$9,500 is Imminent For Bitcoin Despite 5% Intraday Gain: Heres Why – newsBTC

Bitcoin gained bullish momentum above the key $8,800 resistance. As a result, BTC price surpassed $9,000 and it seems like the bulls are now aiming a test of $9,500.

Yesterday, we discussed how bitcoin bulls aim big after the price surge above the $8,500 resistance. BTC even surged above the main $8,800 resistance level and the 100 hourly simple moving average to move further into a positive zone.

In the past three sessions, the price is up around 5% and it surpassed the $9,000 psychological barrier. A new weekly high is formed near the $9,145 and the price is currently correcting lower.

It is trading near the 23.6% Fib retracement level of the recent rise from the $8,873 low to $9,145 high. The first key support on the downside is near the $9,000 level.

Furthermore, the 50% Fib retracement level of the recent rise from the $8,873 low to $9,145 high is also near the $9,000 level to act as a strong support. If there are additional losses, bitcoin price might decline towards the $8,880 support area.

More importantly, there is a key bullish trend line forming with support near $8,880 on the hourly chart of the BTC/USD pair. If the price fails to stay above the $8,800 support, it could revisit the main $8,500 support area (the recent breakout zone).

Bitcoin Price

In the short term, BTC might correct lower towards the $9,000 and $8,880 support levels. However, the bulls remain in control as long as the price is above $8,500 and the 100 hourly simple moving average.

On the upside, an initial resistance is near the $9,200 area. If bitcoin surges above the $9,200 resistance, it will most likely set the pace for a test of the $9,500 hurdle. Any further gains may perhaps call for a push towards $10,000 in the near term.

Technical indicators:

Hourly MACD The MACD is showing positive signs in the bullish zone.

Hourly RSI (Relative Strength Index) The RSI for BTC/USD is currently correcting from the overbought zone.

Major Support Levels $9,000 followed by $8,880.

Major Resistance Levels $9,150, $9,200 and $9,500.

Excerpt from:
$9,500 is Imminent For Bitcoin Despite 5% Intraday Gain: Heres Why - newsBTC

Bitcoin Moves on Path to Money But Unit of Account a Long Way Off – Bitcoinist

Bitcoin is only a decade old but it has come a long way on the path to becoming money. A couple of metrics to consider are precision of spending and unit of account status.

When bitcoin was first envisioned back in 2009 it was largely experimental. For its first year, tens of thousands of them were fired across networks just to see what happened.

The first real world transaction occurred in 2010 when Laszlo Hanyecz famously asked for pizza on the bitcointalk forum in exchange for 10,000 BTC. He received a $25 order of pizza in exchange for the coins marking the first ever transaction for a tangible asset.

It went from magic worthless internet money to something with real value, which was the desired intention for the transaction. At todays bitcoin prices that pizza would be worth $90 million.

BitMEX Research has delved deeper into the precision of spending on the bitcoin network to reveal how the accuracy has improved over time.

By dividing outputs into groups increasing by a power of ten (from 1 satoshi to 100k BTC) and plotting the results on a chart it is clear to see the increase in precision over the past decade.

Currently over 70% of Bitcoin outputs use the highest available degree of precision (one satoshi), considerable growth since the c40% level in 2012.

The report concluded that an increase in precision would be beneficial to privacy based on the way bitcoin transactions work with UTXOs.

As our data shows, the level of precision is increasing, such that most outputs now have the maximum level of precision. This could inadvertently be positive news from a privacy perspective.

The study went on to state that bitcoin needs to achieve three major steps before it can be considered the same status as money.

Firstly it needs to be used as a medium of exchange which is already happening, driven by its potential unique capability: censorship resistant electronic payments.

The second step has been clearly evidenced this month and that is its status as a store of value. With market movements mirroring the worlds largest store of value, gold, bitcoin is being viewed in the same light, especially in times of adversity.

