product application as well as anticipated revenue that each application holds is described in the report.

Impeding factors and challenges:

Marketing strategies indulged:

Ask for Discount on Mobile Encryption Market Report at:https://www.marketstudyreport.com/check-for-discount/1630215?utm_source=technologymagazine&utm_medium=Kunal

Analysis of the competitors in the industry:

The Mobile Encryption market report consists of information such as evaluation of the competitive landscape, research related to the concentration ratio along with market concentration rate over the forecasted time period.

For More Details On this Report:https://www.marketstudyreport.com/reports/global-mobile-encryption-market-growth-status-and-outlook-2019-2024

Some of the Major Highlights of TOC covers:

Mobile Encryption Regional Market Analysis

Mobile Encryption Segment Market Analysis (by Type)

Mobile Encryption Segment Market Analysis (by Application)

Mobile Encryption Major Manufacturers Analysis

Related Reports:

1. Global Microscope Imaging Analysis Software Market Growth (Status and Outlook) 2019-2024This report categorizes the Microscope Imaging Analysis Software market data by manufacturers, region, type and application, also analyzes the market status, market share, growth rate, future trends, market drivers, opportunities and challenges, risks and entry barriers, sales channels, distributors Analysis.Read More: https://www.marketstudyreport.com/reports/global-microscope-imaging-analysis-software-market-growth-status-and-outlook-2019-2024

2. Global Threat Intelligence Security Market Growth (Status and Outlook) 2019-2024Threat Intelligence Security Market Report covers the makers information, including shipment, value, income, net benefit, talk with record, business appropriation and so forth., this information enables the buyer to think about the contenders better. This report additionally covers every one of the districts and nations of the world, which demonstrates a provincial advancement status, including market size, volume and esteem, and also value information. It additionally covers diverse enterprises customers data, which is critical for the producers.Read More: https://www.marketstudyreport.com/reports/global-threat-intelligence-security-market-growth-status-and-outlook-2019-2024

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

See the original post:
Laminar Growth to be Witnessed by Mobile Encryption Market - Technology Magazine

Latest Study explores the Homomorphic Encryption Market Witness Highest Growth in near future – Technology Magazine

The Homomorphic Encryption market research report now available with Market Study Report, LLC, is a compilation of pivotal insights pertaining to market size, competitive spectrum, geographical outlook, contender share, and consumption trends of this industry. The report also highlights the key drivers and challenges influencing the revenue graph of this vertical along with strategies adopted by distinguished players to enhance their footprints in the Homomorphic Encryption market.

According to the report, the Homomorphic Encryption market is a collection of details that provides an in-depth evaluation of the industry vertical. The valuation of the Homomorphic Encryption market is from a dual viewpoint considering production and consumption.

Request a sample Report of Homomorphic Encryption Market at:https://www.marketstudyreport.com/request-a-sample/2432440?utm_source=technologymagazine&utm_medium=Kunal

Considering the production clause, the report provides data about the product renumeration, gross margins of the firms manufacturing the product, and manufacturing of the product. With regards to consumption, the report speaks about the product consumption value and product consumption volume in tandem with the status of import and export of the products.

An overview of the regional landscape:

Regional segmentation: North America, Europe, Asia Pacific, Middle East & Africa, Latin America.

Pivotal point in this section:

This report provides an understanding of the regional segment of this industry.

Crucial points encompassed in the report:

Brief of the product spectrum:

Product segmentation:

Pivotal point in this section:

The study offers particulars about the product reach.

An overview of the report:

Important aspects from the application terrain:

Application segmentation:

Pivotal point in this section:

Details about the classification of the application spectrum is mentioned in the report.

Ask for Discount on Homomorphic Encryption Market Report at:https://www.marketstudyreport.com/check-for-discount/2432440?utm_source=technologymagazine&utm_medium=Kunal

A succinct overview of the application-based segment of the Homomorphic Encryption market:

A concise overview of competitive reach:

Competitive segmentation:

Pivotal point in this section:

The study presents specifics about the competitive spectrum of the Homomorphic Encryption market.

Glimpse into some concepts and ideas offered by the report:

The study offers data associated to the growth margins of the firms in tandem with the manufacturing expenses, product costs, and renumeration. A significant amount of data is provided which speaks about the level to which the industry has been evaluated. Data pertaining the possibility of new investment projects that are undertaken, as well as the research conclusions, are presented in the report.

