Metas Biggest Encrypted Messaging Mistake Was Its Promise – WIRED

Since the 1990s, governments around the world have often used the welfare of children as an excuse for all kinds of internet policy overreach: encryption backdoors, centralized censorship mechanisms, and anti-anonymity measures. So when Meta, facing pressure from the government as well as NGOs, announced its decision last week to delay the rollout of end-to-end encryption for messaging systems such as Instagram DMs and Messengerwith child safety as the cited reasonprivacy advocates were understandably upset and suspicious. But speaking as someone who previously worked on safety and security at Facebook, I dont view the delay as an arbitrary political decision. The concern over the safety of young users is genuine, and the problems are pervasive, especially when it comes to social systems as complex as those at Meta.

Frustrating as it may be, the companys delay is likely justified. Some form of end-to-end encryption should be available to all people, to preserve the right to private communication and prevent government incursions. But end-to-end encryption isn't just one issue or technologyits a broad set of policy decisions and use cases with high-stakes consequences. As such, creating the proper environment for its use is a complex task. The need for end-to-end encryption, as well as the conditions required to implement it safely, vary for each platform, and apps like Facebook and Instagram still require serious changes before it can be introduced without compromising functionality or introducing safety risks. Metas greatest misstep isnt this latest delay but rather the timeline, and perhaps even the outcome it promised.

When then-Facebook first announced its timeline to implement interoperable end-to-end encryption across all its properties in 2019, its immediate infeasibility was clear. The proposed timeline was so rapid that even producing the technology itself would be nigh impossible, with safety mechanisms barely entering the picture. Systems like WhatsApp already had end-to-end encryption and content-oblivious mechanisms for detecting some kinds of harm, and it was assumed this would readily translate to other Facebook properties.

However, apps and sites like Facebook and Instagram are wildly different in architecture and dynamics than WhatsApp. Both implement direct messaging alongside systems that attempt to actively connect you with people, derived from a combination of reading users' phone books, algorithmically determining similar accounts based on locations, interests, and friends, as well as general online activity. In the case of Facebook, large public or private groups also facilitate expansion of one's social graph, along with global search of all accounts and grouping by institutions such as schools. While apps like WhatsApp and Signal operate more like private direct messaging between known contacts, Facebook and Instagrams growth-oriented design leads to situations where abusers can more easily find new victims, identities and relationships are accidentally exposed, and large numbers of strangers are mixed together.

These fundamental differences mean that before Meta can safely switch all of its platforms to end-to-end encryption, its apps must undergo some nontrivial changes. First off, the company must improve its existing content-oblivious harm-reduction mechanisms. This involves using social graphs to detect users who are trying to rapidly expand their networks or to target people of certain demographics (for example, people of a particular declared or inferred age), and finding other potentially problematic patterns in metadata. These mechanisms can work hand in hand with user reporting options and proactive messaging, such that users are presented with safety messaging that informs them of their options for reporting abuse, along with efficient reporting flows to allow them to escalate to the operator of the platform. While these types of features are beneficial with or without end-to-end encryption, they become significantly more important when the ability to inspect content is removed.

Original post:
Metas Biggest Encrypted Messaging Mistake Was Its Promise - WIRED

Global Hardware Encryption Market Trends and Opportunities to 2030 | Western Digital, Samsung Electronics, and Micron Technology among others – Taiwan…

The global hardware encryption market size was US$131.3 billion in 2019. The global hardware encryption market size is forecast to reach the value of US$2,277 billion by 2030 by registering a compound annual growth rate (CAGR) of 31.1% during the forecast period from 2021-2030.

Request for A Sample Report: https://reportocean.com/industry-verticals/sample-request?report_id=Pol63

COVID-19 Impact Analysis

The COVID-19 epidemic had a nominal effect on the global hardware encryption market. During the pandemic, encryption became a crucial tool in tracking crises. Moreover, the organization began adopting various methods to protect the data. Apart from that, government bodies adopted hardware encryption to control the situation securely. As a result, it propelled the growth of the global hardware encryption market.

Factors Influencing

Geographic Analysis

Asia-Pacific is forecast to dominate the market during the forecast period from 2021-2030. It is due to the growing urbanization, rise in household income, and rapidly growing population in emerging countries, such as China and India. Moreover, the availability of electronic and semiconductor manufacturing companies would significantly contribute to the market growth during the analysis period.

North America and Europe may register strong growth rates because of the rising era of cloud-based services and innovations in the Internet of Things (IoT) based technologies. Moreover, these regions are home to many established hardware encryptions manufacturing firms. Therefore, the market would witness various growth opportunities in these regions.

Competitors in the Market

Market Segmentation

Insight by Architecture Type

Insight by Product Type

Insight by Algorithm & Standard

Insight by Application

Insight by End-User

Insight by Region

Download Free Sample Copy of Hardware Encryption Market@ https://reportocean.com/industry-verticals/sample-request?report_id=Pol63

About Report Ocean:

We are the best market research reports provider in the industry. Report Ocean believe in providing the quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.

Get in Touch with Us:

Report Ocean

Name: Nishi Sharma

Email: sales@reportocean.com

Address: 500 N Michigan Ave, Suite 600, Chicago, IIIinois 60611 UNITED STATES

Tel: +1 888 212 3539 (US TOLL FREE)

Website: https://www.reportocean.com/

Read more here:
Global Hardware Encryption Market Trends and Opportunities to 2030 | Western Digital, Samsung Electronics, and Micron Technology among others - Taiwan...

How the 5G industrial IoT will change different verticals – IT Brief New Zealand

The industrial Internet of Things, protecting systems during the holiday season, and using encryption to help address cloud misconfiguration, are amongst the most recent insights from global technology firm Thales.

Industrial IoT

The industrial Internet of Things is coming and many believe it will be the catalyst for unprecedented productivity levels.

However, according to Thales Group, it cannot happen without fast and reliable connectivity extending to even the remotest locations.

