Bipartisan EARN IT Act Poses Serious Threat to Encryption – Nerdist

The latest update on the endless war between those pushing to guard freedom of speech and privacy on the internet and those pushing to increase government oversight over the worldwide network is not good news for anyone belonging to the former group. Thats because a new, bipartisan bill is currently being circulated amongst congress, dubbed the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act, or EARN IT, which, if passed, would effectively grant the federal government the ability to disallow the use of effective end-to-end encryption on every platform operating in the U.S.

The EARN IT Act, which is being sponsored by Senators Lindsey Graham,Josh Hawley,Dianne Feinstein, andRichard Blumenthal, is an amendment to Section 230 of the 1996 Communications Decency Act (CDA). Section 230 (the common name for Title V of the CDA), says, most critically, that No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.

This snippet of law from Section 230 is monumentally important because it prevents internet services providers (ISPs), platforms like Google or Facebook or Twitter, as well as messaging apps like WhatsApp or Signal, from being held legally responsible for illegal information thats shared on their networks. In other words, section 230 allows these companies to not be held liable if people are sharing illegal information utilizing their tools.

Section 230 is so crucial to internet privacy and development, in fact, that the Electronic Frontier Foundation refers to it as the most important law protecting internet speech, and says that it is perhaps the most influential law to protect the kind of innovation that has allowed the Internet to thrive since 1996.

With its proposed amendment, EARN IT would effectively do away with the default legal shielding provided by Section 230, and instead would require corporations to earn that protection by passing inspection from a national commission made up of 19 members, including the Attorney General, The Secretary of Homeland Security, and The Chairman of the Federal Trade Commission. (And yes, the EARN IT act is meant to reference the fact that corporations will need to earn their Section 230 protections should this law pass.)

Regarding inspection, the bill says that the EARN IT commission would utilize best practice guidelines that it would develop itself to decide which companies have earned protection under Section 230. According to the March 5 draft of the bill:

The purpose of the Commission is to develop recommended best practices that providers of interactive computer services may choose to implement to prevent, reduce, and respond to the online sexual exploitation of children, including the enticement, grooming, sex trafficking, and sexual abuse of children and the proliferation of online child sexual abuse material.

The downstream effect of this amendment to Section 230, and the establishment of this national commission as a gatekeeper to the protections it provides, would, according to many reputable sources discussing the bill (including the EFF, Stanford Law Schools Center for Internet and Society, and the ACLU), result in the federal government having a so-called backdoor for accessing encrypted messages. This, in turn, would seriously degrade end-to-end encryption, which is a system ofcommunication where only the communicating users can read the messages [being shared].

Although it may seem like a leap to assume EARN IT would undoubtedly crush the freedom and privacy provided by end-to-end encryption, especially considering the fact that the bill never even references the system of communication by name, common sense forces that conclusion. If EARN IT passes, companies would subsequently be faced with a dilemma: either weaken their end-to-end encryption methods in order to allow the national commission to have its backdoor to make sure best practices are being observed, or lose the protections provided by Section 230, and be made vulnerable to an unthinkably massive inundation of lawsuits.

Sen. Lindsey Graham discussing the EARN IT act at a March 2020 hearing. USSenLindseyGraham

It should be noted that there are, of course, some legal experts out there who dont think EARN IT is nearly as bad as its opponents claim it is, and also may, in fact, help to curb the sharing of illegal content onlinespecifically in regards to child pornography and other sexual abuse materials. But it should also, likewise, be noted that several of the key sponsors of the bill, from both sides of the political aisle, have been looking for a way to diminish the efficacy of end-to-end encryption for some time. Senator Graham, for example, told representatives from Apple and Facebook in December of last year that My advice to you is to get on with [providing warrant-compatible encryption voluntarily], because this time next year, if we havent found a way that you can live with, we will impose our will on you.

What do you think about the EARN IT act? Do you fear that the bill, should it pass, would greatly diminish the efficacy of end-to-end encryption? And would you trust a small national commission to decide which companies are or are not observing best practices when it comes to what their users are sharing on their platforms? Let us know your thoughts in the comments!

Feature image: Blogtrepreneur

Read this article:
Bipartisan EARN IT Act Poses Serious Threat to Encryption - Nerdist

Signal Threatens to Leave the US If EARN IT Act Passes – WIRED

On Friday, Apple and Google announced a joint collaboration to make a Covid-19 "contact-tracing" framework available for legions of Android and iOS smartphones. Slated for release next month, the platform will give public health organizations the ability to track infections and use Bluetooth proximity analysis to warn people if they've come into contact with someone who has reported that they're infected. The service will be opt-in only and is designed to preserve privacy, the companies say. The pandemic has fueled debate about contact-tracing apps, but researchers say that it is possible to design encryption schemes for such services in a way that would successfully protect user privacy.

In other pandemic news, the Trump administration's hesitation to invoke the Defense Production Act to spur N95 mask manufacturing in the United States may mean that it's too late now for the effort to help the way it would have. And election officials are scrambling to scale up voting contingency plans for primaries and Election Day this year, including adding capacity for potential expanded absentee voting by mail. President Trump attempted to politicize vote-by-mail efforts in a number of remarks and tweets this week.

Researchers made a map of all the nations they've linked to the use of zero-day exploits; these elite tools are far more widespread than you might think. Plus, researchers from Cisco Talos demonstrated that cheap 3D printers are making it easier than ever to clone fingerprints and trick smartphone and laptop fingerprint locks.

If you need something to do this weekend, cut through the hubbub and use WIRED's comprehensive guide to making your Zoom meetings more private and secure.

And there's more. Every Saturday we round up the security and privacy stories that we didnt break or report on in depth but think you should know about. Click on the headlines to read them, and stay safe out there.

The end-to-end encrypted messaging app Signal, which is respected and trusted for its transparent, open source design, says that it will be one of the immediate casualties should the controversial EARN IT Act pass Congress. Written by South Carolina Republican senator Lindsey Graham and Connecticut Democrat Richard Blumenthal and introduced in the Senate last month, the EARN IT Act claims to be a vehicle for improving how digital platforms reduce sexual exploitation and abuse of children online. But the law would really create leverage for the government to ask that tech companies undermine their encryption schemes to enable law enforcement access. Signal developer Joshua Lund said in a blog post on Wednesday that Signal is not cool with that! More specifically, he noted that Signal would face insurmountable financial burdens as a result of the law and would therefore be forced to leave the US market rather than undermine its encryption to stay. Given that Signal is recommended and used across the Department of Defense, Congress, and other parts of the US government, this would be a seemingly problematic outcome for everyone.

