DNS-over-HTTPS is coming to Windows 10 – Naked Security

For fans of DNS-over-HTTPS (DoH) privacy, it must feel like a dam of resistance is starting to break.

Mozilla Firefox and Cloudflare were the earliest adopters of this controversial new way to make DNS queries private by encrypting them, followed not long after by the weight of Google, which embedded DoH into Chrome as a non-default setting.

This week an even bigger name joined the party Windows 10 which Microsoft has announced will integrate the ability to use DoH, and eventually also its close cousin DNS-over-TLS (DoT), into its networking client.

It looks like game over for the opponents of DoH, predominantly ISPs which have expressed a nest of worries some rather self-serving (we cant monetise DNS traffic we cant see) and others which perhaps deserve a hearing (how do we filter out bad domains?).

Things got so hyperbolic that last summer the UK ISP Association (ISPA) even shortlisted Mozilla for an Internet Villain award to punish its enthusiasm for DoH before backing down after a public backlash.

Earlier this month, Mozilla retaliated, accusing ISPs of misrepresenting the technical arguments around encrypted DNS.

Weve already covered how DoH and DoT work in previous articles, but the gist is they encrypt the queries a computer makes to DNS servers in a way that means intermediaries such as ISP and governments cant easily see which websites are being visited.

Another way to think of it is that DoH extends the benefits of HTTPS security to DNS traffic. While not perfectly private (data still leaks via things like Server Name Indication), its better than sending DNS queries in the clear.

In fact, DoT has some advantages over DoH, but requires ports to be opened in routers/firewalls. DoH is indistinguishable from regular web browsing traffic whereas DoT runs in its own lane, making it easier to block or filter, and requires users to configure more settings to make it work.

Because DoH piggybacks HTTPS, it just works out of the box as long as the client software supports it, that is. Thats why Windows 10 integration, whenever that appears, is important.

Given that DoH support is already turned on in Firefox (which uses Cloudflare resolution) and Googles Chrome (which uses its own DNS), what does Windows 10 integration add?

The answer is that it might help re-decentralise the provision of encrypted DNS.

Today, the unencrypted DNS system is highly decentralised, which is good for stability (no single point of failure), and some aspects of security (DNS filtering is used to block malevolent sites). Anyone who doubts the importance of avoiding single points of failure might consider the Dyn DDoS attack of 2016, which caused major internet outages caused by targeting only one provider.

Even users who switch from their ISPs DNS resolution to public alternatives such as Googles 8.8.8.8/8.8.4.4 for performance reasons now have plenty of choice.

But if DoH or DoT ends up being turned on by default in browsers, DNS resolution could quickly shrink to a small number of providers, which might in time end up being bad for privacy.

According to Microsoft, the integration of encrypted DNS inside Windows is a way to resist this and hang on to the benefits of decentralisation:

There is an assumption by many that DNS encryption requires DNS centralization. This is only true if encrypted DNS adoption isnt universal. To keep the DNS decentralized, it will be important for client operating systems (such as Windows) and internet service providers alike to widely adopt encrypted DNS.

However, having decided to embrace encrypted DNS, Microsoft admits there are still technical issues to iron out.

For example, Windows wont override the defaults set by the user or admin while still being guided by some privacy ground rules:

Given that encrypted DNS has emerged from the IETF, ISPs must already know they are fighting a losing battle.

Although unfolding gradually, the shift to a more private online world appears to be underway whether its opponents like it or not. The battle now is to be on the inside of this change or risk being locked out forever.

Follow this link:
DNS-over-HTTPS is coming to Windows 10 - Naked Security

Massive Growth in Network Encryption Market by Component, Transmission Type, Data Rate, Organization Size, Vertical, and Region Global Forecast and…

The main engines in the market place more emphasis on increasing optical transmission, increasing demand for different controls and protecting security against network security fraud.

In the online services market by gender-switching, optical distribution will grow at the highest CAGR during that period.

Information transfer is a way to facilitate the transfer of data from one place to another. Transport allows your company to interact with other computers, laptops, mobile phones, other devices, and people on your network. Two types of transport are used: optical and conventional transport networks. Traditional transport is done via coaxial cable, double cable and radio/microwave. Fiber optics offer many advantages, such as high bandwidth and noise, interference reduction and excellent data protection during transmission. Therefore, due to the increasing demand for high-speed data transmission, while enhancing security, we expect fiber transmission.

