Priyanka Sharma takes over the leadership of the Cloud Native Computing Foundation – TechCrunch

The Cloud Native Computing Foundation, the Linux Foundation-based home of open-source projects like Kubernetes, OpenTracing and Envoy, today announced that Dan Kohn, the long-time executive director of the organization, is stepping down, with Priyanka Sharma, the director of Cloud Native Alliances at GitLab, stepping into the general manager role. Kohn will continue to be part of the Linux Foundation, where he will launch a new initiative to help public health authorities use open source software to fight COVID-19 and other epidemics.

Sharma, who once presented in the TechCrunch Disrupt Battlefield competition a startup she co-founded, became part of the overall cloud-native community during her time as head of marketing and strategic partnerships at Lightstep, a role she took in 2016. Her involvement with the OpenTracing project snowballed into a deeper relationship with the CNCF, she told me. Once I joined GitLab, I was fortunate enough to be elected to the board of the CNCF and until the 31st, I am in that role, she told me. That was really helpful, but that gave me the context about how does such a successful foundation and community run what is the governance piece here which, when I was on the community side, I wasnt that involved in.

Kohn had been at the helm of the CNCF since 2016 and guided the project from its early days to becoming one of the most successful open-source foundations of all time. Its bi-annual conferences draw thousands of developers from all over the world. While its marquee project is obviously Kubernetes, Kohn and his team at the foundation put a lot of emphasis on the overall ecosystem. The organizations mission, after all, is to make cloud native computing ubiquitous. Today, the CNCF is home to 10 graduated projects, like Kubernetes, Prometheus, Envoy, Jaeger and Vitess, as well as 16 so-called incubating projects, like OpenTracing, Linkerd, Rook and etcd.

Priyankas contributions toCNCF as a speaker, governing board member, and community leader over the last several years has been invaluable, said Kohn in a statement. I think she is a great choice to lead the organization to its next stage.

Sharma says shell start her tenure by listening to the community. Cloud native has become the de facto standard, she said. Were doing great with regard to technology adoption, growth but as things evolve with the number of people already in the foundation that is on track to be 600 members I think as a community, and there is so much growth opportunity there, we can go deeper into developer engagement, have more conversations around education and understanding of all the projects. Now we have 10 graduated projects not just Kubernetes so theres lots of adoption to happen there. So Im just very excited for the second wave that we will have.

Now that everybody knows that DevOps and containers are, she wants to bring more people into the fold and also look at new technologies like serverless and service meshes. Weve been off to a blockbuster start and now I think we have to mature a little and go deeper, she said.

Its worth noting that current CNCF CTO Chris Aniszczyk will continue in his role at the foundation. The cloud native community has grown leaps and bounds in the last few years as companies look for more flexible and innovative solutions to meet their continuously evolving infrastructure and application needs, he said. As CNCF now reaches nearly 50 projects and 90,000 contributors globally, Im thrilled to have an opportunity to work with Priyanka to cultivate and grow our cloud native community in its next evolution.

Here is the original post:
Priyanka Sharma takes over the leadership of the Cloud Native Computing Foundation - TechCrunch

Avoiding The Missing Middle With AI – The Next Platform

It is common knowledge in the manufacturing sector of the economy that many of the companies that should have deployed HPC simulation and modeling applications one or two decades ago to help with product design, among other tasks, did not do so. With the lowering of costs of HPC clusters based on X86 processors and the advent of open source software to perform many tasks, this seemed counterintuitive. Perplexing. And very annoying to those who were trying to address the missing middle, as it came to be called.

There are a lot of theories about what went wrong here, but at the very least, even with the lowering of the cost of HPC wares, buying a cluster, managing it, and keeping it busy to therefore justify the substantial investment was tough to rationalize, no matter the potential returns. Then there was the difficulty of sorting out how to make an HPC workflow, consisting of multiple applications hooked together, work well when existing systems designing with scientific workstations and easier to use CAD/CAM tools did the job. And even with the advent of the HPC in the public cloud, HPC machines might be easier to consume, but no one would call them inexpensive.