WhatsApp announced on Tuesday that it will restrict forwarding of highly forwarded messages, so users can only send them to one chat at a time. The idea is to make it much more difficult and tedious to bulk-forward a message. WhatsApp has put other restrictions on forwarding in the past. Last year it started labeling highly forwarded messages with a double-arrow icon, and it has been particularly focused on curbing the spread of misinformation in recent months, given the Covid-19 pandemic.

Hackers hit the currency exchange firm Travelex with ransomware at the beginning of January, crippling the company's operations. This turned out to be just the beginning of the company's problems and financial woes. The Wall Street Journal reports, though, that before it was embroiled in the drama of a major accounting scandal, Travelex paid its ransomware attackers a whopping $2.3 million in an attempt to get them to go away. Paying hackers their requested ransom is not illegal in the United Kingdom where Travelex is based, but it is frowned upon by the international law enforcement community and security experts. Victims can't be sure that attackers will actually retreat after they receive the ransom, and paying emboldens hackers to attempt more ransomware schemes.

More Great WIRED Stories

See the rest here:
Signal Threatens to Leave the US If EARN IT Act Passes - WIRED

Zoom routed calls through China and lied about encryption technology, report alleges – Campus Reform

As coronavirus has forced students, professors, and employees inside their homes, video-conferencing has become the new norm for classroom lectures, business meetings and almost any function that demands face-to-face interaction. Students across America have made a sudden transition to using Zoom for their classroom lectures, a company that is currently being sued for failure to fully disclose privacy policies.

Zoom has recently been called out for routing meetings through China.

Understand what you are signing up for. No software is 100% secure."

An April report from the Citizen Lab revealed that some calls originating from North America were routed through servers in China, along with the encryption keys for the calls, even when all meeting participants, and the Zoom subscribers company, are outside of China.

While Zoom is headquartered in the United States, and listed on the NASDAQ, the mainline Zoom app appears to be developed by three companies in China, explains the report.

[RELATED: Free speech org vows to 'monitor' colleges with classes online]

The same report reveals that Zoom used dishonest marketing schemes to mislead its users, revealing that while Zoom promises end-to-end (E2E) encryption for video and audio, it actually only provides transport encryption.

This means that rather than the users controlling their encrypted information, Zoom controls it, giving the company access to meetings.

Zoom has also allegedly leaked personal email addresses and sent user data to Facebook, such as their phone model, when they were using the app, and more--- prompting a class-action lawsuit.

According to Bloomberg, the lawsuit cites that Zooms privacy policy failed to state that the company sent data to third parties. The complaint states that Zooms Wholly inadequate program design and security measures have resulted, and will continue to result, in unauthorized disclosure of its users personal information.

While Zoom claims to have taken necessary precautions and made corrections, some students have voiced concern for their privacy.

Campus Reform spoke to students whose classes have transferred to Zoom due to the coronavirus crisis.

[RELATED: FBI gets involved as Zoombombing threatens online classes]

Widener University student and Campus Reform Correspondent Mickey Mertz expressed concerns over Zooms alleged negligence.

I use Zoom for all my classes. Though the information discussed during these lessons are not top-secret information, Im a bit worried about what personal data can be collected through a Zoom call, Mertz said in an email to Campus Reform.

Jesse Stiller, another correspondent and student at the College of New Jersey, told Campus Reform that knowing this is unsettling.

It should concern all users that Zoom is lying about their end-to-end encryption and that the government of China can demand any and all calls for any reason if they choose to do so, said Stiller, adding that it is somewhat relieving that Zoom is being investigated. Zoom needs to be clear with their users and forthcoming with their policies.

While concern over Zooms dishonesty is widely shared, some researchers are optimistic that students are safe and that access to important personal information does not pose a monumental threat to common citizens.

Cybersecurity researcher Caleb Purcell told Campus Reform that Zoom has been "rightly scrutinized" for its carelessness, but that he is confident that everyday users are safe.

[RELATED: As coronavirus forces classes online, colleges face new challenge: 'Zoombombing']

Privacy is currently at the forefront of security concerns, and so Zoom did make a mistake here. They have been scrutinized, and rightly so, said Purcell. But should the average citizen be worried? No. The real concern is that - for calls routed through China - the Chinese government could theoretically force Zoom to hand over decrypted call data, he added, saying that he is not aware of any instances in which that has been the case.

When asked about Zooms misleading end-to-end encryption claims, Purcell acknowledged that the company deserves blame.

Zoom made a mistake here - this time redefining end-to-end video encryption for marketing purposes They have been properly scrutinized, he said.

Purcell urges users to consider their reasons for using such software.

Each user must re-evaluate their use case for Zoom video calls, understanding that Zoom has the ability to decrypt call data. Are you using Zoom for education, open webinars, or connecting with friends/colleagues? Sounds great! Are you using Zoom for highly confidential/classified meetings? Probably best that you find an alternative tailored for your needs. Zoom is just one tool in the kit, and it doesn't fit everyone's needs.

Purcell concluded by providing a word of advice to software users.

Understand what you are signing up for. No software is 100 percent secure. Identify your personal and/or business risks, and adopt software that has been thoroughly and openly tested against those risks," he said.

[RELATED: Professors worried students will share lectures with 'right wing sites']

The Electronic Frontier Foundation (EFF), a pioneer digital civil rights organization, also told Campus Reform in an exclusive statement that Zoom has made unacceptable mistakes.

Zoom has let down so many with its privacy mistakes, said Rebecca Jeschke, EFFs Media Relations Director, which is really unfortunate since so many people are depending on it amid the pandemic.

Jeschke urged the company to act hastily so as to maintain their reputation.

Zoom's response and plans to fix the problems are welcome, but it needs to deliver what it's promised. Zoom needs to be more transparent about encryption/data practices. We have recommended steps users can take to protect their privacy and avoid trolls, but it's a lot of steps. It shouldn't be so hard for users, so it's imperative that Zoom fix these mistakes and regain users' trust.