Request the Sample Report Here: https://www.marketresearchinc.com/request-sample.php?id=23853

Key Market Segments:

Key Market Players:

Cisco (US), Juniper Networks (US), Gemalto (Netherlands), Nokia (Finland), Thales eSecurity (US), Atos (France), Ciena (US), Rohde & Schwarz Cybersecurity (Germany), ADVA (Germany), Colt Technology Services (UK), Huawei (China), Aruba (US), F5 Networks (US), Stormshield (France), ECI Telecom (Israel), Senetas (Australia), Viasat (US), Raytheon (US), Quantum (US), TCC (US) , ARRIS (Georgia), atmedia (Germany), Securosys (Switzerland), PacketLight Networks (Israel), and Certes Networks (US).

Based on regions:

North America

Europe

APAC

Latin America

MEA

Speak to our analyst for a discussion on the above findings, and ask for a discount on the report: https://www.marketresearchinc.com/ask-for-discount.php?id=23853

The telecom and IT sector will maintain the largest market size during this period

ICT relationships include solutions, IT service providers, consulting firms, Internet service providers (ISPs) and telecommunications companies. With the development of modern technology and the increasing use of the Internet and mobile devices carrying their products (BYOD) within the organization, there is a growing demand for temporary data protection and meeting industry standards. Telecom companies and IT service providers are removing network service solutions for negative feedback. Cyber fraud is also one of the biggest challenges facing cybercriminals, network operators, service providers and users around the world. The Company maintains a data protection program for its employees and customers. Major vendors of enterprise-class software solutions, platforms, and services for IT and IT service providers are Cisco, Juniper, and Huawei.

Large business distribution retains a larger market size during that period

Large companies are the main drivers of network extraction because they need to pull a lot of data from different applications, including marketing, marketing, human resources and activities that are implemented within the organization. Large companies around the world are at the forefront of implementing network encryption solutions because there is a lot of content generated by applications every second. Implementing a network services solution can help large companies prevent unauthorized access to sensitive data. Many capital expenditures (CAPEX) were created to improve the IT infrastructure that companies bring to develop and manage their business. In addition, financial institutions are investing in security solutions because unauthorized use of business data can damage the brand image and lead to weight loss.

The largest market in North America for the forecast period

Key sectors such as CIT, BFSI, Media and Entertainment, and Government are focused on focusing network mining on the track. As an advanced technology zone, North America has the largest market size in the network encryption market in this region. This region includes developed countries, the United States and Canada. The North American market provides an excellent platform for startups and small businesses in terms of regulations and contracts. As a result, companies are growing rapidly and the demand for network encryption is increasing. Therefore, North America has the largest market size in the network encryption market. North American companies continue to follow popular business strategies to expand their network of telecom companies. The region has extensive experience in information technology and a major IT infrastructure. As a result, the company has improved operating costs (CapEx) and operating costs (OpEx).

Report Customization and Benefits: This report can be customized to meet the desired requirements. Please connect with our analyst, who will ensure that you get a report that suits your needs.

Table of Content:

Chapter 1 Global Network Encryption Market Overview

Chapter 2 Global Economic Impact on Network Encryption Industry

Chapter 3 Global Network Encryption Market Competition by Manufacturers

Chapter 4 Global Network Encryption Production, Revenue (Value) by Region (2012-2018)

Chapter 5 Global Network Encryption Supply (Production), Consumption, Export, Import by Regions (2012-2018)

Chapter 6 Global Network Encryption Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Network Encryption Market Analysis by Application

Chapter 8 Network Encryption Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Network Encryption Market Forecast (2018-2023)

Chapter 13 Appendix

About Us:

Market Research Inc is farsighted in its view and covers the massive ground in global research. Local or global, we keep a close check on both markets. Trends and concurrent assessments sometimes overlap and influence the other. When we say market intelligence, we mean a deep and well-informed insight into your products, market, marketing, competitors, and customers. Market research companies are leading the way in nurturing global thought leadership. We help your product/service become the best they can with our informed approach.

Contact Us:

Author Kevin

US Address: 51 Yerba Buena Lane, Ground Suite,

Inner Sunset San Francisco, CA 94103, USA

Call Us: +1 (628) 225 1818

Email: sales@marketresearchinc.com

See the original post:
Massive Growth in Network Encryption Market by Component, Transmission Type, Data Rate, Organization Size, Vertical, and Region Global Forecast and...