No one wants a missing middle with machine learning in the enterprise, which is a much broader market to be sure, and that is going to mean democratizing AI as vendors like Dell, Hewlett Packard Enterprise, Lenovo, IBM, and others have been trying to do for years in the HPC space. The good news now is that HPC and AI applications can usually run on the same iron, which allows investments to be amortized over more and more diverse workloads. The breadth of the market everyone has exploding datasets as they hoard data in the hopes of transmuting it into valuable nuggets of information also helps, because at the very least all companies can potentially use AI, whereas not every company can use traditional HPC simulation and modeling.

Dell was founded with the idea of making a decent X86 PC available for a reasonable price, and when Michael Dell formally entered the datacenter in November 1994 with the first PowerEdge machines, the idea was to bring that same commodity X86 philosophy to the glasshouse. And Dell, as much as any other vendor, pushed the X86 agenda hard and benefitted greatly from this, becoming the top server shipper during the height of the dot-com boom in 2001. Suffice it to say, the company knows a thing or two about bringing technologies to the middle and has also pushed up into the high end, particularly with the acquisition of EMC. That acquisition also brought Dell the VMware server virtualization juggernaut, whose software is used by over 600,000 organizations these days and has become over the past dozen years the dominant management substrate in the enterprise. And it is the combination of Dell iron and VMware software that can help shrink that potential missing middle in AI and also speed up the absorption of AI technologies by VMware.

The first step in this making AI real effort by Dell was to get the vSphere 7 virtualization stack, which we previewed back in March, out the door, complete with its Tanzu Kubernetes container orchestrator integrated with the virtual server platform that VMware is best known for. We could argue about whether or not running Kubernetes atop the ESXi hypervisor makes sense, but the point is moot. For a lot of enterprises, who are risk averse, this is how they are going to install Kubernetes because the VMware stack is how they manage their virtual infrastructure and the software that is packaged for it. This is very hard to change, and that is why VMware still has a growing and profitable business, with somewhere around 70 million VMs under management of ESXi and that had somewhere around an $11 billion run rate in the final quarter of fiscal 2020 ended in February, by our estimates. Thats about three-quarters of VMwares business, with another 15 percent being driven by vSAN virtual storage and another 10 percent being driven by NSX network virtualization. Going forward, ESXi will still grow modestly, and by the end of 2022, we expect that it will have an annualized run rate of $11.5 billion in revenues and represent about half of the business, with the remaining half split pretty evenly between vSAN and NSX.

If you wonder why as we often did VMware didnt go ahead with Project Photon and create a clean-slate Kubernetes platform, thats your answer. You dont upset that applecart. But you do try to tell people they can mix oranges and apples.

Ravi Pendekanti, senior vice president of server solutions product management and marketing at Dell said in an announcement today that Dell and VMware were finally working to preinstall the VMware stack on PowerEdge servers, which will make deployment for those enterprises. And that vSphere 7 stack will also include the Bitfusion GPU slicer and aggregator, which VMware acquired last summer, raising a few eyebrows. (But not ours.) The Bitfusion software allows for multiple GPUs in enclosures to be distinct from the servers and virtualized so they can be shared dynamically with servers and also allows for them to be pooled to create larger aggregations of GPU compute for both AI and HPC workloads, as it turns out. This disaggregation and pooling is key because GPUs are expensive and not every workload that can use them can have them installed. That is just way too costly. So having them disaggregated and available in a pool drives up sharing across time and utilization at any specific time, thus yielding better ROI for AI and, for those who need it, GPU-accelerated HPC workloads.

We are essentially doing for the accelerator space what we did for compute several years ago, explained Krish Prasad, senior vice president and general manager of VMwares Cloud Platform business unit, during the announcement today. But we have taken it one step further and have given customers the ability to pool the accelerators.

