Meet ZCash, the cryptocurrency that protects your privacy better than Bitcoin – Nairametrics

Tether,the third most valuable cryptocurrency witha market capitalization of about $9.1billion,is expectedtopass Ethereum ($27 billion))as the number two cryptocurrency,on the strength of the dollar.

Bloomberg News reportedrecentlythatthere is ahigh probabilitythat it expects Tether (USDT)tooutsize Ethereum (ETH) in market capitalization.

The report outlines the organic growth of Tethers market capitalization as one of the major reasons for the gain Bitcoin (BTC) is presently having in the mid-term.

Interest in digital links to the dollar represents the need tohandleand store value in the worlds reserve currency without an intermediary.

(READ MORE:Bitcoin loses $1500 in 3 mins, pigs get slaughtered in BTC market)

What you need to know:Tether is designed as a blockchain-based cryptocurrency whose digital coins in circulation are backed by the same value of traditional fiat currencies, like the U.S dollar, Japanese Yen, or the Euro. It trades under the ticker symbol USDT.

Recall that Nairametricsearlierreported how Tether had overtaken XRP (XRP) asthe number three most valuable cryptocurrency by market capitalization. Bloomberg reports added that the momentumwith the help of the U.S dollaris expected to makeTether gainand moveto the second spot:

Absent an unlikely reversal in predominant crypto trends, it should be a matter of time until Tether passes Ethereum to take the No. 2 spot in total assets behind Bitcoin.Receiving helpfrom widespread adoption witha workablecase as a proxy for the worlds reserve currency, there seems little to stop the increasing adoption of the dollar-linked stable coin.

READ MORE: Did Satoshi Nakamoto cause the panic sell-off in Bitcoin market

Also,Bloombergs report expectsTether to rise based onEthereumslimited upside.

We see little upside in the ETH price absent a rising tide from Bitcoin. The pre-eminent crypto is breaking away from the pack in terms of adoption and is supported by almost-ideal macroeconomic conditions for stores-of-value amid quantitative easing.

Tether is in a similar position. Strengthening Dollar Supports Stable Coins. The advancing dollar will fuel demand for the Tether stable coin, in our view. In terms of gold and Bitcoin, the dollar is depreciating, butit isgoing in the other direction vs. most other currencies.

READ ALSO: Nigeria and China finalize currency swap deal; The low down explained

The greenback appears best positioned as global currency valuesretreat, with all facing unlimited supply.

Tether and stable coins are gaining traction as vehicles for dollar exposure without intermediaries and for transferring value among the numerous highly speculative and volatile crypto assets.

Original post:
Meet ZCash, the cryptocurrency that protects your privacy better than Bitcoin - Nairametrics

Journalism Without Fear: Despite Threats to Press Freedom, Hope Remains Editor & Publisher Magazine- Newspaper & News Publishing Industry…

Editors Note: This story was assigned and published in our June print issue before the attacks on journalists covering the protests over the killing of George Floyd took place. We support our fellow journalists on the ground and condemn any acts of violence against them.NY

Last month, the media industry commemorated World Press Freedom Day on May 3 in the middle of a global pandemic. According to the United Nations Educational, Scientific and Cultural Organization (UNESCO), for nearly 30 years, World Press Freedom Day has acted as a reminder for governments to respect their commitment to press freedom; it has supported media which are targets for the restraint, or abolition, of press freedom; and it has remembered the journalists who lost their lives in the pursuit of a story.

This year, UNESCO launched a global campaign on media and social media channels, with a focus on Journalism without Fear or Favour (sic) in an increasingly complex media landscape.

As the (COVID-19) pandemic spreads, it has also given rise to a second pandemic of misinformation, from harmful health advice to wild conspiracy theories. The press provides the antidote: verified, scientific, fact-based news and analysis, UN Secretary-General Antnio Guterres said on the UNESCO website.

Now more than ever, we know that freedom of the press is imperative.

Trumps Rhetoric

No countrys administration has a perfect relationship with the media. Nevertheless, President Trump administrations hostility towards the U.S. press seems to be unmatched. His weapon are his harmful words, in particular the ones he spread on social media.

According to the U.S. Press Freedom Tracker, a database of press freedom incidents in the U.S., on April 11, Trump reached his 2,000th attack on the media when he tweeted in regard to a New York Times report which traced the origins of New York COVID-19 cases to Europe and not China.