Follow the author of this article on Twitter: @addison_smith49

Originally posted here:
Zoom routed calls through China and lied about encryption technology, report alleges - Campus Reform

Encryption Key Management Software Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 – Science In Me

New Jersey, United States:The new report has been added by Market Research Intellect to provide a detailed overview of the Encryption Key Management Software Market. The study will help to better understand the Encryption Key Management Software industry competitors, the sales channel, Encryption Key Management Software growth potential, potentially disruptive trends, Encryption Key Management Software industry product innovations and the value / volume of size market (regional / national level, Encryption Key Management Software- Industrial segments), market share of the best actors / products.

Information has been added to the report to provide a realistic view of the industry based on data from Encryption Key Management Software manufacturers, i.e. H. Shipping, price, sales, gross profit, business distribution, etc., SWOT analysis, consumer preference, current developments and trends, drivers and limiting factors, company profile, investment opportunities, analysis of the demand gap, market size value / volume, services and products, Porters five models , socio-economic factors, official regulations in the Encryption Key Management Software branch. Market participants can use the report to take a look at the future of the Encryption Key Management Software market and make significant changes to their operating style and marketing tactics in order to achieve sustainable growth.

Get | Download Sample Copy @ https://www.marketresearchintellect.com/download-sample/?rid=182608&utm_source=SI&utm_medium=888

The report examines the competitive environment scenario observed with key players in Encryption Key Management Software sales, the profile of their business, their earnings, their sales, their business tactics, and the forecasting situations of the Encryption Key Management Software sales industry. According to studies, the Encryption Key Management Software sales market is very competitive and diverse due to global and local suppliers.

The Encryption Key Management Software Sales Market Report mainly contains the following Manufacturers:

Market Competition

The competitive landscape of the Encryption Key Management Software market is examined in detail in the report, with a focus on the latest developments, the future plans of the main players and the most important growth strategies that they have adopted. The analysts who compiled the report have created a portrait of almost all of the major players in the Encryption Key Management Software market, highlighting their key commercial aspects such as production, areas of activity and product portfolio. All companies analyzed in the report are examined on the basis of important factors such as market share, market growth, company size, production, sales and earnings.

Report Highlights

Assessment of sales channels

innovation trends

sustainability strategies

Niche market trends

Market entry analysis

market size and forecast

The geographic department provides data that give you an overview of the turnover of companies and sales figures for the growth activity Encryption Key Management Software for electrical meters. Here are the strengths of the geographic divisions: North America (United States, Canada and Mexico), Europe (Germany, Spain, France, Great Britain, Russia and Italy and more), Asia-Pacific (China, Japan, Korea, India and Southeast Asia) and more ), South America (Brazil, Argentina, Colombia), the Middle East and Africa (Saudi Arabia, United Arab Emirates, Egypt, Nigeria and South Africa) and ROW.

Ask For Discount (Special Offer: Get 25% discount on this report) @ https://www.marketresearchintellect.com/ask-for-discount/?rid=182608&utm_source=SI&utm_medium=888

Table of Content

1 Introduction of Encryption Key Management Software Market1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Encryption Key Management Software Market Outlook4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Encryption Key Management Software Market, By Deployment Model5.1 Overview

6 Encryption Key Management Software Market, By Solution6.1 Overview

7 Encryption Key Management Software Market, By Vertical7.1 Overview

8 Encryption Key Management Software Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Encryption Key Management Software Market Competitive Landscape9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix11.1 Related Research

Complete Report is Available @ https://www.marketresearchintellect.com/product/global-encryption-key-management-software-market-size-forecast/?utm_source=SI&utm_medium=888

We also offer customization on reports based on specific client requirement:

1-Freecountry level analysis forany 5 countriesof your choice.

2-FreeCompetitive analysis of any market players.

3-Free 40 analyst hoursto cover any other data points

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

Get Our Trending Report

https://www.marketresearchblogs.com/

https://www.marktforschungsblogs.com/

Tags: Encryption Key Management Software Market Size, Encryption Key Management Software Market Growth, Encryption Key Management Software Market Forecast, Encryption Key Management Software Market Analysis, Encryption Key Management Software Market Trends, Encryption Key Management Software Market

Read the original here:
Encryption Key Management Software Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Science In Me

IoT Security Solution For Encryption Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 – Science In Me

New Jersey, United States:The new report has been added by Market Research Intellect to provide a detailed overview of the IoT Security Solution For Encryption Market. The study will help to better understand the IoT Security Solution For Encryption industry competitors, the sales channel, IoT Security Solution For Encryption growth potential, potentially disruptive trends, IoT Security Solution For Encryption industry product innovations and the value / volume of size market (regional / national level, IoT Security Solution For Encryption- Industrial segments), market share of the best actors / products.

Information has been added to the report to provide a realistic view of the industry based on data from IoT Security Solution For Encryption manufacturers, i.e. H. Shipping, price, sales, gross profit, business distribution, etc., SWOT analysis, consumer preference, current developments and trends, drivers and limiting factors, company profile, investment opportunities, analysis of the demand gap, market size value / volume, services and products, Porters five models , socio-economic factors, official regulations in the IoT Security Solution For Encryption branch. Market participants can use the report to take a look at the future of the IoT Security Solution For Encryption market and make significant changes to their operating style and marketing tactics in order to achieve sustainable growth.

Get | Download Sample Copy @ https://www.marketresearchintellect.com/download-sample/?rid=170784&utm_source=SI&utm_medium=888

The report examines the competitive environment scenario observed with key players in IoT Security Solution For Encryption sales, the profile of their business, their earnings, their sales, their business tactics, and the forecasting situations of the IoT Security Solution For Encryption sales industry. According to studies, the IoT Security Solution For Encryption sales market is very competitive and diverse due to global and local suppliers.

The IoT Security Solution For Encryption Sales Market Report mainly contains the following Manufacturers:

Market Competition

The competitive landscape of the IoT Security Solution For Encryption market is examined in detail in the report, with a focus on the latest developments, the future plans of the main players and the most important growth strategies that they have adopted. The analysts who compiled the report have created a portrait of almost all of the major players in the IoT Security Solution For Encryption market, highlighting their key commercial aspects such as production, areas of activity and product portfolio. All companies analyzed in the report are examined on the basis of important factors such as market share, market growth, company size, production, sales and earnings.

