How to install VeraCrypt PIM encryption tool in Ubuntu Linux – H2S Media

- Advertisement -

VeraCrypt is open-source software and forked of TrueCrypt that meant to provide encryption to your data and drive on Ubuntu, Debian, Windows, macOS, CentOS, OpenSuse and other similar platforms. It can be used to create encrypted containers as well as encrypted hard drives, SSDs, USB sticks and SD cards. The operation of VeraCrypt is similar to that of TrueCrypt. Furthermore, the Veracrypt Portable a portable version is also available for Windows.

Using the VeryCrypt, we can encrypt not only the whole drive or partition but also some particular folder or entire system. Furthermore, we can create a hidden VeraCrypt partition to protect highly sensitive data with encryption and secure password.

It offers multiple encryption algorithms along with well-known AES 256-bit encryption. The VeryCrypt makers name the special strength of their hash algorithms using RIPEMD160, SHA-2 and Whirlpool, which have significantly more iterations. However, one downside of encrypting a large amount of data partition is it takes time to create and mount initially. However, speed is not affected.

Also, once you have encrypted the drive or folder it cannot be accessed through normal file explorer of the system unless and until mounted using the program and then assigning a drive letter.

What is VeraCrypt PIM?

PIM stands for Personal Iterations Multiplier. It is a parameter that was introduced in VeraCrypt 1.12 and whose value controls the number of iterations used by the header key derivation function. This value can be specified through the password dialogue or in the command line.

If no PIM value is specified, VeraCrypt will use the default number of iterations used in versions prior to 1.12.

The below-given steps can also be used on other Ubuntu or Debian based operating systems such as Kali Linux, Linux Mint, Elementary OS, MX Linux and more to install Veracrypt. Here we are using Ubuntu 18.04, however, the command will be the same for Ubuntu 19.10, 17.04, 16,04

It is cross-platform which is not only available for Debian & Ubuntu but also for Windows, CentOS including macOS as aforementioned, thus as per your system version download the available Debian package from its official website. For example, here we are using Ubuntu 18.04, thus we will download the package available for it. Note: If you want to use the GUI version of the software the go for the GUI Veracrypt Debian package.

Download Veracrypt Debian packages for Ubuntu

Just like Windows, we can also install software on Ubuntu with just one click using the Software centre. Go to the Downloads, as by default the file we get from a browser goes into it. There you will see the downloaded package of this encryption tool. Double click on it and select the Install button.

veracrypt-1.24-update4-ubuntu-18.04-amd64.deb

Install Veracrypt packages

If you want to use the command line, then simply open the Command terminal and type:

To install the Debian package the command will be:

Note: Replace the filename the one which is showing in your terminal.

In our case it was like appearing the below screenshotthus the command will be:

install using the command line

After installing it, go to Ubuntu or your Linux applications menu and search for Veracypt, as it appears, click on its icon to run and launch it.

Launch Veracrypt on Ubuntu

Now, the Veracrypt will be in front of you. We can simply create an encrypted volume using the Create Volume button or select the particular file to encrypt. For more info on it see our article on Vercypt usage on Windows to get an idea of it because the usage of it will be similar for all OS.

use VeraCrypt on Linux

Other Articles:

See the original post:
How to install VeraCrypt PIM encryption tool in Ubuntu Linux - H2S Media

5% of Block Rewards – Bitcoin ABC Will Add Infrastructure Funding Plan in Next Release – Bitcoin News

Bitcoin ABC developers published a blog post on Saturday which discusses the miner Infrastructure Funding Plan (IFP) and the team told the community the software engineers have been requested to implement IFP. According to the developers, the code for IFP will be implemented in the upcoming 0.21.0 ABC software release.

Also Read: 3 Cents per kWh Central Asias Cheap Electricity Entices Chinese Bitcoin Miners

Btc.top founder Jiang Zhuoer recently introduced a miner-funded Infrastructure Funding Plan (IFP) that would see a fraction of block rewards sent to core developers working on the BCH protocol. At first, the plan was to use 12.5% of the BCH coinbase rewards and miner participation was required. While some people liked the plan, the proposal didnt sit well with a number of BCH supporters and people debated the subject for days. Then Zhuoer followed up with the community after hearing the responses and he explained that the coinbase reward would be reduced and instead of requiring other miners to donate they could burn their percentage.