According to our analysis of more than 19,400 of Trumps tweets, 2,000 means that he has, on average, tweeted negatively about the press more than once a day for the past 4.5 years, the report stated.

These kinds of relentless attacks can take a toll, and we know that that was the presidents aim because he told (CBS News correspondent) Lesley Stahl that the goal was to undermine journalists so that when they wrote negative stories about him people wouldnt believe the stories, said Sarah Matthews, staff attorney for the Reporters Committee for Freedom of the Press (RCFP).

She pointed to a recent Pew Research Center report which showed that while Democrats trust in many news outlets has remained stable or increased since 2014, Republicans have reported greater distrust for 14 of 20 news sources that were highlighted, including CNN, the New York Times and the Washington Postthree frequent targets of Trumps criticism.

One of the most chilling effects of Trumps rhetoric is the impact that it has had on press freedom worldwide. Countless examples exist. The Trump Administration and the Media, a report written by former Washington Post editor and current Arizona State University professor Leonard Downie Jr. published in April, provides a good snapshot. According to the report, between January 2017 and May 2019, at least 26 countries have enacted or introduced laws and government rules restricting online media and journalists access in the name of fake news.

When the President of the United States is saying its okay to attack the media that they are the enemy of the people, that they are fake news, youre going to see authoritarian leaders around the world take that and run with it, Matthews said.

The Law and the Press

Last year, journalists in the U.S. saw 27 subpoenas, nine searches and seizures, seven prior restraints and nine arrests, according to the U.S. Press Freedom Tracker. Unfortunately, there are many ways that governments and/or government officials have attempted to use legitimate laws to attack the press.

The most disturbing may be the governments use of the 1917 Espionage Act to indict government officials a.k.a. journalists sources. The utilization of this law became a trend in the Obama administration, which prosecuted eight government employees and contractors for leaking classified information, according to Downies report. The Trump administration took to utilizing this law as well. By the end of 2019only three years in the administrationthey had indicted eight government employees and contractors.

New York Times national security reporter Scott Shane told Downie in his report, more sources have begun to utilize encryption tools. However, its clear that the point is to discourage sources from even coming forward.

Julian Assange, the founder of WikiLeaks, who obtained secret military and diplomatic documents and published them on the WikiLeaks site in 2010 was also charged of violating the Espionage Act. In May 2019, he was indicted on 17 counts of violating the law.

Thats one of the most significant and disturbing things that weve seen because the multiple charges against Assange is for the simple act of publishing government secrets, and that is the first time in history that the government has actually obtained an indictment on that theory, Matthews said. So, this could have future implications for the press because thats the job of a journalistto publish what the government is doing.

Journalists in many other countries also struggle against the governments laws. In China, President Xi Jinping has succeeded in imposing a social model in China based on control of news and information and online surveillance of its citizens, according to the Reporters Without Borders (RSF) 2020 World Press Freedom Index. In addition, the countrys state and privately-owned media are under the Communist Partys close control, and foreign reporters face many obstacles.

In March, RSF called on Chinese authorities to end their harassment of foreign reporters after a Foreign Correspondents Club of China report revealed that in 2019, foreign journalists were experiencing an increase in harassment and acts of violence. For example, 82 percent of the surveys respondents experienced interference, harassment or violence; 51 percent were obstructed by police or officials; and 28 percent were placed under physical surveillance at one point or another.

The Guardian recently reported that in Egypt, as the numbers of coronavirus cases continue to rise, the government has strengthened its control over what kind information is reported. Those who spread false news about the coronavirus may face up to five years imprisonment and steep fines. The Guardian reported that at least 12 individuals have been caught in this crackdown.

The article also points out that journalism has become a crime over the past four years in the country, that is according to Amnesty International, a non-governmental organization focused on human rights. The group has also recorded many journalists that have been detained in recent years under a broad 2015 counterterrorism law which expanded the definition of terror to include all kinds of opposition.

Tracking Misinformation

Tech giants in the U.S. have faced criticism to fix the issue of misinformationparticularly after the 2016 presidential election, which led Facebook to create a network of fact checkers and other methods to flag fake news. However, in many other countries, press freedom has suffered greatly because of misinformation.