Thirdly is the unit of account status. This is when goods and services are priced in bitcoin, or satoshis in this case. This is still a very long way off due to price volatility as BTC is still primarily a vehicle for speculation. There are also a number of factors that need to happen to the technology before it sees mass adoption.

It added that if this does finally occur then the degree of precision may decrease due to the assets increased use as a unit of account.

How long will it take for bitcoin to have money status? Add your comments below.

Images via Shutterstock

View original post here:
Bitcoin Moves on Path to Money But Unit of Account a Long Way Off - Bitcoinist

New Collaboration Brings Increased Open Source Security Support and Assurances to Software Developers – PRNewswire

SAN FRANCISCO, Jan. 28, 2020 /PRNewswire/ --The Linux Foundation, the nonprofit organization enabling mass innovation through open source, and the Open Source Technology Improvement Fund (OSTIF) today announced a strategic partnership to advance security for open source software (OSS) that has become critical to the world's infrastructure.

The organizations will bring together and build on a depth of their experience supporting security audits for widely deployed open source communities. This formal and strategic agreement will allow the Linux Foundation to augment its work on security audits, of which it has already investedmore than$1macross more than 20 security audits for open source projects to date, by including audit sourcing experts through OSTIF's network. OSTIF will share the resources available through the Linux Foundation's Community Bridge, a funding and support ecosystem for developers and projects, with its community to help fundraise for new audits.

"The Linux Foundation's ability to fundraise across industries to support thousands of developers around the world is unprecedented," said Amir Montazery, vice president of development at OSTIF. "The Linux Foundation is a pioneer in open source software and one of the few organizations taking the actions required to truly support it for generations to come. We are excited to join forces and increase our collective impact on improving critical software."

As part of the strategic partnership, The Linux Foundation will appoint Mike Dolan, vice president of strategic programs, to the OSTIF Advisory Board.

"OSTIF represents a global community and network of security experts and developers and demonstrates an important commitment to the improvement and sustainability of open source software," said Mike Dolan, vice president of strategic programs, Linux Foundation. "This is a natural collaboration that we hope will increase trust in the global open source software supply chain that underpins modern society."

About the Linux Foundation Founded in 2000, the Linux Foundation is supported by more than 1,000 members and is the world's leading home for collaboration on open source software, open standards, open data, and open hardware. Linux Foundation's projects are critical to the world's infrastructure including Linux, Kubernetes, Node.js, and more. The Linux Foundation's methodology focuses on leveraging best practices and addressing the needs of contributors, users and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.

About Open Source Technology Improvement Fund The Open Source Technology Improvement Fund is a non-profit organization that connects open source security projects with much needed funding and logistical support. This core value is driven by public fundraising and by soliciting donations from corporate and government donors.For more information, please visithttps://ostif.org

The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page: https://www.linuxfoundation.org/trademark-usage.

Linux is a registered trademark of Linus Torvalds.

Media Contact pr@linuxfoundation.org

SOURCE The Linux Foundation

http://www.linuxfoundation.org

Read this article:
New Collaboration Brings Increased Open Source Security Support and Assurances to Software Developers - PRNewswire

Security in the financial industry – TechRadar

In recent years, there has been a growing realization that privacy is every citizens right. Whats also become clear is that you cant have privacy without security in place. You only need to look at the number of cyber-attacks which have plagued the headlines in recent years to see that companies have been irresponsible to date. No company is immune to todays cybercriminals, especially financial services companies who process and handle huge amounts of sensitive information. With this in mind, these businesses need to ensure theyre adopting the right technologies to protect themselves from this growing threat.

Stephan Fabel, Director of Product, Canonical - publisher of Ubuntu.

Encryption is one of the biggest solutions to this problem and is an enabler of modern-day banking and fintech operations. Banks are well-known for using encryption for security reasons. Currently, the biggest challenge facing the finserv sector is around bringing this level of security to the wider industry. Finserv customers want high levels of security but also easy deployment, flexibility, and agility, which often poses a challenge for IT teams. Canonical is working closely with IBM to overcome this issue and provide its fintech customers with the technology to optimize data protection and privacy across both containers and multi-cloud infrastructures.