Report Highlights

Assessment of sales channels

innovation trends

sustainability strategies

Niche market trends

Market entry analysis

market size and forecast

The geographic department provides data that give you an overview of the turnover of companies and sales figures for the growth activity IoT Security Solution For Encryption for electrical meters. Here are the strengths of the geographic divisions: North America (United States, Canada and Mexico), Europe (Germany, Spain, France, Great Britain, Russia and Italy and more), Asia-Pacific (China, Japan, Korea, India and Southeast Asia) and more ), South America (Brazil, Argentina, Colombia), the Middle East and Africa (Saudi Arabia, United Arab Emirates, Egypt, Nigeria and South Africa) and ROW.

Ask For Discount (Special Offer: Get 25% discount on this report) @ https://www.marketresearchintellect.com/ask-for-discount/?rid=170784&utm_source=SI&utm_medium=888

Table of Content

1 Introduction of IoT Security Solution For Encryption Market1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 IoT Security Solution For Encryption Market Outlook4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 IoT Security Solution For Encryption Market, By Deployment Model5.1 Overview

6 IoT Security Solution For Encryption Market, By Solution6.1 Overview

7 IoT Security Solution For Encryption Market, By Vertical7.1 Overview

8 IoT Security Solution For Encryption Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 IoT Security Solution For Encryption Market Competitive Landscape9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix11.1 Related Research

Complete Report is Available @ https://www.marketresearchintellect.com/product/global-iot-security-solution-for-encryption-market-size-forecast/?utm_source=SI&utm_medium=888

We also offer customization on reports based on specific client requirement:

1-Freecountry level analysis forany 5 countriesof your choice.

2-FreeCompetitive analysis of any market players.

3-Free 40 analyst hoursto cover any other data points

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

Get Our Trending Report

https://www.marketresearchblogs.com/

https://www.marktforschungsblogs.com/

Tags: IoT Security Solution For Encryption Market Size, IoT Security Solution For Encryption Market Growth, IoT Security Solution For Encryption Market Forecast, IoT Security Solution For Encryption Market Analysis, IoT Security Solution For Encryption Market Trends, IoT Security Solution For Encryption Market

Here is the original post:
IoT Security Solution For Encryption Market Size Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Science In Me

Incentives and infrastructure what govt can do to boost data centres in India – ThePrint

Text Size:A- A+

In her budget speech earlier this year, Finance Minister Nirmala Sitharaman proposed to allocate Rs 8,000 crore to set up data centres and IT parks, over the next five years. Her announcement came on the back of the Personal Data Protection Bill, 2019, which stipulates that an individuals critical and sensitive personal data must be stored in India.

A data centre is afacilitywhich stores large volumes of digital information and the modern digital economy functions around them. But the conversations around privacy, different categories of data and data localisation haveput them under the spotlight. In India, the data centre ecosystem is still in its infancy. However, thegovernment of Indiahas an ambitious plan to make thecountry a $1 trillion digital economy by 2025. Consequently, companies may find it appealing to set up data centres in India.

On the surface, the Finance Ministers announcement, the governments ambition and legislative support may sound like an inviting proposition. But a closer analysis of Indias regulatory and internet infrastructure illustrates that the country requires calibrated policy measures to ensure it becomes a regional data hub.

Also Read: India has to toe a fine line in defining non-personal data between public interest and IPR

In 2017,India ranked 134 out of 176 countries on theICT development index, a measure developed by the UNs International Telecommunication Union, to determine a countrys digital development. Poor network infrastructure quality, aided by restrictive rules and laws, is the principle reason responsible for this dismal performanceof India.

For instance,data centres may use dark fibre to overcome degraded network performance. Though expensive, these avoid latency, provide greater bandwidth, stability and security. However, dark fibrenetwork is consideredastelecom infrastructure and can only be accessed through a licensed partner. Consequently, companies who want to operate data centres are forced to enter into commercial agreements with telecom service providers, even though the service they provide is non-telecommunication connectivity. Relaxing such requirements for data centers will attract more investments and promote competition in this segment.

Lack of encryption standards which are essential to prevent breaches, especially if data is stored in one location, is another hurdle. An encryption standard ranging from 128 bits to 256 bits or more can ensure the security of sensitive information, exchanged via the Internet. Indian laws mandate varying levels of encryption. In the past, The Department of Telecom (DoT), had, prescribed weak encryption standards of 40-bits for Internet Service Providers (ISPs) and encryption above this requires specific permission. But, banking transactions need to be secured with 128-bit encryption, at the very minimum. For data to be secure, these standards will have to be strengthened across sectors.

Another hurdle is a restrictive company National Internet Exchange of India (NIXI). It allows ISPs to interconnect via exchanges in India. If the NIXI was opened up, it would lead to cost-effective data transmission between customers and enterprises. Its connection with domestic data centers, ISPs and content providers, will enable efficient traffic routing. For that to happen, data centres need to be recognised as key components of a core internet network. The London Internet Exchange (LINX) and the Amsterdam Internet Exchange (AMS-IX) allow private peering a direct connection between data centres and enterprises. As a result, data transfers are quicker and cost-effective.

Also Read: Coronavirus doesnt stop Indian Army from carrying out its annual cyber security exercise

Around the world, governments give several incentives to companiesto help them set up data centres.

Inthe US, several state governments offer low property and sales tax rates on power infrastructure, equipment and electricity to attract data centres, subject to certain investment and employment thresholds. In Florida, for example, data centres fall under the Florida Enterprise Zone incentives programme which hasa qualified target industry taxrefund incentive. Under the scheme, companies that create high wage jobs in the state are eligible for tax reimbursements on their corporate incomes, sales, intangible personal property and insurance premiums. In 2017, Swedenslashedthe tax rate on electricity used by data centres, by 97 per cent.

Other incentives include capacity development and infrastructure support. To develop the countrys data hub in Guizhou, the Chinese government encourages tertiary institutionstooffercourses in big data. Singapores data centre parks provide power related infrastructural facilities like on-site power plants, dual power feeds and redundant sources of network path diversity.