As an aside: It is a pity that VMware cant do the same thing for CPUs and memory across individual servers, but perhaps it will buy TidalScale and fix that. Anyway, the GPU middleware from Bitfusion, called FlexDirect, doesnt just do aggregation and remote pooling, but also has partitioning capability and without resorting to actually carving up the GPU hardware as Nvidia has done to create the Ampere GA100 GPU, which has slices that can act as one large GPU or eight tinier ones. With Bitfusion, the slices can be as small as 1/20th of the GPU and its memory. It is not clear how large of a pool Bitfusion can see, but in the past it was limited to eight GPUs.

Prasad added that the Bitfusion support with vSphere 7 comes initially on Dell PowerEdge R740 rack machines and PowerEdge C4140 semi-custom, hyperscale style machines. Presumably it will eventually be available on other Dell iron, and indeed on any server that supports VMware.

In the long run, these are all good first steps to getting broad adoption of AI among large enterprises, but there will have to be reference systems with software stacks, which Dell is getting ready for market but which the company did not talk about in detail today. Its the details that matter and that we can all learn from. Some information about the reference architectures can be found at this link, and the one for Bitfusion is interesting. This is a mix of the PowerEdge servers mentioned above plus physical networking:

This more generic reference architecture for virtual GPUs is also interesting.

We do know that these stacks can include the whole Cloud Foundation enchilada of virtualization and management software from VMware ESXi, its vSphere and now Bitfusion extensions, vCenter management, vSAN virtual storage, and NSX virtual networking or for those who want to go barer bones, the vSphere Scale-Out Edition, which has the ESXi hypervisor and vMotion for compute and storage, the vSphere Distributed Switch for virtual networking, and a bunch of management tool add-ons. Ultimately, full AI and HPC application stacks need to have reference architectures, probably in T-shirt sizes so customers can choose quickly, to make this even easier. Prices on these would be nice, too.

Continue reading here:
Avoiding The Missing Middle With AI - The Next Platform

Octopus Scanner malware infected 26 GitHub repositories – TEISS

GitHub has revealed that it recently discovered a powerful malware dubbed Octopus Scanner that not only infected devices owned by developers but also infected GitHub repositories and spread to new ones.

On 28th May, GitHubs Security Incident Response Team (SIRT) reported that it was recently alerted by a security researcher about a malware that was spreading itself via infected GitHub repositories. Upon investigating the alert, the SIRT team discovered Octopus Scanner, a malware "designed to enumerate and backdoor NetBeans projects, and which uses the build process and its resulting artifacts to spread itself."

JJ, the security researcher who alerted GitHub about the malware infection, told the company that as many as 26 GitHub repositories were infected by Octopus Scanner. Any developer who downloaded a project from an infected repository, activated the malware in their own systems. The malware would scan for a NetBeans IDE in developers' devices and if it is installed, the malware would infect every resulting JAR file with a dropper.

Once the dropper payload executes, it spawns a Remote Administration Tool (RAT) which connects to a set of C2 servers, gains control over the device, and prevents new project builds from replacing the infected build in order to preserve its malicious build artifacts.

"While we have seen many cases where the software supply chain was compromised by hijacking developer credentials or typosquatting popular package names, a malware that abuses the build process and its resulting artifacts to spread is both interesting and concerning for multiple reasons," GitHub said.

"In an OSS context, it gives the malware an effective means of transmission since the affected projects will presumably get cloned, forked, and used on potentially many different systems. The actual artifacts of these builds may spread even further in a way that is disconnected from the original build process and harder to track down after the fact.

"Since the primary-infected users are developers, the access that is gained is of high interest to attackers since developers generally have access to additional projects, production environments, database passwords, and other critical assets. There is a huge potential for escalation of access, which is a core attacker objective in most cases," it added.

The Security Incident Response Team also warned that just like the malware was designed to attack the NetBeans build process, similar malware can also be developed by hackers to target other frequently-used build processes such as Make, MsBuild, Gradle and others.

To prevent this from happenning, GitHub is planning to further improve the integrity and security of the OSS supply chain by introducing Dependency Graph, security alerts for vulnerable dependencies, automated security updates as well as code scanning and secret scanning that help detect potential issues in code.

