Todays cache | Crypto-jacking, and more – The Hindu

Personal computers are illegally hacked by cryptocurrency miners to collect Monero cryptos.

Microsoft is replacing humans with AI to select and curate news stories on the companys Edge browsers and MSN site. That move will lead to over 20 people losing their jobs.

Googles Pixel Buds 2 has a connectivity issue, according to a growing number of user reports on the companys support forum and Reddit.

Facebook is making some updates to its user verification policy. With this change, page owners with large audiences need to confirm their identity with the social network.

Lastly, Indias Department of Telecom (DoT) has issued a notice to internet service providers (ISP) to block a file-sharing platform.

Crypto-jacking

Crypto-jacking is the process of illegally using someone elses computer to mine or collect Bitcoin or other types of cryptocurrencies.

In the UK, an 18-year-olds computer was crypto-jacked by miners to collect Monero cryptocurrency, the BBC reported.

Abdelrhman Badr did not know he was crypto-jacked until he noticed unusual activities in his computer. Even after turning his PC to sleep mode, the fans kept running.

And when he opened the laptop, the main login page would open up without the usual login page.

"My computer wasn't actually going to sleep at all," he told the BBC.

Badr serendipitously found about the mining when he was going through the computers program. The device has been sending information to a website he never heard of.

That website was collecting Monero cryptocurrency. In retrospect, Badr thought that an accidental download might have installed a malware in his pc.

Badrs computer falling prey to cryptocurrency mining is not on-off. A few weeks earlier, a pan-European group claimed to have attempted mining cryptocurrencies using multiple machines.

The practice of illegally collecting crpytocurrencies is currently on rise as the price of the asset is falling, according to Palo Alto Networks.

So, to reduce costs associated with mining, hackers resort to crypto-jacking.

AI to replace humans at Microsofts news curation division

Microsoft has decided to replace humans with AI to select, edit and curate news stories on the companys news webpage and Edge browser, the Guardian reported.

The move resulted in over 27 individuals losing their jobs at PA Media, a company contracted by Microsoft to manage its news page. The employees were told that the software companys decision to terminate its contract is a result of Microsofts global shift to use AI for news.

The PA Media team managing Microsofts MSN site does not file own stories. They only select articles from other news organisations and post them on Microsofts website. For hosting these articles, both Microsoft and the news organisation share advertising revenue.

We are in the process of winding down the Microsoft team working at PA, and we are doing everything we can to support the individuals concerned, a spokesperson at PA Media said in a statement.

We are proud of the work we have done with Microsoft and know we delivered a high-quality service.

Microsoft said that the company decision to use AI is not a result of the current pandemic. It has been evaluating its businesses on a regular basis to increase investment in some functions, and reducing in others.

Facebook to verify identity of users with large audiences

Facebook said it will verify identity of users with large audiences in the US in an effort to improve user experience in its apps.

The move will be the social networks extension of its page verification process started in 2018. Back then, Facebook verified users who manage Pages with a large group of followers.

The extension in the attestation policy comes at a time when the US is warming up for 2020 Presidential election. And the addition to the ID confirmation process may limit the spread of viral posts if the social network spots inauthentic behaviour.

The social media company wants to ensure that real people, and not bots, use its network. The move will also help users to know who is the actual person behind the content they see on Facebook. The messengers identity is important given their message reaches a large number of people.

If someone does not verify their identity or provides an ID that does not match a linked Facebook account, the speed of the viral post will be reduce so fewer users will see it.

And if the person posting the content is a Page admin, that person will need to complete a Page Publishing Authorization. Without completing it, their account wont be verified, and they cant post any content on the page.

The ID shared for verification will be stored securely and will not be shared on a persons profile.

Internet service providers in India asked to block WeTransfer

WeTransfer, a Netherlands-based file sharing platform, has been blocked in India on instruction from Department of Telecom (DoT) to internet service providers (ISP), Reuters reported.