For More Details On this Report: https://www.marketstudyreport.com/reports/global-homomorphic-encryption-market-professional-survey-2019-by-manufacturers-regions-types-and-applications-forecast-to-2024

Some of the Major Highlights of TOC covers:

Development Trend of Analysis of Homomorphic Encryption Market

Marketing Channel

Market Dynamics

Methodology/Research Approach

Related Reports:

1. Global Lipid Testing Market Professional Survey 2019 by Manufacturers, Regions, Types and Applications, Forecast to 2024Lipid Testing market research report provides the newest industry data and industry future trends, allowing you to identify the products and end users driving Revenue growth and profitability. The industry report lists the leading competitors and provides the insights strategic industry Analysis of the key factors influencing the market.Read More: https://www.marketstudyreport.com/reports/global-lipid-testing-market-professional-survey-2019-by-manufacturers-regions-types-and-applications-forecast-to-2024

2. Global Orthopedic Products Market Professional Survey 2019 by Manufacturers, Regions, Types and Applications, Forecast to 2024Orthopedic Products Market report begins from overview of Industry Chain structure, and describes industry environment, then analyses market size and forecast of Orthopedic Products by product, region and application, in addition, this report introduces market competition situation among the vendors and company profile, besides, market price analysis and value chain features are covered in this report.Read More: https://www.marketstudyreport.com/reports/global-orthopedic-products-market-professional-survey-2019-by-manufacturers-regions-types-and-applications-forecast-to-2024

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

Read the rest here:
Latest Study explores the Homomorphic Encryption Market Witness Highest Growth in near future - Technology Magazine

Instagram messages on the web could pose an encryption challenge – The Verge

Its a relatively slow week on the platforms-and-democracy beat, so lets talk about something small but fascinating in its own way: the arrival of Instagram messages on the web.

An unfortunate thing about being a xennial who grew up using (and loving) the world wide web is that most developers no longer build for it. Over the past 15 years, mobile phones became more popular than desktop computers ever were, and the result is that web development has entered a slow but seemingly inexorable decline. At the same time, like most journalists, I spent all day working on that same web. And with each passing year, the place where I do most of my work seems a little less vital.

This all feels particularly true when it comes to communications tools. Once, every messaging kingdom was united with a common API, allowing us to gather our conversations into a single place. (Shout out to Adium.) But today, our messages are often scattered across a dozen or more corporate inboxes, and accessing them typically requires picking up your phone and navigating to a separate app.

As a result, I spend a lot of time typing on a glass screen, where I am slow and typo-prone, rather than on a physical keyboard, where Im lightning-quick. And each time I pick up my phone to respond to a message on WhatsApp, or Snapchat, or Signal, I inevitably find a notification for some other app, and the next thing I know 20 minutes have passed.

All of which is to say, I was extremely excited today to see Instagrams announcement that it had begun rolling out direct messages on the web. (The company gave me access to the feature, and its glorious.) Heres Ashley Carman at The Verge:

Starting today, a small percentage of the platforms global users will be able to access their DMs from Instagrams website, which should be useful for businesses, influencers, and anyone else who sends lots of DMs, while also helping to round out the apps experience across devices. Todays rollout is only a test, the company says, and more details on a potential wide-scale rollout will come in the future.

The direct messaging experience will be essentially the same through the browser as it is on mobile. You can create new groups or start a chat with someone either from the DM screen or a profile page; you can also double-tap to like a message, share photos from the desktop, and see the total number of unread messages you have. Youll be able to receive desktop DM notifications if you enable notifications for the entire Instagram site in your browser.

Instagram didnt state a strategic rationale for the move, but it makes sense in a world that is already moving toward small groups and private communication. Messengers win in part by being ubiquitous, and even if deskbound users like myself are in the minority, Facebook can only grab market share from rivals if its everywhere those rivals can be found. (iMessage and Signal, for example, have long been usable on desktop as well as mobile devices.)

Now, thanks to this move, I can make greater use of Instagram as both a social and reporting tool, and the web itself feels just a bit more vital. All of which is good news but, asks former Facebook security chief Alex Stamos, is it secure? After all, Facebook is in the midst of a significant shift toward private, end-to-end encrypted messaging, with plans to create a single, encrypted backend for all of its messaging apps.