Again, BCH community members mulled over the revised plan and the conversation had settled for a while. Then on Saturday, Bitcoin ABC announced the team would be adding support to the IFP within the next codebase release. The 0.21.0 ABC software release will contain code that implements the rules if triggered by miners via [a] BIP-9 like method. The method would be the same steps used when BTC developers activated Segregated Witness (Segwit) for soft fork deployment. The Bitcoin ABC blog post states:

The new plan addresses several of the major concerns expressed over the last few weeks. Bitcoin ABC has been requested to implement this plan in the node software, and as such will be including this implementation in the upcoming 0.21.0 release.

According to the development team, the new plan is different as it will be triggered by miners via BIP-9 like method. The amount is reduced to 5% of block reward [and] the funds can go to more than one project, and can go to one of several in a whitelist, the update says. The post goes further and explains the whitelist of possible projects. The following criteria include:

The software engineers disclosed that by applying the criteria a whitelist has come to fruition. There will be donation addresses for a General Fund, Bitcoin ABC, Electron Cash, and BCHD. As a project, Bitcoin ABC believes that stable funding of Bitcoin Cash software infrastructure is vital to the success of the project, the developers concluded. While we recognize that some aspects of this plan have been controversial, we believe that overall the benefits of the plan create the potential for a very exciting future in which Bitcoin Cash can grow and compete, and can reach its goal of becoming the best money the world has ever seen.

The developers also thanked Btc.tops Jiang Zhuoer and other mining pools for their desire to fund infrastructure. We are optimistic this plan could be a great success, the teams blog post further highlights.

What do you think about Bitcoin ABCs recent announcement? Let us know what you think about this topic in the comments section below.

Image credits: Shutterstock, Bitcoin ABC logo, and Coin Dance.

Do you want to maximize your Bitcoin Mining potential? Plug your own hardware into the worlds most profitable Bitcoin mining pool or get started without having to own hardware through one of our competitive Bitcoin cloud mining contracts.

Jamie Redman is a financial tech journalist living in Florida. Redman has been an active member of the cryptocurrency community since 2011. He has a passion for Bitcoin, open source code, and decentralized applications. Redman has written thousands of articles for news.Bitcoin.com about the disruptive protocols emerging today.

Follow this link:
5% of Block Rewards - Bitcoin ABC Will Add Infrastructure Funding Plan in Next Release - Bitcoin News

Open Source Group Wants Windows 7 Source Code In A Blank Hard drive – Fossbytes

Just when Microsoft ended the support for Windows 7, Free Software Foundation filed a petition demanding Windows 7 to be open source. Now, the open-source community went a little further by making another bold move.

Reportedly, the FSF mailed a blank upcycled hard drive to Microsoft. The foundation wants Microsoft to send back the hard drive, but after copying Windows 7 source code in it, along with license notice.

Whats even more interesting is that the foundation offers its help to Microsoft for the process to go smoother.

Its as easy as copying the source code, giving it a license notice, and mailing it back to us. As the author of the most popular free software license in the world, were ready to give them all of the help we can. All they have to do is ask,said the Free Software Organization.

The Free Software Foundation was aiming for at least 7,777 signatures in their petition to open-source Windows 7. However, they received overwhelming support from people with more than 13,000 signatures.

The open-source foundation also pointed out that its a perfect opportunity for Microsoft to show how much love they have for open-source.

We want them to show exactly how much love they have for the open source software they mention in their advertising. If they really do love free software and were willing to give them the benefit of the doubt they have the opportunity to show it to the world.

So, its pretty clear that the foundation is going head on to challenge Microsoft. But obviously, Microsoft still hasnt responded to their request to open-source Windows 7.

Its highly unlikely that the tech giant is even taking this petition seriously. Thats because Microsoft will earn big bucks by providing Windows 7 ESU to anyone who pays for it.

See the article here:
Open Source Group Wants Windows 7 Source Code In A Blank Hard drive - Fossbytes

What to know about open source security – Information Age

Many companies have a preference towards open source technology, so what should be kept in mind in regards to ensuring its security?

What do companies need to know about securing open source tech?

Like any area of tech, open source needs its own security measures to thrive without a hitch.

A major benefit that organisations gain from using open source tech is that its freely available and not distributed from a particular proprietor.

The open source aspect refers to the code, and can be found within databases, applications and operating systems, among other software. This code can be changed to suit the needs of the business.

However, being available from the public domain, this realm will have its own potential vulnerabilities that hackers could exploit.

The creator of Jenkins X and the Apache Groovy language, James Strachandistinguished engineer at CloudBeesdiscusses the importance of open source providers in keeping open source, open. Read here

Open source applications, for all their arrays of use cases, can be compromised if those responsible for their security arent on top of any possible vulnerabilities.

