Wide-Spread SSD Encryption is Inevitable

TORONTO The recent Sony hack grabbed headlines in large part due to the political fallout, but its not the first corporate enterprise to suffer a high profile security breach and probably wont be the last.

Regardless, its yet another sign that additional layers of security may be needed as hackers find ways to break through network firewalls and pull out sensitive data, whether its Hollywood secrets from a movie studio, or customer data from retailers such as Home Depot or Target. And sometimes its not only outside threats that must be dealt with; those threats can come from within the firewall.

While password-protected user profiles on the client OS have been standard for years, self-encrypting SSDs are starting to become more appealing as they allow for encryption at the hardware level, regardless of OS, and can be deployed in a variety of scenarios, including enterprise workstations or in a retail environment.

In general, SSDs are becoming more common. SanDisk, for example, is bullish about adoption by average notebook users, while like many other vendors, optimizing its enterprise SSDs for different workloads. Samsung, meanwhile, has added new security features to its self-encrypting drive (SED), the 840 EVO SSD, making it compatible with professional security software employed by enterprise organizations, as it expects encrypted SSDs to become standard. Beyond SEDs themselves, there are the vendors such as Wave Systems and WinMagic that offer software to manage the encryption of SSDs on a wide scale.

A survey by the Storage Networking Industry Association presented at last years Storage Visions Conference found users lacked interest in built-in encryption features for SSDs, particularly in the mobile space. One of the chief concerns they had when adding features such as encryption to MCUs and SSDs is their effect on performance. Even though many SSDs being shipped today have data protection and encryption features built in, often those capabilities are not being switched on by OEMs, due to the misconception that encryption can reduce performance.

Ritu Jyoti, chief product officer at Kaminario, said customers are actually requesting encryption as a feature for its all-flash array, but also voice concerns about its effect on performance. They do ask the question. Customers in the financial services sector in particular are looking for encryption on their enterprise SSDs, she said, driven by compliance demands, as well as standards outlined by the National Institute of Standards and Technology.

Kaminario recently announced it had added always-on, data-at-rest encryption capabilities to its K2 all-flash array, but Jyoti said interest in encryption features has been expressed by the companys customer base for several years. She said the K2 encryption uses 256-bit AES keys technology and requires administrative authorization for access, ensuring no data is available on drives after deletion through a cryptographic SSD erase feature.

To address performance concerns, Kaminario leverages Samsung SEDs as well as its own architecture, which support non-disruptive software and hardware upgrades so encryption can be added without downtime or loss of data.

Jyoti said SEDs and encryption of all-flash arrays have become a growing trend in the enterprise. They are going to become the defacto standard very quickly.

George Crump, president and founder of research firm Storage Switzerland, recently blogged about Kaminarios new all-flash array and addressed its new features, including encryption, which he wrote is critical for flash systems in particular because of the way controllers manage flash. When NAND flash cell wears out the flash controller, as it should, it marks that cell as read-only. The problem is that erasing a flash cell requires that null data be written to it, he wrote. But how do you do that if the flash controller had previously marked the cell as read-only? If you cant erase the data, but you can read it, then some enterprising data thief may be able to get to your data.

Link:
Wide-Spread SSD Encryption is Inevitable

EU swings behind David Cameron’s encryption plan – as party grassroots voice opposition

The European Union is swinging behind Prime Minister David Cameron's policy to enable national governments to read all encrypted communications - at the same time that his own Conservative Party grassroots are starting to come out against the idea.

In a paper leaked to privacy group State Watch, the General Secretariat of the Council of the European Union, EU counter-terrorism coordinator Gilles de Kerchove wrote:

"Since the Snowden revelations, internet and telecommunications companies have started to useoften de-centralised encryption which increasingly makes lawful interception by the relevantnational authorities technically difficult or even impossible."

He wants the EU to have the power to force internet companies to tap their communications as part of a new strategy to combat terrorism. The paper was drawn up following the Islamist terrorist attacks on the French satirical magazine Charlie Hebdo and a Jewish supermarket in Paris.

He continued: "The Commission should be invited to explore rules obliging internet and telecommunications companies operating in the EU to provide under certain conditions as set out in the relevant national laws and in full compliance with fundamental rights access of the relevant national authorities to communications (i.e. share encryption keys)."

A spokesperson for de Kerchove declined to comment, according to EurActiv.

At the same time, though, the Conservative grassroots has woken up to oppose Cameron's widely derided encryption and internet surveillance proposals - which he also put to US President Barack Obama in his recent trip to Washington DC.