"5G provides it. And it is already here," the company says.

5G networks are now rolling out across the world. According to the GSA, there were 180 commercial services in 72 countries in September 2021. Meanwhile, 465 operators in 139 markets are planning live deployments.

"So, the conditions are in place for the Industrial IoT to flourish," Thales says. "Indeed, the first pioneering services have been built."

How to protect your systems from unauthorised access this holiday Season

Many retailers and shipping services are planning to hire temporary workers for the upcoming holiday season. Retailers, shipping and logistics companies, and other organisations can take multiple steps to mitigate the risks posed by seasonal workers by ensuring they have the right access security in place.

How encryption can help address Cloud misconfiguration

Cloud service providers (CSPs) try to make it simple and easy for their users to comply with data privacy regulations and mandates. Still, as all of those who work in technology know, you reduce access to granular controls when you simplify a process. On the flip side, if you allow access to granular controls, the person setting the controls needs to be an expert to set them correctly. And, even experts make mistakes.

New partnership between Thales and VNPT to accelerate digital transformation in Vietnam

Thales and the Vietnam Posts and Telecommunications Group have signed a Memorandum of Understanding (MoU) to explore technical collaborations in telecommunications satellites, Smart and Safe cities, Digital Identity and Biometrics, 5G & Internet of Things and cybersecurity.

The MoU was signed between both organisations on 3 November 2021 in Paris, in the presence of Jean Castex, Prime Minister of France, and Pham Minh Chinh, Prime Minister of the Socialist Republic of Vietnam. The joint collaboration on these topics aligns with Vietnam's national digital transformation goals, including establishing a strong digital economy and driving towards a Smart Nation.

Thales is a global technology company investing in digital and "deep tech" innovations, including Big Data, AI, connectivity, cybersecurity and quantum technology.

"Thales's core purpose is to build a future we can all trust. It's the exact transcription of the DNA that has shaped the Group ever since it was founded more than a century ago," the company says.

It has more than 80,000 employees across five continents, and its corporate purpose revolves around three components: autonomy, resilience and sustainability.

See the original post here:
How the 5G industrial IoT will change different verticals - IT Brief New Zealand

How to encrypt files in Windows – PCWorld

Most of us have some rather sensitive files on our PCs. Whether its our tax returns, financial records, password lists (seriously, just use a password manager already), or just files you dont want anyone to see under any circumstances, we all have our reasons for wanting a bit more security. This means that its time to get into encryption, which is where a drive, file, or folder is encoded (encrypted) so as to make it unreadable to anyone except the person with the right key to decrypt it. The upside is that anyone attempting to access it without the password will fail, and the downside is that if you lose the encryption key (usually a password), whatever you had encrypted will be gone forever, unless theres a way to recover it.

Luckily, in Windows you have options on how to do this for absolutely no cost whatsoever. Windows 10/11 Pro users have encryption tools built into the OS; while users of the Home variant must use a free third-party utility. Whether you want full-drive encryption, or just a secure space to keep your important records, one of these tools will fit the bill.

Windows 10 or 11 Pro offers two built-in encryption tools: There is this simple tool, which can be used to encrypt any filehowever, in our testing we had issues with it, so we recommend using the other option, Bitlocker. Bitlocker offers full-drive encryption only, however, but thankfully you can choose between encrypting the entire drive, or just the space thats being used. Encrypting an entire drive does incur a performance penalty, but if its your work laptop and everything you are working on is on your C:/ drive, its a good option to consider. Its also a good option for external drives, as most of us have lost a few of those over the course of our lives, and lord knows what we had on them when we did so. Setting up Bitlocker is relatively painless, so follow along.

If you just type the word Bitlocker in Windows search itll appear, or you can find it in the Control Panel listed as Bitlocker Management. When you open it, youll be presented with a list of your attached storage devices, both internal and external. Were going to install it on our external drive, F.

Josh Norem/IDG

After youve enabled Bitlocker on the drive of your choice, Microsoft will ask you how you want to unlock the drive, either via a password or with a Smart Card; we chose a password. If you choose a Smart Card youll need a USB drive, which will be paired with a PIN code to unlock the drive.

Josh Norem/IDG

Next, Microsoft will ask you how you want to restore the recovery key, which could save your behind if you ever forget your password, or lose your Smart Card. We chose to have the recovery key accessible via our Microsoft Account, as that seems to be the most secure method of storing it, and definitely smarter than printing it out!

Josh Norem/IDG

One of the last steps is deciding how much of the drive to encrypt: all of it, or just the used space. We chose just the used space simply because it should result in faster drive performance.

Josh Norem/IDG

Youll also have to choose which encryption mode you want: one that works with newer PCs, or one thats compatible with older versions of Windows. Since we only have Windows 10/11 PCs in our house, we chose the newer version.

Josh Norem/IDG

Were all set now, so go ahead and click Start Encrypting. On our 256GB test drive, the encryption process took just a few seconds. Once its complete, your data is now encrypted.

Josh Norem/IDG

Going forward, inserting the now-encrypted drive results in the error seen below, instead of just automatically opening like it does for external storage.

Josh Norem/IDG

Youll also get a pop-up from Windows asking you to type the encryption password, or the recovery key. Thankfully, Windows gives you the option of automatically unlocking on a certain PC, which is handy if youre using it a lot on a home PC as opposed to a laptop.

Josh Norem/IDG

If you have the Home version of Windows, you can still get in on the encryption game with Veracrypt, which is a free utility that can encrypt a folder, drive, or partition. This handy tool lets you mount an encrypted virtual disk in Windows, MacOS, and Linux. When you enter your password the disk is mounted and your files appear, but when you close the program, the disk unmounts and the files are no longer accessible. We didnt test the disk or partition encryption, so these instructions only apply to creating an encrypted folder. Lets jump in, shall we?

To get started, download the free utility and fire it up. To begin, youll need to create the encrypted volume, so click on Create Volume.