Stamos went on to highlight two core challenges in making web-based communications secure. One is securely storing cryptographic information in JavaScript, the lingua franca of the web. (This problem is being actively worked on, Stamos notes.) The second is that the nature of the web would allow a company to create a custom backdoor targeting an individual user if compelled by a government, say. For that, there are few obvious workarounds.

One alternative is to take the approach that Signal and Facebook-owned WhatsApp have, and create native or web-based apps. As security researcher Saleem Rashid told me, the web version of WhatsApp generates a public key in the browser using JavaScript, then encodes it in a QR code that a users scans with their phone. This creates an encrypted tunnel between the web and the smartphone, and so long as the JavaScript involved in generating the key is not malicious, WhatsApp should not be able to encrypt any of the messages.

When I asked Instagram about how it plans to square the circle between desktop messages and encryption, the company declined to comment. Im told that it still plans to build encryption into its products, and is still working through exactly how to accomplish this.

Granted, when I think of the tasks that I hope Facebook accomplishes this year, encrypted Instagram DMs are low on the list. But with our authoritarian president browbeating Apple today for failing to unlock a suspected criminals phone, the stakes for all this are relatively clear. We will either have good encrypted messaging backed by US corporations, or we wont. As Apple put it this week:

We have always maintained there is no such thing as a backdoor just for the good guys, the company explained. Backdoors can also be exploited by those who threaten our national security and the data security of our customers. ... We feel strongly encryption is vital to protecting our country and our users data.

On one level, todays Instagram news is a small story about a niche feature. But in the background, questions about the security of our private communications are swirling. Which should give us all reason to watch Facebooks next moves here very closely.

Today in news that could affect public perception of the big tech platforms.

Trending down: Facebook said it doesnt need to change its web-tracking services to comply with Californias new consumer-privacy law. The companys rationale is that routine data transfers about consumers dont fit the laws definition of selling data. The move puts it at odds with Google, which is taking the opposite tack.

Trending down: Grindr, OkCupid and Tinder are sharing sensitive user data like dating choices and precise location to advertisers in ways that may violate privacy laws, according to a new report. I dont want to downplay that, but if you think that data is sensitive, you should see the average Grindr users DMs.

Two days before the UK election in December, some 74,000 political advertisements vanished from Facebooks Ad Library, a website that serves as an archive of political and issue ads run on the platform. The company said a bug wiped 40 percent of all political Facebook ads in the UK from the public record. Rory Smith at BuzzFeed has the story:

In the wake of the failure during the UK elections, Facebook said it had launched a review of how to prevent these issues, as well as how to communicate them more clearly.

But the events of Dec. 10 are not the first time Facebooks Ad Library has failed since its launch in May 2018. The API, which is supposed to give researchers greater access to data than the library website, went live in March 2019 and ran into trouble within weeks of the European Parliament election in May. Researchers have been documenting a myriad of issues ever since.

The platform also drew the ire of researchers when it failed to deliver the data it promised as part of a partnership with the nonprofit Social Science Research Council and Social Science One, a for-profit initiative run by researchers a project that was funded by several large US foundations. Facebook said it remains committed to providing data to researchers, but the SSRC and funders have begun withdrawing from the project due to the companys delays.

Russian military hackers may have been boring into the Ukrainian gas company at the center of the impeachment inquiry, where Hunter Biden served on the board. Experts say the timing and scale of the attacks suggest that the Russians could be searching for potentially embarrassing material on the Bidens, similar to what Trump was looking for. On Twitter, security experts like Facebooks Nathaniel Gleicher have urged caution when writing about this story, arguing that the case for attribution to Russia is thin. (Nicole Perlroth and Matthew Rosenberg / The New York Times)

Theres been an explosion of online disinformation, including the use of doctored images, from politicians. They do it for a simple reason: Its effective at spreading their messages, and so far none have paid a price for trafficking in bogus memes. (Drew Harwell / The Washington Post)

Artificial personas, in the form of AI-driven text generation and social-media chatbots, could drown out actual human discussions on the internet, experts warn. They say the issue could manifest itself in particularly frightening ways during an election. (Bruce Schneier / The Atlantic)