Ben Griffin, director at Computer Disposals Ltd, explained: Because the code used by open source projects is freely viewable, hackers can take advantage of organisations that are slow to patch their applications.

Updating applications as soon as possible is imperative. Additionally, an inventory that tracks open source usage across teams helps with regards to visibility and transparency, as well as ensuring that different teams dont use different versions of the same component.

Similarly, technical employees should be careful not to copy and paste code from open source libraries, as this leaves the software susceptible to later vulnerabilities. Its a good idea to create an open source policy that specifically forbids copying and pasting such code from other projects.

Companies should also be sure to keep the security of their supply chain in mind when dealing with open source tech, and not agree to use any software without carefully examining what it entails.

The best thing to do when it comes to sharing open source code is to control your open source supply chain, said Stefano Maffulli, senior director of digital marketing and community at Scality. Do the due diligence on the packages shipped, reduce dependencies as much as possible and automatically keep track of them in your CI toolchain.

You want to avoid getting into situations like those weve seen recently where popular libraries were hijacked by criminals and modified to ship malware, like the right9ctrl fiasco in the fall of 2018, or completely removed from distribution as a political act of protest, such as the Chef scandal in the fall of 2019.

Theres a lot of hype around blockchain in supply chain management; can it help enterprises escape their siloed insights and enable them to take a more integrated and holistic approach? Read here

In some ways, observing the security of open source tech is similar to securing software distributed by a proprietor.

One of these ways is that a plan is needed for when the software is under threat.

Alongside fixing and upgrading the code for open source software users, and encouraging developers to regularly monitor for patch updates, a solid business continuity and disaster recovery (BCDR) strategy is an effective solution for resolving any risks tied to open source software that threaten the availability of systems and data, said Ryan Weeks, chief information security office at Datto.

Being able to keep systems running and to quickly recover from an attack helps businesses avoid costly downtime caused by those security risks, including everything from ransomware, crypto jacking, and spyware to trojan horses, worms, and rootkits.

A good indicator of what open source tech is worth using within the company is which other firms are using it.

Dont let them get away with it. New survey data has revealed 23% of organisations have shipped products with known security vulnerabilities to beat competition. Read here

Organisations should use open source software that has been adopted/embraced by large vendors, said Lior Ben Naon, chief solution architect at Skybox Security. For example, at organisational networks, we see Red Hat Linux servers significantly more than we see Ubuntu or CentOS distributions.

It is due to extended support mechanism of Red Hat, and the ownership they are taking upon their Linux code base. So in this example, it starts with open source code, but being adopted by a major vendor helps improve the security level, and allow better patching process, among others.

Companies should be wary of any personal information that may be present within application programming interfaces (APIs).

Vice president, global marketing at SIOS Technology, Frank Jablonski, said: The security risks of open APIs are not limited to hackers and malware. Open data and codes can lead to data sharing among applications.

The amount of personal information attained by open APIs can undoubtedly be shared with third-parties. This is evident in Facebooks vow to better secure personal information.

APIs can read all your data or they read the data from another application that you have. Security features for open APIs, such as API gateways, should provide users with the utmost protection.

Read the original post:
What to know about open source security - Information Age

Open Source Software Market Expected to Witness a Sustainable Growth over 2025 | Intel, Alfresco, Transcend, Epson, OpenText, IBM, RethinkDB, Acquia,…

The Open Source Software Market research Report is a valuable supply of perceptive information for business strategists. This Premium Tyres Market study provides comprehensive data which enhances the understanding, scope and application of this report.

The key market segments along with its subtypes are provided in the report. This report especially focuses on the dynamic view of the market, which can help to manage the outline of the industries. Several analysis tools and standard procedures help to demonstrate the role of different domains in market. The study estimates the factors that are boosting the development of Open Source Software companies.

You can get the sample copy of this report now @ https://www.reportsintellect.com/sample-request/957119

Key Companies Covered : Intel, Alfresco, Transcend, Epson, OpenText, IBM, RethinkDB, Acquia, Oracle, Astaro, Continuent, Canonical, Compiere, ClearCenter, Cleversafe

You get the detailed analysis of the current market scenario for Open Source Software and a market forecast till 2025 with this report. The forecast is also supported with the elements affecting the market dynamics for the forecast period. This report also details the information related to geographic trends, competitive scenarios and opportunities in the Open Source Software market. The report is also equipped with SWOT analysis and value chain for the companies which are profiled in this report.