Writing on Conservative Home, former Cambridge University Conservative Association officer Andrew Bower, who now works in Cambridge's technology industry, roundly criticised the Prime Minister's plans. "Encryption is ubiquitous in our everyday devices and the commercial services that enable them," he wrote.

He continued: "Encryption is not just for the bad guys. The online world makes our assets and identity vulnerable. Encryption as part of a well-designed security model is essential to enabling and giving confidence to banking transactions and commerce today.

"By mobilising against encryption the government is contradicting the advice of its Information Commissioner on data protection for organisations and its own advice to the general public about being safe online."

Read this article:
EU swings behind David Cameron's encryption plan – as party grassroots voice opposition

NIST pledges transparency in NSA dealings over crypto standards

The agency says it will disclose all contributions from the National Security Agency

A U.S. agency that develops widely used standards for encryption has pledged to be more transparent about its dealings with the National Security Agency, amid concerns the NSA undermined those standards to boost its surveillance efforts.

The National Institute of Standards and Technology outlined new proposed operating procedures in an updated draft published Friday. It's seeking public comments on the proposal through March 27.

The document follows a report last July from independent security experts who concluded NIST had put too much faith in the NSA in developing cryptographic standards.

"The new draft expands on NIST's interactions with the National Security Agency (NSA), explaining how the agencies work together and what steps are now in place to ensure NSA's contributions to the standards development process are transparent," NIST said.

"The new processes will ensure that NIST attributes to the NSA all algorithms, standards or guidelines contributed by the agency's staff, and acknowledges all comments received from the NSA."

NIST has been in the spotlight since 2013, when reports based on leaked documents from Edward Snowden claimed the NSA used its influence over NIST to insert a backdoor in at least one cryptographic standard and possibly to weaken others.

Last February, NIST appointed an independent panel of technologists review its practices, including Ed Felten, a computer scientist at Princeton University, Ron Rivest, an MIT professor, and Internet pioneer Vint Cerf, who works at Google.

They concluded that NIST needed to hire more cryptographic experts and reduce its reliance on the NSA for decisions about standards.

Friday's proposal reflects the feedback in that report and from public comments on the first draft, which was published last February and said much less about NIST's work with the NSA.

See the rest here:
NIST pledges transparency in NSA dealings over crypto standards

GPG4WIN, GPG, APG and K-9 Mail – file, folder, email encryption, decryption – Video


GPG4WIN, GPG, APG and K-9 Mail - file, folder, email encryption, decryption
22 Jan 2015 GPG4WIN, GPG, APG and K-9 Mail - file, folder, email encryption,decryption. Demo of the file, folder and email encryption programs from links below on Windows 7 or 8.1 or Android...

By: amrikw

Go here to see the original:
GPG4WIN, GPG, APG and K-9 Mail - file, folder, email encryption, decryption - Video

The Upload: Your tech news briefing for Friday, January 23

Box shares start trading ... EU wants encryption keys ... Uber agrees to get a license ... and more

Microsoft HoloLens

Box debuts on NYSE Friday

Shares in cloud storage provider Box start trading on the New York Stock Exchange Friday; its IPO has been priced at $14 per share, topping the expected $12-$13 share, Reuters reports, and valuing the company at about $1.67 billion. Analysts are waiting to see if Box can continue to grow its customer base in a competitive space, and increase revenue per seat.

Snowden will make an appearance at Harvard

The world's best-known former NSA analyst, Edward Snowden, is on tap for a live video chat during a symposium on privacy at Harvard on Friday. The man who revealed to the world the extent of U.S. government surveillance of its own citizens remains in Moscow, and will be interviewed by security guru Bruce Schneier.

EU counter-terror lead wants tech firms' encryption keys

Just as more Internet companies have added end-to-end encryption in the outcry that followed revelations of widespread government surveillance of online communications, now the EU's counter-terrorism coordinator wants them to hand over the keys. Gilles de Kerchove says that the EU should consider adding new rules that would apply to companies operating in the region.

Not-yet-public Intel Atom chip powers Microsoft's HoloLens

There's an unreleased Intel Atom chip code-named Cherry Trail sitting inside Microsoft's stunning HoloLens holographic computer, which stole the show at this week's Windows 10 event. The HoloLens computer isn't yet commercially available, but sources say the CPU and GPU are based on Cherry Trail, which will also be used in tablets later this year.