Recently, Singapore adopted a law to prevent the electronic communication in Singapore of false statements of fact. CNN explained that under this law, government ministers can decide whether to order something deemed fake news to be taken down, or for a correction to be put up alongside it. In addition, companies like Facebook and Google can be ordered to block accounts or sites spreading false information.

The COVID-19 pandemic has only ramped up the spread of misinformation. In response, U.S. tech companies are ramping up their efforts. Twitter recently broadened its definition of harmful content to include denials of global or local health recommendations, while other countries are passing strict laws prevent free speech.

As reported by the Committee to Project Journalists (CPJ), Puerto Ricos Governor Wanda Vzquezrecently signed an amendment to the islands Public Security Law. The revision makes it illegal for media outlets or social media accounts to transmit or allow the transmission of false information relating to government proclamations or executive orders concerning COVID-19 or other disasters.

While the intentions might be pure, these new regulations threaten journalistic practices by allowing government officials the power to decide what is fake news or misleading information.

Moving Forward

While journalists around the world continue to do their work, its important to educate the public about the importance of a free press. Fortunately, there are already efforts like this within the industry. An example is the Washington Posts Press Freedom Partnership initiative which, through complimentary advertising, highlights organizations like CPJ and the International Press Institute.

These organizations work diligently to defend journalists and the free press, especially in authoritarian countries. They can provide much needed support in countries where journalism has suffered blows as a result to the misinformation crisis. Its vital that the industry continues to support these organizations.

The recent COVID-19 pandemic has only agitated the news industrys financial issue, leading to substantial cutbacks, layoffs and furloughs in newsrooms around the world. In April, the New York Times reported an estimated 36,000 employees of news media companies in the U.S. had been laid off, furloughed or had their pay reduced.

However, there is hope.

Multiple organizations have jointly called on Congress to provide support to journalism in the next coronavirus stimulus bill. The Seattle Times has also made a call to Congress through their Free Press Initiative (which reports on issues the free press faces and advocates for policy change) to help see journalism through the pandemic. Inspired by the free press system that the Founding Fathers created, which included government subsidization, publisher Frank Blethen started the Free Press Initiative to re-establish Americas free press in a modern era.

In the call to Congress, Blethen outlines reforms for getting the press through the current pandemic and the longer term. First, he writes, Congress should provide significant stimulus funds based on newsroom head count to all daily newspapers regardless of their ownership or affiliation. To participate, newsrooms will need to maintain staff for six months and those that do will receive a second round of funds.

Matthews also brought up the progress in New Jersey to implement a model for local news. As reported by Nieman Lab, the plan is to create community information districts nationwide, which would collect tax-like funding from residents (and) use it to support local journalism and other information goods.

On the other hand, Blethen thinks a free press fund should be created and funded by a fee made on the ad revenue from major internet platforms like Facebook and Google. In addition, Blethen calls for ownership reform to prioritize local ownership. When asked about the future of press freedom, Blethen was also adamant that the government provide relief if journalism is to survive the next several months.

If we do the right things, I think well see a very rejuvenating free press within the next five years, he said.

However, Matthews said that at the end of the day, those in the U.S. are fortunate that they are the home of the First Amendment.

Free speech and free press principals are deeply ingrained in U.S. culture and I think we will prevail, Matthews said. We have a strong, a very robust, independent and diverse news media. And I think they will continue to do their jobs.

More:
Journalism Without Fear: Despite Threats to Press Freedom, Hope Remains Editor & Publisher Magazine- Newspaper & News Publishing Industry...

The Week That Was: All of Lawfare in One Post – Lawfare

As America responds to the killing of George Floyd by a white police officer in Minneapolis, Jen Patja Howell shared an episode of the Lawfare Podcast, featuring an interview with Dr. Rashawn Ray about the mechanisms of police violence, implicit bias, and what policy levers are available to bring an end to the rash of police killings:

Scott Anderson and Michel Paradis explored the Trump administrations ability to deploy military forces within the U.S. and the limitations of the Insurrection Act.

And Patja Howell shared a joint episode of the Lawfare Podcast and the National Security Law Podcast discussing the presidents threat to invoke the Insurrection Act with Bobby Chesney, Steve Vladeck and Benjamin Wittes:

Hundreds of Department of Homeland Security officers were called up this week to provide security within the District of Columbia. Carrie Cordero argued that the Departments law enforcement agencies require expanded oversight.