The Octopus Scanner Malware validates the importance of analysing binaries within your code and not taking the word of the manifest. What makes Octopus so dangerous is that it has the capability to infect other JAR files in the project so a developer ends up using and distributing the mutated code to their team or community of open source users, says Brian Fox, CTO at open source software security specialist Sonatype.

Weve seen over 20 one-off attempts at malicious code injection within OSS projects, but this is a new form of attack. This attack infects developer tools that subsequently infect all of the projects they are working on. Its been open season on open source for a number of years, developers are on the front lines, and a new weapon has arrived on the battlefront.

Ive always described this in terms of a tainted food project. If you inspect a salad recipe, youll find all of the common ingredient names (aka the manifest), but quality is not an attribute of the ingredient list. Tainted lettuce wont be listed as an ingredient, but that doesnt mean you wont end up with E. coli when using it, he adds.

ALSO READ:Security flaw in Secure Shells implementation library luckily did not affect GitHub

See more here:
Octopus Scanner malware infected 26 GitHub repositories - TEISS

What is Encryption & How Does it Work? – Tech Advisor

The need for encryption and tough security measures is at an all-time high, with an increasing number of businesses and consumers falling victim to a whole host of cyber crimes.

Although, the method of encrypting information is certainly not new. In fact, cryptography dates back to ancient times, the only real difference being that now we use electronic devices to generate unique encryption algorithms to scramble our data.

These days you'll find encryption in most things that run using an internet connection, from messaging apps and personal banking apps to websites and online payment methods.

And for consumers, making sure your data cannot be stolen or used for ransom has never been more important.

But encryption is not without bad press. Pretty Good Encryption (PGP), a popular email encryption program has hit the headlines this week afterGerman researchers found a major vulnerability which could reveal past and present encrypted emails.

Find out more about PGP's encryption vulnerability here.

Techworld looks to explain what encryptionis and how it works.

In its most basic form, encryption is the process of encoding data, making it unintelligible and scrambled. In a lot of cases, encrypted data is also paired with an encryption key, and only those that possess the key will be able to open it.

An encryption key is a collection of algorithms designed to be totally unique. These are able to scramble and unscramble data, essentially unlocking the information and turning it back to readable data.

Usually, the person that is encrypting the data will possess the key that locks the data and will make 'copies' and pass them on to relevant people that require access. This process is calledpublic-key cryptography.

Computer or at least machine cryptography, which encryption is a form of,became significant during the second world war with military forces across Europe tasked with breaking Germany's Enigma code.

Read next:Best anti-ransomware tools 2018

Convoys travelling across the Atlantic were a vital lifeline forBritain as the majority of Europe was occupied by the Nazis.

German U-Boats often used radio signals to send encrypted messages to one another and attack these convoys en masse, planning and undertaking coordinated attacks. It was these messages that werecreated by the German Navy's Enigma machines, which the British forces set out to decrypt.

And while it's believed that Polish mathematicianMarian Rejewski actually cracked the Enigma code in 1938, not the British, at Bletchley Park in England, Alan Turing and Gordon Weichman created a code-breaking machine calledColossus based on Rejewski's which became the first programmable digital computer.

This marked a huge turning point for encryption and decryption.

In practice, when you send a message using an encrypted messaging service (WhatsApp for example), the service wraps the message in code, scrambling it and creating an encryptionkey. It can then only be unlocked by the recipient of the message.

Digital encryption is extremely complicated and that's why it is considered difficultto crack. To bolster that protection, a new set of encryption algorithms is created each time two smartphones begin communicating with one another.

You might have heard of end-to-end encryption, perhaps you've received a notification on WhatsApp saying that they now support this type of encryption.

End-to-end encryptionrefers to the process ofencoding and scrambling some information so only the sender and receiver can see it.

As previously explained, encryption keys can work as a pair, one locking the information and multiple (which can be passed out) to unlock the encrypted information.