One such technology is the secure service container - a tool which has been specifically developed for container-based applications on IBMs LinuxONE. Banks and fintechs are already using this technology to protect themselves against three of the most common attack factors: malware, ransomware and memory scraping, as well as other mainstream attack methods used for stealing cryptocurrency, and insider attacks which compromise user credentials.

By using the mix of hardware and software that the so-called security service container offers, developers get the same quality of security that they would on Linux, and this works in any data center, whether on-premise or using cloud services. The next generations of finserv IT infrastructures are being built around Linux because it is easy to deploy, and gives you a highly functional and easily automated stack. Industry giants such as Barclays have already built whole data center infrastructures around Linux. Besides providing easy access to innovations and software frameworks for IT teams, open source software also increases trust, which is essential for security compliance in the long term.

When it comes to close-sourced software, it is impossible to verify all background activities happening, and in case of a bug or an error, it is hard to analyse the reasons behind them, given only the original developer can access the backend. In the case of open source, the community of developers is very quick to spot and fix bugs or errors.

In the financial services industry, containerization can enable new levels of security, cost saving and developer efficiency. The majority of developers are not security experts but are looking for cost efficiencies when deploying new applications and systems. With containers, you can push a button, move things to the cloud and it will run as a virtual machine. These capabilities are not something developers have traditionally been able to benefit from to provide advanced security through hardware. Even with physical access to computers, cyber criminals wont be able to break into the system.

In about 10-15 years quantum computers will become powerful enough to break all current cryptography keys, and the banking and financial industries are preparing for the post-quantum cryptography already. Technology vendors are already populating their systems with such algorithms, moving from firmware into hardware. When quantum computers reach the required level of power, the majority of businesses will need to decrypt all of their data and encrypt it with the new post-quantum cryptographic methods.

In addition, blockchain technology will also become one of the key security algorithms. The goal is to enable the finserv industry to operate, test and run analytics without data. It is also great that new players in the finserv space, who have never had legacy systems in place, will build their infrastructures on non-monolithic systems.

See original here:
Security in the financial industry - TechRadar

3 Reasons to Buy IBM Stock – Motley Fool

International Business Machines (NYSE:IBM) managed to beat expectations with its fourth-quarter report last week, and it provided guidance calling for revenue and earnings growth in 2020. The stock has been trending downward for years as the company's transformation failed to translate into sustainable growth. That painful period may finally be over.

While looking at IBM's stock chart doesn't foster much confidence, there are a few good reasons to buy the stock.

IBM loaded up its balance sheet with debt to acquire open source software company Red Hat. While there's no guarantee that the $34 billion deal won't end in write-offs and disappointment, Red Hat presents IBM with some significant growth opportunities.

Red Hat itself was growing at a solid double-digit rate prior to the acquisition. Red Hat Enterprise Linux accounted for about one-third of the paid enterprise operating system market in 2018, second only to Microsoft. And Red Hat OpenShift, the company's container-based platform for hybrid cloud, currently leads the market.

The Red Hat acquisition strengthened IBM's position in the hybrid cloud market on day one. The combination of IBM and Red Hat is powerful, because IBM now has the opportunity to pitch Red Hat software to its large clients. Red Hat's normalized revenue growth rate accelerated to 24% in IBM's fourth quarter as that benefit began to be realized. One example: IBM recently announced a $1 billion hybrid cloud deal with a major Spanish bank involving Red Hat's OpenShift platform.

While IBM paid a steep price for Red Hat, the deal may end up being the key to IBM's return to sustainable growth.

Image source: Getty Images.

IBM grew its revenue in the fourth quarter, and it expects revenue growth in 2020. Earnings are being pressured by the accounting treatment of Red Hat's pre-acquisition deferred revenue, but IBM stock looks cheap even including that headwind.