Most Important Types : Shareware, Bundled Software, BSD(Berkeley Source Distribution), Advanced Driver Assistance Systems (ADAS)

Most Important Application : BMForum, phpBB, PHPWind

Get Instant discount @ https://www.reportsintellect.com/discount-request/957119

Global Open Source Software Market Size, Status and Forecast 2020 2025

1 Market Overview

2 Manufacturers Profiles

3 Global Open Source Software Sales, Revenue, Market Share and Competition by Manufacturer

4 Global Open Source Software Market Analysis by Regions

5 North America Open Source Software by Countries

6 Europe Open Source Software by Countries

7 Asia-Pacific Open Source Software by Countries

8 South America Open Source Software by Countries

9 Middle East and Africa Open Source Software by Countries

10 Global Open Source Software Market Segment by Type

11 Global Open Source Software Market Segment by Application

12 Open Source Software Market Forecast

13 Sales Channel, Distributors, Traders and Dealers

14 Research Findings and Conclusion

15 Appendixes

Reasons for Buying this Report:

About Us:

Reports Intellect is your one-stop solution for everything related to market research and market intelligence. We understand the importance of market intelligence and its need in todays competitive world.

Our professional team works hard to fetch the most authentic research reports backed with impeccable data figures which guarantee outstanding results every time for you.

So whether it is the latest report from the researchers or a custom requirement, our team is here to help you in the best possible way.

Contact Us:

[emailprotected]

PH +1-706-996-2486

US Address:

225 Peachtree Street NE,

Suite 400,

Atlanta, GA 30303

See the original post here:
Open Source Software Market Expected to Witness a Sustainable Growth over 2025 | Intel, Alfresco, Transcend, Epson, OpenText, IBM, RethinkDB, Acquia,...

Orange Egypt Builds Horizontal Cloud on Red Hat Technologies, Improving Time-to-Market by up to 10x – Business Wire

RALEIGH, N.C.--(BUSINESS WIRE)--Red Hat, Inc., the world's leading provider of open source solutions, today announced that Red Hats open hybrid cloud technologies are providing a horizontal cloud platform for Orange Egypts virtual network functions (VNFs), helping the service provider to more quickly deliver new services to customers, optimize its network investments and reduce operational expenditure. Building on the foundation of Red Hat OpenStack Platform and Red Hat Ceph Storage, Orange Egypt is the first Orange affiliate to manage 100% of its live customer traffic over a fully software-based platform spanning several sites across its region.

To maintain its position as Egypt's leading mobile operator, Orange Egypt wanted to use the latest in hybrid cloud and network functions virtualization (NFV) innovation to be able to respond in real-time to market dynamics and network conditions to best serve its more than 30 million customers. As part of this initiative, Orange Egypt looked to virtualize its mobile packet core, which had been running standalone functions on dedicated appliances.

Accordingly, Orange Egypt set out to move strategically from a centralized evolved packet core (EPC) supplier to a software-defined, distributed architecture on standard hardware, using Red Hat OpenStack Platform supported by Red Hat Ceph Storage. Red Hat Consulting provided certified training courses and professional services to support Orange Egypts teams derive greater value from open technologies, tools and methodologies.

In less than a year, Orange Egypt launched vEPC in 12 datacenters across six sites in Cairo and Alexandria. Today, 100% of Orange Egypts mobile broadband traffic is served by its virtualized packet core platform.

With its Red Hat-based open cloud, Orange Egypt gains access to an ecosystem of thousands of certified providers. The freedom to choose diverse suppliers as well as a reduced reliance on specialized hardware has helped Orange Egypt to lower its capital expenditure and operational expenses.

Red Hat OpenStack Platform is massively-scalable infrastructure with unified automated management, enabling Orange Egypt to launch and adapt services to better fulfill customer demand. With Red Hat Ceph Storage, Orange Egypt has a massively scalable storage solution for its workloads. It has been able to roll out software-defined capacity expansions for its telecom packet core to serve summer hotspots in Alexandria and Northern coastal areas. Orange Egypt was able to make 50% capacity upgrades in only two working days per site, which is nearly 10 times quicker than its traditional process.

With this new deployment, Orange Egypt was also able to deliver new cybersecurity services such as parental controls and malware protection to its consumer and business customers faster than previously possible with its traditional system. The third VNF that Orange Egypt has launched on its platform is mobile data optimization (MDO), enabling transmission control protocol (TCP) acceleration aimed at reducing network latency and improving the user experience.

Supporting Quotes

Darrell Jordan-Smith, global vice president, vertical industries & accounts, Red HatOrange Egypt is on a drive towards network transformation, and Red Hat is helping it meet this goal through a multi-vendor, multi-application network that can make full use of the scale and agility offered by cloud computing. Trusting in Red Hats open hybrid cloud technologies as the backbone for its horizontal platform approach, Orange Egypt has gained greater flexibility and freedom to optimize its network performance, expenditure and service delivery for the benefit of its customers.