The DoT had issued an order on May 18 to ISPs without giving a reason for blocking the site. The order invokes a clause from conditions laid out for granting licences to ISPs, Reuters said on reviewing the note.

Per the clause invoked by DoT, all ISPs must block websites in the interest of national security or public interest.

At this moment in time, WeTransfer seems to be blocked and unavailable in India, WeTransfer said in a blog post.

We are working hard to understand the reasoning behind this block, as well as how to get it reverted as soon as possible.

WeTransfer allows users to share and upload files of up to 2GB for free in one transfer. Paid users can transfer 20GB per upload.

Pixel Buds 2 users report issues

A growing number of Pixel Buds 2 report Bluetooth connectivity issues, 9to5 Google reported.

Several threads on Google support forums and some on Reddit show many users facing issues related to random audio cutouts, leading to brief pauses while connected to the buds.

The issues have been coming up since the first pieces were shipped, and Googles updates arent solving the connection problem.

Unfortunately, even with the latest version 295 update, the problem is not fixed, based on reports by users.

In one of the cases, even a replacement pair did not solve the issue.

A review on Reddit said: I was really excited to get these in today, but have had nothing but issues with them. While sitting at my computer they seemed to work fine, but I noticed that if I touched the left ear bud or moved my head too much, it would cut out.

Excerpt from:
Todays cache | Crypto-jacking, and more - The Hindu

Cryptocurrency Market News: It’s a sea of red in the crypto market today – FXStreet

Bitcoin has taken a tumble on Tuesday just as the 10K level looked to have been a thing of the past. This looks like a bank of orders have been triggered or some potential profit-taking has taken place. Either way, this leads to traderslooking for levels where the market might stop. First and foremost the price is now struggling at the 4-hour 200 period Simple Moving Average (SMA). Even looking back on the chart the 200 SMA seems to be a decent support andresistancezone on this timeframe but the volume on this move lower could be too hot to handle on this occasion.The next level down is the black support level at 9K. There has been 3 occasions on this chart alone where the 9K level has been used in a reactionary manner. Beyond this, there is another support zone near 7645.00 (marked in blue). This level is where a previous price drop back in March 2020 stalled. It then became a congestion point toward the end of April and could be a price magnet again.

The intense selling pressure surrounding cryptocurrencies caused Ethereum (ETH/USD) to fall sharply from multi-month highs it set at $253.50 earlier in the day.The pair erased near 7% in a matter of minutes and dropped all the way to $224 before recovering modestly. As of writing, ETH/USD was down 5% on the day at $235.50.

Stellar Lumen - Even the high performing XLM/USD lost more than 14% of its price within 11 minutes. Stellar is trading at $0.0784 as of writing after bulls bought half of thedip. XLM is now at risk of forming a nasty reversal doji candle on its daily chart if it drops and closes below $0.0757.

Ripple's XRPtoken has dipped below the 200 Simple Moving Average on the four-hour chart and is battling to hold onto the 50 and 100 SMA. Upside momentum has all but diminished. The fresh daily low of $0.1975 is the first support line to watch. It if followed by $0.1916, $0.1918, and $0.1855, which were all low points in the past week.Resistanceawaits at around $0.2060, which held XRP down before the latest surge, followed by $0.2138 and $0.2144, the two swing highs hit in early June.

From today onwards, Canadian firms operating with virtual currencies will be legally recognized as Money Service Businesses.

Cryptocurrencyexchanges and payment processors are now legally recognized as Money Service Businesses (MSB) within Canada.

June 1 saw the enactment of amendments to Canadas Proceeds of Crime (Money Laundering) and Terrorist Financing Act that were passed in June 2019 to address holes in the then-existing framework.

Candian crypto firms must now report all transactions exceeding 10,000 Canadian dollars ($7,403), and register and comply with the Financial Transactions and ReportsAnalysisCentre of Canada (FINTRAC).

One of the largestsemiconductor manufacturers in China, SMIC hasannounced plans to raiseUSD 2.8 billion in a public sale (IPO) on the Sci-Tech Board of the Shanghai Stock Exchange (SSE).