Also Read: Virus brings Digital India to govt as papers, meetings make way for e-Office, WhatsApp

Some companies in India have been quick to recognise the importance of data centres. CtrlS, a Hyderabad-based company, was the first to set up a tier-IV data centre that is available 99.95per centtimes of the year, with the most advanced facilities. Another company,STT Global Data Centres India Pvt. Ltda joint venture between Tata Communications andSingaporesSTT India DC Pte. Ltdoperates15data centres in major cities including Pune, Hyderabad, Delhi and Mumbai.

Some state governments too have recognised their importance. Maharashtra provides incentives like stamp duty exemption, VAT refund and an electricity duty exemption to companies that invest a minimum of Rs 1,500 crore to set up a data centre, according to its2015 IT policy.

Telanganas2016datacentrepolicyoffers sales tax and building fee rebates, as well as land at subsidised costs. Gujarat too offers subsidies on power tariffs and lease rentals. But restrictive labour laws in these states, blunt these incentives and act as hurdles in the path of data centres.

In 2008, the Maharashtra governmentmade it mandatoryfor all industrial enterprises to ensure that 50 per cent of their supervisory stuff and 80 per cent of all employees are locals. In 2019, the Shiv Sena-led governmentsaidthat it would enact a law to ensure 80 per cent of all private sector jobs are reserved for sons of the soil. Gujarat too istrying to implementa similar law.

In India, it is critical to have a robust telecom sector and the ability to leverage new technologies like 5G for smooth functioning of data centres. Regulatory and labour laws in the country need to change.India needs anational policy that provides clarity on licencing, harmonises standards, provides incentives, improves infrastructure and promotes the flow of data. The finance ministersBudget 2020 provisions for data centres is the springboard for such a policy.

Theauthorswork at Koan Advisory Group, a technology policy consulting firm. This article is part of ThePrint-Koan Advisory series that analyses emerging policies, laws and regulations in Indias technology sector.

Read all articles in the series here.

ThePrint is now on Telegram. For the best reports & opinion on politics, governance and more, subscribe to ThePrint on Telegram.

Subscribe to our YouTube channel.

See the original post:
Incentives and infrastructure what govt can do to boost data centres in India - ThePrint

How to encrypt a USB in Windows and Apple macOS – Explica

Very commonly used to transport all kinds of data, from photos to important documents, programs, music, etc., USB sticks are part of our daily lives, but they are also very vulnerable devices. It is common for us to leave them connected to other computers, to lose them with all our information inside them, or to find them, someone has used them, and we run the risk of being infected.

For this reason, and as the OCU advises us, we are going to encrypt a USB device in Windows and Apples MacOS:

Encrypt a USB in Windows

On Windows operating systems we have the BitLocker tool. It is a tool developed by Microsoft that usually comes pre-installed in almost all versions of its operating system.

With this tool, to encrypt a USB or hard drive you just have to go to the folder This team where all the storage units of your computer are listed. If you do not know how to get to this folder, just write its name in the Windows start menu and you can quickly access it. Then haz right click on the device and / or unit what do you want to protect and choose the option Activate BitLocker to start the process.

You will enter a window where you are given two options to unlock the unit. You have to activate the first one, Use a password to unlock the unit , and then write the password that you will use for encryption.

When you click Next, Windows will tell you that it will generate a recovery key in the event that you forget your password, it will offer to save it to your Microsoft account, in a file, or print it. Choose the option you prefer

When you press next again, you will have to choose between two encryption options: A quick one that encrypts only the space used and another slower that completely encrypts the USB memory. The difference is that the second option will also encrypt the data that you may have erased, but that could still be recovered. Choose the one you prefer and click Next.

The previous action will take you to a new window with two other options to choose the encryption mode:

New encryption mode. It is designed for fixed units of a single device such as hard drives that are inside your laptop.Compatible mode. You will have to choose if you want the USB you are going to encrypt to be used in other Windows computers. and therefore It is the most recommended option.

Press Next to go to the last window listing all the options you have chosen. If you are satisfied with everything, press Start encryption. Depending on the configuration you have chosen it will take more or less time, but generally it should not be too much. When you connect this unit to a Windows computer, first it will give you a read error. Next, it will show you a notification announcing that it is protected with Bitlocker.

When you click on it, a box will appear in the upper right part of the desktop for you to write your password. When you do, you will normally enter the unit.

Encrypt a USB on MacOS

All you have to do is connect the USB to the computer and do right click about its icon when it appears on the desktop.In the drop-down menu you will only have to choose the option Encrypt to enter the password you want to lock it with.

See more here:
How to encrypt a USB in Windows and Apple macOS - Explica

Hardware Encryption Technology Market Growth Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 – Germany English News

New Jersey, United States:The new report has been added by Market Research Intellect to provide a detailed overview of the Hardware Encryption Technology Market. The study will help to better understand the Hardware Encryption Technology industry competitors, the sales channel, Hardware Encryption Technology growth potential, potentially disruptive trends, Hardware Encryption Technology industry product innovations and the value / volume of size market (regional / national level, Hardware Encryption Technology- Industrial segments), market share of the best actors / products.

Information has been added to the report to provide a realistic view of the industry based on data from Hardware Encryption Technology manufacturers, i.e. H. Shipping, price, sales, gross profit, business distribution, etc., SWOT analysis, consumer preference, current developments and trends, drivers and limiting factors, company profile, investment opportunities, analysis of the demand gap, market size value / volume, services and products, Porters five models , socio-economic factors, official regulations in the Hardware Encryption Technology branch. Market participants can use the report to take a look at the future of the Hardware Encryption Technology market and make significant changes to their operating style and marketing tactics in order to achieve sustainable growth.

Get | Download Sample Copy @ https://www.marketresearchintellect.com/download-sample/?rid=195049&utm_source=GEN&utm_medium=888

The report examines the competitive environment scenario observed with key players in Hardware Encryption Technology sales, the profile of their business, their earnings, their sales, their business tactics, and the forecasting situations of the Hardware Encryption Technology sales industry. According to studies, the Hardware Encryption Technology sales market is very competitive and diverse due to global and local suppliers.

The Hardware Encryption Technology Sales Market Report mainly contains the following Manufacturers:

Market Competition

The competitive landscape of the Hardware Encryption Technology market is examined in detail in the report, with a focus on the latest developments, the future plans of the main players and the most important growth strategies that they have adopted. The analysts who compiled the report have created a portrait of almost all of the major players in the Hardware Encryption Technology market, highlighting their key commercial aspects such as production, areas of activity and product portfolio. All companies analyzed in the report are examined on the basis of important factors such as market share, market growth, company size, production, sales and earnings.