Ayman Amiri, chief technology officer, Orange EgyptWe decided to lead the way in digital services innovation and provide outstanding customer experience. Open source is powering the development of next-generation cloud-native platforms and Red Hat augments this with enhanced security, stability and support, enabling us to create solutions that best fit our customers unique needs. With our horizontal telco cloud based on Red Hat technologies, we can act more dynamically to address business challenges and opportunities, and make a greater contribution to the digital development of Egyptian society.

Additional Resources

Connect with Red Hat

About Red Hat, Inc.

Red Hat is the worlds leading provider of enterprise open source software solutions, using a community-powered approach to deliver reliable and high-performing Linux, hybrid cloud, container, and Kubernetes technologies. Red Hat helps customers integrate new and existing IT applications, develop cloud-native applications, standardize on our industry-leading operating system, and automate, secure, and manage complex environments. Award-winning support, training, and consulting services make Red Hat a trusted adviser to the Fortune 500. As a strategic partner to cloud providers, system integrators, application vendors, customers, and open source communities, Red Hat can help organizations prepare for the digital future.

Forward-Looking Statements

Certain statements contained in this press release may constitute "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements provide current expectations of future events based on certain assumptions and include any statement that does not directly relate to any historical or current fact. Actual results may differ materially from those indicated by such forward-looking statements as a result of various important factors, including: risks related to the ability of the Company to compete effectively; the ability to deliver and stimulate demand for new products and technological innovations on a timely basis; delays or reductions in information technology spending; the integration of acquisitions and the ability to market successfully acquired technologies and products; risks related to errors or defects in our offerings and third-party products upon which our offerings depend; risks related to the security of our offerings and other data security vulnerabilities; fluctuations in exchange rates; changes in and a dependence on key personnel; the effects of industry consolidation; uncertainty and adverse results in litigation and related settlements; the inability to adequately protect Company intellectual property and the potential for infringement or breach of license claims of or relating to third party intellectual property; the ability to meet financial and operational challenges encountered in our international operations; and ineffective management of, and control over, the Company's growth and international operations, as well as other factors. In addition to these factors, actual future performance, outcomes, and results may differ materially because of more general factors including (without limitation) general industry and market conditions and growth rates, economic and political conditions, governmental and public policy changes and the impact of natural disasters such as earthquakes and floods. The forward-looking statements included in this press release represent the Company's views as of the date of this press release and these views could change. However, while the Company may elect to update these forward-looking statements at some point in the future, the Company specifically disclaims any obligation to do so. These forward-looking statements should not be relied upon as representing the Company's views as of any date subsequent to the date of this press release.

Red Hat and Ceph are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the U.S. and other countries. The OpenStack Word Mark is either a registered trademark/service mark or trademark/service mark of the OpenStack Foundation, in the United States and other countries, and is used with the OpenStack Foundation's permission. Red Hat is not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.

Read the rest here:
Orange Egypt Builds Horizontal Cloud on Red Hat Technologies, Improving Time-to-Market by up to 10x - Business Wire

The Private Internet Access Android app is being open sourced – Privacy News Online

Private Internet Access (PIA) is open sourcing its Android VPN app and dependencies code to the public as part of its commitment to open sourcing all clients in the name of transparency and privacy. The Free and Open Source Software (FOSS) community is a cornerstone of everything we enjoy on the internet.

Private Internet Access is proud to be able to give back to the FOSS community by open sourcing the hard work of our developers, for the benefit of all. The roll out of all the Android-related PIA repositories will take place over the next couple of weeks and is starting today with PIAs slightly altered Android OpenVPN repo. The next repo will be PIAs Android VPN tunnel libraries and the final repo will be the PIA Android app itself.

Private Internet Access first announced their plans to open source their VPN client software on all platforms in 2018. Over the last few years, PIA has open sourced its Chrome Extension, Firefox Add-On, Private Internet Access tunnel for Apple Platforms, and Desktop client. The open source PIA desktop client even includes the code for how to allow users to resolve Handshake names. It is with great pleasure that the PIA team releases the code for the PIA VPN Android App to the public for anyone to review.

Links to all of the repositories can be found at pia-foss on Github. More information on PIAs FOSS codebases can also be found here. Any questions regarding Private Internet Accesss open source codebases can be directed to opensource@privateinternetaccess.com.