Josh Norem/IDG

On the next screen we chose Create an encrypted file container, as were just looking for a repository for our sensitive documents and media.

Josh Norem/IDG

Next we chose Standard Veracrypt volume as its fine for the vast majority of home users.

Josh Norem/IDG

Next you have to choose the location for this file, so consider the size of the folder you will create, and make sure your storage device has enough room to hold it. We made a folder on one of our hard drives labeled Veracrypt since were good at hiding things, and then typed the name of the file into the dialogue box that appeared, resulting in what you see in the screenshot. Also note you can create this volume on a removable drive too.

Josh Norem/IDG

Next you have a lot of encryption options, but just select AES and click through. AES-256 encryption is considered the strongest form of encryption and cannot be cracked with brute strength, so it should work for your purposes.

Josh Norem/IDG

Now decide how big you want your container to be. You cant go back and make it bigger later, so shoot for the moon, assuming you have enough room. We decided to make ours 1GB.

Josh Norem/IDG

With that information inputted, the program is ready to create the volume on your drive. Dont be afraid by all the hacker looking stuff on the screen, just click Format and youre off to the races.

Josh Norem/IDG

Once the process is completed, it will show you that the volume is ready.

Josh Norem/IDG

You can now navigate to where the container is just to verify its existence and see its file size, if that is important to you. Youll note that clicking on it does nothing, as you have to use the Veracrypt program to actually open it, so lets do that now.

Josh Norem/IDG

Now its time to access our encrypted volume. Open Veracrypt and choose Select File from the main menu, then navigate to the folder where its located. Youll also need to choose a volume letter from the list provided, so choose one that is not in use like X or M, something like that. Once youve chosen the volume letter, and navigated to the file, click Mount.

Josh Norem/IDG

After that completes youll see the same window with the path to your file in blue. Double-click that and the volume will open. You will also see the same volume appear in This PC as well, if you prefer that method.

Josh Norem/IDG

Et voilahere are our encrypted files! These are quite sensitive cat photos, obviously, but feel free to throw anything you want in there, knowing its about as secure as it can possibly be for now.

Josh Norem/IDG

One final note: As long as the volume is mounted, it is accessible. So that means if you open it up, put some files in it, then just walk away from your PC, anyone with physical access to it can also look at the files. To complete the process, you have to click Dismount on the main screen of Veracrypt to shut the door on your encrypted folder. Once youve dismounted the volume, it will no longer be accessible without the encryption password.

Josh Norem/IDG

If you want to encrypt your drive to prevent unauthorized access, its built right into Windows Pro versions, so it is worth it on something that might get smashed and grabbed from a car, such as a laptop. For your desktop PC that never moves, the benefits are debatable. We do like having an encrypted folder via Veracrypt, however, for all of our tax returns and similar documents. Just be absolutely sure you keep the password somewhere safe, since you will never get back into that secure disk if you lose it.

Continued here:
How to encrypt files in Windows - PCWorld

Will you be ready when quantum breaks encryption? Steps to take now to prepare – Lexology

While the potential opportunities quantum brings are impressive, the seismic risk it poses to current encryption methods cannot be ignored. Do you know the steps your organisation should be taking now to reduce your quantum cyber risk?

Last week Rob Sumroy, head of Slaughter and Mays Tech practice, spoke at ITech laws European conference on this very subject. He was joined by Dr Ali El Kaafarani (a visiting professor at Oxford University and founder of PQShield) and Professor Yasser Omar (Professor at IST University of Lisbon and President of the Portuguese Quantum Institute).

The problem quantum will break commonly used PKC

Put simply, we know that our data and systems need to be kept secure, and encryption methods like RSA (a type of public-key cryptography or PKC) help us do this. However, a cryptographically relevant quantum computer will, in the future, be able to solve the mathematical problems on which these encryption methods are based exponentially faster than a classical computer can. This means that an encryption algorithm that would have taken thousands of years to break (making it unbreakable in practice) could be cracked in a day or so by a quantum computer, creating both a current, and future, risk:

The solution

Thankfully, a number of solutions to the encryption problem exist, and there are steps organisations can take now to prepare.

The international community has been developing quantum-proof encryption based on both classical computing (quantum-safe cryptography) and quantum mechanics (quantum key distribution).

What can organisations do?

Organisations should consider the quantum risk now, and build transitioning to quantum-safe products and services into their future plans. Preparations include:

For more information on quantum, please see our quantum computing podcasts series, which includes a podcast on Cyber security in the era of quantum with Dr Ali El Kaafarani and Robert Hannigan (Chairman of BlueVoyant International and ex Director of Government Communications Headquarters (GCHQ)).

Read the rest here:
Will you be ready when quantum breaks encryption? Steps to take now to prepare - Lexology

How To Talk to Strangers Where No One Can See You – The Phoenix – Swarthmore College The Phoenix Online

Today, Im writing about something that was first used by the Ancient Mesopotamians. It used to be illegal to export under weapons trafficking treaties, and it is frequently bemoaned by law enforcement. Its also a critical component of almost every electronic device, and without it, the global economy would come to a screeching halt. Im talking, of course, about encryption algorithms.

Encryption is technically a subset of cryptography, which is the study of how to communicate securely in the presence of an adversary (who might try to eavesdrop, edit, or disrupt said communication). To encrypt something is to take some information, like my password is 1234, and combine it with a key (a chunk of hopefully random data) via some encryption algorithm such that it becomes unreadable gibberish. Said gibberish is only decipherable by providing an identical key, or a key thats mathematically related to the original key in a complicated way.

The kind of encryption youre most likely familiar with is symmetric encryption: encrypt a message with one key, and decrypt it with the same key. Symmetric encryption dates back to ancient times; Julius Caesar invented (or popularized) a cipher where the letters of the alphabet were simply shifted some number of places down (e.g. A becomes C, B becomes D, and so on). But cryptography didnt really take off until the early 20th century, with the advent of technologies like radio, which enabled longer-range communication at the cost of being trivially easy to eavesdrop on. World War II saw use of the Enigma Machine, a fascinatingly complicated electromechanical device that was only decoded by the Allies after a Herculean effort. These days, though, encryption generally refers to modern computerized algorithms like AES.

