Satechi Lockdown USB 3.0 External 2.5in Enclosure 256-bit AES Encryption – Video


Satechi Lockdown USB 3.0 External 2.5in Enclosure 256-bit AES Encryption
Read More http://cheap.waitmejapan.com/?asin=B005KDZ8EA Satechi Lockdown USB 3.0 External 2.5in Enclosure 256-bit AES Encryption Product Features Satechi Lockdown USB 30 External 25in Enclosure...

By: Certaiumorang

Read this article:
Satechi Lockdown USB 3.0 External 2.5in Enclosure 256-bit AES Encryption - Video

Google chairman says ‘unbreakable’ encryption will become a reality

Google chairman Eric Schmidt say he believes that unbreakable encryption will become a reality in "our lifetime".

Speaking alongside former US Secretary of State Condaleeza Rice at a recent Stanford University cyber security forum, he argued thattechnology rather than legislation will win out as users increasingly look for ways to protect their online activities.

"Everything is going to have to be encrypted all the way, said Schmidt.

End-to-end encryption has been available for many years in the shape of PGP for email, OTR for instant messaging and the likes of Tresorit for cloud-storage, but does not always guarantee complete security, with numerous exploitable backdoors.

Google currently provides a Chrome extension (called End-to-End') that uses the open-source OpenPGP, which Yahoo is also looking to implement from next year.

The webmail providers have teamed up to allowYahoo Mail users to send and receive encrypted messages from Yahoo and Gmail users, and to createa PGP encryption tool that will encrypt data contained in messages, but not the sender/receiver's email addresses or the subject line.

Despite these efforts, however, Americal Civil Liberties Unionprivacy researcher Christopher Soghoian criticised Google for not applying the same privacy zeal to the Android operating system.

Now that Eric Schmidt loves crypto, perhaps he should talk to the Android team, which still doesn't use encryption crypto by default, he said on Twitter.

George Anderson, director at security firm Webroot, told SCMagazineUK.com that encryption alone "cannot guarantee complete security" and that any code is only likely to remain unbreakable in the short term.

There is a lot of work to be done before the industry is able to create an unbreakable' code. While it's true encryption will raise the barrier to immediate access to sensitive data by the man in the street, it will not stop state actors or equally well resourced cyber-criminals. Organisations that need absolute security for compliance or sensitive data reasons must take a layered approach, using encryption to help put them on a more equal playing field with hackers, said Anderson.

Read this article:
Google chairman says 'unbreakable' encryption will become a reality

Forums: stubborn files, encryption keys and more

Yesterday, Mac Elite "jeff k" took to the MacNN forums looking for assistance with trying to figure out why a stubborn file won't clear out of the trash can. Mac Elite "rotuts" sparked a conversation about apps that can be used to catalog hard drive file usage by date.

Earlier this week, Junior Member "Ron K" started a discussion about storing encryption keys with Apple, and commenters have decided it's probably not a good idea. Today, one Fresh-Faced Recruit was looking for a terminal command to disable automatic App updates, but a solution has yet to be found. Today, the conversation continues in the thread titled "help with IMAP" which was started earlier this month.

by MacNN Staff

Read the original:
Forums: stubborn files, encryption keys and more

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering – Video


Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering
To get this project in ONLINE or through TRAINING Sessions, Contact:JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai -83. Landmark: Next to Kotak Mahendra Bank....

By: jpinfotechprojects

Read the original post:
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering - Video

As governments invade privacy, tools for encryption grow more popular

In the wake of Edward Snowdens revelations about the NSA collecting massive amounts of user meta-data, many people went in search of safer, more secure ways to use the internet anonymously. Once thought to be something only used by the tech-savvy, increased interest in end-to-end e-mail encryption has prompted both Google and Yahoo to develop user-friendly versions of the protocol that would, in theory, make personal messages exceedingly difficult to intercept.

GeeksPhone, a Spanish hardware manufacturer, and Silent Circle, U.S. communication firm, promise to provide the same kind of privacy with Blackphone, the first fully encrypted smartphone meant for the average consumer. While technically an Android device, Blackphone runs a forked version of the operating system called PrivatOS that rids the phone of any and all connections to Googles servers.

Encrypting e-mail is effective, but requires that both the sender and recipient of a message use the same specific encryption protocol to maintain privacy. Blackphone, for all of the protection that it provides, cuts users off from most of the serviceslike games, maps, and other functionsso as to make sure that there are absolutely no gaps through which information might be extracted.

The Onion Router also known as Tor, a browser designed keep users entirely anonymous, is something of a happy medium, and the NSA is actively trying to scare people away from it. Tor guides its internet traffic through complex networks of layered encryption that hide a computers physical location and make it nearly impossible to monitor the IP addresses that it visits.