The Treasury Department unveiled new rules designed to increase scrutiny of foreign investors whose potential stakes in US companies could pose a national security threat. The rules are focused on businesses that handle personal data, and come after the United States has heightened scrutiny of foreign involvement in apps such as Grindr and TikTok. (Katy Stech Ferek / The Wall Street Journal)

The Harvard Law Review just floated the idea of adding 127 more states to the union. These states would add enough votes in Congress to rewrite the Constitution by passing amendments aimed at making every vote count equally. Worth a read.(Ian Millhiser / Vox)

The New York Times editorial board interviewed Bernie Sanders on how he plans carry out his ambitious policy ideas if faced with the Republican-led Senate that stymied so many of President Barack Obamas proposals. Notably, he says hes not an Amazon Prime customer and tries never to use any apps.

Workers for grocery delivery platform Instacart are organizing a national boycott of the company next week to push for the reinstatement of a 10 percent default tip on all orders. One of 2020s big stories is going to be tech-focused labor movements; this is but the latest example. (Kim Lyons / The Verge)

Microsoft CEO Satya Nadella strongly criticized a new citizenship law that the Indian government passed last month. The law, known as the Citizenship Amendment Act, fast-tracks Indian citizenship for immigrants from most major South Asian religions except Islam. India is Nadellas birthplace, and one of Microsofts largest markets, making his comments all the more notable. (Pranav Dixit / BuzzFeed)

Facebooks push into virtual reality has resulted in a slew of new patents, mostly for heads-up displays. The company won 64 percent more patents in 2019 than in 2018. Christopher Yasiejko and Sarah Frier at Bloomberg explain what this might mean:

The breadth of Facebooks patent growth, said Larry Cady, a senior analyst with IFI, resembled that of intellectual-property heavyweights Amazon.com Inc. and Apple Inc., which were No. 9 and No. 7, respectively, with each winning more than twice as many patents as the social media titan. Facebooks largest numbers were in categories typical of Internet-based computer companies -- data processing and digital transmission, for example -- but its areas of greatest growth were in more novel categories that may suggest where the company sees its future.

Facebooks 169 patents in the Optical Elements category marked a nearly six-fold jump. Most of that growth stems from the Heads-Up Displays sub-category, which Cady said probably is related to virtual-reality headsets. Facebook owns the VR company Oculus and in November acquired the Prague-based gaming studio behind the popular Beat Saber game. One such patent, granted Nov. 5, is titled Compact head-mounted display for artificial reality.

Popular e-boys on TikTok are nabbing fashion and entertainment deals. Theyre known mostly for making irony-steeped videos of themselves in their bedrooms wearing tragically hip outfits composed of thrifted clothes. Some observers predict that top e-boys will have success reminiscent of the boy bands of yore. (Rebecca Jennings / Vox)

YouTube signed three video stars Lannan LazarBeam Eacott, Elliott Muselk Watkins and Rachell Valkyrae Hofstetter to combat Amazons Twitch and Facebook. Exclusive deals for top video game streamers have been one of the big tech stories of the year so far. (Salvador Rodriguez / CNBC)

Uncanny Valley, Anna Wieners beautiful memoir about life working at San Francisco tech companies, is out today. Kaitlyn Tiffany has a great interview with Wiener in the Atlantic. Read this book and stay tuned for news about an Interface Live event with Wiener in San Francisco next month!

Mark Bergen, friend of The Interface and a journalist at Bloomberg, is writing a book about YouTube titled Like, Comment, Subscribe. Bergen is a former Recode colleague and ace YouTube reporter, and this book will be a must-read in our world. (Kia Kokalitcheva / Axios)

The Information published a Twitter org chart that identifies the companys 66 top executives, including the nine people who report directly to CEO Jack Dorsey. (Alex Heath / The Information)

A new app called Doublicat allows users to put any face on a GIFs in seconds, essentially allowing them to create deepfakes. The app launches just as prominent tech companies like Facebook and Reddit ban deepfakes almost completely. (Matthew Wille / Input)

Wired got Jack Dorsey to do 11 minutes of Twitter tech support on video. Enjoy!

Send us tips, comments, questions, and web-based DMs: casey@theverge.com and zoe@theverge.com.