AES is short for Advanced Encryption Standard and has been the standardized encryption method for the U.S. governments classified information since 2002. Its also used for most web traffic, disk encryption on iOS and macOS, password managers, end-to-end encrypted chat applications, and a zillion other things. In fact, most modern processors have specific hardware components just to encrypt and decrypt AES data. But symmetric encryption still has a flaw: you need both parties to have the same key for them to talk to each other. How does that happen when theres no secure communication channel, like when accessing a website over the Internet? It would obviously be impractical for every computer to come pre-programmed with what would be millions or billions of different encryption keys for everything. So, we need a way for two parties, communicating solely over an insecure communication channel, to have a conversation thats impervious to eavesdropping. It sounds impossible, but as it turns out, its perfectly achievable with a bit of sorcery known broadly as asymmetric-key encryption.

Its not particularly an exaggeration to say that without asymmetric-key encryption, the Internet wouldnt exist anywhere near its current form. It would be impossible to transmit any sensitive information like credit cards, passwords, or private email, unless you obtained an encryption key offline (which kind of obviates the entire point). Its hard to speculate on exactly what an Internet in this world would look like, or whether it would exist at all, but I can safely say that it would be a lot worse than it is now.

So how does asymmetric-key encryption work? The first hint is in a more common name for it: public-key cryptography. Instead of one key that encrypts and decrypts (symmetric encryption), asymmetric encryption uses a pair of keys: a public key and a private key. If you encrypt a message with the public key, it can only be decrypted with the corresponding private key, and theres no way you can figure out the private key from just the public key. So, you can make the public key as public as you want: transmit it over a public WiFi network, give it to your friends, even post it on social media. Meanwhile, the private key is private only to you. If someone wants to send you a message, all they have to do is encrypt it with your freely available public key and transmit it to you through any channel, even an insecure one. You can think of public-key cryptography as like a safe with two separate keys one key can only lock, and the other one can only unlock. You can duplicate the locking key as much as you want, and anyone can use it to put stuff in the safe and then lock it. But to access whats inside after the safe has been locked, youd need your secret unlocking key.

But the lock analogy breaks down at a certain point, because theres no difference in principle between the public and private key. If I encrypt something with my private key, it can only be decrypted with the corresponding public key. This is useful for identity verification through something called a digital signature. If I take a message, encrypt it (or sign it) with my private key, and publish the encrypted and original messages together, then you can verify the encrypted message decrypts successfully to the original. If they match, then you know I am who I say I am. (This concept, by the way, is key to the security of blockchain-based cryptocurrency: transfers out of a specific account are only accepted by the rest of the network if they have a valid digital signature proving that whoever submitted the transfer possesses the private key for said account.)

The specific mathematical underpinning behind public-key cryptography is sort of complicated and varies based on the specific algorithm. For many algorithms, we rely on the fact that multiplying very large numbers together is relatively easy, while finding the factors of a very large number is very, very hard. (For performance reasons, some modern algorithms use things that are kind of similar to large numbers like elliptic curves, but we can safely ignore that.) Either way, though, the mathematical details of public-key cryptography are somewhat less interesting than the fact that it exists and you can do things with it.

Almost everything you do on the Internet nowadays relies on public-key cryptography. If youre reading this on a computer, the webpage was transmitted via the HTTPS protocol, which (to simplify things) means your computer transmitted an encrypted request using The Phoenix websites public key, which lets your computer talk to the server through a private channel. If youre reading this in the print edition, then public-key cryptography was still involved I send in these articles via email, which involves my computer making a secure connection to my mail server using its public key via the same method. (Technically, asymmetric encryption is generally used just to secretly transmit a key for symmetric encryption, since symmetric encryption is considerably faster.)

But why does any of this matter, aside from it being really cool and interesting? Well, Ive previously written about why HTTPS makes paying for a VPN somewhat unhelpful for a lot of people. Today, though, Im going to cover end-to-end encryption, which is a fascinating application of cryptography and an interesting thing to be aware of in your own life.

When you send an email, its (usually) encrypted in transit via the methods I talked about above: if someone is eavesdropping on your Internet traffic, they cant read your mail. But once it reaches your mail server, its decrypted and is readable by your mail provider (e.g. Gmail). Its important to note that readable doesnt mean someone at Google is regularly snooping through your mail to learn all your secrets, it just means that Googles systems can process the plain contents of messages. This can be for innocuous reasons: checking whether messages are spam, for instance, or automatically adding a booking to your calendar based on a confirmation email. But theres nothing technically stopping Google from scanning your email to target advertisements. (Google explicitly says that they dont do this. Sometimes it might seem like they do, but those are often cases where, e.g., you search for winter coats, spend an hour browsing winter-coat-related websites, and then see an ad for winter coats next to an email you sent to a friend asking about coat recommendations.)

But the fact that Google could read your email if they wanted to is more important in a different way: if Google can theoretically do it, then the government can too. If youre worried about government surveillance (from any government), then you dont care what a company says they will or wont look at, you want a cryptographic guarantee that they cant provide data to anyone even if they were made to by a court order, subpoena, or police raid. This is where end-to-end encryption comes in.

End-to-end encryption is when your data stays encrypted all the way from you to the person or people youre talking to. Most commonly, this is in the context of chat applications like WhatsApp or iMessage. To secure your messages, instead of the server publishing its public key, everyone on the service publishes a public key. The private keys never leave each persons device. If you want to send a message to your friend, you ask the server for your friends public key and use it to encrypt the message. The server here just passes encrypted messages back and forth, so all it can possibly know is when you send messages and who you send them to. (Through a little bit more cryptography, its actually also possible to also obscure the fact that youre sending the messages kind of like dropping a letter in a mailbox without writing a return address.) Actual end-to-end encryption as implemented also uses a bit more stuff on top of the public/private key business, via something called a double ratchet: the two parties constantly change their public and private keys via an agreed-upon method. This means that if a private key is compromised, an attacker can only view a few messages before the keys are regenerated.