For 2020, IBM expects to generate adjusted earnings per share of at least $13.35. This number includes the impact of IBM being unable to recognize all of Red Hat's stand-alone revenue. Free cash flow is expected to be around $12.5 billion, up from $11.9 billion in 2019.

With the stock trading around $139, both the price-to-earnings ratio and price-to-free cash flow ratio are right around 10. That's a valuation that assumes little or no growth. IBM expects to grow its adjusted pre-tax income by a high single-digit percentage annually through 2021, factoring in the benefits of Red Hat. If the company can hit that target, it could earn the stock a higher multiple.

A cheap price alone isn't enough to make a stock a good investment. But combine the beaten-down valuation with the growth potential afforded by Red Hat, and IBM looks like a good value.

IBM temporarily halted share buybacks once the Red Hat acquisition closed in order to prioritize paying down its debt. The company remains committed to growing the dividend, though, and another increase is expected in April.

Assuming IBM does raise its dividend in a few months, the company will become a Dividend Aristocrat, having increased its dividend for 25 consecutive years. IBM has paid dividends uninterrupted for over 100 years.

IBM's next dividend increase will likely be small, but a high yield makes up for the sluggish growth. The current quarterly dividend of $1.62 per share represents a yield of about 4.7%.

IBM is not a growth stock. Slow and steady growth is likely the best investors can hope for, but that's perfectly fine if the price is right. With IBM trading at pessimistic levels and sporting a high-yield dividend, growth doesn't need to be spectacular for the stock to be a winner over the next few years.

Here is the original post:
3 Reasons to Buy IBM Stock - Motley Fool

Remember the Clipper chip? NSA’s botched backdoor-for-Feds from 1993 still influences today’s encryption debates – The Register

Enigma More than a quarter century after its introduction, the failed rollout of hardware deliberately backdoored by the NSA is still having an impact on the modern encryption debate.

Known as Clipper, the encryption chipset developed and championed by the US government only lasted a few years, from 1993 to 1996. However, the project remains a cautionary tale for security professionals and some policy-makers. In the latter case, however, the lessons appear to have been forgotten, Matt Blaze, McDevitt Professor of Computer Science and Law at Georgetown University in the US, told the USENIX Enigma security conference today in San Francisco.

In short, Clipper was an effort by the NSA to create a secure encryption system, aimed at telephones and other gear, that could be cracked by investigators if needed. It boiled down to a microchip that contained an 80-bit key burned in during fabrication, with a copy of the key held in escrow for g-men to use with proper clearance. Thus, any data encrypted by the chip could be decrypted as needed by the government. The Diffie-Hellman key exchange algorithm was used to exchange data securely between devices.

Any key escrow mechanism is going to be designed from the same position of ignorance that Clipper was designed with in the 1990s

Not surprisingly, the project met stiff resistance from security and privacy advocates who, even in the early days of the worldwide web, saw the massive risk posed by the chipset: for one thing, if someone outside the US government was able to get hold of the keys or deduce them, Clipper-secured devices would be vulnerable to eavesdropping. The implementation was also buggy and lacking. Some of the people on the Clipper team were so alarmed they secretly briefed opponents of the project, alerting them to insecurities in the design, The Register understands.

Blaze, meanwhile, recounted how Clipper was doomed from the start, in part because of a hardware-based approach that was expensive and inconvenient to implement, and because technical vulnerabilities in the encryption and escrow method would be difficult to fix. Each chip cost about $30 when programmed, we note, and the relatively short keys could be broken by future computers.

In the years following Clipper's unveiling, a period dubbed the "first crypto wars," Blaze said, the chipset was snubbed and faded into obscurity while software-based encryption rose and led to the loosening of government restrictions on its sale and use. It helped that Blaze revealed in 1994 a major vulnerability [PDF] in the design of Clipper's escrow design, sealing its fate.