Read the original:
Instagram messages on the web could pose an encryption challenge - The Verge

The US government should stop demanding tech companies compromise on encryption – TechCrunch

In a tweet late Tuesday, President Trumpcriticized Apple for refusing to unlock phones used by killers, drug dealers and other violent criminal elements. Trump was specifically referring to a locked iPhone that belonged to a Saudi airman who killed three U.S sailors in an attack on a Florida base in December.

Its only the latest example of the government trying to gain access to a terror suspects device it claims it cant access because of the encryption that scrambles the devices data without the owners passcode.

The government spent the past week bartering for Apples help. Apple said it had given to investigators gigabytes of information, including iCloud backups, account information and transactional data for multiple accounts. In every instance it received a legal demand, Apple said it responded with all of the information it had. But U.S. Attorney General William BarraccusedApple of not giving investigators any substantive assistance in unlocking the phone.

Read this article:
The US government should stop demanding tech companies compromise on encryption - TechCrunch

Breaking the encryption impasse | TheHill – The Hill

The debate about encryption is stuck in a long battle between one camp arguing that access to encrypted data is essential for law enforcement and another camp arguing that encryption is necessary to protect against cyber espionage and to enable individuals to safeguard their information. The debate also does not seem to move forward. Just like in the 2016 San Bernardino case, the Justice Department is pressing Apple to provide the data from the two iPhones belonging to the Saudi lieutenant who acted as the gunman during the shooting at the Pensacola naval base last month.

The debate has received attention over the plans by Facebook to expand encryption of user messages, a policy that the FBI director referred to as a dream come true for child pornographers. But the new Pensacola case again raises the issues from the San Bernardino mass shooting. The law enforcement argument is best understood through the positions of the Justice Department and the FBI, which have been fighting a losing battle against the use of end to end encryption, security that ensures only the sender and receiver can read the message. The Justice Department and the FBI want such encryption banned, replaced by exceptional access systems allowing law enforcement with a warrant to read the messages.

On the other side of the argument in the encryption debate are primarily civil libertarians and cybersecurity experts. The problem they see is that exceptional access would decrease broader cybersecurity. Computer security experts argue that if you make it easy for law enforcement to get around encryption, this makes it easy for the bad guys, such as malicious hackers, foreign nations, criminals, and spies, to also do the same thing.

While we have started on different sides of the argument, we have both long recognized the need to find a critical path forward. Earlier this year, we convened a working group of former law enforcement and national security officials, civil society organizations, business representatives, and academics to work together on finding practical and useful solutions that acknowledge the importance of the two dimensions of national security.

What we found, through months of meeting with experts on both sides of the argument, is that we have been thinking about the debate the wrong way. We started our initial working group meeting by throwing out two strawmen. First, we should stop seeking approaches to enable access to encrypted information. Second, law enforcement officials will not be able to protect the public unless they can obtain access to all encrypted data. Once we changed the nature of the debate, we found a lot of agreement.

We agreed that proposals should address a legitimate and demonstrated law enforcement problem, that solutions should not make disparities in law enforcement worse, and that it should not be possible to repurpose exceptional access solutions into mass surveillance tools. We agreed that these tools should not appreciably decrease public cybersecurity, and that use of the capability should be documented and reported in a way that enables public oversight. By far the most promising path for the current debate was focusing on law enforcement access to data at rest.

By putting aside the more controversial debate about data in motion, or information being passed between two devices on an encrypted platform, and focusing on a conversation about data at rest, or information stored on a particular device, allowed us to find a more pragmatic way to address the concerns of both privacy advocates and law enforcement. This was an important starting point, and while we did not conclude with an agreed upon proposal, we were able to make progress. Embracing this approach could help move this entrenched debate in a more constructive direction.

One thing we did manage to all agree on is that no single approach will solve every problem when it comes to the encryption debate. It is now well past time to rethink the belief that solutions are impossible and that encryption means law enforcement officials cannot do their jobs. So by breaking the debate down into its component parts and looking at points of agreement, there is a path toward a more fruitful and more civil debate.

Denis McDonough is a visiting senior fellow at the Carnegie Endowment for International Peace and a former White House chief of staff. Susan Landau is the Bridge Professor in Cyber Security and Policy with Tufts University.