Report Highlights

Assessment of sales channels

innovation trends

sustainability strategies

Niche market trends

Market entry analysis

market size and forecast

The geographic department provides data that give you an overview of the turnover of companies and sales figures for the growth activity Hardware Encryption Technology for electrical meters. Here are the strengths of the geographic divisions: North America (United States, Canada and Mexico), Europe (Germany, Spain, France, Great Britain, Russia and Italy and more), Asia-Pacific (China, Japan, Korea, India and Southeast Asia) and more ), South America (Brazil, Argentina, Colombia), the Middle East and Africa (Saudi Arabia, United Arab Emirates, Egypt, Nigeria and South Africa) and ROW.

Ask For Discount (Special Offer: Get 25% discount on this report) @ https://www.marketresearchintellect.com/ask-for-discount/?rid=195049&utm_source=GEN&utm_medium=888

Table of Content

1 Introduction of Hardware Encryption Technology Market1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Hardware Encryption Technology Market Outlook4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Hardware Encryption Technology Market, By Deployment Model5.1 Overview

6 Hardware Encryption Technology Market, By Solution6.1 Overview

7 Hardware Encryption Technology Market, By Vertical7.1 Overview

8 Hardware Encryption Technology Market, By Geography8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Hardware Encryption Technology Market Competitive Landscape9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix11.1 Related Research

Complete Report is Available @ https://www.marketresearchintellect.com/product/global-hardware-encryption-technology-market-size-and-forecast/?utm_source=GEN&utm_medium=888

We also offer customization on reports based on specific client requirement:

1-Freecountry level analysis forany 5 countriesof your choice.

2-FreeCompetitive analysis of any market players.

3-Free 40 analyst hoursto cover any other data points

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven FernandesMarket Research IntellectNew Jersey ( USA )Tel: +1-650-781-4080

Email: [emailprotected]

Get Our Trending Report

https://www.marketresearchblogs.com/

https://www.marktforschungsblogs.com/

Tags: Hardware Encryption Technology Market Size, Hardware Encryption Technology Market Growth, Hardware Encryption Technology Market Forecast, Hardware Encryption Technology Market Analysis, Hardware Encryption Technology Market Trends, Hardware Encryption Technology Market

Read the original post:
Hardware Encryption Technology Market Growth Analysis, Top Manufacturers, Shares, Growth Opportunities and Forecast to 2026 - Germany English News

How WhatsApp is making it more expensive to spread misinformation – The Verge

We always have at least some reason to worry about the spread of misinformation, but we worry more about misinformation during a public health crisis. We are generally not well informed on public health issues even in good times, and so the emergence of new disease to which the human race has no natural immunity presents an incredible target for bad actors.

For example, if for whatever reason you are opposed to new 5G cellular networks, you could go on social networks and make a lot of posts suggesting that 5G networks are making the spread of the virus worse. Or you could say that 5G itself is causing COVID-19. Or you could say that the pandemic itself is a hoax, and that talk of a virus is intended to cover up the installation of 5G equipment. And if you said it often enough, and your posts got enough traction, then eventually the fringe press would write up your claims, and the misinformation would rapidly move into the mainstream.

In the United Kingdom last month, in the days after the government ordered citizens to remain in their homes, this is more or less exactly what happened. Some people are setting telephone poles on fire in an utterly misguided effort to fight back against 5G. Jim Waterson and Alex Hern talked to fact-checkers about the situation in the Guardian:

They cite the rapid growth of neighbourhood social media groups, a failure by networks to promote scientific evidence about 5G, and a terrified population looking to make sense of a world turned upside down. [...]

Tom Phillips, the editor of the factchecking organisation Full Fact, said it warned last summer about the growing prevalence of 5G health claims. But in recent weeks debunked claims about 5G had been transformed, potentially aided by the creation of new local Facebook and WhatsApp groups to help support neighbours during the pandemic. Google Trends data suggests British interest in 5G theories exploded in the final days of March, shortly after the lockdown was imposed.

Lets stipulate that fringe theories like these dont exist only on social networks and that, as the piece argues, telecoms should be doing a much better job at explaining to people what 5G is and isnt. (Heres a good overview from my colleague Chaim Gartenberg.)

But its clear that, as usual, social networks are amplifying some of these theories and helping them gain a foothold in the popular imagination. If youre Facebook, you can throw a bunch of fact-checkers and content moderators at the issue to remove viral posts and attempt to deny other fringe voices undue algorithmic promotion. But if the subject is Facebook-owned WhatsApp, the solution is murkier.

WhatsApp, after all, uses end-to-end encryption. In practice, this means WhatsApp itself cant peer into the contents of your message. There are obvious privacy benefits to an app like this, particularly in a world where far-right authoritarianism is on the rise. Will Cathcart, who runs WhatsApp, told me this week that WhatsApps commitment to privacy feels even more urgent in a pandemic-stricken world where nearly all of our communication is mediated digitally. (As an aside, the entire story of the recent Zoom backlash is that the products design enabled far too many strangers to interrupt your call.)

Part of what WhatsApp is trying to do is make what you used to do face to face possible, Cathcart told me. Part of that is privacy.

If we were talking face to face, he told me over Zoom, we probably wouldnt worry too much about someone spying on us. On a digital call, though, spying becomes a much bigger concern.

If all WhatsApp did was enable texts, calls, and chats, that would be the end of the story. But from the beginning, the app has had a feature that in at least some parts of the world transformed it into something that more closely resembles a social network like Facebook. That feature is the forward button, and I wrote about its history today at The Verge:

For much of WhatsApps existence, it was easy for users to forward a single message to as many as 256 people with just a few taps. Initially, these messages were not labeled as forwards, and the end-to-end encryption in WhatsApp could make it almost impossible for authorities to determine who might be using the app to spread hate speech or calls to violence. This triggered a crisis in India, where WhatsApp was linked to mob violence.

In 2018, WhatsApp began experimenting with limits on the number of times a message could be forwarded. It also began labeling forwarded messages for the first time, and adding two arrows to show that a message has been repeatedly forwarded. Last year, the company began limiting the number of people you can forward a single message to to five.