Full end-to-end encryption (or at least, end-to-end encryption that didnt suck) was pioneered in 2013 by what would eventually become Signal. Signal was the first end-to-end encrypted messaging app that tried to be usable by non-computer-nerds while still being secure, and as a result has seen extensive use among whistleblowers, journalists, and any social movement you care to name. But whats had an even bigger impact is the Signal Protocol that the Signal app was built on. The protocol defines a standardized and secure method for sending text and other communication completely securely between two or more parties. In 2016, WhatsApp, the most popular messaging application in the world, switched over to the Signal Protocol for all of its messages and data. This means that every text sent on WhatsApp is unreadable to WhatsApp, its parent company Facebook, or anyone else, except the intended recipients. (Unlike Signal, however, WhatsApp does collect and use data about when and to whom messages were sent, and might use that information to target advertisements.)

So, if end-to-end encryption is so easy to use, why isnt it used for everything? Mostly because it turns out that not having a usable copy of your data stored on a companys servers is annoying from a usability standpoint for anything more complicated than simple text chat. You may have experienced this yourself if youve ever been added to a WhatsApp group chat in progress: since previous messages were only encrypted with the previous participants keys, you cant read them and miss any context that happened before you got there. End-to-end encryption also means that mirroring messages or conversations between multiple devices is difficult: since only your phone holds the keys to decrypt the messages, keeping chat records consistent between your laptop and phone requires awkward relay setups. Finally, its sort of pointless for public-facing things like social media where everyone is supposed to be able to read it anyway.Notice that in this article I havent really talked about any possibility of breaking a key. Thats because modern encryption algorithms are, for all intents and purposes, unbreakable: cracking a single 256-bit AES key with every computer on the planet would take about 14 thousand trillion trillion trillion trillion, or 14,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000, years.

Its impossible to even begin to give a perspective on how big that number is. If you try to express it in terms of multiples of the age of the universe, another mind-bogglingly big number, you get another number thats still too big to properly express. (About 900 thousand trillion trillion trillion times the age of the universe, if youre wondering.) But the fact that properly implemented AES encryption is effectively impossible to break via computational brute force doesnt mean that your secrets are necessarily safe from, say, regular brute force (as a classic xkcd comic illustrates). One of the fundamental lessons of encryption (and indeed of all computer security) is that the humans that use encryption algorithms are almost always more vulnerable to deception, persuasion, or blunt force trauma than the algorithms themselves. It doesnt matter how big your encryption key is if the password used to generate said key is just the word password.

View original post here:
How To Talk to Strangers Where No One Can See You - The Phoenix - Swarthmore College The Phoenix Online

How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud – BollyInside

This tutorial is about the How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud. We will try our best so that you understand this guide. I hope you like this blog How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud. If your answer is yes then please do share after reading this.

The WhatsApp messaging service adds end-to-end encryption to the backups of its users data stored in iCloud or Google Drive. WhatsApp introduced encryption to its messaging service in 2016, although there have been doubts recently about claims that it prevents surveillance. Now, the Facebook-owned service has announced that the users own backup of messages will be end-to-end encrypted if stored on Google Drive or Apples iCloud.

While the end-to-end encrypted messages you send and receive are stored on your device, many people also want a way to back up their chats in case they lose their phone, the company said in a post. blog. Starting today, we offer an optional additional layer of security to protect backups stored on Google Drive or iCloud with end-to-end encryption.

IPhone owners should note that an unencrypted version of their chat history is backed up to iCloud if they have iCloud backup enabled. To make sure this doesnt happen, you need to disable iCloud Backup and only allow WhatsApp to upload backups directly to iCloud Drive.

I hope you understand this article How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.

See more here:
How to Encrypt WhatsApp Chat Backups with End-to-End Encryption in iCloud - BollyInside

Vaultree’s Executive Team and Advisors Drive Innovation in the Cybersecurity Industry – Yahoo Finance

Encryption Startup Assembles Expert Security Advocates to Guide Company Growth

CORK, Ireland, Nov. 18, 2021 /PRNewswire/ -- Vaultree, provider of Encryption-as-a-Service, announced today that it has assembled a highly qualified roster of executives and advisors comprising some of the cybersecurity industry's most experienced luminaries. This team brings together engineering know-how and business-savvy entrepreneurship to steer Vaultree's direction and growth.

(PRNewsfoto/Vaultree)

The executive team is made up of five co-founders who bring a wealth of varied experience:

Dr. Kevin Curran is a professor of cybersecurity, executive co-director of the Legal Innovation Centre and group leader of the Cyber Security and Web Technologies Research Group at Ulster University. He sits on the Advisory Group of the UK Cyber Security Council and the Northern Ireland Civil Service Cyber Leadership Board (FBBA).

Maxim Dressler is a project and sales leader with international experience in the software and fintech industry in leading commercial and strategic roles. His drive to make his clients' lives easier has contributed to his track record of establishing new brands, opening markets and implementing processes.

Ryan Lasmaili is a commercial and strategic leader with international experience in leading complex projects across different verticals. With 12 years of startup experience, he is an expert in technical product development, market growth strategy and business operations. In the last five years, Ryan's core focus has been on complex cybersecurity and encryption development.

Shaun McBrearty is a software security engineer with over 10 years of experience in designing, implementing, testing and deploying cryptographic solutions. His expertise is developing solutions that overcome the shortcomings of traditional cryptographic algorithms.

Tilo Weigandt is a program manager, strategic tech marketer and business developer with a "nothing is impossible" attitude and more than a decade of experience in starting things from scratch, developing highly scalable tech products, business segments and brands in global markets. Data protection lies at the heart of everything he has been implementing.