Patja Howell shared an episode of Rational Security discussing the role of Bill Barr and the Justice Department in responding to the recent protests, and Trumps use of other federal forces:

Daniel Byman argued that policymakers and law enforcement should keep a careful eye on whether white supremacists work to accelerate civil disorder amid protests over the death of George Floyd. Elliot Setzer shared the criminal complaint against three alleged far-right anti-government extremists charged with conspiracy to incite violence at a Las Vegas Black Lives Matter protest. And as demonstrations continued in major cities around the country, Susan Hennessey and Margaret Taylor outlined how Congress could work together to calm the country.

Richard Altieri and Benjamin Della Rocca analyzed Trumps revocation of Hong Kongs special status, and Chinas push to win the global tech race. Peter E. Harrell explained how the U.S. could respond to Beijings attempts to restrict Hong Kongs autonomy. And Setzer shared a livestream of a Senate Banking, Housing and Urban Affairs Committee hearing on the crisis in Hong Kong.

Wittes analyzed Rod Rosensteins peculiar testimony to the Senate Judiciary Committee earlier this week, arguing the the former deputy attorney general made claims contradicted by much of the known record. Setzer shared a recording of the Committees hearingthe first in a series on oversight of the Crossfire Hurricane investigation.

Patja Howell shared an episode of the Lawfare Podcast in which Jack Goldsmith spoke with Bart Gellman, author of the new book, Dark Mirror: Edward Snowden and the American Surveillance State:

Stewart Baker also shared an episode of the Cyberlaw Podcast featuring an interview with Bart Gellman:

Setzer shared Judge Emmet Sullivans brief submitted to the D.C. Circuit Court of Appeals outlining his rationale for declining to immediately dismiss the case against Michael Flynn. Setzer also shared the Justice Departments brief urging the D.C. Circuit to force Sullivan immediately to dismiss the prosecution of Flynn.

Charlie Martel argued Congress should investigate the Trump administrations coronavirus response. And Herb Lin offered some ways that lessons from cybersecurity and the pandemic can inform one another.

Charles Duan and Jeffrey Westling argued that Trumps executive order on Section 230 has already harmed online speech. Elliot Setzer shared the Center for Democracy and Technologys challenge to the constitutionality of the executive order. And as political pressure is mounting against broad liability protections for online platforms, Yuval Shany outlined a better way forward for regulating offensive online speech.

Jacob Shulz shared a ruling from a military commissions judge holding that torture can be a factor in sentencing.

Edward Fishman discussed how to fix Americas failing sanctions policy.

Patja Howell shared an episode of the Lawfare Podcast in which Evelyn Douek and Quinta Jurecic spoke with Ryan Merkley of the Wikimedia Foundation about why Wikipedia works:

Jason Blazakis argued the State Department decision to add Cuba to the Not Fully Cooperating Country list could signal a more aggressive policy.

Setzer shared a livestream of a House Homeland Security Committee hearing on election security and integrity during the pandemic.

Jason Healey argued the cyber budget shows what the U.S. valuesand it isnt cyber defense.

Paul Rozenzweig reviewed P.W. Singer and August Coles recent book, Burn In: A Novel of the Real Robotic Future.

Justin Key Canfil argued there is no clear explanation for why the Trump administration believes withdrawal from the Open Skies Treaty serves U.S. interests.

Emma Broches discussed Southeast Asias overlooked foreign fighter problem.

Patja Howell shared an episode of the Lawfare Podcast discussing covert action, regime change and international law with Michael Poznansky, an assistant professor of International Affairs and Intelligence Studies at the University of Pittsburgh:

And Mikhaila Fogel shared an invitation to a career panel webinar and Q&A with Lawfares senior team, on Tuesday, June 9, at 11:00 a.m. ET.

And that was the week that was.

Continued here:
The Week That Was: All of Lawfare in One Post - Lawfare

The Cyber Threat Facing Pakistan The Diplomat – The Diplomat

Asia Defense|Security|South Asia

The threat of Indian cyberattacks against Pakistan becomes more serious given Indias growing cybersecurity cooperation with Israel.