The occasion for my piece was the news that WhatsApp has taken another step down the path to removing the apps broadcast features: as of today, you can forward what the company calls a highly forwarded message one that it is at least five forwards away from its point of origin to just a single person.

As I note in the story, this is a soft limit. You can forward a highly forwarded message more than once just to one person at a time. (You could also just copy and paste it repeatedly.) But the amount of friction is meaningful. It effectively raises the price of using WhatsApp to spread misinformation, at least in terms of time. Misinformation will still spread on WhatsApp, just as it spreads on all messaging services. But it will spread more slowly and give fact-checkers more time to chase down the truth and promote it.

This strikes me as a healthy balance. In fact, Id say its a healthier balance than now exists on Apples iMessage another app that uses end-to-end encryption and enables mass forwarding, and is used by more than 1 billion people. Signal, the upstart messaging app funded by WhatsApp co-founder Brian Acton, uses the same scheme.

On Tuesday, the Washington Post reported that a group of Democratic senators sent a letter to WhatsApp asking that it do more to curb the spread of misinformation. But I hope the senators recognize that WhatsApp isnt the only popular encrypted messenger on the market and that its making moves that its competitors would do well to copy.

Today in news that could affect public perception of the big tech platforms.

Trending up: Facebook is giving these 400 local newsrooms grants of $5,000 each to support their coronavirus reporting as part of the Facebook Journalism Project. The company also announced a relief fund for local newsrooms struggling with the pandemic. These relief grants range from $25,000 to $100,000.

Trending up: Jack Dorsey announced he is moving $1 billion of his Square equityroughly 28 percent of his wealth to Startsmall LLC to fund COVID-19 relief and other efforts. Once the pandemic is under control he plans to shift the focus of the donations to girls health and education, as well as universal basic income.

Trending sideways: Amazon is giving partial pay to employees it sends home for showing up with a fever. Amazon is really on a run of doing almost right thing, just a few days after everyone expected they might.

Amazon has started disciplining warehouse workers who violate social distancing rules, which mandate that they stay 6 feet away from their colleagues in order to limit the spread of the coronavirus. If workers are caught twice breaking the rules, they may get fired. Heres Annie Palmer at CNBC:

Its unclear how Amazon is identifying employees who have violated the rules. In a blog post published last week, Dave Clark, who runs Amazons retail operations, said the company would use its top machine learning technologists to detect areas where it can improve social distancing in its facilities by relying on internal camera systems.

Three Amazon warehouse workers who asked to remain anonymous said they were told by site leadership that their facilities would identify individuals as they see them violate the rules, as well as by reviewing camera footage. The workers also expressed concerns that the policy would be unfairly applied to floor associates and not site leadership.

Amazon keeps changing the definition of what it considers an essential product. While the company originally said it would de-prioritize less necessary items, as of April 6th you could still order a bowling ball, a 10-pack of rubber chickens, and a prom dress in the United States, and have them show up at your door within a week. And so now I know what Im doing this weekend! (Maddy Varner / The Markup)

Amazon is postponing its major summer shopping event, Prime Day, until at least August. The company expects a potential $100 million hit from excess devices it might now have to sell at a discount. (Krystal Hu and Jeffrey Dastin / Reuters)

Some teachers are reporting that fewer than half of their students are participating in online learning. The absence rates are particularly high in schools with many low-income students, where access to home computers and internet connections can be spotty. Dana Goldstein, Adam Popescu and Nikole Hannah-Jones at The New York Times have the story:

The trend is leading to widespread concern among educators, with talk of a potential need for summer sessions, an early start in the fall, or perhaps having some or even all students repeat a grade once Americans are able to return to classrooms.

Students are struggling to connect in districts large and small. Los Angeles said last week that about a third of its high school students were not logging in for classes. And there are daunting challenges for rural communities like Minford, Ohio, where many students live in remote wooded areas unserved by internet providers.

IT contractors at Facebook have been told their physical presence is required to set up laptops for new hires and other remote employees. They have even been given letters to carry on their commutes stating that they are helping to provide essential services amid the COVID-19 pandemic. (Sam Biddle / The Intercept)

New York has 12 times as many coronavirus deaths as California. While it seemed to some that California lawmakers overreacted in early March, the decision to implement a state-wide shelter-in-place order early now seems like a necessary move. (German Lopez / Vox)

Heres what contact tracing, or tracking peoples locations via their smartphones, could look like in the US. The method, while invasive by American standards, is already working in South Korea and Singapore. (Derek Thompson / The Atlantic)

A group of disease experts is exploring using syndromic surveillance tracking aggregated data from emergency rooms to combat COVID-19. The technique was developed after 9/11 amid fears of bioterrorism. (Christina Farr / CNBC)

As government buildings throughout the US shut their doors to prevent the spread of COVID-19, many judges have moved operations online. The result is that custody hearings, bankruptcy proceedings, and abuse charges are being heard in virtual courts hosted on YouTube and Zoom. (Bloomberg)

Coronavirus has created an opportunity for tech companies to quietly lobby for long-held goals in the frantic political and economic environment created by the outbreak. Some of these involve delaying enforcement of Californias new privacy law and not reclassifying contractors as full-time employees. (David McCabe / The New York Times)

This is how coronavirus changed the way we use the internet from the devices we stream on, to the apps we use to connect with loved ones. While Americans are spending more time online, the growth hasnt been universal across all apps and services. (Ella Koeze and Nathaniel Popper / The New York Times)

Total cases in the US: At least 380,749

Total deaths in the US: At least 11,000

Reported cases in California: 16,329

Reported cases in New York: 138,836

Reported cases in New Jersey: 41,090

Reported cases in Michigan: 17,130

Data from The New York Times.

Wisconsin voters are facing a choice between protecting their health and exercising their right to vote after state Republican leaders rebuffed the Democratic governors attempt to postpone in-person voting in the presidential primary. The choice offers a grim foreshadowing of an expected national fight over voting rights in the year of COVID-19. Astead W. Herndon and Jim Rutenberg at The New York Times have the story:

The state stands as a first test case in what both national parties expect to be a protracted fight over changing voter rules to contend with the pandemic potentially the biggest voting rights battle since the passage of the Voting Rights Act of 1965. Mr. Evers was trying to push Wisconsin still further toward voting by mail.