These experts comprise Vaultree's Board of Advisors:

Story continues

John N. Stewart Former Cisco chief security & trust officer and "Startup Whisperer," using his 30 years of cybersecurity experience to provide guidance to startups.

Sarah Armstrong-Smith Microsoft's chief security advisor and a keynote speaker on cybersecurity and information protection.

Stav Pischits Co-founder at Cynance and Cyber Club London, and a director of ISACA.

Rik Ferguson Vice president of security research at Trend Micro, special advisor to Europol's Cybercrime Centre, and co-founder of Respect in Security.

David Currie Nubank's chief information security officer with a history of IT leadership roles, including cryptography.

Leticia Gammil Cisco Security channels leader and the founder and president at WOMCY, a non-profit focused on the development of cybersecurity.

Andreas Bittner Managing director at Vanguard and a co-founder and COO of Solaris Bank.

Rik Ferguson, Vaultree advisor and vice president of security research at Trend Micro, said: "The world of cybercrime and the lack of accessible and affordable data encryption continues to be a threat to businesses around the globe. During my 27 years of experience in information security, I have yet to see a solution that offers a fully encrypted, searchable and scalable solution like Vaultree's, which is why I am working with this team of experts."

Shaun McBrearty, co-founder, Vaultree, said: "Cybercrime rates are climbing every year, proving a need for a new generation of data protection. This is why we made it our mission to create an encryption-as-a-service software that provides a scalable, easy-to-use solution to protect business data and make data protection attainable for enterprises of any size. We are grateful to be working with a seasoned team of experts as we chart our growth course."

About VaultreeVaultree's Encryption-as-a-Service solution enables businesses of all sizes to process fully end-to-end encrypted data. Easy to use and integrate, Vaultree delivers peak performance without compromising security, neutralizing the weak spots of traditional encryption. Follow Vaultree on Twitter @Vaultree or LinkedIn. Visit http://www.vaultree.com and join our waitlist to stay up to date on product development and company news.

Media Contact Madison DailyNadel Phelan, Inc. madison.daily@nadelphelan.com

Cision

View original content to download multimedia:https://www.prnewswire.com/news-releases/vaultrees-executive-team-and-advisors-drive-innovation-in-the-cybersecurity-industry-301427750.html

SOURCE Vaultree

See the original post:
Vaultree's Executive Team and Advisors Drive Innovation in the Cybersecurity Industry - Yahoo Finance

Public Key Signature: What It Is & Why It’s Everywhere – Hashed Out by The SSL Store

PKI digital signatures can be found virtually everywhere from digitally signed emails and software to secure websites. Well break down what a PKI signature is and how it helps protect your datas integrity

Remember when you were a kid and your parents told you that if you put your mind to it, you can do or be anything you want? Well, on the internet, that is kind of true. You can pretty much make your own truth about yourself you could be a teenager, an adult, or a companys CEO. Without a way to prove your claims are legitimate, no one will be any the wiser.

Cybercriminals know this and love to take advantage of it. Thats why we have all the issues that we do today relating to phishing other sorts of predatory cyber attack techniques. Before the internet, you had to meet up with someone face to face to securely exchange information or send coded, encrypted messages.

But now that people are communicating and doing business with others across the world instantaneously, face-to-face meetups are no longer feasible in most cases. So, to protect yourself and your customers, you need to have a way to prove your identity online and help people know that your emails, files, and software are legitimate and havent been faked. This is where PKI signatures come into play.

But what is a public key signature? How is a digital signature different from other electronic signatures? And where can you find PKI digital signatures in action?

Lets hash it out.

Before we can dive head-first into the nitty-gritty of public key signatures, it would be smart to at least briefly recap what a digital signature is as well as the role it plays in public key infrastructure (PKI). After all, you cant run the play if you dont know the rules.

A PKI signature is a form of verifiable digital identity that helps you prove you (or something you create) is real. In a way, its kind of like a fingerprint because its something that uniquely identifies you. However, its more than just identity. A digital signature is a way for your organization to affirm its legitimacy through the use of a digital certificate (such as a code signing certificate) and a cryptographic key.

In a nutshell, using a PKI digital signature enables you to attach your verifiable identity to software, code, emails, and other digital communications so people know theyre not fake. This helps you:

If that all seems a bit complicated, lets break this down with more of a simple analogy

A PKI signature is the modern equivalent of a wax seal that people historically would use to secure sensitive communications. Before the internet or the invention of the telephone, people would either meet up in person or communicate remotely via written letters. Of course, without digital communications, these messages would have to be delivered by hand via train, boat, or horseback riders which means that these messages could be intercepted on their way to their intended recipients.

Say, you want to send a sensitive message to a friend. Youd want to have a way to let them know that you signed it and that the message hasnt been tampered with in any way. Years ago, youd use a wax seal to achieve this. This process would entail:

When your friend receives your message, theyll see that the wax seal intact. This unbroken wax seal indicates that your message is legitimate in two crucial ways:

In much the same way, communications on the internet also need to have these same types of protections. While theyre not being sent by horseback, digital communications pass through a lot of hands as they transmit across the internet in the form of servers, routers, and other intermediates until they reach the right destination. This means that cybercriminals would have many opportunities to alter or manipulate your information in transit if there wasnt a way for the recipient to verify the messages integrity.

Heres a great video from Computerphile that helps to explain PKI digital signatures in another way:

People often mistakenly conflate PKI digital signatures and electronic signatures as being the same, but thats not quite true. Yes, a digital signature is a type of electronic signature, but not all electronic signatures are digital signatures. Its kind of like how all iPhones are smartphones but not all smartphones are iPhones. Sure, they both are a way to say youre someone on the internet, but only one of them (*cough*PKI signature*cough*) can actually help you prove your identity because its more than just an online signature that can be altered.