In 2019, the mobile phones of some senior Pakistani officials were hacked for covert surveillance. The hacking was done via WhatsApp using a special type of malware called Pegasus, allegedly developed by Israeli spyware company the NSO Group. The malware could infiltrate a phone by making a missed call on the targeted WhatsApp number and turn on the phones camera and microphone as well as gain access to messages, emails, contacts, and passwords. The malware also has the capability of determining GPS location. After the hacking incident, reports suggested that the Pakistani government was working on developing an alternative to the WhatsApp application for protecting sensitive or classified information.

It still remains unknown who had targeted the Pakistani officials. However, concerns were exacerbated after reports emerged that Indian intelligence agencies were using the same Israeli spyware to carry out surveillance of Indian lawyers, opposition political leaders, human rights activists, and members of civil society.

In recent years, India has stepped up efforts to strengthen its defensive and offensive cyberwarfare capabilities. Due to its rivalry with Pakistan, both countries could potentially target the other with cyberattacks. Although neither Pakistan nor India has carried out a large-scale cyberattack against each other so far, small-scale cyberattacks between both neighbors are becoming frequent. Web vandalism especially is very common.

The threat of Indian cyberattacks against Pakistan becomes more serious given Indias growing cybersecurity cooperation with Israel. The latter is a center of cybersecurity research and development. In June 2019, Israeli Prime Minister Benjamin Netanyahu, while speaking at the 9th Annual International Cybersecurity Conference, said, I set the goal for Israel of becoming one of the top five cybersecurity powers in the world Its a goal we have met. He emphasized, When it comes to cybersecurity, Israel has invested more than any other country proportionally. Indian policymakers are now also looking towards Israels Talpiot training program, which is the first of its kind in the world. Under this program, Israeli Defense Forces recruit some of the countrys most talented and innovative young individuals and then teach them advanced physics, mathematics, and computer science. It is known for producing experts that bolster the Israeli militarys research and development and cybersecurity.

In March 2013, former CIA contractor Edward Snowden revealed that Pakistan was among the countries most targeted for surveillance by the U.S. National Security Agency (NSA). In June 2017, Pakistans Senate Committee on Foreign Affairs also warned the government that Pakistan was a principal target of cyberespionage. With Pakistan being one of the top targets of foreign espionage, there are increased calls within the country to devote more resources for securing computer systems, investing in the security of the countrys digital infrastructure, and strengthening cybersecurity research and development. Pakistan also needs a strong cybersecurity framework to counter identity theft, financial data theft, and surveillance of critical infrastructure.

Enjoying this article? Click here to subscribe for full access. Just $5 a month.

The government needs to invest in modernizing its agencies to enable them to deal with cyber threats. Currently there is no agency or organization fully committed to the countrys cybersecurity. Pakistan needs a full-fledged agency for protecting the country from cyberattacks. For example, the United States has the Cybersecurity and Infrastructure Security Agency (CISA) and Israel has Unit 8200 or the National Cyber Security Authority (NCSA). In Pakistan, the National Response Center for Cyber Crime (NR3C), a unit of the Federal Investigation Agency (FIA), deals with cybercrimes; however, it lacks the capacity to shield the countrys critical national infrastructure and is deficient in resources, manpower and facilities.

Pakistan also lacks sufficient legislation for countering cyber threats. In 2016, Pakistan passed a cybercrime law called the Prevention of Electronic Crimes Act, 2016; however, the act does not cover many crucial aspects of cybersecurity. Pakistan needs more stringent cybersecurity regulations that require companies and organizations to protect their computer systems and information from cyberattacks. The regulations should mandate government departments, the energy industry, as well as healthcare and financial institutions to protect their computer systems and information from being breached. Such measures are particularly important since the systems of almost all organizations are now connected to the internet and are becoming dependent on artificial intelligence and big data analytics. This makes them a vulnerable target for hackers. Cybersecurity experts, however, argue that companies will not invest in cybersecurity unless governments compel them.

Pakistan needs to realize the dire threat to its critical infrastructure and the government should make all out-efforts to ensure the security of interconnected infrastructures of the country. For this it is important to identify the national infrastructure that remains critical to the national and economic security of Pakistan. In sum, it is important for Pakistani policymakers to identify the immediate and future cyber threats and formulate a cybersecurity strategy accordingly. Pakistan cannot ensure comprehensive national and economic security without effectively managing these threats.