It is important to note, said Blaze, that the pace of innovation and unpredictability of how technologies will develop makes it incredibly difficult to legislate an approach to encryption and backdoors. In other words, security mechanisms made mandatory today, such as another escrow system, could be broken within a few years, by force or by exploiting flaws, leading to disaster.

This unpredictability in technological development, said Blaze, thus undercuts the entire concept of backdoors and key escrow. The FBI and Trump administration (and the Obama one before that) pushed hard for such a system but need to learn the lessons of history, Blaze opined.

"The FBI is the only organization on Earth complaining that computer security is too good," the Georgetown prof quipped.

"Any key escrow mechanism is going to be designed from the same position of ignorance that Clipper was designed with in the 1990s. We are going to be looking back at those engineering decisions ten years from now as being equally laughably wrong."

Daniel Weitzner, founding director of the MIT Internet Policy Research Initiative, said this problem is not lost on all governments trying to work out new encryption laws and policies in the 21st century. He sees a number of administrations trying to address the issue by bringing developers and telcos in on the process.

"What the legislators hear is a complicated problem that they don't know how to resolve," Weitzner noted. "Moving the debate to experts on one hand gets you down to details, but it is not necessarily easy."

Sponsored: Detecting cyber attacks as a small to medium business

More here:
Remember the Clipper chip? NSA's botched backdoor-for-Feds from 1993 still influences today's encryption debates - The Register

Options to End the End to End Encryption Debate – Infosecurity Magazine

Its a long-simmering disagreement that shows no sign of reaching a conclusion: law enforcement wants access to encrypted devices and messaging apps to fight crime. Tech companies say any system that allows for lawful access would instantly be attacked and put legitimate users in danger.

The latest spat between the FBI and Apple was over the locked devices of Mohammed Saeed Alshamrani, who was suspected of killing three people and injuring eight in a shooting spree on a Navy base in Pensacola, Florida on December 6, may have escalated the conflict, but it's unlikely to break the deadlock.

While the debate has been framed as a battle between privacy and security, the reason for the stalemate is that the conversation between law enforcement and tech firms has largely focused on one solution. With tech firms moving to stronger security and end-to-end encryption across messaging apps, the US Justice Department along with the UK and Australia - has asked companies to create a key or backdoor into the design of their products that would allow law enforcement to unlock the phones of criminal suspects and access data a move that Facebook says is impossible without weakening the strength of its encryption.

Surprisingly little thought, however, has been given to alternative ways of handling the challenge of thwarting criminals who hide behind encryption, while also preserving the privacy of legitimate users. So what are the alternatives, and is there a possibility that both sides could agree a middle ground?

Facebook has offered its own solution. Anxious to avoida scenario where unbreakable encryption would effectively become illegal,Facebook says it should still be able to provide some critical location and account information.

This is because end-to-end encryption hides all content, but not all metadata of the conversation taking place.We are building tools to look for signals and patterns of suspicious activity so that we can stop abusers from reaching potential victims, Facebooks Jay Sullivan told the Judiciary Committee last month.

The big fear, however, is that 12 million referrals of child sexual abuse - currently flagged by tech giants - would be lost annually if Facebook implements its plans. Stronger encryption would limit the chances of identifying the abusers and rescuing the victims.

Then there is the argument that Facebook cannot be trusted, with critics pointing to numerous security breaches and the mass collection of users personal data for financial gain.

Anotheroption, put forward by the Carnegie Endowment for International Peace in a new paper calledMoving the Encryption Policy Conversation Forward, attempts to find some middle ground by separating data at rest and data in motion. It would prevent police from being able to carry out live surveillance of discussions that are in progress, but allow them with a court-ordered search warrant to see data at rest on mobile phones.This would include photos and messages that are already held on suspects mobile phones, laptops and in cloud storage.

Exploring mobile phone data at rest seems to be an area most likely to kick start the debate.New York County District Attorney Cyrus Vance is among supporters of this approach and wants federal legislative action to push it through.His frustration stems from Apples refusal to provide access to the phone of the San Bernardino shooter following the 2015 massacre.