The Shanghai Stock Exchange approved the IPO and this will increase the overall competition in the Bitcoin mining firmware chipmaker industry.

SMICis already listed in Hong Kong is looking to push Chinas broader focusfor self-reliance when it comes to semiconductors, a field in which the worlds second-largest economy (China) isseen as lagging far behind the U.S.

Read more here:
Cryptocurrency Market News: It's a sea of red in the crypto market today - FXStreet

Atakama Announces It Will Be Offering Its Encryption Software To Businesses In Need For Free – Salamanca Press

NEW YORK, June 4, 2020 /PRNewswire/ -- ATAKAMA Inc., a data security company based in NYC, announced today that for the duration of the COVID-19 pandemic, it will be offering its groundbreaking new data security software for free to businesses in need while workers remain at home.

Atakama provides businesses with unparalleled protection for confidential, proprietary and client files all without disrupting how users interact with their data. Atakama's one-of-a-kind information security solution is designed to keep business data safe from attacks, even when other security fails. Atakama offers customizable security policies to best fit individualized business needs and user workflows.

Founded in 2017 by a team of entrepreneurs, engineers, and cryptographers, Atakama has since developed a software that enables each file to be encrypted individually without employing passwords or centralized key storage. Its patent-pending distributed key management software seamlessly distributes pieces of encryption keys to physical devices controlled by the user. By eliminating the need for passwords, Atakama ensures that data is protected even when other cybersecurity measures fail.

"Granular, file-level encryption is one of the most powerful yet underutilized tools available for information security," says Atakama's CEO, Daniel H. Gallancy. "Its underutilization has been a consequence of cumbersome deployment requirements, scalability difficulties and concerns about lost encryption keys. By making use of threshold cryptography, Atakama eliminates the barriers to the successful use of file-level encryption. In today's environment, where a significant percentage of the workforce is remote, businesses need to bolster their security systems, both as a means of protecting a distributed workforce and as a means of defending against an unfortunate opportunistic increase in attacks. I have been overwhelmed by the entire Atakama team's outspoken desire to provide assistance to businesses in need. We've decided to offer Atakama for free for the duration of the COVID-19 pandemic."

The company is offering a version of their software free to businesses for a limited period. To learn more and to request a live demo and installation of the software, visit http://www.atakama.com/data-security, or email info@atakama.com.

About Atakama:

Atakama Inc. is an information security software company that provides unparalleled data protection for businesses. By employing a file-by-file encryption design, Atakama eliminates the ability for attackers to directly profit off of confidential data, and substantially mitigates the damage of unpreventable attacks. Atakama's encryption solution helps companies adhere to mandatory compliance regulations and in the process, provides best-in-class protection for sensitive and non-public information. Atakama's distributed key management protocols can be customized based on company or department needs, seamlessly integrates with existing cybersecurity stacks, and can be deployed within hours. Undeniably, a vast improvement over the status quo.

Continue reading here:
Atakama Announces It Will Be Offering Its Encryption Software To Businesses In Need For Free - Salamanca Press

Will COVID-19 finally usher in the age of the cryptocurrency? – The New Economy

By law, financial firms are required to collect personal information about their customers, which ultimately ends up in online databases. Cryptocurrencies could create a more open financial system with improved consumer privacy protections

Even as all of humanity mobilises against COVID-19, thoughts are turning to how the world will be different after the crisis. As businesses rush to adapt to the new world of social distancing, the pandemic has accelerated an already inexorable trend towards digital commerce. This broader shift should also include the widespread adoption of digital currencies, which provide stronger consumer financial and privacy protections.

For most of the 20th century, encryption was reserved for national security needs. Cryptography helped the Allies win the Second World War, and then protected secret communications during the Cold War. Until as recently as 1992, the US, as a matter of national security, did not allow cryptographic technology to be exported. Encrypted communication was not widely available, and anyone using it was assumed to have something to hide.