Homomorphic Encryption Market Outlook, Size, Status, and Forecast to 2024- Microsoft (US), IBM Corporation (US), Galois Inc (US), CryptoExperts…

Global Homomorphic Encryption Market Growth (Status and Outlook) 2019-2024

This report studies the Homomorphic Encryption market with many aspects of the industry like the market size, market status, market trends and forecast, the report also provides brief information of the competitors and the specific growth opportunities with key market drivers. Find the complete Homomorphic Encryption market analysis segmented by companies, region, type and applications in the report.

This report studies the Homomorphic Encryption market, Homomorphic encryption is a form of encryption that allows computation on ciphertexts, generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. The purpose of homomorphic encryption is to allow computation on encrypted data.

CLICK HERE TO REQUEST A SAMPLE OF THIS REPORT

The Homomorphic Encryption is mainly classified into the following types: Partially Homomorphism, Somewhat Homomorphism and Fully Homomorphism. And Fully Homomorphism is the most widely used type which took up about 50.18% of the total in 2016 in USA

Homomorphic Encryption is mainly used in Industrial, Government, Financial & Insurance, Health Care and Others. And Government is the most widely used area which took up about 30.98% of the USA total in 2016.

After surveying all the points of new projects, the report will evaluate based on all research and a conclusion offered. The Market report, which consists of a precise framework, such as SWOT inspections, which shows a complete assessed of the remarkable specialists on the market for Homomorphic Encryption. The report also includes detailed underlying data of vendor developments, tactical decision-making, and market observations.

The key players covered in this study: Microsoft (U.S.), IBM Corporation (U.S.), Galois Inc (U.S.), CryptoExperts (France)

This report focuses on the global Homomorphic Encryption status, future forecast, growth opportunity, key market and key players. The study objectives are to present the Homomorphic Encryption development in United States, Europe, China, Japan, Southeast Asia, India, Central & South America.

Segmentation by product type: breakdown data from 2014 to 2019 in Section 2.3; and forecast to 2024 in section 10.7.

Segmentation by application: breakdown data from 2014 to 2019, in Section 2.4; and forecast to 2024 in section 10.8.

In addition, this report discusses the key drivers influencing market growth, opportunities, the challenges and the risks faced by key players and the market as a whole. It also analyzes key emerging trends and their impact on present and future development.

Key Questions Answered

What is the size and CAGR of the global Homomorphic Encryption market?

What are the key driving factors of the most profitable regional market?

Which are the leading segments of the global Homomorphic Encryption market?

How will the global Homomorphic Encryption market advance in the coming years?

What are the main strategies adopted in the global Homomorphic Encryption market?

What is the nature of competition in the global Homomorphic Encryption market?

What growth impetus or acceleration market carries during the forecast period?

Which region may hit the highest market share in the coming era?

What trends, challenges, and barriers will impact the development and sizing of the Global Homomorphic Encryption Market?

INQUIRE MORE ABOUT THIS REPORT

Reasons for Buying this Report

Table of Contents:

2019-2024 Global Homomorphic Encryption Market Report (Status and Outlook)

Chapter One: Scope of the Report

Chapter Two: Executive Summary

Chapter Three: Global Homomorphic Encryption by Players

Chapter Four: Homomorphic Encryption by Regions

Chapter Five: Americas

Chapter Six: APAC

Chapter Seven: Europe

Chapter Eight: Middle East & Africa

Chapter Nine: Market Drivers, Challenges and Trends

Chapter Ten: Marketing, Distributors and Customer

Chapter Eleven: Global Homomorphic Encryption Market Forecast

Chapter Twelve: Key Players Analysis

Research Findings and Conclusion

About Us:

Market research is the new buzzword in the market, which helps in understanding the market potential of any product in the market. Reports And Markets is not just another company in this domain but is a part of a veteran group called Algoro Research Consultants Pvt. Ltd. It offers premium progressive statistical surveying, market research reports, analysis & forecast data for a wide range of sectors both for the government and private agencies all across the world.