Even so,many in the computer security community are skeptical, and the approach rigorous testing and debate to see if its viable.

A third option isnt so much a backdoor, more an emergency entrance. Here the government, the tech company and a neutral third party, such as a court, would each keep a fragment of a cryptographic key. Authorities would get sanctioned and pre-agreed access to messaging data a bit like a bank safe deposit box which can only be opened if the bank and the customer are present.

According to Andersen Cheng, CEO of Post-Quantum, this scenario option would significantly limit the ability of rogue actors to get access because it means no one authority has a master key to unlock millions of accounts. Any concerns over government control can be allayed because the key management could be hosted by the social media companies, he says.

The only problem and its a big one - is that no one appears to have any idea how to create such a thing at scale that will remain secret. Tech companies are likely to rail against any technical steps that would fundamentally weaken communications.

Then, theres the current solution. Each year,US police districts give millions of dollars to third-party commercial developers to access data saved to the cloud. As we know from recent scandals, undetectable spyware exploits vulnerabilities in software, allowing the buyer to access a device to read texts, pilfer address books, remotely switch on microphones and track the location of their target. There is no shortage of commercial surveillance companies that offer these services, and police reportedly used similar tools to access the phone of the San Bernardino shooter when Apple wouldnt help.

This kind of technology is playing an increasing part in helping government agencies all over the world prevent and investigate terrorism and crime and save lives: almost 50% of police investigations now involve cloud data.

Controversial Israeli firm NSO Group was involved in the capture notorious drug lord El Chapo, and recently police in Western Europe said that NSO spyware was helping them track a terror suspect they feared was plotting an attack during Christmas.

Despite this, encrypted devices and messaging platforms continue to complicate crime investigations, not least becausecritical evidence is often only available on the device itself, not in the cloud. The tools provided by commercial companies can also be expensive, with police claiming that justice is sometimes unattainable for crime victims in areas where police departments do not have the means to decrypt phones.

Campaigners also point to potential abuses and a lack of transparency over new forms of surveillance being used, and a more widespread adoption of this approach will mean that governments will have to impose careful controls to prevent misuse and enforce oversight.

Whatever the solution to the current debate over encryption, its unlikely to perfectly suit everyone. As the Carnegie Endowment report points out,cybersecurity advocates may have to accept some level of increased security risk, just as law enforcement advocates may not be able to access all the data they seek.

The first step, however, is recognizing that, with the lives and safety of so many at stake, lawmakers and tech firms should investigate every option.

Read more:
Options to End the End to End Encryption Debate - Infosecurity Magazine

Is William Barr’s Latest Attack On Section 230 Simply An Effort To Harm Tech Companies For Blocking His Desire To Kill Encryption? – Techdirt

from the this-makes-no-sense dept

Last month, we noted that Attorney General William Barr was making a bizarre attack on Section 230 of the Communications Decency Act, claiming that the DOJ was "studying Section 230 and its scope" and arguing -- without evidence -- that 230 might be contributing to "unlawful behavior" online. As we noted at the time, Section 230 explicitly exempts federal criminal charges from what it applies to, meaning that it literally cannot interfere with any DOJ prosecution. So it's truly bizarre to see the DOJ concerned about the issue.

But Barr has continued to push forward with this anti-230 kick, and is going to host a "workshop" about 230 in a few weeks.

The U.S. Justice Department is hosting a workshop next month seeking a wide diversity of viewpoints on Section 230 of the Communications Decency Act, the federal statute that, with few exceptions, protections major internet companies and private website owners from liability when it comes to the posts and comments generated by users.

While the DOJ claims that this workshop will have that "diversity of viewpoints," as we've seen in other contexts with the DOJ, that this is rarely the actual case. It may offer up a sacrificial lamb in support of 230, but it is likely to stack the deck against 230. This is the same thing that the DOJ has done, repeatedly, with regard to the encryption debate and questions around "going dark." Indeed, we've noted before the similarities between the government's efforts to attack encryption and the playbook that was used to attack Section 230 in 2018. In fact, we've heard that the very same former Hollywood lobbyist is a key player in both efforts.