But starting in the 1990s, early internet entrepreneurs began calling for encryption to be used in e-commerce, arguing that it was needed in order to protect customer credit card numbers, passwords and other information entered online. It turned out that the same encryption technology that had been created in academic labs where trust and collaboration reigned could be useful to everyone.

Cryptocurrencies hold the promise of creating a more open financial system with worldwide access, instantaneous fund transfers, lower costs and vastly improved consumer privacy protections

Changing expectationsUS policymakers and law enforcement initially balked at this push towards widespread encryption. In their view, privacy for everyone meant privacy for terrorists, drug dealers and money launderers. As then FBI Director Louis J Freeh told Congress in 1994, preserving the US Governments ability to intercept internet communications was the number one law enforcement, public safety and national security issue facing us.

The debate about end-to-end encryption is still raging. But, crucially, consumer expectations have changed since the 1990s. The overwhelming majority of internet traffic is now encrypted, and most of us have been trained to look for the closed-lock icon in our browser before entering sensitive information. Popular apps like WhatsApp, Telegram, iMessage and Signal have led the way in normalising private messaging that cant be tracked by third parties.

But there is one area of our lives where privacy is not yet the norm: our personal financial information. By law, financial firms are required to collect reams of personal information about their customers. This information ultimately ends up in online databases, where it presents a tempting target for hackers. In 2017, the credit rating firm Equifax revealed that a data breach had exposed sensitive information about more than 147 million consumers, or just under half of the US population. That followed a similar breach in 2013, when hackers famously obtained the names, credit card numbers and other information about tens of millions of Target customers.

Anonymous moneyFortunately, a solution is on the horizon. Cryptocurrencies hold the promise of creating a more open financial system with worldwide access, instantaneous fund transfers, lower costs and vastly improved consumer privacy protections. When bitcoin first gained popularity, many people incorrectly assumed that it was anonymous money. In fact, as a blockchain technology, it uses a public ledger that records a digital trail of every transaction. Blockchain analytics firms are thus now helping law enforcement track down criminals who thought their trail was covered. And cryptocurrency exchanges like Coinbase have instituted robust anti-money-laundering and Know Your Customer programs that rival those of any financial institution.

Several more recent developments in cryptocurrency technologies promise to take consumer privacy to even higher levels, and they are sure to be controversial. First, privacy coins such as Zcash and Monero offer new cryptocurrency protocols that make every transaction untraceable. Other cryptocurrencies aspire to replicate these features, and even JPMorgan Chase has explored private transactions through its Quorum cryptocurrency. This shift is a bit like when websites moved from HTTP to HTTPS as the global standard: it lets consumers know that their information is protected by default.

For countries thinking about cryptocurrency policy, the best approach will be to strike a balance between law enforcement, cybersecurity, privacy, innovation and economic competitiveness

Second, so-called non-custodial cryptocurrency wallets now enable customers to store their own private keys (which allow one to move funds) instead of relying on a third party. By not actually storing customer funds, the providers of non-custodial wallets are aiming to position themselves as software companies rather than financial institutions subject to regulation. In the past, non-custodial wallets required a certain degree of technical sophistication to operate, limiting their use. But, like encrypted messaging apps, they are becoming increasingly accessible to a mass market.

A new generationUnsurprisingly, these innovations have alarmed banks, regulators and law enforcement agencies. But just as the early internet needed encryption to enable digital commerce, cryptocurrencies need privacy protections to unlock their full power and potential. Whether one needs to guard against authoritarian regimes, data harvesters or criminals, the best way to ensure that sensitive financial data isnt hacked is to avoid having to collect it in the first place.

Enhancing consumer financial protections does not mean giving free rein to criminals. Law enforcement agencies still have a wide range of tools at their disposal, from subpoenaing cryptocurrency exchanges to examining conversions into and out of fiat currencies (which are likely to remain the choke points for law enforcement). And these exchanges will continue to be regulated as financial services, regardless of whether consumers are using privacy coins or non-custodial wallets.