Contact Us:

Sanjay Jain

Manager Partner Relations & International Marketing

http://www.reportsandmarkets.com

[emailprotected]

Ph: +1-352-353-0818 (US)

More here:
Homomorphic Encryption Market Outlook, Size, Status, and Forecast to 2024- Microsoft (US), IBM Corporation (US), Galois Inc (US), CryptoExperts...

Import EFS File Encryption Certificate and Key (PFX file) in Windows 10 – TWCN Tech News

When you EFS encrypt your files/folders, its recommended you create a backup of your file encryption certificate and key to a PFX file, to avoid permanently losing access to your encrypted files and folders if the original certificate and key are lost or corrupted. In this post, we will show you how to import the PFX file for your EFS file encryption certificate and key in Windows 10.

If you lose access to your encrypted files and folders, you will not be able to open them again unless you are able to restore your file encryption certificate and key used with EFS. So it is imperative that you save it. You can import the PFX file to restore your EFS File Encryption Certificate and Key in either of two ways, via-

Double-click or right-click the backed up PFX file and click Install PFX.

Ensure the Current User radio button is selected. Click Next.

Click Next.

Type in the password for the PFX file private key, check Mark this key as exportable, checkInclude all extended properties, and Next.

Select the radio button for Automatically select the certificate store based on the type of certificate, and click Next.

Click Finish.

Click OK on the Certificate Import Wizard prompt.

You have now successfully imported your EFS File Encryption Certificate and Key.

Press the Windows key + R. In the Run dialog box, type certmgr.msc, hit Enter to open Certificates Manager.

In the left pane of certmgr window, right-click the Personal store, click All Tasks, and click Import.

Click Next.

Click on the Browsebutton, selectPersonal Information Exchange from the file type drop-down, navigate to the location you saved the PFX file, select the PFX file, click on Open, and click Next.

Type in the password for the PFX file private key, check Mark this key as exportable, checkInclude all extended properties, and click Next.

Select the radio button for Automatically select the certificate store based on the type of certificate, and click Next.

Click Finish.

Click OK on the Certificate Import Wizard prompt.

You have now successfully imported your EFS File Encryption Certificate and Key.

You will need to refresh (F5) certmgr to see your imported EFS file encryption certificate and key now restored in Certificatesin thePersonal store, as shown above.

Hope you find this post on how to import EFS File Encryption Certificate and Key useful.

See the original post:
Import EFS File Encryption Certificate and Key (PFX file) in Windows 10 - TWCN Tech News

What Is End-to-End Encryption? Another Bulls-Eye on Big Tech – The New York Times

SAN FRANCISCO A Justice Department official hinted on Monday that a yearslong fight over encrypted communications could become part of a sweeping investigation of big tech companies.

While a department spokesman declined to discuss specifics, a speech Monday by the deputy attorney general, Jeffrey A. Rosen, pointed toward heightened interest in technology called end-to-end encryption, which makes it nearly impossible for law enforcement and spy agencies to get access to peoples digital communications.

Law enforcement and technologists have been arguing over encryption controls for more than two decades. On one side are privacy advocates and tech bosses like Apples chief executive, Timothy D. Cook, who believe people should be able to have online communications free of snooping. On the other side are law enforcement and some lawmakers, who believe tough encryption makes it impossible to track child predators, terrorists and other criminals.

Attorney General William P. Barr, joined by his British and Australian counterparts, recently pressed Facebooks chief executive, Mark Zuckerberg, to abandon plans to embed end-to-end encryption in services like Messenger and Instagram. WhatsApp, which is owned by Facebook, already provides that tougher encryption.

Companies should not deliberately design their systems to preclude any form of access to content even for preventing or investigating the most serious crimes, Mr. Barr wrote in a letter last month.

Here is an explanation of the technology and the stakes.

End-to-end encryption scrambles messages in such a way that they can be deciphered only by the sender and the intended recipient. As the label implies, end-to-end encryption takes place on either end of a communication. A message is encrypted on a senders device, sent to the recipients device in an unreadable format, then decoded for the recipient.

There are several ways to do this, but the most popular works like this: A program on your device mathematically generates two cryptographic keys a public key and a private key.

The public key can be shared with anyone who wants to encrypt a message to you. The private key, or secret key, decrypts messages sent to you and never leaves your device. Think of it as a locked mailbox. Anyone with a public key can put something in your box and lock it, but only you have the private key to unlock it.