With end-to-end encryption, however, only the sender and recipient are able to unlock and read the information. With WhatsApp, the messages are passed through a server, but it is not able to read the messages.

The diagram above shows how end-to-end encryption works, with one person sending a message to another.

There are two main methods of encryption that can be done: symmetric and asymmetric. Although, it is worth noting that within these two ways, there are various of encryptionalgorithms that are used to keep messages private.

So, while we've touched on symmetric and asymmetricencryption briefly already, you can gather more detail here.

Symmetric encryption is the process of using the same key (two keys which are identical) for both encrypting and decrypting data.

This will mean two or more parties will have access to the same key, which for some is a big drawback, even though the mathematical algorithm to protect the data is pretty much impossible to crack. People's concerns often land with the behaviours of those with access to the shared key.

Conversely,asymmetric encryption refers to the method of using a pair of keys: one for encrypting the data and the other for decrypting it.

This process is depicted in the above diagram. The first key is called the public key and the second is called the private key. The public key is shared with the servers so the message can be sent, while the private key, which is owned by the possessor of the public key, is kept a secret, totally private.

Only the person with the private key matching the public one will be able to access the data and decrypt it, making it impenetrable to intruders.

There are numerous common encryption algorithms and methods designed to keep information private. You may already be aware of some of them including RSA, Triple DES and Blowfish.

Data Masking is a form of encryption that creates a similar, yet inaccurate version of an organisations data. This data can be interpreted by the organisation, so is functional and can be used in place of the real data.

"Encryption is an essential part of an organisations security portfolio, securing data whilst it is in transit or not being used," saysJes Breslaw, director of strategy at Delphix. "However, it does not solve one of the biggest challenges when protecting sensitive data: when it is being consumed by business applications.

"Data masking is the complementary solution to encryption that solves this problem by replacing sensitive information with fictitious, yet realistic data. What makes masking attractive is that it keeps data safe and of good quality; yet, unlike encrypted data, masked data cant be reversed its one way."

The upcoming deadline for GDPR means that this form of technology is growing in use, as it not only hides direct consumer data, but also indirect data linking to an individual.

"In order to mask data, some companies create their own masking scripts, or turn to legacy vendors with bloated interfaces that require high levels of expertise," explains Breslaw.

"The reason they fail is that translating large amounts of data is a slow and costly exercise delaying projects and forcing departments to use poor quality data. Worse still, many dont protect data at all, something that GDPR will not forgive. Dynamic Data Platforms combine data masking with modern approaches to virtualising and automating the delivery and securing of data."

Continue reading here:
What is Encryption & How Does it Work? - Tech Advisor

Zoom paid accounts reportedly will get strong encryption for calls – The Verge

Zoom will add stronger encryption to its paid customers video calls, but isnt planning to offer the enhanced security to all accounts, Reuters reported. A security consultant with the company told Reuters that it still wasnt clear whether some accounts, such as nonprofit users, might qualify for the more secure calls.

Zooms approach to end-to-end encryption is very much a work in progress - everything from our draft cryptographic design, which was just published last week, to our continued discussions around which customers it would apply to, a company spokesperson said in an email to The Verge.

The videoconferencing platform has boomed in popularity during the coronavirus pandemic, but has been plagued by myriad security issues. Those include Zoombombing, where an uninvited guest invades a video call and disrupts it with pornography or other shock content.

Adding full end-to-end encryption on every video call, however, would exclude customers who call in from phone lines. And Reuters reported tighter encryption would not allow Zooms own security teams to add themselves to calls to help customers in real time.

Zoom published a draft paper May 22nd outlining some of its encryption plans.

Read the rest here:
Zoom paid accounts reportedly will get strong encryption for calls - The Verge

Join EFF for a Reddit AMA on EARN IT – EFF

Over the last few months, the EARN IT Act, a bill that would have disastrous consequences for free speech and security online, has gained thousands of critics. Digital rights advocates and technologists have been joined by human rights groups, online platforms, sex worker advocates,policy organizationsand think tanks, and Senators alike have joined together tostop the bill, which would drastically undermine encryption and violate the Constitution at the same time.