Muhammad Abdul Qadeer is a Fellow at the Strategic Studies Institute Islamabad (SSII). His area of research focuses on South Asian politics. Follow him on Twitter @MuhamadAQadeer

The rest is here:
The Cyber Threat Facing Pakistan The Diplomat - The Diplomat

How to Get the Most Out of Signal and Encrypted Chat – WIRED

As police-brutality protests continue throughout the United States, people have increasingly turned to the encrypted messaging app Signal, and for good reason. As law enforcement increasingly surveils crowds, Signal represents most peoples best way to communicate safely. And thanks in part to a $50 million infusion from former WhatsApp CEO Brian Acton over two years ago, the formerly niche app is more accessible than ever.

For the first few weeks of May, Signal saw between 9,000 and 10,000 downloads each day across iOS and Android, according to the analytics company Apptopia. On May 31 that number jumped to nearly 15,000. On Wednesday alone, around 32,000 people installed it. By doing so, they can now take advantage of Signals end-to-end encryption, which means that no onenot the government, your phone company, or Signal itselfcan read the contents of messages as they pass between devices.

Signal is not the only end-to-end encrypted messaging app; iMessage has it, as do stand-alone apps like Telegram. But Signal stands apart, both for its rich features and the fact that its code has been open source for years, meaning cryptographers have had plenty of opportunities to poke and prod it for flaws.

WIRED has long encouraged readers to use Signal. Here, were offering tips on how to get the most out of it once you do.

Know Its Limits

For those who are new to encrypted messaging, the most important thing to remember is that its not magic. Having Signal on your phone does not make you invincible. Most importantly, remember that if youre messaging with someone who doesnt have Signal installed, nothings encrypted. It only works for Signal-to-Signal communications. And make sure you have a strong password on your phone in the first place, since anyone who has physical access to your device can still read your messages.

Signal also has a desktop app, which should be plenty secure for the vast majority of people; just be aware that desktop environments face a litany of threats. And using Signal on multiple devices means more places your messages can be compromised or stolen.

Get Set Up Safely

Signal requires you to provide a phone number when you join, which essentially serves as your user name. That doesnt mean you have to use your actual phone number, though. To avoid giving it up, use a Google Voice number instead.

To do so, head to Google Voice in your browser, log in with a Google account, and select a new phone number. Google will ask you to verify it by providing your actual phone number, where itll send a code that will let you complete your registration. You can now use that Google Voice number for your Signal account, keeping it separate from your main line.

You should feel comfortable letting Signal access your devices contacts; it stores that information on your phone, not in the cloud. The app does periodically send truncated, hashed phone numbers back to Signal's servers, which is how it checks if any of your contacts are also using it, but it also says it discards that information immediately. That way, the app can alert you when one of your contacts signs up for Signal; if youd rather not get those updates, tap your profile icon, then Settings, then Notifications, and toggle off Contact Joined Signal.

On Android, you can make Signal your default messaging app by going to Settings > Apps & notifications > Advanced > Default Apps > SMS app, and picking Signal. Just remember that not everyone you text also has it installed, and that an iOS user you're texting with might check their Signal app less often than iMessage. (iOS still doesnt let you change the default messaging app, sorry!)

More:
How to Get the Most Out of Signal and Encrypted Chat - WIRED

IBM Fully Homomorphic Encryption Toolkit Now Available for MacOS and iOS – InfoQ.com

IBM's Fully Homomorphic Encryption (FHE) Toolkit aims to allow developers to start using FHE in their solutions. According to IBM, FHE can have a dramatic impact on data security and privacy in highly regulated industries by enabling computing directly on encrypted data.

Broadly classifiable within the same arena as secure multi-party computation, Homomorphic Encryption is an approach to secure computation that does not require decrypting your data in order to process them. Instead, homomorphic encryption enables processing ciphertexts with the guarantee that encrypted results match those that would be produced by first decrypting input data, processing them, and finally encrypting them.

Homomorphic Encryption (HE) can be partially homomorphic, somewhat homomorphic, leveled fully homomorphic, or fully homomorphic, depending on the number and kind of allowed primitive operations. For example, partially homomorphic encryption only uses one type of operation, either addition or multiplication, that can be applied an unlimited number of times to the ciphertexts. The commonly used RSA algorithm is a kind of partially homomorphic encryption. Somewhat homomorphic encryption may use one kind of operation, just like partially homomorphic, but it can only be performed a limited number of times. Fully homomorphic encryption, instead, enables using both addition and multiplication an unlimited number of times.