A more common form of encryption, known as transport layer encryption, relies on a third party, like a tech company, to encrypt messages as they move across the web.

With this type of encryption, law enforcement and intelligence agencies can get access to encrypted messages by presenting technology companies with a warrant or national security letter. The sender and recipient would not have to know about it.

End-to-end encryption ensures that no one can eavesdrop on the contents of a message while it is in transit. It forces spies or snoops to go directly to the sender or recipient to read the content of the encrypted message. Or they must hack directly into the senders or recipients device, something that can be harder to do at scale and makes mass surveillance much more difficult.

Privacy activists, libertarians, security experts and human rights activists argue that end-to-end encryption steers governments away from mass surveillance and toward a more targeted, constitutional form of intelligence gathering. But intelligence and law enforcement agencies argue that end-to-end encryption makes it much harder to track terrorists, pedophiles and human traffickers.

When Mr. Zuckerberg announced in March that Facebook would move all three of its messaging services to end-to-end encryption, he acknowledged the risk it presented for truly terrible things like child exploitation.

Encryption is a powerful tool for privacy, but that includes the privacy of people doing bad things, he said.

The debate over end-to-end encryption has had several iterations, beginning in the 1990s with the spread of Pretty Good Privacy, or PGP, software, an end-to-end encryption scheme designed by a programmer named Phil Zimmermann. As a result, the Clinton administration proposed a Clipper Chip, a back door for law enforcement and security agencies.

But the Clipper Chip provoked a backlash from a coalition of unlikely bedfellows, including the American Civil Liberties Union; the televangelist Pat Robertson; and Senators John Kerry, the Massachusetts Democrat, and John Ashcroft, the Missouri Republican. The White House backed down in 1996.

End-to-end encryption gained more traction in 2013, after data leaked by the former National Security Agency contractor Edward J. Snowden appeared to show the extent to which the N.S.A. and other intelligence and law enforcement agencies were gaining access to users communications through companies like Yahoo, Microsoft, Google and Facebook without their knowledge.

Encrypted messaging apps like Signal and Wicker gained in popularity, and tech giants like Apple and Facebook started wrapping user data in end-to-end encryption.

Google, which pledged to add an end-to-end encryption option for Gmail users several years ago, has not made this the default option for email. But the company does offer a video-calling app, Duo, that is end-to-end encrypted.

As more communications moved to these end-to-end encrypted services, law enforcement and intelligence services around the world started to complain about datas going dark.

Government agencies have tried to force technology companies to roll back end-to-end encryption, or build back doors, like the Clipper Chip of the 1990s, into their encrypted products to facilitate government surveillance.

In the most aggressive of these efforts, the F.B.I. tried in 2016 to compel Apple in federal court to unlock the iPhone of one of the attackers in the 2015 mass shooting in San Bernardino, Calif.

Mr. Cook of Apple called the F.B.I.s effort the software equivalent of cancer. He said complying with the request would open the door to more invasive government interception down the road.

Maybe its an operating system for surveillance, maybe the ability for the law enforcement to turn on the camera, Mr. Cook told ABC News. I dont know where it stops.

Privacy activists and security experts noted that any back door created for United States law enforcement agencies would inevitably become a target for foreign adversaries, cybercriminals and terrorists.

Alex Stamos, the chief security officer of Yahoo at the time, likened the creation of an encryption back door to drilling a hole in the windshield. By trying to provide an entry point for one government, you end up cracking the structural integrity of the entire encryption shield.

The F.B.I. eventually backed down. Instead of forcing Apple to create a back door, the agency said it had paid an outside party to hack into the phone of the San Bernardino gunman.

Governments have stepped up their calls for an encryption back door.

Last year, Australian lawmakers passed a bill requiring technology companies to provide law enforcement and security agencies with access to encrypted communications. The bill gave the government the ability to get a court order allowing it to secretly order technology companies and technologists to re-engineer software and hardware so that it can be used to spy on users.

Australias law is based on Britains 2016 Investigatory Powers Act, which compels British companies to hand over the keys to unscramble encrypted data to law enforcement agencies. The Australian law could apply to overseas companies like Facebook and Apple.

Australias new law applies to network administrators, developers and other tech employees, forcing them to comply with secret government demands without notifying their employers.

Other governments are also considering new encryption laws. In India, Facebooks biggest market, officials told the countrys Supreme Court in October that Indian law requires Facebook to decrypt messages and supply them to law enforcement upon request.