Its kind of like getting an autograph of your favorite athlete like, say, quarterback Tom Brady. (Sorry, Pats fans, Tom is ours now! #TampaBayBucs) Sure, you could just walk up to Tom at a bar and ask him to sign something. But without having some way to authenticate that his signature is real like, say, an official certificate of authenticity then someone could argue that anyone could have signed his name.

Or, for all they know, you really could have gotten Tom to autograph one item. But what would stop you from sitting at home on the weekends, using his signature as an example so that you can forge his autograph on a bunch of Buccaneers team gear that you want to sell? Well, nothing, unless your prospective buyers had a way to verify the autographs legitimacy.

This is kind of like the difference between an electronic signature and a digital signature:

To really get at the heart of understanding public key signatures, you need to know about two cryptographic processes that play pivotal roles in their creation: encryption and hashing.

This cryptographic process takes a mathematical algorithm and applies it to plaintext (readable) data to scramble it into an unreadable state. It can use:

As you can see, there are some key differences (excuse the pun) between asymmetric and symmetric encryption. Regardless of those differences, the process is, essentially, reversible (using the decryption key), which means that encryption is a two-way function.

In digital signatures, encryption is used to specifically encrypt the hash data to create the digital signature. (It doesnt encrypt the file or email you want to digitally sign it only encrypts the hash value.)

Hashing is a cryptographic function that also applies a mathematical algorithm to data and files. However, its purpose is different than an encryption algorithm a hashing algorithm takes data of any length and maps it to an output (hash value) of a specific length. For example, you can take a single sentence or an entire book, apply a hash function to it, and the result will be an output (hash value) of the same length.

Because the process isnt reversible, theres not a key that reverts or maps the hash value back to the original input. This means that hashing is a one-way cryptographic function. (You know because hashing only works in one direction.)

In truth, digital signatures can be found all across the internet. For example, you can use digital signatures in the following applications:

A website security certificate, or whats known as an SSL/TLS certificate, is one of the most central components of security on the internet. Installing this certificate on your server enables you to secure your website using the secure HTTPS protocol. Enabling HTTPS means that whenever customers connect to your website, their individual connections (and any data they share during their session) will be secured using encryption. This is what makes that nifty little padlock icon appear in your browser.

A digital signature is a part of whats known as the TLS handshake (or what some people still call the SSL handshake). We wont get into all of the specifics here, but the first part of the handshake involves the websites server and users browser exchanging information (including the servers SSL/TLS certificate and digital signatures) via an asymmetric encrypted connection. Using a digital signature helps the server prove that its the legitimate server for the website youre trying to visit.

A document signing certificate enables you to apply your digital signature to many types of documents, including Microsoft Office documents and PDFs (depending on the specific certificate you use). Heres a quick example of what a digital signature looks like:

Using an email signing certificate (i.e., an S/MIME certificate) allows you to apply your digital signature to your emails. This provides identity assurance and protects the integrity of your communications.

Note: For extra security, you can also use this certificate to send encrypted emails (to users who also use email signing certificates). This provides secure, end-to-end encryption that protects your data both while its bouncing between servers and routers and sitting on your recipients email server.

Using a code signing certificate helps you to protect your supply chain. It also offers assurance to users who download your software that your software is both legitimate and unmodified.

When you sign your certificates using a code signing certificate, youll display your verified company organization information (as shown in the screenshot on the right):

Of course, unsigned (and software signed using standard code signing certificates) can also trigger Windows SmartScreen warning messages as well the difference would be that digitally signed software would display the verified publisher information instead of Unknown publisher.

To avoid displaying Windows SmartScreen messages, be sure to sign your software, code, and other executables using an extended validation code signing certificate. Using this PKI digital signature ensures Microsoft and its browsers automatically trust your software.

Remember the SSL/TLS handshake that we mentioned earlier? Well, in two-way authentication, or whats known as mutual authentication, both the server and the client prove their identities to one another. This means that in addition to the server providing its information to the client, the client must do the same by providing information to the server.

This information includes a generated hash value, digital client certificate, and cryptographic public key. The client generates the hash using data it exchanges with the server and encrypts the fixed length string using its private key (which is mathematically related to the public key it shares).

Heres a basic overview of how this process works:

Public key signatures are essential in an internet-oriented world. As more companies are moving to the cloud and relying on this public network to conduct business and provide services, the roles of identity and integrity in security become more important.

Of course, weve talked about the reasons why its so important at length in a previous article. Be sure to check out our article on why you should use digital signatures to sign everything. But well quickly summarize the key reasons here for you about why digital signatures matter:

Thanks to all of you whove stuck through this article to get to this point. For those of you whove decided to skip to the end for the too long; didnt read portion of our article, welcome. We know your time is precious, so heres a quick overview of what weve covered in this article so you can skim and head out on your way.

All of this is to say that this cryptographic technique is all about helping companies prove their authenticity and giving users a way to verify that files, software, and other information havent been manipulated or altered since they were digitally signed.

Stay tuned next week for a related article that will break down how digital signatures work.

View post:
Public Key Signature: What It Is & Why It's Everywhere - Hashed Out by The SSL Store

From Thanos to Prometheus: When Ransomware Encryption Goes Wrong – Security Intelligence

IBM Security X-Force researchers have recently reverse-engineered Prometheus ransomware samples as part of ongoing incident response operations. X-Force has found that samples that infected organizational networks featured flawed encryption. This allowed our team to develop a fast-acting decryptor and help customers recover from the attack without a decryption key.

While rare, ransomware developers can make mistakes in the ways they implement encryption, causing unintended flaws. This is not the first time X-Force sees faulty encryption mechanisms save the day for victimized organizations. Mistakes can easily occur when malware developers use patchwork code and dabble in cryptography without appropriate expertise.

Most organized cybercrime groups do use properly configured encryption, which is almost always impossible to break. That said, the option to examine possibilities can make a difference for victimized organizations and change the course of negotiation and recovery.