Given the similarities in the playbook, and the fact that the DOJ is not hindered at all by 230, it makes you wonder if Barr and the DOJ are playing this anti-230 card simply as a method of punishing the internet industry for opposing his desire to gut encryption? The whole thing seems to be little more than an abuse of DOJ power to intimidate and threaten an entire industry for daring to support online security and free speech online against a government which would prefer neither thing be enabled.

Filed Under: cda 230, doj, encryption, section 230, william barr

See the original post here:
Is William Barr's Latest Attack On Section 230 Simply An Effort To Harm Tech Companies For Blocking His Desire To Kill Encryption? - Techdirt

The FBI doesn’t need Apple to give it a backdoor to encryption, because it already has all the access it needs – Boing Boing

Once again, the FBI is putting pressure on Apple to help them break into the phone of a mass shooter. And once again, Apple has been largely resistant to the effort. Which is good, because a government having control over a private company that gives them secret backdoor access into people's personal technology devices is an authoritarian wet dream waiting to happen.

It also doesn't matter anyway because as Reuters pointed out this week Apple already buckled under FBI pressure a few years and cancelled their plans to add end-to-end encryption to all iPhone backups in iCloud:

The company said it turned over at least some data for 90% of the requests it received [from the FBI]. It turns over data more often in response to secret U.S. intelligence court directives, which sought content from more than 18,000 accounts in the first half of 2019, the most recently reported six-month period.

But what if the FBI wants access to someone's locked iPhone, and they haven't backed it up to iCloud? Theystill don't need Apple's help, because as with the San Bernardino shooting there are plenty of third-party companies that can and will gladly solve the problem in exchange for money.

From OneZero:

Over the past three months,OneZero sent Freedom of Information Act (FOIA) requests to over 50 major police departments, sheriffs, and prosecutors around the country asking for information about their use of phone-cracking technology. Hundreds of documents from these agencies reveal that law enforcement in at least 11 states spent over $4 million in the last decade on devices and software designed to get around passwords and access information stored on phones.

[]

The documents range from contracts, requests for proposals (RFPs), invoices for payments by law enforcement, quotes from forensic companies, and emails traded between officials discussing vendor approval. They suggest that most law enforcement agencies bought forensic investigation products from a small group of companies that includeCellebrite, Grayshift, Paraben, BlackBag, and MSAB. In addition to selling the software and hardware needed to unlock phones, these companies also charge thousands of dollars each year to upgrade the software in their products. In addition, their customers spend thousands on training sessions to teach personnel in their offices how to use the tools.

And perhaps that's the most frustrating thing about this whole scenario. The US government is always warning us about the authoritarian overreaches of surveillance states like those in China, but really, they just want to replicate it without feeling guilty. Meanwhile, supposed-innovations of free market enterprise are providing the same opportunities for authoritarian surveillance capitalism, but, ya know, privately-owned, so immune to any legal oversight or transparency, because America. Isn't that supposed to be the dream?

Exclusive: Apple dropped plan for encrypting backups after FBI complained [Joseph Menn / Reuters]

Exclusive: U.S. Cops Have Wide Access to Phone Cracking Software, New Documents Reveal [Michael Hayes / OneZero]

Image via the White House

No encrypted iCloud backups for you, citizen!

The time is always right to do what is right, thats true. But the timing of this is a pretty ugly retconespecially after a new trove of FBI files on Martin Luther King, Jr. were just released six months ago, painting an ugly picture of frequent sexual misconduct.

Gee, thanks.