They cant come into the country and say, We will establish a non-decryptable system, Indias attorney general, K.K. Venugopal, told the court, referring to Facebook and other big tech platforms. Indias Supreme Court has said it will reconvene on the issue in January.

See the original post here:
What Is End-to-End Encryption? Another Bulls-Eye on Big Tech - The New York Times

Race is on to build quantum-proof encryption – Financial Times

When Google said it had achieved quantum supremacy by eclipsing the performance of classical supercomputers, experts reacted with both excitement and concern about how next-generation computing could affect everything from medicine to financial portfolio optimisation.

In October, the tech group said its Sycamore quantum processor had, in 200 seconds, performed a task that would take the worlds best supercomputer 10,000 years to complete, although the magnitude of this claim is disputed by the likes of IBM.

Quantum computers which exploit the quirky behaviour of subatomic particles that can be in two states simultaneously may prove a useful technology for tasks requiring optimisation and comparison; that is, to find the best route or choice by examining all the options. This could range from finding the most cost-effective route for shipping goods to the most efficient way to extract natural resources.

Experts say quantum computing has the potential to transform materials science and drug development by comprehensively modelling molecules, while its ability to model interconnected dependencies could optimise financial portfolios.

However, cyber security experts and intelligence agencies worry that data security encryption systems will be blown away by the quantum tornado.

Encryption underpins everything from instant messaging services such as WhatsApp to online banking, ecommerce and secure web browsing. It uses algorithms to scramble data from the sender and gives the receiver a decryption key. These algorithms are based on mathematical functions that are easy to compute in one direction but hard to invert. Computing the product of two numbers is easy but factoring large prime numbers is difficult.

Even if the first quantum computer does not come for 20 years we are, in a sense, already late

Even with the biggest computers, factoring is hard once you are looking at numbers into, say, three or four hundred digits, says Christophe Petit, senior lecturer at Birmingham universitys School of Computer Science. There just isnt a method to efficiently solve that problem and encryption relies on that hardness.

With the extra power provided by quantum computers, problems such as factoring are easily scalable. The day a big quantum computer is built, all the cryptography we are using today is dead, warns Mr Petit.

It is uncertain when the first true quantum computer will arrive. There is also a long journey between building a computer with quantum-like properties compared with a full-scale, commercial version, partly because of the ultra-low temperature conditions required by quantum computers. However, there are fears that a malicious state could get far enough to wreak havoc.

Cracking encryption could enable a rogue actor to spy on communications and data including classified intelligence flowing between military agencies or gain backdoor access to critical infrastructures and facilities. Financial data also relies heavily on quantum-vulnerable encryption.

To crack encryption, all you need is one working quantum computer under laboratory conditions, says Andersen Cheng, chief executive of Post-Quantum, a cyber security company. Mr Cheng likens it to building an engine and gearbox compared with manufacturing an entire car. A lot of nation states are building quantum computers and they just need a working engine to start cracking encryption, he says.

In the public discourse, people are saying it will be 10 to 20 years until we have the first full commercially available quantum computer, says Mr Cheng. In the cyber security domain, they say it will be more like five to 10 years, but the intelligence community [has] become worried...over the past two years. They believe a working quantum computer will arrive much earlier than we think.

Wednesday, 20 November, 2019

Agencies including the National Security Agency and National Institute of Standards and Technology in the US, and Government Communications Headquarters in the UK, are working on post-quantum cyber security.

To build quantum-resistant encryption, cyber teams seek out categories of problems for which simultaneous processing power confers no advantage. These should be problems that are already understood but take substantial time to solve.

Lattice-based cryptography is a leading approach explored by the likes of IBM. It uses high-dimension geometric structures to hide information in ways considered impossible to solve without the key, even for quantum computers. An alternative technique, borrowed from the satellite industry, deliberately introduces random errors into the encryption process to make the output look different every time, even if the same input is being encrypted, according to Mr Cheng.

While a small network of cyber researchers has been exploring post-quantum security protocols for decades, experts say we need to raise the pace. We want to be ready not just when quantum computers come out but 20 years earlier, says Mr Petit. We should be rolling out encryption in evoting systems, medical data, and aircraft, for instance that will be secure for decades. Even if the first quantum computer does not come for 20 years we are, in a sense, already late.