According to IBM researcher Flavio Bergamaschi, FHE is well suited to industries with strict regulations, such as finance and healthcare.

IBM Fully Homomorphic Encryption Toolkit is based on HELib, an open source HE library providing a number of low-level routines such set, add, multiply, shift, and others, along with higher-level features for automatic noise management, multi-threading, and so on.

IBM Research helped pioneer FHE in 2009 with the creation of HeLib, which has grown to become the worlds most mature and versatile encryption library. Since then, we have made significant strides in performance, achieving over a 100x improvement in speed that allows FHE to be leveraged in the applications we rely on in our everyday lives.

Homomorphic encryption requires a specific skill-set for programmers and IBM HFE Toolkit aims to make it easier for them to start using this technology.

It was no small feat to synthesize 11 years of top-notch cryptography research into a streamlined developer experience that is accessible and freely available to anyone in the time most people would spend to brew a pot of coffee or de-clutter a desk.

As mentioned, IBM initial release supports macOS and iOS, with Linux and Android coming soon. The toolkit provides a ready-to-use playground including a sample app that perform a query on an encrypted database. The query takes about 80 seconds on a MacBook Pro and the relevant code is shown below:

Homomorphic encryption is still a rather young field which attracts lots of research efforts. IBM is not the only company investing on homomorphic encryption. Microsoft, for instance, released SEAL (Simple Encrypted Arithmetic Library), and Google recently unveiled its Private Join and Compute tool.

Read more from the original source:
IBM Fully Homomorphic Encryption Toolkit Now Available for MacOS and iOS - InfoQ.com

A new Java-based ransomware targets Windows and Linux – TechCrunch

Security researchers have discovered a new kind of ransomware that uses a little-known Java file format to make it more difficult to detect before it detonates its file-encrypting payload.

Consulting giant KPMGs incident response unit was called in to run the recovery effort at an unnamed European educational institute hit by a ransomware attack. BlackBerrys security research unit, which partners with KPMG, analyzed the malware and published its findings Thursday.

BlackBerrys researchers said that a hacker broke into the institutes network using a remote desktop server connected to the internet, and deployed a persistent backdoor in order to gain easy access to the network after they leave. After a few days of inactivity to prevent detection, the hacker re-enters the network again through the backdoor, disables any running anti-malware service, spreads the ransomware module across the network and detonates the payload, encrypting each computers files and holding them hostage for a ransom.

The researchers said it was the first time theyve seen a ransomware module compiled into a Java image file format, or JIMAGE. These files contain all the components needed for the code to run a bit like a Java application but are rarely scanned by anti-malware engines and can go largely undetected.

BlackBerry named the ransomware Tycoon, referencing a folder name found in the decompiled code. The researchers said the module had code that allows the ransomware to run on both Windows and Linux computers.

Ransomware operators typically use strong, off-the-shelf encryption algorithms to scramble victims files in exchange for a ransom, often demanded in cryptocurrency. For most victims, their only options are to hope they have a backup or pay the ransom. (The FBI has long discouraged victims from paying the ransom.)

But the researchers said there was hope that some victims could recover their encrypted files without paying the ransom. Early versions of the Tycoon ransomware used the same encryption keys to scramble their victims files. That means one decryption tool could be used to recover files for multiple victims, the researchers said. But newer versions of Tycoon seem to have fixed this weakness.

BlackBerrys Eric Milam and Claudiu Teodorescu told TechCrunch that they have observed about a dozen highly targeted Tycoon infections in the past six months, suggesting the hackers carefully select their victims, including educational institutions and software houses.

But, as is often the case, the researchers said that the actual number of infections is likely far higher.

See the original post:
A new Java-based ransomware targets Windows and Linux - TechCrunch

IBM toolkit keeps data encrypted in iPhone and Mac apps while in use – Engadget

Its now more practical to keep data encrypted while you use it, provided youre using an Apple device. IBM has released (via ZDNet) a toolkit that makes it easier to implement fully homomorphic encryption (FHE) in iOS and macOS apps. In theory, hackers will have a tougher time prying on certain kinds of sensitive information that would normally need to be decrypted, like your financial or medical data. Apps can selectively decrypt content, too, so a user can only get the data theyre meant to see.