This isno exaggeration: buried in this bill is language thatgives government officials like Attorney General William Barr the power to compel online service providers to break encryption or be exposed to potentially crushing legal liability. At a time of increasing necessity for secure and safe messages, encryption is even more important than ever. But the Senators promoting this bill are pushing for an Internet where the law requires every message sent to be read by government-approved scanning software. Companies that handle such messages wouldnt be allowed to securely encrypt them, or theyd lose legal protections that allow them to operate.

We can't let that happen.

Join EFF's technologists, lawyers, activists, and lobbyists on Wednesday, June 3rd, for a Reddit AMA about all things EARN IT, including encryption, keepingonline conversations private and secure, and Section 230.

And for now: please join the tens of thousands of individuals who have lettheir Senators know howthat they must stop this plan to scan every message online.

TAKE ACTION

STOP THE GRAHAM-BLUMENTHAL ATTACK ON ENCRYPTION

Visit link:
Join EFF for a Reddit AMA on EARN IT - EFF

First Amendment Rights and Twitter, Encryption Backdoors – Security Boulevard

In episode 123 for June 1st 2020: The controversy continues over fact checking and First Amendment rights on Twitter, and why government mandated encryption backdoors are bad for everyones security.

** Show notes and links mentioned on the show **

Trump to sign executive order aimed at cracking down on Facebook and Twitterhttps://www.cnbc.com/2020/05/28/trump-to-sign-executive-order-aimed-at-cracking-down-on-facebook-twitter.html

The law enforcement backdoor debate continueshttps://www.helpnetsecurity.com/2020/05/26/backdoor-encryption/

OWASP Top 10 2020 Data Analysis Planhttps://owasp.org/www-project-top-ten/

** Thank you to our sponsors! **

Silent Pocket

Visit https://silent-pocket.com to check out Silent Pockets amazing line of faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 15% off your order at checkout using discount code sharedsecurity.

Edgewise Networks

Find out how Edgewise can stop lateral threat movement and prevent data breaches. Visit https://edgewise.net and request a demo!

Take the Click Armor 3-minute interactive assessment: Can I be Phished?https://www.clickarmor.ca/canibephished

** Help support the show **

Looking for an affordable, reliable, no logs VPN provider? Support the podcast by purchasing a Private Internet Access VPN subscription via our affiliate link: http://www.privateinternetaccess.com/pages/buy-vpn/sharedsecurity

** Subscribe and follow the show **

Sign-up for our email newsletter to receive our free Facebook Privacy & Security Guide, full transcripts of each weekly episode, contest announcements, and special offers from our sponsors: http://eepurl.com/dwcc8D

Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe

Contact us: https://sharedsecurity.net/contact

Website: https://sharedsecurity.net

Twitter: https://twitter.com/sharedsec

Facebook: https://facebook.com/sharedsec

Instagram: https://instagram.com/sharedsecurity

YouTube: https://www.youtube.com/c/SharedSecurityPodcast

The post First Amendment Rights and Twitter, Encryption Backdoors appeared first on Shared Security Podcast.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Shared Security Podcast authored by Tom Eston. Read the original post at: https://sharedsecurity.net/2020/06/01/first-amendment-rights-and-twitter-encryption-backdoors/?utm_source=rss&utm_medium=rss&utm_campaign=first-amendment-rights-and-twitter-encryption-backdoors

Read more from the original source:
First Amendment Rights and Twitter, Encryption Backdoors - Security Boulevard

Google would really like to remind you that all Duo calls are end-to-end encrypted – Android Police

Since its launch in 2016, Google Duo has used end-to-end encryptionfor calls, messages, notes, and all kinds of communications carried through it. That encryption is one of the reasons we recommend using Duo to catch up with friends and family, but most users may not be aware of it. Now Google is boasting this privacy-centric approach for everyone to see, and while it's at it, it added the option to send more emojis to your contacts.