Having watched the US benefit enormously from the creation of the worlds leading internet companies, many countries are now working to attract the next generation of cryptocurrency firms. For countries thinking about cryptocurrency policy, the best approach, as always, will be to strike a balance between law enforcement, cybersecurity, privacy, innovation and economic competitiveness.

Consumers in a free society will always demand and expect reasonable levels of privacy. Our financial lives are no exception. Fortunately, cryptocurrencies can fix some of the most vexing issues in financial services. As we plan to rebuild economically after the COVID-19 crisis, we must allow these technologies to grow.

Project Syndicate 2020

View original post here:
Will COVID-19 finally usher in the age of the cryptocurrency? - The New Economy

Ethereum-based exchange DeversiFi gets an upgrade, targets pro traders – Decrypt

Decentralized exchanges are getting a little more professional.

DeversiFi announced yesterday the mainnet launch of new upgrades to the DeversiFi decentralized exchange, bringing a host of new features to create a professional-grade exchange platform with experienced traders in mind.

The upgrade includes support for StarkWares ZK-STARK layer 2 scaling solution, enabling more than 9,000 transactions per second on the decentralized exchange (DEX). Its sure to be a major player in the crypto exchange landscape, where the popularity of decentralized exchanges is already growing rapidly. (StarkWare, which raised $30 million in a Series A in 2018, is backed by Ethereum incubator ConsenSys, which also funds an editorially independent Decrypt.)

The DiversiFi upgrade also brings self-custodial control for digital assets, allowing users to make trades without needing to first send their tokens to a wallet controlled by DeversiFi, as is required to trade on centralized competitors like Binance or Poloniex. Other changes include API improvements, improved market order mechanisms, and support for Ledger hardware wallets.

Commercial grade Defi needs robust cryptography and ZK-STARKs are fastest in class, post-quantum safe and can easily scale to tens of thousands of transactions per second with no trusted setup, StarkWare co-founder and president Eli Ben Sasson said in a statement.

Partnering with DeversiFi will bring the benefits of ZK-STARK technology into the hands of every trader. We are excited to see traders embracing self-custodial trading without sacrificing liquidity or speed.

Alternative decentralized exchanges, such as IDEX or Uniswap, enable basic token swapping, but often lack more advanced tools like order books, limit orders, and other tools often employed by professional traders. To achieve some of these features and the instantaneous settlement required for some advanced trading strategies, DeversiFi uses an off-chain order book, but still settles trades on the Ethereum blockchain.

ZK-STARK technology also offers greater privacy for DeversiFi users, as individual transactions are not visible on the blockchain, instead grouped into aggregate transaction blocks verified by hashes.

Before becoming DiversiFi, the decentralized exchange service was founded as Ethfinex in 2017 and incubated by the Bitfinex exchange for two years. DiversiFi became fully independent in August 2019.

The DiversiFi upgrade also introduces the Data Availability Committee (DAC), which records token balances off-chain (like tokens reserved for filling limit orders) to ensure that if the exchange goes offline, trades can still withdraw any tokens held in DeversiFi smart contracts. Members of the DAC include Infura, Nethermind, Cephalopod, and ConsenSys.

Read more:
Ethereum-based exchange DeversiFi gets an upgrade, targets pro traders - Decrypt

Trust Stamp launching Malta subsidiary with government support to deliver biometric ID to Africa – Biometric Update

Trust Stampis launching a wholly-owned subsidiary in the Republic of Malta to advance its biometric and cryptographic identity authentication technology.

The company has secured 1 million (roughly US$1.1 million) in funding in the form of a 200,000 ($227,000) grant and a low-interest loan of up to 800,000 ($908,000) to cover three-quarters of the salaries it pays Malta-based employees. The loan is repayable through 10 percent of the Maltese subsidiarys annual profits.