Private Internet Access has been the premier no-log VPN service in the industry for a decade. To maintain trust in our service, Private Internet Access is committed to leading the industry in new features and especially in transparency. Open sourcing our clients is just the tip of the iceberg. We believe that what privacy seeking users have been yearning for is the ability to not just blindly trust the companies they rely on to protect their privacy. To accomodate this righteous desire, Private Internet Access has adopted a new mentality: Dont Trust, Verify.

Allowing our users to verify that there is no malicious code running on their computers and Android and iOS smartphones is just the beginning. Private Internet Access is also developing a Verifiable zero access infrastructure as well as allowing random audits so there is additional verification that no logging is happening on our VPN servers. Join us as we lead the charge for a more private, transparent future where users dont need to blindly trust, but can verify instead.

View original post here:
The Private Internet Access Android app is being open sourced - Privacy News Online

Red Hat OpenShift Now Available for IBM Z and LinuxONE – Database Trends and Applications

IBM has announced that the Red Hat OpenShift Container Platform is generally available forIBM ZandIBM LinuxONE. According to IBM, the availability of OpenShift for Z and LinuxONE is a major milestone for both hybrid multi-cloud and for enterprise computing. OpenShift supports cloud-native applications being built once and deployed anywhereand now extends this to on-premise enterprise servers such as IBM Z and LinuxONE. The offering is the result of the collaboration between the IBM and Red Hat development teams and discussions with early adopter clients.

The IBM announcement was made in an IBM IT Infrastructure blog post by Ross A. Mauri, general manager for IBM Z, and Joe Fernandes, vice president of products, Cloud Platforms Business Unit at Red Hat, which was acquired last year by IBM.

"Organizations today are looking to bring business innovation to market faster and more efficiently. Containers enable applications to be packaged together with their software dependencies, and Kubernetes adds powerful tools to manage large numbers of containers and orchestrate the full application lifecycle," the blog post said. "OpenShift then brings together the core open source technologies ofLinux, containers and Kubernetes, adds additional open source capabilities such developer tools and a registry, and hardens, tests and optimizes the software for enterprise production use."

Working with IBM Hybrid Cloud, Red Hat has also developed a roadmap for bringing the ecosystem of enterprise software to the OpenShift platform. IBM Cloud Paks containerize key IBM and open source software components to help enable faster enterprise application development and delivery.

IBM also announced thatIBM Cloud Pak for Applicationsis available for IBM Z and LinuxONEsupporting modernization of existing apps and building new cloud-native apps. In addition,as announced last August, IBM plans to deliver additional Cloud Paks for IBM Z and LinuxONE.

More information is available about IBM Z,LinuxONE, and Red Hat OpenShift

Follow this link:
Red Hat OpenShift Now Available for IBM Z and LinuxONE - Database Trends and Applications

WhatsApp hits 2 billion users, resists governments on encryption – Business Insider – Business Insider

WhatsApp is bracing itself for a clash with the US government over encryption.

In an interview with The Wall Street Journal published Wednesday, the head of WhatsApp, Will Cathcart, said the messaging app had hit 2 billion users, up from 1.5 billion two years ago. It still falls behind the core Facebook app, which has 2.5 billion users.

Cathcart used the interview as a chance to draw a line in the sand over end-to-end encryption, the system that allows WhatsApp users' messages to stay private and inaccessible even by WhatsApp.

WhatsApp and its parent company, Facebook, have come under pressure from the US government recently to create ways for law enforcement to circumvent encryption. Attorney General William Barr last year asked Facebook to delay its plans for encrypting all its messaging platforms which Facebook rejected.

"For all of human history, people have been able to communicate privately with each other," Cathcart told The Journal, adding: "And we don't think that should go away in a modern society."

The US isn't the only government that's been pressuring WhatsApp to break encryption. Last year the allied "Five Eyes" intelligence-sharing countries (the US, the UK, Canada, Australia, and New Zealand) united in pushing for encrypted services to build "safeguards" for law enforcement though they stopped short of calling for deliberate security vulnerabilities known as backdoors.

The argument against backdoors runs that they weaken the system, as they could be exploited by malicious actors rather than law enforcement.

Cathcart said that despite Facebook CEO Mark Zuckerberg's grand plans to weave together Facebook's suite of social-media platforms including Instagram and WhatsApp, WhatsApp's engineers were still focused on a constrained set of products consisting of private messaging, payments, and customer-service tools for businesses.