Originally posted here:
Breaking the encryption impasse | TheHill - The Hill

Encryption Battle Reignited As US Govt At Loggerheads With Apple – International Business Times

Apple and the US government are at loggerheads for the second time in four years over unlocking iPhones connected to a mass shooting, reviving debate over law enforcement access to encrypted devices.

Attorney General Bill Barr said Monday that Apple failed to provide "substantive assistance" in unlocking two iPhones in the investigation into the December shooting deaths of three US sailors at a Florida naval station, which he called an "act of terrorism."

Apple disputed Barr's claim, while arguing against the idea of "backdoors" for law enforcement to access its encrypted smartphones.

"We reject the characterization that Apple has not provided substantive assistance in the Pensacola investigation," the company said in a statement.

The US attorney general claimed Apple has failed to provide enough help to unlock iPhones used in a deadly December shooting spree, reviving a debate on law enforcement access to encrypted devices Photo: GETTY IMAGES / JUSTIN SULLIVAN

"Our responses to their many requests since the attack have been timely, thorough and are ongoing."

Late on Tuesday, President Donald Trump weighed in on Twitter, saying the government was helping Apple on trade issues "yet they refuse to unlock phones used by killers, drug dealers and other violent criminal elements."

"They will have to step up to the plate and help our great Country, NOW!" he added.

The standoff highlighted the debate between law enforcement and the tech sector about encryption -- a key way to protect the privacy of digital communications, but which can also make investigations difficult, even with a court order.

The latest battle is similar to the dispute between Apple and the US Justice Department after the December 2015 mass shooting in San Bernardino, California, when the iPhone maker rejected a request to develop software to break into the shooter's iPhone.

Attorney General Bill Barr has called on both Facebook and Apple to provide better access to law enforcement seeking access to encrypted devices and content Photo: GETTY IMAGES / BILL PUGLIANO

That fight ended in 2016 when the government paid an outside party a reported $1 million for a tool that circumvented Apple's iPhone encryption.

Barr last year called on Facebook to allow authorities to circumvent encryption to fight extremism, child pornography and other crimes. The social network has said it would move ahead with strong encryption for its messaging applications.

Digital rights activists argue that any privileged access for law enforcement would weaken security and make it easier for hackers and authoritarian governments to intercept messages.

Apple has been implementing stronger encryption on its iPhones, making it harder for law enforcement to access the devices Photo: AFP / Philip FONG

"We have always maintained there is no such thing as a backdoor just for the good guys," Apple's statement said.

"Backdoors can also be exploited by those who threaten our national security and the data security of our customers."

Apple and others argue that digital "breadcrumbs" make it increasingly easy to track people, even without breaking into personal devices.

The government's latest demand "is dangerous and unconstitutional, and would weaken the security of millions of iPhones," Jennifer Granick of the American Civil Liberties Union said in a statement.

"Strong encryption enables religious minorities facing genocide, like the Uighurs in China, and journalists investigating powerful drug cartels in Mexico, to communicate safely."

Granick added that Apple cannot allow the FBI access to encrypted communications "without also providing it to authoritarian foreign governments and weakening our defenses against criminals and hackers."

Kurt Opsahl of the Electronic Frontier Foundation echoed that sentiment, saying Apple "is right to provide strong security" for its devices.

"The AG (attorney general) requesting Apple re-engineer its phones to break that security is a poor security trade-off, and imperils millions of innocent people around the globe," Opsahl tweeted.

James Lewis of the Center for Strategic and International Studies, a Washington think tank, said he believes it's possible to allow law enforcement access without sacrificing encryption.

"You're not weakening encryption, you're making it so it's not end-to-end," Lewis told AFP.

"It means that there's a third party who can look at it under appropriate authority."

But Lewis said he does not expect either side to come out a winner in the battle, and that US officials will likely find another outside party to crack the two iPhones belonging to the shooter, Royal Saudi Air Force 2nd Lieutenant Mohammed Saeed Alshamran, who died in the attack.

"It's a repeat of the movie we saw in San Bernardino," he said.

"It's going to be harder because Apple probably fixed the trick that worked in San Bernardino."

More:
Encryption Battle Reignited As US Govt At Loggerheads With Apple - International Business Times