We have been working with Malta Enterprise for over a year and are very impressed both by Maltas commitment to the continued growth of their technology industry, and by our shared commitment to substantially increasing the participation of women in the technology sector, comments Trust Stamp CEO Gareth N. Genner. In recent months, we have engaged with many of Maltas government departments and we have executed a letter of intent to work together on a broad range of technology initiatives.

Trust Stamp is reported to be preparing for a $32 million IPO in Ireland this year. The AIID symbol, combining Trust Stamps focus on AI and ID, has been reserved for its listing. The company is planning to raise $7 million or more in a Series A funding effort recently launched to the SeedInvest platform, with direct investments from Mastercard International, Second Century Ventures and FSH Capital.

Malta will not only host an expanded R&D team including our new Post-Doctoral Fellowship Program but will also serve as the base for our public-benefit subsidiary AiiD to work with NGOs and governments throughout Africa, Genner added. Malta has a long-term commitment to working with a number of African governments, and there are tremendous opportunities for us to partner with both the Malta government and other Maltese enterprises.

Africa | authentication | biometrics | cryptography | Malta | research and development | Trust Stamp

Read the original here:
Trust Stamp launching Malta subsidiary with government support to deliver biometric ID to Africa - Biometric Update

Atakama Announces It Will Be Offering Its Encryption Software To Businesses In Need For Free – PRNewswire

NEW YORK, June 4, 2020 /PRNewswire/ -- ATAKAMA Inc., a data security company based in NYC, announced today that for the duration of the COVID-19 pandemic, it will be offering its groundbreaking new data security software for free to businesses in need while workers remain at home.

Atakama provides businesses with unparalleled protection for confidential, proprietary and client files all without disrupting how users interact with their data. Atakama's one-of-a-kind information security solution is designed to keep business data safe from attacks, even when other security fails. Atakama offers customizable security policies to best fit individualized business needs and user workflows.

Founded in 2017 by a team of entrepreneurs, engineers, and cryptographers, Atakama has since developed a software that enables each file to be encrypted individually without employing passwords or centralized key storage. Its patent-pending distributed key management software seamlessly distributes pieces of encryption keys to physical devices controlled by the user. By eliminating the need for passwords, Atakama ensures that data is protected even when other cybersecurity measures fail.

"Granular, file-level encryption is one of the most powerful yet underutilized tools available for information security," says Atakama's CEO, Daniel H. Gallancy. "Its underutilization has been a consequence of cumbersome deployment requirements, scalability difficulties and concerns about lost encryption keys. By making use of threshold cryptography, Atakama eliminates the barriers to the successful use of file-level encryption. In today's environment, where a significant percentage of the workforce is remote, businesses need to bolster their security systems, both as a means of protecting a distributed workforce and as a means of defending against an unfortunate opportunistic increase in attacks. I have been overwhelmed by the entire Atakama team's outspoken desire to provide assistance to businesses in need. We've decided to offer Atakama for free for the duration of the COVID-19 pandemic."

The company is offering a version of their software free to businesses for a limited period. To learn more and to request a live demo and installation of the software, visit http://www.atakama.com/data-security, or email [emailprotected].

About Atakama:

Atakama Inc. is an information security software company that provides unparalleled data protection for businesses. By employing a file-by-file encryption design, Atakama eliminates the ability for attackers to directly profit off of confidential data, and substantially mitigates the damage of unpreventable attacks. Atakama's encryption solution helps companies adhere to mandatory compliance regulations and in the process, provides best-in-class protection for sensitive and non-public information. Atakama's distributed key management protocols can be customized based on company or department needs, seamlessly integrates with existing cybersecurity stacks, and can be deployed within hours. Undeniably, a vast improvement over the status quo.

SOURCE Atakama

https://www.atakama.com

Follow this link:
Atakama Announces It Will Be Offering Its Encryption Software To Businesses In Need For Free - PRNewswire

Which Video Chat Apps Offer The Best Privacy And Encryption? – Lifehacker Australia

There are many free group video chat and teleconferencing apps out there. Many of them even tout their privacy and security featuresbut just because they keep certain communications off-limits to other users or potential hackers, that doesnt mean your conversations are protected from the companies themselves, not to mention the organisations and third-parties they work with.