Go here to read the rest:
WhatsApp hits 2 billion users, resists governments on encryption - Business Insider - Business Insider

Indias proposed internet regulations could threaten privacy everywhere – The Verge

In December, after a somewhat bruising Senate hearing with Facebook, I argued that the fight over encryption was just beginning. This week, with India poised to unveil new rules that threaten encrypted communications around the world, it seems safe to say that the encryption fight is now fully underway.

First, some background.

Messaging products that are end-to-end encrypted can be read only by the sender and the recipient. The encrypted platform itself such as Apples iCloud, or Facebooks WhatsApp cant read the message, because it doesnt have a key. This has led to periodic attempts from law enforcement agencies and lawmakers to force platforms to create so-called backdoors that would allow them to snoop on the contents of those messages. But the platforms have resisted, and the issue has generally been in a stalemate.

In India, though, things are moving very quickly to make end-to-end encryption illegal. The country has sought to exert more control over the internet in the wake of lynchings committed after false rumors spread on WhatsApp. But the Indian government has often taken a draconian approach to regulating the web shutting down internet access at least 95 times last year, including an indefinite shutdown in Kashmir that a judge called an abuse of power earlier this year.

Now a set of rules proposed a little over a year ago would force tech platforms to cooperate continuously with government requests, without requiring so much as a warrant or court order. Among the requirements is that any post be traceable to its origin. And in what is believed to be a world first, the rules would require tech companies to do the investigating to deploy their sophisticated tools to track a posts spread on their network back to its point of origin, and then turn that information over to law enforcement.

This is quite different from the current approach, in which law enforcement identifies a suspect and then asks platforms to supply information about them. Now tech companies could essentially be required to serve as deputies of the state, conducting investigations on behalf of law enforcement, without so much as a court order.

That almost certainly means breaking encryption how else could tech companies be expected to trace the source of a message? Imagine Clearview AI, but as a service tech companies are required to provide to law enforcement for free, and you start to understand what the Indian government is asking for here.

The final rules are expected to be released imminently, Saritha Roi reports in Bloomberg:

The Ministry of Electronics and Information Technology is expected to publish the new rules later this month without major changes, according to a government official familiar with the matter. [...]

The provisions in the earlier draft had required platforms such as Googles YouTube or ByteDance Inc.s TikTok, Facebook or its Instagram and WhatsApp apps, to help the government trace the origins of a post within 72 hours of a request. The companies would also have to preserve their records for at least 180 days to aid government investigators, establish a brick-and-mortar operation within India and appoint both a grievance officer to deal with user complaints and a government liaison.

The rules would apply to any app with more than 5 million users, including Facebook, YouTube, Twitter, and TikTok. Bloomberg reports that its not clear whether the identities of foreign users would be exempt.

The tech companies are fighting back. A trade group has argued that the rules would represent a severe violation of Indian citizens privacy, and they would almost certainly sue if the rules were implemented as written.

But theres no guarantee that theyll win. And if these rules take effect India wont be the last democracy to implement them. Tech companies will come under increasing pressure to implement a similar system in other Western countries. (Australia seems poised to try to break encryption as well.)

What happens if encryption supporters lose? First, privacy is diminished for billions of users including for activists, dissidents, victims of domestic abuse, businesses, and even government workers who have come to rely on secure messaging.

Second, the move could hurt the tech sector both in India and abroad by making it prohibitively expensive to launch a new business. Who can afford to build a compliance regime that requires the company to accommodate any government request, no matter how small, from day one? In practice, the answer is likely to be only incumbents. Hannah Quay-de la Vallee makes this point here:

If this rule is implemented in India (and potentially copied by other nations) it could force companies to create two types of systems one that uses e2e and one that doesnt. Companies might well justifiably balk at the cost and complexity of that approach and simply build less secure systems. That would weaken the overall safety of the internet ecosystem, harming users around the globe. Alternatively they could remove themselves from the Indian market altogether, depriving 1.2 billion people of state-of-the-art internet security. Neither of these are good outcomes.

Given how many things Americans have to worry about domestically, I understand how a story about Indian internet rules can fly under the radar. But its important to recognize that the spirit thats animating the discussion in India is alive and well in the United States. Threats to privacy are multiplying faster than tech or society can deal with them. In such a world, encryption is one of the last and best tools we have to fight back.

Today in news that could affect public perception of the big tech platforms.

Trending sideways: Facebooks fundraising features, which have led to more than $3 billion in donations since 2015, have generated significant goodwill. But nonprofits are complaining they dont receive enough data about donors to form long-lasting relationships.