Originally posted here:
Race is on to build quantum-proof encryption - Financial Times

FBI worried about criminals having unfettered access to encryption technology – KTVI Fox 2 St. Louis

EL PASO, Texas El Pasos new FBI chief is worried about an old problem: advances in encryption technology that may allow criminals to plot or commit crimes with impunity.

Something that concerns not just the FBI but all law enforcement is what we call lawful access. Technology companies are deploying encryption software in which the customer can encrypt and only (they) and the end-user can access, said Luis M. Quesada, special agent in charge of the El Paso Field Office as of this month.

Encryption is useful when it comes to protecting private information like banking, he said, but unrestricted use of this technology could pose a threat to the public. It means we couldnt follow kidnappings, child pornography, terrorist acts the lone terrorist shooters which usually communicate through (digital) platforms, he said.

One example cited is the Sutherland Springs, Texas, shooting, in which a gunman killed 26 people and left 20 others injured at First Baptist Church. The shooters phone was encrypted and police didnt at the time have the technology to find out if he had co-conspirators.

We want to know if the shooter was communicating with somebody else, if he was being radicalized. It could lead us to somebody else to prevent the next event. Or if we arrest a child pornographer wed like to know who hes communicating with so we have a map of who hes (talking to) and save more kids, Quesada said. He suggested the problem could be addressed through legislation of these technologies.

Quesadas comments on Tuesday echoed concerns expressed in July by Attorney General William P. Barr and, more recently, the International Criminal Police Organization (INTERPOL). Some of it centers around Facebooks plan to provide state-of-the-art encryption on messages in all of its platforms, but concerns other companies applications as well.

At the July technology conference at Fordham University, Barr noted that one Mexican drug cartel was using WhatsApp as its privacy communication method to keep U.S. authorities from finding out when the next fentanyl shipment would be sent across the border.

Efforts to curb unfettered access by the general public to encrypted technology go back to the Obama administration and further. Back in 2015, then-FBI Director James B. Comey warned the Senate Judiciary Committee that malicious actors could take advantage of Web technology to plot violent crimes, steal private information or sexually abuse children. Back then the catchphrase wasnt lawful access, but instead going dark.

Former El Paso Border Patrol Sector Chief Victor M. Manjarrez said law-enforcement officials have been fighting criminals use of technology since the days of two-way handheld radios.

We came across encrypted radios used by drug traffickers in Southern Arizona in the early 2000s. You could hear them talking but couldnt (make out) the words, he said.

Manjarrez, now associate director of the Center for Law & Human Behavior at the University of Texas at El Paso, said even if Congress were actually cooperative with each other and restricted encrypted technology, organized criminals will eventually find a way to defeat it.

The problem is that technology changes so fast that transnational criminal organizations can overcome obstacles much quicker than we can change or legislate policy, he said.

Manjarrez said the only way law-enforcement agencies can prevent crimes shielded by technology is to be proactive.

Law-enforcement by nature is reactive. At some point we need to decide we have to be proactive. Just like the Department of Defense in terms of counterterrorism, they seek out the threats. At some point, I think, well have to accept that in law enforcement, he said.

Visit the BorderReport.com homepage for the latest exclusive stories and breaking news about issues along the United States-Mexico border.

View original post here:
FBI worried about criminals having unfettered access to encryption technology - KTVI Fox 2 St. Louis

DOJ Hints At Probe of Big Tech on Encryption – Crime Report

By Crime and Justice News | 9 hours ago

A Justice Department official hinted that a yearslong fight over encrypted communications could become part of a sweeping investigation of big tech companies, reports the New York Times. A speech Monday by Deputy Attorney General Jeffrey Rosen pointed toward heightened interest in end-to-end encryption, which makes it nearly impossible for law enforcement and spy agencies to get access to peoples digital communications. Law enforcement and technologists have been arguing over encryption for more than two decades. Privacy advocates and tech bosses like Apple chief executive Timothy Cook believe people should be able to have online communications free of snooping. Law enforcement and some lawmakers believe tough encryption makes it impossible to track child predators, terrorists and other criminals.