For example, Zoom is now limiting its end-to-end encryption (E2EE) for free users. The company says this is being done to curb abuse and take action against trolls and hackers, but it also undercuts the privacy of those who used Zoom meetings for secure communication.

Other popular apps, such as Discord, have the ability to see user communicationseven those taking place on private servers. This has helped Discord remove hateful and white-supremacist groups from its platform, but that also means that activists, journalists and community organisers working to create positive movements via Discord servers do not have the privacy such action often requires.

If youre looking for a free and encrypted alternative to Zoom or Discord, the Videoconferencing Guide from Paul Schreiber, Jacob Hoffman-Andrews and Yael Grauer will help you find an app appropriate for your needs. It features side-by-side comparisons of 28 of the most-used video chat apps and covers features, limitations, security and pricing information (where applicable) for each. Its wisest to focus on open-source software, since these apps are often free of ads and are transparent with their code, making it easier to see exactly what its doing with your data.

As for specific suggestions, here are three open-source alternatives from the Videoconferencing Guide that get our vote of approval.

Jitsi is the most traditional of the free and open-source video conferencing apps on this list. Its interface is reminiscent of other teleconferencing apps, but with some key differencesmost importantly, its transparent E2EE and security features, which you can read more about here. It also gives all users in a call the ability to mute or remove other participants in the event that someone enters a private meeting uninvited.

It supports up to 75 participants on a single call and lets you record meetings without restrictions, which is more than other teleconferencing appseven some paid ones. Jitsi can be used freely in your browser of choice ordownloaded as an app for Android, iOS and even the open-source F-Droid OS. You can also join active Jitsi meetings via a simple phone call.

Signal often gets the nod for secure communication, and I agree with the endorsements it typically receives, especially in light of recent enhancements like PIN security. That said, its lower on this particular list due to its limited video chat features in comparison to other apps. Signal only supports two users on live video calls, though its video communication uses the same privacy and E2EE settings as its one-on-one and group text messages. Media sent through Signal is also encrypted, even in group chats, making it good for securely sharing videos, photos and recorded audio clips. Media attachments and texts can even be set to auto-delete after being viewed or after a certain amount of time has passed.

You might not be able to host a large group teleconference via Signal, but its still a good resource for those who need private communication. Signal is available on Android, iOS/iPadOS, Windows, Mac and Linux.

Jami is probably the most secure video chat option at this point. Not only is it completely free, open-source and transparent about is encryption measures and privacy policies, its one of the only apps of its kind to use a fully peer-to-peer distribution model instead of the more common server-based model. This means that all communication on Jami happens purely between the devices involvednothing is sent to a server, ever. This keeps all users anonymous and all communication private, and even lets users communicate freely while connected to smaller local networks without sending data over the internet.

That said, Jamis peer-to-peer distribution model also comes with some idiosyncrasies that may limit its viability. Since communication is not facilitated by an external server, Jami doesnt have inherent limits on group size, call recording, video quality or even data transfer speeds, but youll still be limited by your device(s) and the strength of your peer-to-peer connection. All users on the call will also need to use the Jami appit does not support communication with users outside the apps ecosystem the way Signal and Jitsi do. That said, Jami is available on Android, iOS, Mac, Linux and even Android TV, so finding a compatible device shouldnt be too difficult.

If youre not as concerned about open-source, ads, and/or collection of personal user information, there are other free alternatives to Discord and Zoom that offer some form of E2EE, including:

WhatsApp

8x8 Meetings

FaceTime

Google Duo

Skype

Youll find more information about their features and limitations in the Videoconferencing Guide.