Post-Snowden, Tor saw a substantial increase in the number of people using its browser and network, undoubtedly in-part due to privacy concerns. Documents published by The Guardian revealed that the NSA were actively engaged with attempting to infiltrate Tors network, and considered the browser to be the king of high-secure, low-latency anonymity. Following widespread, successful-attempts at tracking Tor users activity, the FBI openly admitted to exploiting a loophole in Tors infrastructure as a part of a larger operation in pursuit of a child pornography ring.

Authorities have justified their pushes into the anonymous internet, asserting that by and large, much of Tors traffic is related to illegal activities, but that seems to be changing. Richard David James, better known by his stage name Aphex Twin, is a fixture in the electronic music scene. Earlier this week James announced his latest album using a website that could only be accessed using Tor, drawing in a significant number of pageviews in a single day.

The attention, says Tor executive director Andrew Lewman, is both a blessing and a curse. While Tors network was able to handle the 133,000 visits that Aphex Twin drew, he doubts whether it could withstand the kinds of gargantuan traffic that Facebook sees on a daily basis. Tor users, comparatively speaking, are rarea fact that Lewman asserts is what makes them targets for governmental organizations.

Its been co-opted by GCHQ and the NSA that if youre using Tor, you must be a criminal, Lewman explained to The Guardian. I know the NSA and GCHQ want you to believe that Tor users are already suspect, because, you know, god forbid who would want their privacy online, they must be terrorists.

Proponents of Tor and other forms of ubiquitous encryption have called for the public to adopt the technologies on a larger scale, logic stating that if everyone is using encryption, then no one can be singled out for it. Rather than adopting the small, experimental proofs of concept like Tor, Lewman says, true privacy on the internet will come when internet juggernauts like Facebook, Twitter, and Google incorporate the technology into their platforms, making them the standard rather than the exception.

Read the original here:
As governments invade privacy, tools for encryption grow more popular

Forums: encryption, crashes and hot Macs

This week, MacNN forum-goers discuss a wide range of topics including encryption software, consistent crashes, and how to cool down a hot Mac. One Fresh-Faced Recruit was wondering if there was some kind of one-click encryption solution that could encrypt a file before it is uploaded to cloud storage, and decrypt it when it is needed again. Moderator "Rumor" reported their third crash in one day, and was hoping fellow forum goers could help troubleshoot and get to the root cause of this problem.

Useful tips on how to deal with a problematic MagSafe charger connection can be found in the thread titled "can't get the charge plug to stay connected charge-wise," where one Senior User had their problem resolved. In a post started by "chasg" earlier this month, forum-goers continue to discuss ways to determine what might be making an iMac run hot, and how to fix it. Yesterday, "rotuts" was asking fellow forum-goers if anyone had any opinions on Apple's USB DVD drive, wondering if they should use their $100 Apple credit on something else instead.

by MacNN Staff

View post:
Forums: encryption, crashes and hot Macs

Stealing encryption keys through the power of touch

Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers.

There are several ways of attacking encryption systems. At one end of the spectrum, there are flaws and weaknesses in the algorithms themselves that make it easier than it should be to figure out the key to decrypt something. At the other end, there are flaws and weaknesses in human flesh and bones that make it easier than it should be to force someone to offer up the key to decrypt something.

In the middle are a range of attacks that don't depend on flaws on the encryption algorithms but rather in the way they've been implemented. Encryption systems, both software and hardware, can leak information about the keys being used in all sorts of indirect ways, such as the performance of the system's cache, or the time taken to perform encryption and decryption operations. Attacks using these indirect information leaks are known collectively as side channel attacks.

This research is a side-channel attack. The metal parts of a laptop, such as the shielding around USB ports, and heatsink fins, are notionally all at a common ground level. However, this level undergoes tiny fluctuations due to the electric fields within the laptop. These variations can be measured, and this can be used to leak information about encryption keys.

The measurements can be done by directly attaching a digitizer to a metal part of the laptop, but they don't have to be this obvious. The researchers showed that they could retrieve information with connections at the far end of shielded USB, VGA, and Ethernet connections. They also used human touch: a person in contact with metal parts of the laptop can in turn be connected to a digitizer, and the voltage fluctuations can be measured.

The researchers note that this works better in hot weather, due to the lower resistance of sweaty fingers.

While the information retrieval was better when used with high-end lab equipment, the researchers also experimented with using a smartphone connected to Ethernet shielding via its headphone port, and found that this was sufficient to perform some attacks.

The major importance source of the voltage variations is the processor. The simplest thing to detect is probably whether the processor is active or sleeping, with the researchers saying that on almost all machines, the difference between an active processor and a processor suspended with the "HLT" instruction could be detected. On many machines, finer grained information was visible. The research recorded the fluctuations with a sample rate of between a few tens of kilohertz, and a few megahertz. These sample rates are far lower than the several gigahertz that processors operate, and so these measurements can't give insight into individual instructionsbut this wasn't actually necessary.