Link:
The Upload: Your tech news briefing for Friday, January 23

Chaos Computer Club contradicts EU, demands full encryption

Germany's main hackers' association contradicted EU security officials on Thursday by demanding strictly confidential data handling across the board online, using readily available encryption methods.

This follows a briefing paper for EU interior ministers released by the EU's counter-terrorism coordinator Gilles de Kerchove on Wednesday in the wake of this month's terror attacks in Paris.

EU's De Kerchove wants "back doors" to consumers' data

The EU paper said Internet and communications companies should be "obliged" to "provide" authorities in EU member nations with electronic access keys, sometimes called "back doors."

Responding, the Chaos Computer Club (CCC) said on its blog Thursday that "anyone who transfers or archives customers' data unencrypted and thereby endangers their security must face significant penalties."

Secure public, instead of 'militarization'

The CCC demanded that the millions spent by nations to "militarize" networks to spy on their citizens be invested instead in the construction of secure systems and technical training for the public.

"Effective cryptography must become the obligatory standard in communications via the Internet," the club said, adding that governments should "heave overboard" their plans for total surveillance.

Digital self-defense

The CCC accused German Interior Minister Thomas de Maiziere of ignoring the reality that more or less technically adept people could hide communications, making politicians' calls to regulate encryption practically unenforceable.

The rest is here:
Chaos Computer Club contradicts EU, demands full encryption

Thieves, Snoops and Idiots (episode 1): Edward Snowden – Encryption Expert? – Video


Thieves, Snoops and Idiots (episode 1): Edward Snowden Encryption Expert?
In this inaugural episode of Thieves, Snoops and Idiots, we delve into security advice recommended by government whistleblower Edward Snowden. While Snowden has brought great attention...

By: PKWARE

See the original post:
Thieves, Snoops and Idiots (episode 1): Edward Snowden – Encryption Expert? - Video

Encryption, Privacy, National Security, and Dr. Seuss

Last week, U.S.President Barack Obama, standing with British Prime Minister David Cameron, said that If we find evidence of a terrorist plotand despite having a phone number, despite having a social media address or e-mail address, we cant penetrate that;thats a problem. According to the Wall Street Journal, he then indicated that he believes Silicon Valley companies want to solve this problem, because Theyre patriots.

An interesting statement, given that just a few months ago, Silicon Valley companies were being criticized by U.S. government agencies for adding automatic encryption to smart phonesa move the government sees as not so patriotic. The latest software released for Android and Apple phones and pads automatically encrypts user data, and the companies said they are not keeping a master key, so they cant help the government get into user data, even if they want to. Other communications and social networking apps, like WhatsApp, have also been rolling out automatic encryption.

So whats the story? Is Silicon Valley determined to protect user privacy, or is it ready and willing to turn over data to the government when asked.

You could see it as a delicate dance, or as walking a fine line. Or, you could be a little more cynical, and view it through the eyes of the Dr. Seuss classic, The Sneetches.

I was introduced to this parable back in the 90s. The book is typically used to teach lessons about discrimination. But Silicon Valley venture capitalist Tim Draper had a different interpretation in mind when he gave a copy of the book to my husband. The intent, Draper noted, was to help my husband understand Microsofts moves at the time. Since then,The Sneetcheshas beena story that I think about regularly when I watch the goings on in business and technology today.

Short synoposis: two sets of creaturesstar-bellied Sneetches and plain-bellied Sneetcheslive in a world in which the star-bellied Sneetches are top dogs. An entrepreneur named Sylvester McMonkey McBean comes in with new technologyhe can add stars to plain-bellied Sneetches, for a fee. The plain-bellied crew all signs up, and now nobody can tell the two groups apart. The original elite arent happy, so McBean offers a new tech fix,at a higher fee:star removal. This goes back and forth until the Sneetches are brokeand McBean drives off with all the money. Only then do the two sides work out their differences.

So McBean provides the technology that givesand the technology that takes awaysort of like a tech industry that gives privacy protection, yet is, apparently alsointerested in working with the government to get around privacy protection.

You can see an animated version of the Sneetches here (or read the text here) and think about whether its a good or bad thing that Silicon Valley is in the position of brokering our privacy.

Advertisement

IEEE Spectrums blog featuring the people, places, and passions of the world of technologists in Silicon Valley and its environs. Contact us:t.perry@ieee.org

View original post here:
Encryption, Privacy, National Security, and Dr. Seuss