Attorney General William Barr, joined by his British and Australian counterparts, have pressed Facebook chief executive Mark Zuckerberg to abandon plans to embed end-to-end encryption in services like Messenger and Instagram. Companies should not deliberately design their systems to preclude any form of access to content even for preventing or investigating the most serious crimes, Barr said. End-to-end encryption scrambles messages so they can be deciphered only by the sender and the intended recipient. Last year, Australia enacted a law requiring technology companies to provide law enforcement and security agencies with access to encrypted communications. The measure allowed the government to get a court order allowing it to secretly order technology companies to re-engineer software and hardware so that it can be used to spy on users.

Read more:
DOJ Hints At Probe of Big Tech on Encryption - Crime Report

El Paso FBI says they need more access to encrypted messages – KTSM 9 News

EL PASO, Texas (KTSM) When it comes to our phones and computers we all want to have privacy. However, the El Paso FBI says that privacy can become harmful when used by criminals.

Nowadays, a large majority of people have apps on their phones with end to end encryption. Making messages unavailable to third parties.

Warrant proof encryption has become more available to the general public. It prevents law enforcement from accessing messages even after they have a warrant to search a phone.

If we dont have access to encrypted communications then we are blind to that, and that could give a whole platform to individuals that get socialized with each other or radicalized or influenced themselves, said Luis Quesada the El Paso FBI Special Agent in Charge.

It has been two years since the Sutherland Springs church shooting and the FBI says they have yet to access the shooters phone due to the advanced encryption on the device.

The FBI cannot comment about the El Paso Walmart shooters phone since it is still under investigation. However, they say encryption gives radicalized individuals a means of protected communication.

They write manifestos, they put them out. If we dont have access to that, thats a threat to all of us as a society, said Quesada.

According to the FBI advance encryptions are used by drug cartels, human traffickers, child pornographers and radical individuals.

The problem is with this type of encryption these companies are deploying, we cant get into them, said Quesada. We saw from the Sutherland shooting so you could imagine any other crime from child pornographers and human trafficking they depend on communication.

However, Facebook has been testing end to end encryption to provide more privacy to users on messenger and Instagram direct messages.

This raises the concerns of government officials and law enforcement agencies. The U.S. Attorney General William Barr has been working to have Facebook allow law enforcement to have a back door to read those encrypted messages.

There has to be a balance for the safety and security of the general population, said Quesada.

Go here to read the rest:
El Paso FBI says they need more access to encrypted messages - KTSM 9 News

FBI Recruits Interpol to Condemn End-to-End Encryption – WebProNews

Attorney General William Barr and his Australian and British counterparts made headlines recently when they wrote an open letter urging Facebook to create backdoors in its encryption. Not content with open letters, the FBI has drafted a resolution for Interpol to release urging companies to create methods that would allow access to encrypted data.

Sources told Reuters the resolution would be released without a formal vote by representatives of the roughly 60 countries in attendance. A draft of the resolution seen by Reuters uses the threat of child exploitation as the reason behind the need for weakened encryption.

Service providers, application developers and device manufacturers are developing and deploying products and services with encryption which effectively conceals sexual exploitation of children occurring on their platforms.

Tech companies should include mechanisms in the design of their encrypted products and services whereby governments, acting with appropriate legal authority, can obtain access to data in a readable and useable format.

According to Nicole Perloth at the New York Times, however Interpol is denying the resolution was ever considered:

There is no doubt the resolution was drafted, with both Reuters and Ars Technica having seen a copy of it. The only question is whether Reuters sources about Interpols intentions were incorrect, or whether Interpol is attempting to backpedal after the news broke.

Either way, its another disturbing escalation of attempts to weaken end-to-end encryption. The draft resolution itself is misleading in nature. Ars reports the resolution claims technologists agree that creating systems that [allow] for lawful access to data, while maintaining customer privacycan be implemented in a way that would enhance privacy while maintaining strong cyber security.

In point of fact, nothing could be further from the truth. As previously highlighted, mathematicians, cryptologist and privacy experts all agree there is no silver bullet. It is simple maththere is no way for encryption to be strong and protect its users, while simultaneously having backdoors or other means for companies or governments to access the encrypted data.

If Interpol could be persuaded to condemn strong encryption, it would make it easier for countries around the world to pass laws requiring companies to create backdoors. Such a result would be disastrous for journalists, whistleblowers, political dissidents, refugees and anyone else who values their privacy.

Read more here:
FBI Recruits Interpol to Condemn End-to-End Encryption - WebProNews