The kit is available on GitHub (iOS, macOS) now, with Android and Linux versions expected in a few weeks. IBM has cautioned that theyre not perfect or final, and that they wont always be useful. They might, however, be complete enough to bolster the security in cases where even temporary decryption might pose a security risk.

More here:
IBM toolkit keeps data encrypted in iPhone and Mac apps while in use - Engadget

Advice on software for public key encryption of messages and files – Encryption Methods and Programs – BleepingComputer

I'm interested in running some software to allow me to encrypt messages or files (any arbitrary format) using public key cryptography. Specifically I need:

Something which can run on a linux PC, I have no smartphone at all to run apps, but also run on a variety of devices other people might be using. Running in a browser might be good for compatibility, so long as it wouldn't require an internet connection, just be a local html page with bits of javascript or what have you stored in a file on your machine which you could open up in the browser when you needed it.

It needs to be something which is not reliant on internet connectivity, something which one could choose to put one's encrypted messages into any format to send them, as an attachmenet to an email or even a CD disc through the post.

Source code must be open, and have been vetted by some group independent of the software's producers.

It needs to be relatively user friendly, I've heard that PGP/GPG is not, I mainly want something where you just feed it a file/text you wish to encrypt, tell it the public key of the receiver (pre-arranged somehow) and out comes and encryted copy to send to them. Or as the receiver you feed it the encrypted file, supply your private key and out comes a decrypted copy.

Can anyone recommend anything? Thanks

Edited by rp88, 04 June 2020 - 05:07 PM.

My systems:2 laptops, intel i3 processors, windows 8.1 installed on the hard-drive and linux mint 17.3 MATE installed to USB

Read more:
Advice on software for public key encryption of messages and files - Encryption Methods and Programs - BleepingComputer

Facebook admits they dont know how to remove child abuse images when encryption kicks in – The Sun

CLUELESS Facebook last night admitted they do not know how to take down sick child abuse images when they bring in encryption.

The Silicon Valley giant has enraged cops and governments worldwide by vowing to make all messages on its platforms secret.

1

It will mean only the sender and recipient can see what's in Messenger and Instagram direct messages.

Monika Bickert, Facebook's head of counter-terrorism, confessed the company would no longer be able to see messages containing child abuse.

And she revealed they have still not come up with a plan to keep kids safe online.

Her comments to the culture select committee horrified MPs who lashed the firm for having no idea how they will protect youngsters.

Grilling the Facebook boss, Labour MP Yvette Cooper demanded to know: So once they are end to end encrypted, if an offender uses it to send an image of a child being sexually abused or being raped, what will you be able to do about it?

Ms Bickert admitted: I dont have the answers for you on that yet. We are still in the consultative phase.

"These are early days for us. We can keep you in the loop. She said Facebook still plans to go ahead with end to end encryption but is still developing how it looks.

She added: It is true we will not be able to see content unless its reported to us.

We are looking at how we can build this product with those concerns in mind.

BACK TO WORKBoris Johnson wants coronavirus lockdown lifted quickly to save 3 million jobs

FLACK PROBELawyer who prosecuted Caroline Flack for assault insists it was right decision

AN ICON DEFACEDChurchill statue vandalised on D-Day anniversary during London BLM protest

MCCANN TWINSWhere are Madeleine McCann's twin siblings now?

Exclusive

HUNT BLUNDERWitness 'spotted Maddie in German-registered VW van 3wks after she vanished'

OWN GOALJohn Barnes forced to apologise after accidentally sharing porn on Twitter

I cant give you answers on how we are likely to build this product. Clearly shocked, Ms Cooper said the National Crime Agency had raised serious concerns that encryption will help perverts hide their crimes.

And she demanded the tech giant hurry up and come up with a real plan to protect vulnerable kids.

She fumed: I dont know if you recognise quite how serious it sounds that you have made a decision to go ahead with something and you dont seem to have any idea of how you are going to solve this massive problem about how to protect children." The Home Office warned late last year the plan will give free rein to criminals online.

GOT a story? RING The Sun on 0207 782 4104 or WHATSAPP on 07423720250 or EMAILexclusive@the-sun.co.uk

See the original post here:
Facebook admits they dont know how to remove child abuse images when encryption kicks in - The Sun