Mike Bloomberg is paying some of the biggest meme-makers on the internet to post sponsored content on Instagram promoting his presidential campaign. Hes working with Meme 2020, a company formed by some of the people behind extremely influential accounts, like Mick Purzycki of Jerry Media. Taylor Lorenz at The New York Times has the scoop:

The campaign, which launched this week, has already placed sponsored posts on Instagram accounts including @GrapeJuiceBoys, a meme page with more than 2.7 million followers; Jerry Medias own most popular account, with more than 13.3 million followers; and @Tank.Sinatra, a member with more than 2.3 million followers.

The accounts all posted Bloomberg campaign ads in the form of fake direct messages from the candidate.

Larry Ellison, the founder of Oracle and one of the worlds richest men, is throwing a fundraiser for Donald Trump. Its the most significant display of support from a major tech titan for the president, by far. (Theodore Schleifer / Recode)

Senator Kirsten Gillibrand (D-NY) released a proposal to overhaul the way the US government regulates privacy. Her new Data Protection Act would create an independent agency to protect consumer data at large. (Makena Kelly / The Verge)

A court in Moscow fined Twitter and Facebook 4 million rubles each (a piddling $63,000) for refusing to store the personal data of Russian citizens on servers in their home country. Its the largest penalty imposed on Western technology companies yet under Russias new internet laws, which are designed to give the government more control over peoples online activity. (Associated Press)

A network of news sites is expanding across the country. Nearly 40 websites masquerading as conservative local news outlets were discovered in Michigan in October. Now, additional statewide networks have sprung up in Montana and Iowa. (Katherina Sourine and Dominick Sokotoff / The Michigan Daily)

A mobile voting app used in West Virginia has basic security flaws that could allow someone to see and intercept votes as theyre transmitted from mobile phones to the voting companys server. Its the latest evidence that digital voting solutions are not secure. (Kim Zetter / Vice)

Facebooks dataset of anonymized URLs, which is meant to help researchers study the impact of social media on democracy, is finally live. The project, which allows approved researchers to see every link shared on Facebook, is part of a research partnership with Social Science One. Gary King and Nathaniel Persily of Social Science One talk about why the launch took so long:

When Facebook originally agreed to make data available to academics through a structure we developed (King and Persily, 2019, GaryKing.org/partnerships) and Mark Zuckerberg testified about our idea before Congress, we thought this day would take about two months of work; it has taken twenty. Since the original Request for Proposals was announced, we have been able to approve large numbers of researchers, and we continue to do so. When this project began, we thought the political and legal aspects of our job were over, and we merely needed to identify, prepare, and document data for researchers with our Facebook counterparts. In fact, most of the last twenty months has involved negotiating with Facebook over their increasingly conservative views of privacy and the law, trying to get different groups within the company on the same page, and watching Facebook build an information security and data privacy infrastructure adequate to share data with academics.

Facebooks New Product Experimentation team released a Pinterest-like app for saving and sharing photos of activities like cooking and home improvement projects. The app, called Hobbi, is meant to help you document and remember the things you love to do. Pinterest stock dipped on the news. (Alex Heath / The Information)

Teens are creating thrifting communities on Instagram where they buy and sell clothes in photos and comments. Its like a modern-day eBay. (Mia Sato / Input)

Jeff Bezos bought the most expensive property in LA with an eighth of a percent of his net worth. It is literally impossible to imagine just how rich the wealthiest people on the planet are. (Bijan Stephen / The Verge)

Amazons first employee, Shel Kaphan, says breaking up the company could potentially make sense. In an interview for a new PBS Frontline documentary about Amazon, Kaphan said hes proud of what the company has become, but also conflicted. (Jason Del Rey / Recode)

In 2019, YouTube dominated 70 percent of the total time people spent on their phones watching the top five entertainment apps. Its success is something that companies like Netflix, WarnerMedia, NBCUniversal, and Disney will have to take into account as they compete for peoples attention. (Julia Alexander / The Verge)

The CEO of an AI startup with deep ties to the University of Michigan just stepped down from the company amid allegations of sexual misconduct. But hes still a professor at the school. (Zoe Schiffer / The Verge)

Ezra Kleins new book, Why Were Polarized, charts 50 years of American history to figure out why our political climate is the way it is. It turns out the answer is a lot more complicated than just social media. (Nicholas Thompson / Wired)

New social media advice when going through a breakup: Deactivate your accounts, have a trusted friend change the passwords, and avoid looking back for as long as you can stand it. (Katie Way / Vice)

Im sure theres relevant context here, but Ive decided that I dont care to look it up.

Send us tips, comments, questions, and your WhatsApp user ID: casey@theverge.com and zoe@theverge.com.

Continued here:
Indias proposed internet regulations could threaten privacy everywhere - The Verge