In early 2020, a new ransomware family dubbed Thanos was discovered on sale in underground forums mostly frequented by cybercriminals. At the time, Thanos was advertised as a Ransomware Affiliate Program, available for anyone to buy. The malware saw regular updates and new features added over time. A closer look at its code revealed that it was also used at the baseline in ransomware samples that were tracked as Hakbit and used in additional attacks that targeted organizations in Austria, Switzerland and Germany.

Thanos developer equipped it with a bootlocker in mid-2020 and was also using a somewhat novel technique of encrypting files known as RIPlace, in which they weaponized research into ransomware evasion techniques based on file characteristics.

In September 2020, Thanos was detected in attacks on government organizations in MEA. It presented the victims with a black screen that demanded money to unlock files, and while it had a supposed capability to run a destructive attack, that function did not work and left MBR intact.

By June 2021, more of Thanos made headlines, only this time as the base code for another ransomware, Prometheus. The latter was used in double-extortion attacks that encrypted files but also stole data and threatened to release it unless a hefty ransom was paid. Prometheus operators claimed to be part of the REvil group, they even placed a logo of sorts on their demands for ransom but provided no proof to that effect and may have wanted to use that as a pressure tactic.

Figure 1: Prometheus ransom note

While the original Thanos is not as active, its code does not rest. In mid-2021 it was detected in further ransomware attacks, this time used by a group going by the name Haron.

The Thanos code itself was and is being used by multiple threat actors, some of which were suspected to have nation-state sponsored ties. The Prometheus variant has died out in recent months, but other variations can continue to rise from the same Thanos base. What changes through each variation is customization. In Prometheus case, its operators used social engineering well, but were not as adept at working with encryption.

While working on Prometheus samples that encrypted files on infected devices, IBM Security X-Force researchers uncovered a weakness in the key generation algorithm used in the encryption process. Unlike most ransomware cases, this was good news that ended up helping a victimized organization.

Our analysis showed that to generate the seed for encryption, the algorithm Prometheus selected uses a hardcoded initialization vector (IV) and the uptime of the computer. This means that the seed value is a lot easier to guess than it should be, since certain parameters about the encrypted file and the infected device can be obtained.

Based on such parameters, X-Force wrote a decryptor that ended up working quickly to decrypt file types that had known file headers, for example: pdf, doc, xls, ppt, docx, xlsx, pptx, 7z, mp3, jpg, jpeg, zip, iso, exe, dll, sys and png. Decrypting the files was made even easier when device boot time was known. Boot times are not a parameter one would have to guess, they can be obtained via the CBS.log file in the Windows directory.

Using the decryptor was a great option for the recovery process X-Force supported, but another note is important here. Some open-source decryption tools may emerge over time and might seem like a recovery tool that can help in large-scale cases. One must consider the time it takes a decryptor to unlock each file. Some open-source tools can take around five hours per file, or more, which would be too time consuming in cases where a lot of data is no longer accessible. A reasonable amount of time to decrypt each file should be a few minutes or less.

In the Prometheus variants analyzed, there are two ways the ransomware can be configured for encryption:

Encryption process per file:

Encryption process per file:

X-Force found this technique to be lacking in a way that allowed for finding a way to decrypt affected files.

C#s Random class will generate the exact same bytes as long as the seed is known. In this case, the seed is the Environment.TickCount variable, which is the number of milliseconds elapsed since a computer was last started.

That seed value can be guessed given certain parameters. Moreover, the Environment.TickCount variable is also updated around every 16 milliseconds, so it is possible for multiple files to have the same key, which can make decryption even faster down the line.

The hardcoded IV provided no additional security in this case, considering it can easily be obtained and appears to be the same for every sample analyzed. To make encryption stronger, the IV should typically be random or pseudorandom.

Can all Prometheus samples be broken in the same way? X-Forces analysis indicates that any Prometheus sample that uses the C# Random class to generate keys is vulnerable. Of note, they only decrypted files that were encrypted using a Salsa20 stream cipher. Some Prometheus ransomware samples can be configured to use AES-256 and while these samples are still vulnerable, X-Force did not test the decryptor on such in their current work.

To decrypt files, we would need the following information:

Currently, only files with known file headers can be decrypted. For example: pdf, doc, xls, ppt, docx, xlsx, pptx, 7z, mp3, jpg, jpeg, zip, iso, exe, dll, sys and png.

The following process is what X-Force used in their current work to decrypt data encrypted by Prometheus. It focuses on the malwares first configuration.

Note that during any decryption effort, whether custom-built or provided by ransomware actors, certain conditions can affect the accuracy of time estimates of the decryption. If a file takes longer than desired to unlock, it is likely that any other file from that same device will take a similar amount of time.

If the seed value is found for the first file encrypted, that seed value can be continuously incremented in order to find the values for every other file. This may provide a slightly faster decryption process for computers with hundreds or thousands of files to decrypt.

The decryptor tool can be run against an entire directory of files or on a per file basis.

The ransomware problem has turned into a true pandemic for organizations. Every month new attacks are detected, and new malware families and variations arise in the commercial cybercrime arena and through closed groups. Companies are struggling to prevent ransomware infections on the one hand and prepare for incidents on the other. Paying cybercriminals has also turned into a high-stake negotiation where the leverage is almost always on the attackers side.

Will it ever end? With this crime being so rampant in industrialized countries, governments and law enforcement agencies are becoming increasingly involved in ransomware cases, especially in cases where multiple companies are hit.

Stopping attacks is hard because it only takes a small security gap for attackers to find a way in. Response goes a longer way in detecting, containing and helping organizations recover from ransomware attacks. IBM Security X-Force can help. For a ransomware readiness and response guide, download the Definitive Guide to Ransomware here. For any other assistance by IBMs team of experts, explore their incident response and threat intelligence services here.

The rest is here:
From Thanos to Prometheus: When Ransomware Encryption Goes Wrong - Security Intelligence