Read the rest here:
Which Video Chat Apps Offer The Best Privacy And Encryption? - Lifehacker Australia

Demystifying Encryption in Today & Tomorrow’s Digital World – The Internet of Business

Click Here to Access the Podcast

With security threats and breaches happening daily, it is obvious that further action is needed to safeguard our data, devices, and privacy from vulnerabilities.

Therefore, understanding of the importance of encryption in cybersecurity practices is needed now more than ever. Brad Beutlich shares his knowledge and insights into how encryption is protecting businesses today, and will help counter cyber threats of the future, explaining the precautions needed as Quantum computing continues to step towards mainstream adoption.

Listen to pinpoint which technologies are the right ones to spend your security budget on, and what companies have missed to date about data protection. If you need a greater understanding of crypto technologies and how to protect what is going on behind the walls you build, you cannot afford to miss Brads tested advice.

Brad BeutlichVice President of Sales Western Region and LATAMnCipher Security

Brad Beutlich, Vice President of Western and LATAM Sales at nCipher Security (an Entrust Datacard company), is an information security professional who has worked with numerous US based companies over the past 20 years, providing security solutions ranging from end-point, to data security. The last 13 years he has worked for nCipher Security providing security solutions that protect customer data, financial transactions and IoT device manufacturing. Brad holds a BS in Electrical Engineering Technology from Bradley University, and is an award-winning writer and speaker on numerous security topics. His passion as a historian is on brass-era (pre 1913) automobiles, of which he owns a 120-year-old car that runs on steam. As an avid skier, he hits the slopes on the weekends when possible. Brad resides with his wife and three children in Southern California.

nCipher Security, an Entrust Datacard company, is a leader in the general purpose hardware security module (HSM) market, empowering world-leading organizations by delivering trust, integrity and control to their business critical information and applications.

Our cryptographic solutions secure emerging technologies cloud, IoT, blockchain, digital payments and help meet new compliance mandates, using the same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business critical applications, ensuring the integrity of your data and putting you in complete control today, tomorrow, at all times. http://www.ncipher.com

Read the original post:
Demystifying Encryption in Today & Tomorrow's Digital World - The Internet of Business

Letter to the Editor: End-to-end encryption must be safeguarded – Irish Examiner

At ICCL, we were concerned to read your editorial regarding the right to privacy in a democracy. You refer to the proposal to provide end-to-end encryption for messaging services, and say that our right to privacy must end there.

But end-to-end encryption protects us all. Compare it to privacy in our postal service. In order for the public to send correspondence via post, they must be able to trust that it will not be interfered with.

Privacy in our communications with others protects our freedom of expression, and indeed many other rights, including the right to associate with others and to assemble peacefully. Nobody would dream of allowing the government to open every letter sent via the post, so why would we allow it over telecoms?

Moreover, the crimes that you say we would be protected against by banning encryption terrorism and paedophilia will not be stopped by allowing government to read our WhatsApp messages. We already have provisions in law to deal with these grave crimes. We should not, and do not need to, interfere with the fundamental rights of the entire population in order to deal with them.

The dangers inherent in allowing broad access to our private communications are many, and in many parts of the world journalists are at risk when their communications are not private. Human rights activists across the globe are spied on and harmed by governments. Closer to home, our democracy is under threat when corporations spy on us and sell data about our political preferences to political candidates vying for our votes.

You rightly describe concerns attached to big tech being able to pry arbitrarily wherever and whenever they think they can get away with it, but you could apply a similar critique to State intelligence agencies.

Fortunately, encryption can help protect against these concerns about government and big tech alike. Our fundamental right to privacy includes a healthy fear of ever increasing and normalised surveillance. End-to-end encryption helps protect against those who misuse surveillance to target groups who are vulnerable to repression and human rights abuse including journalists and activists.

Breaking encryption is therefore not the solution. Holding our policing and intelligence agencies accountable to ensure their practices are absolutely transparent, accountable and human rights proofed, is ever the way forward.

Here is the original post:
Letter to the Editor: End-to-end encryption must be safeguarded - Irish Examiner