End-to-end encryption is already mentioned in the app's menu under Privacy in Duo, but most users of the service probably never noticed that or knew about it. That's why Google is starting to display a notice when you're on a call, which clarifies that the communication is secure and encrypted. This should help users feel more safe and trusting of the service, especially when enjoying private talks with their loved ones.

Left: Duo's "Privacy" menu already explained this. Right: But now, you'll also see the notice while calling.

The second change affects contact pages in the app. You can already send hearts to people, but that appears to be expanding to include more emojis. On my device, some of my contacts only offer the heart card, while others have a scrolling strip with 10 emojis ( ) that you can tap to send. Emojis you send at the same time will be grouped together in a single card.

Left: You can only send a heart to some contacts. Middle & Right: But others offer more emoji options .

The two features are slowly rolling out to users, likely via a server-side update. Despite being on the latest v89 (APK Mirror) of the app, the encryption notice hasn't showed up on my devices, but the emojis are live in some of my conversations. If you're eager to get any of these, you can grab the APK to make sure the server-side odds are in your favor.

Originally posted here:
Google would really like to remind you that all Duo calls are end-to-end encrypted - Android Police

Google reminds you that all Duo calls are end-to-end encrypted – Drew Reports News

Since its launch in 2016, Google Duo has actually utilized end-to-end encryption for calls, messages, notes, and all kinds of communications executed it. That encryption is one of the reasons we advise utilizing Duo to overtake family and friends, but a lot of users might not be aware of it. Now Google is boasting this privacy-centric technique for everybody to see, and while its at it, it added the option to send more emojis to your contacts.

End-to-end encryption is currently pointed out in the apps menu under Personal privacy in Duo, but many users of the service most likely never discovered that or understood about it. Thats why Google is beginning to display a notification when youre on a call, which clarifies that the interaction is protected and encrypted. This must assist users feel more safe and trusting of the service, particularly when delighting in private talks with their loved ones.

Left: Duos Personal privacy menu currently described this. Right: Today, youll also see the notice while calling.

The second change impacts contact pages in the app. You can already send out hearts to individuals, however that seems broadening to consist of more emojis. On my device, a few of my contacts just offer the heart card, while others have a scrolling strip with 10 emojis () that you can tap to send. Emojis you send out at the same time will be grouped together in a single card.

Left: You can only send a heart to some contacts. Middle & Right: However others offer more emoji options.

The two features are slowly presenting to users, most likely through a server-side update. Regardless of being on the most recent v89 of the app, the file encryption notice hasnt appeared on my devices, however the emojis are live in a few of my conversations. If you aspire to get any of these, you can get the APK to make sure the server-side chances remain in your favor.

QR-Code

Designer:

Rate: Free

Excerpt from:
Google reminds you that all Duo calls are end-to-end encrypted - Drew Reports News

Encryption Software Market Analysis, Growth Rate, Demand, Size and Share, Present Scenario and Future Forecast To 2026 – Cole of Duty

Verified Market Research report titled Encryption Software Market provides detailed information and overview about the key influential factors required to make well informed business decision. This is a latest report, covering the current COVID-19 impact on the market. The pandemic of Coronavirus (COVID-19) has affected every aspect of life globally. This has brought along several changes in market conditions. The rapidly changing market scenario and initial and future assessment of the impact is covered in the report. Our data has been culled out by our team of experts who have curated the report, considering market-relevant information. This report provides latest insights about the markets drivers, restraints, opportunities, and trends. It also discusses the growth and trends of various segments and the market in various regions.

Request Sample Copy of this Report @ https://www.verifiedmarketresearch.com/download-sample/?rid=1826&utm_source=COD&utm_medium=003

Top 10 Companies in the Encryption Software Market Research Report:

Competitive landscape:

The report examines the major players, including the profiles of the major players in the market with a significant global and / or regional presence, combined with their information such as related companies, downstream buyers, upstream suppliers, market position, historical background and top competitors based on the Sales with sales contact information.