Since the pandemic first forced stay-at-home orders across the country, many Democrats have advocated a universal vote-by-mail system in November. Republicans in several states and the president himself are pushing for as much in-person voting as possible.

Taiwan banned all government personnel from using Zoom due to security concerns. It recommended that officials use conferencing software provided by Google and Microsoft instead. (Mary Hui / Quartz)

The EU is moving ahead with its artificial intelligence regulations amid coronavirus disruptions. The proposed rules involve mandatory legal requirements for self-driving cars and biometric identification systems which could force companies to test AI prior to deployment and retrain their algorithms in Europe with different datasets to guarantee users rights are upheld. (Natalia Drozdiak / Bloomberg)

Facial recognition company Clearview AI has deep, longstanding ties to right-wing extremists. Some even helped build the app. Luke OBrien at HuffPost reports:

With the coronavirus pandemic increasingly throwing the country into chaos and President Donald Trump moving to expand domestic surveillance powers in theory, to better map disease spread Clearview has sought deeper inroads into government infrastructure and is now in discussions with state agencies to use its technology to track infected people, according to The Wall Street Journal. [...]

What hasnt been reported, however, is even scarier: Exclusive documents obtained by HuffPost reveal that Ton-That, as well as several people who have done work for the company, have deep, longstanding ties to far-right extremists. Some members of this alt-right cabal went on to work for Ton-That.

Facebook quietly released a new messaging app for couples called Tuned. The app lets two people send each other text and voice messages, along with photos and songs, after adding each others phone numbers. People have been building various versions of this app for years, and none has been a hit so far. (Alex Heath / The Information)

Mark Zuckerberg promised Instagram founder Kevin Systrom independence. But an excerpt from Sarah Friers book No Filter shows that once Instagram started to compete with Facebooks products, that independence gradually eroded. Ill have a lot more to say about this very good book, and soon! (Sarah Frier / Bloomberg)

Facebook Gaming launched tournaments for esports amateurs in early access across the globe. The tournament feature has been in the works for a while, but the company decided to release it early to help people cope with social isolation. (Dean Takahashi / VentureBeat)

Stuff to occupy you online during the quarantine.

Watch Mark Zuckerberg and Priscilla Chan interview Dr. Don Ganem, a leading infectious disease specialist, about developing treatments for COVID-19.

Read Tom Fords tips for looking good on video chats.

Apply for a grant to aid with coronavirus research. Or tell a scientist about it. Or donate to this effort! Cool project from Stripe co-founders Patrick and John Collison and some others.

Download yet another virtual Zoom background from this fun collection. Or this fun collection from the Hallmark Channel!

Send us tips, comments, questions, and WhatsApp forwards: casey@theverge.com and zoe@theverge.com.

View original post here:
How WhatsApp is making it more expensive to spread misinformation - The Verge

Zoom should be criticized for poor communication rather than privacy, security, expert says – ND Newswire

The video platform Zoom has experienced overnight success with offices and schools closed around the world due to the coronavirus pandemic. The increased usage has resulted in a string of security concerns, which, according to a University of Notre Dame cybersecurity and privacy expert, have largely been blown out of proportion.

Zoom is not dealing with a security and privacy crisis, its facing a communication and transparency crisis, according to MikeChapple, associate teaching professor of IT, analytics and operations at Notre Dames Mendoza College ofBusiness.

Zooms recent privacy and security issues arent any more significant than those facing any other tech company, and Zoom has quickly moved to correct each one of them, said Chapple, a former computer scientist with the National Security Agency. The challenge Zoom faces is that they were a specialized niche company that was suddenly thrust into the role of a critical infrastructure provider overnight and they simply werent ready for the intense level of scrutiny that theyve received as a result.

Perhaps the most publicized of Zooms woes is the practice of Zoombombing where people join unsecured Zoom calls and disrupt private conversations.

These arent the result of a security flaw in Zoom, Chapple explained. Zoombombing occurs when people either dont use a password to secure their Zoom meeting or give out the password on a public forum. You can protect yourself against this by following some simple best practices, such as not publishing your meeting password, using a waiting room to control access to your meeting and restricting screen sharing.

Zoom also has been criticized fornot offering end-to-end encryptionfor videoconferences, an approach Chapple says most people never use.

Its true that Zoom doesnt offer this level of encryption, Chapple said. Thats because its technically very difficult to do so. Look at the other major videoconferencing providers.Skype,Microsoft Teams andBlueJeansdont offer end-to-end encryption either. Its simply not a reasonable security expectation. Cisco WebEx does offer an end-to-end encryption option, butchoosing that option disables major features of the platform, including the ability to record a meeting.

Chapple points out that Zoom did make a major mistake in this area by publishing a false claim that the service supported end-to-end encryption. Theyve sinceapologized and published a technical descriptionof exactly how their encryption works.

There also have been reports ofZoom video recordings appearing on public websitesand cloud storage services, but Chapple says there is no indication this was Zooms doing.

Zoom offers a recording feature to meeting hosts anddiscloses to all participants when a meeting is being recorded, he said. At the end of the meeting, the host gets a copy of the video file. If they post it on an open forum, its not reasonable to hold Zoom accountable for the meeting hosts actions.

While researchers have identified afew security flaws in Zooms technologyover the past few weeks, Chapple says thats not unexpected for a platform suddenly thrust into the spotlight.

The reality is that every software product has critical security flaws that we simply havent discovered yet, he said. Zoom reacted to each one of these with apatch that corrected the problem. Thats what any responsible technology company would do.

Where Zoom really failed, according to Chapple, is with their pre-pandemic privacy policy.

It containedsome truly awful terms and conditionsthat basically granted the company the right to access private meeting information. After some scathing public criticism, Zoomrevised their privacy policyto align with industry best practices.

"If youre worried about the privacy and security issues at Zoom, dont use the service. Personally, Ive found Zoom to be a crucial part of my ability to teach and work from home. Im comfortable that theyre focusing on correcting security issues quickly and have built a platform that is scalable, reliable, and secure.

Contact: Mike Chapple, mchapple@nd.edu

Follow this link:
Zoom should be criticized for poor communication rather than privacy, security, expert says - ND Newswire