During encryption and decryption operations, the processor has to perform certain long-running operations (for example, exponentiation of various large numbers), and these operations caused a consistent, characteristic set of voltage fluctuations. When sampling the voltages at a rate of a few MHz, keys for the RSA and ElGamal encryption algorithms could be extracted in a few seconds.

This attack required a single piece of encrypted data to be decrypted a few times.

Continued here:
Stealing encryption keys through the power of touch

Google Gets in a Trusted Stores Encryption Tangle

A conflict between Google's push to make the Web more secure and its Trusted Store program may be costing at least one business money.

Pegasus Auto Racing Supplies, which encrypts all the pages on its website, has had its application for Google's Trusted Stores program turned down, according to The Wall Street Journal.

Think of the badge as the equivalent of the Good Housekeeping Seal. Having it could boost a site's revenue.

Pegasus co-owner Christopher Heitman applied for a Trusted Stores badge in 2012 but was turned down because all his site's pages were encrypted.

Google reportedly told him that the Trusted Stores program is not compatible with HTTPS when the protocol is used for non-sensitive pages such as a site's home page or product listings.

The Trusted Stores program requires applicants to encrypt only pages that contain sensitive information, such as home addresses and credit card numbers.

Heitman applied again this month and once again was turned down.

The Trusted Stores badge "is designed to be suppressed and not show up on secure pages," Google reportedly told Heitman in an email. "However, per the program guidelines, it is required that the badge must be displayed on all pages of your site."

The Google policy "is as clear and easy to understand as a bowl of spaghetti," Jeff Kagan, a technology industry analyst, told the E-Commerce Times.

Google recently announced that it would, in effect, give encrypted Web pages more weight in its search algorithms, resulting in higher rankings.

Continued here:
Google Gets in a Trusted Stores Encryption Tangle

Google Favors Encryption in Ranking, But Not for ‘Trusted Stores’

Google wants websites to use encryption, to protect themselves and users from hackers. Unless they are e-commerce sites, in which case Google doesnt want them to use encryption too widely.

The dissonance arises from the requirements of Googles Trusted Stores program, an effort by the search giant to show users where they can shop online with confidence.

Heres the rub: According to emails Google sent one merchant, the Trusted Stores program doesnt play nice with encryption.

Googles explanation could have come straight from Catch-22. The Trusted Stores badge is designed to be suppressed and not show up on secure pages, Google wrote to Christopher Heitman, co-owner of Pegasus Auto Racing Supplies in New Berlin, Wisc.

That means, Google continued, There will not be a badge that shows up on every page of the site. However, per the program guidelines, it is required that the badge must be displayed on all pages of your site.

Not surprisingly, the explanation left Heitman scratching his head. I would think that protecting their users privacy by using encryption would be a valuable part of providing the best user experience, he says.

Google gave Web encryption a big boost earlier this month when it said encrypted sites would gain points in its search rankings. Encryption can defend against certain types of cyberattacks.

The Trusted Stores program does require that checkout pages be encrypted, to protect personal information such as home addresses and credit-card numbers.

But Google told Heitman that for non-sensitive pages such as a sites home page or product listings, the Trusted Stores program is not compatible with the common encryption protocol that Google said it would favor in its search rankings.

A Google spokesman said as a priority, were working on a solution to display the badge for stores who are moving their entire sites to be encrypted.

See the original post here:
Google Favors Encryption in Ranking, But Not for ‘Trusted Stores’

Google Wants Sites to Use Encryption, Except When It Doesn’t

Google wants websites to use encryption, to protect themselves and users from hackers. Unless they are e-commerce sites, in which case Google doesnt want them to use encryption too widely.

The dissonance arises from the requirements of Googles Trusted Stores program, an effort by the search giant to show users where they can shop online with confidence.

Heres the rub: According to emails Google sent one merchant, the Trusted Stores program doesnt play nice with encryption.

Googles explanation could have come straight from Catch-22. The Trusted Stores badge is designed to be suppressed and not show up on secure pages, Google wrote to Christopher Heitman, co-owner of Pegasus Auto Racing Supplies in New Berlin, Wisc.

That means, Google continued, There will not be a badge that shows up on every page of the site. However, per the program guidelines, it is required that the badge must be displayed on all pages of your site.

Not surprisingly, the explanation left Heitman scratching his head. I would think that protecting their users privacy by using encryption would be a valuable part of providing the best user experience, he says.

Google gave Web encryption a big boost earlier this month when it said encrypted sites would gain points in its search rankings. Encryption can defend against certain types of cyberattacks.

The Trusted Stores program does require that checkout pages be encrypted, to protect personal information such as home addresses and credit-card numbers.

But Google told Heitman that for non-sensitive pages such as a sites home page or product listings, the Trusted Stores program is not compatible with the common encryption protocol that Google said it would favor in its search rankings.

A Google spokesman said as a priority, were working on a solution to display the badge for stores who are moving their entire sites to be encrypted.

Here is the original post:
Google Wants Sites to Use Encryption, Except When It Doesn’t