Regional Description:

The Encryption Software market was analyzed and a proper survey of the market was carried out based on all regions of the world. The regions listed in the report include: North America (United States, Canada, and Mexico), Europe (Germany, France, United Kingdom, Russia, and Italy), Asia-Pacific (China, Japan, Korea, India, and Southeast Asia), South America (Brazil, Argentina , Colombia etc.), Middle East and Africa (Saudi Arabia, United Arab Emirates, Egypt, Nigeria and South Africa). All these regions have been studied in detail and the prevailing trends and different possibilities are also mentioned in the market report.

Sales and sales broken down by application:

Sales and sales divided by type:

In addition, the report categorizes product type and end uses as dynamic market segments that directly impact the growth potential and roadmap of the target market. The report highlights the core developments that are common to all regional hubs and their subsequent impact on the holistic growth path of the Encryption Software market worldwide. Other valuable aspects of the report are the market development history, various marketing channels, supplier analysis, potential buyers and the analysis of the markets industrial chain.

Ask For Discounts @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1826&utm_source=COD&utm_medium=003

Table of Content

1 Introduction of Encryption Software Market

1.1 Overview of the Market1.2 Scope of Report1.3 Assumptions

2 Executive Summary

3 Research Methodology of Verified Market Research

3.1 Data Mining3.2 Validation3.3 Primary Interviews3.4 List of Data Sources

4 Encryption Software Market Outlook

4.1 Overview4.2 Market Dynamics4.2.1 Drivers4.2.2 Restraints4.2.3 Opportunities4.3 Porters Five Force Model4.4 Value Chain Analysis

5 Encryption Software Market, By Deployment Model

5.1 Overview

6 Encryption Software Market, By Solution

6.1 Overview

7 Encryption Software Market, By Vertical

7.1 Overview

8 Encryption Software Market, By Geography

8.1 Overview8.2 North America8.2.1 U.S.8.2.2 Canada8.2.3 Mexico8.3 Europe8.3.1 Germany8.3.2 U.K.8.3.3 France8.3.4 Rest of Europe8.4 Asia Pacific8.4.1 China8.4.2 Japan8.4.3 India8.4.4 Rest of Asia Pacific8.5 Rest of the World8.5.1 Latin America8.5.2 Middle East

9 Encryption Software Market Competitive Landscape

9.1 Overview9.2 Company Market Ranking9.3 Key Development Strategies

10 Company Profiles

10.1.1 Overview10.1.2 Financial Performance10.1.3 Product Outlook10.1.4 Key Developments

11 Appendix

11.1 Related Research

Customized Research Report Using Corporate Email Id @https://www.verifiedmarketresearch.com/product/global-encryption-software-market-size-and-forecast-to-2025/?utm_source=COD&utm_medium=003

About us:

Verified Market Research is a leading Global Research and Consulting firm servicing over 5000+ customers. Verified Market Research provides advanced analytical research solutions while offering information enriched research studies. We offer insight into strategic and growth analyses, Data necessary to achieve corporate goals and critical revenue decisions.

Our 250 Analysts and SMEs offer a high level of expertise in data collection and governance use industrial techniques to collect and analyse data on more than 15,000 high impact and niche markets. Our analysts are trained to combine modern data collection techniques, superior research methodology, expertise and years of collective experience to produce informative and accurate research.

We study 14+ categories from Semiconductor & Electronics, Chemicals, Advanced Materials, Aerospace & Defence, Energy & Power, Healthcare, Pharmaceuticals, Automotive & Transportation, Information & Communication Technology, Software & Services, Information Security, Mining, Minerals & Metals, Building & construction, Agriculture industry and Medical Devices from over 100 countries.

Contact us:

Mr. Edwyne Fernandes

US: +1 (650)-781-4080UK: +44 (203)-411-9686APAC: +91 (902)-863-5784US Toll Free: +1 (800)-7821768

Email: [emailprotected]

View original post here:
Encryption Software Market Analysis, Growth Rate, Demand, Size and Share, Present Scenario and Future Forecast To 2026 - Cole of Duty