You dont need to be a climate scientist in order to know that the Earth is in serious trouble, but the good news is that you also dont need to necessarily make any drastic changes to your lifestyle in order to do your part to help. This nOcean Wearable Reusable Silicone Straw will help you []

When it comes to conquering that resolution list and hitting all of your goals in 2020, nothing is more important than getting a great nights sleep every night so you can wake up feeling refreshed and extra productive. The CarbonIce: 7-in-1 Bacteria Protection & Cooling Pillow will help you do just that, and right now []

Its no secret that business leaders and project managers require a certain set of skills in order to outpace the competition and increase the overall efficiency of their company or team. The Lean Six Sigma Expert Training Bundle will take your managerial skills to the next level through training that will help you earn some []

See the original post:
The FBI doesn't need Apple to give it a backdoor to encryption, because it already has all the access it needs - Boing Boing

There is no legislation mandating encryption of private information – Kamloops This Week

While the fallout from the LifeLabs privacy breach continues to reverberate in the form of proposed class action lawsuits and patients still trying to determine if their personal medical information was accessed, the Office of the Information and Privacy Commission of B.C. has confirmed there is no legislation that mandates private information held by a company be encrypted.

Neither the Freedom of Information and Protection of Personal Information Act (FIPPA), which applies to public bodies, nor the Personal Information Protection Act, (PIPA), which applies to private organizations, specifically mention encryption, the Information and Privacy Commission confirmed in an email response to a query from KTW.

Personal information of up to 15-million LifeLabs patients, primarily in B.C. and Ontario, may have been accessed during a cyberattack on the companys computer systems in October. LifeLabs reported it to authorities on Nov. 1, but the breach was not made public until mid-December.

LifeLabs said it retained outside cybersecurity consultants to investigate and assist with restoring the security of its data.

While LifeLabs states on its website that its patient information is encrypted, company CEO Charles Brown told the CBCs Early Edition on Dec. 18 that he did not know if the information hacked was, indeed, encrypted.

Here is the text that can be found on the Life Labs website: Our security practices are designed to protect your personal information and prevent unauthorized access. Only authorized employees are permitted to access personal information and only when the access is necessary. Your information is protected using industry best practices, and all information is transmitted over secure, encrypted channels.

Section 30 of the Freedom of Information and Protection of Personal Information Act states: A public body must protect personal information in its custody or under its control by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or disposal.

Section S.34 of the Personal Information Protection Act states: An organization must protect personal information in its custody or under its control by making reasonable security arrangements to prevent unauthorized access, collection, use, disclosure, copying, modification or disposal or similar risks.

Noel Boivin, senior communications officer for the Office of the Information and Privacy Commission of B.C., said the department has the authority to issue legally binding orders to ensure organizations comply with those requirements.

Decisions such as these are made based on the unique facts of each case, Boivin said. Based on these requirements in both pieces of legislation, our office recommends encryption as a best practice.

The Office of the Information and Privacy Commission recommends organizations implement technical safeguards, including ensuring computers and networks are secure from intrusion by using firewalls, intrusion-detection software and antivirus software and by encrypting personal information.

Boivin noted findings from previous investigation reports call for organizations to encrypt data on personal storage devices.

Our guidance is that personal information should be encrypted in transit and at rest in order to protect against unauthorized access, said Caitlin Lemiski, the Office of the Information and Privacy Commissions director of policy.

The encryption, and key management, should be based on current industry-accepted standards for protecting data and should be reviewed regularly.

LifeLabs has four clinics in Kamloops two downtown, one in Aberdeen and one in North Kamloops.

According to the company, hackers gained access to the computer system that held customer information from 2016 and earlier that could include names, addresses, email addresses, login user names and passwords, dates of birth, health card numbers and lab test results.

The access was accompanied by a ransom demand, which LifeLabs paid.

LifeLabs set up a dedicated phone line and information on its website for those affected by the breach. To find out more, the public should go online tocustomernotice.lifelabs.comor contact LifeLabs at 1-888-918-0467.

In January 2013, patient information for 16,100 Kamloops-area residents was on a computer hard drive that went missing as it was being transferred by LifeLabs to Burnaby from Kamloops.

Read the original here:
There is no legislation mandating encryption of private information - Kamloops This Week