Australia the latest country to have no idea how encryption works … – BGR

Australia is the latest country to seek ways to access information passed between smartphones via encrypted apps, information that might be relevant to criminal investigations and counterterrorism operations. The Australian government wants to be able to spy on encrypted means of communications, whether theyre built in to devices like the iPhone, or apps like WhatsApp, Telegram, and anything else that secures chats and voice calls. But, the Australian government has said it doesnt want backdoors in iOS! This only proves that governments still fail to grasp how encrypted iPhones work.

Apple top execs met twice with the Turnbull government in Australia, The Sydney Morning Herald explains, as Prime Minister Malcolm Turnbull wants to pass new encryption laws.

Turnbulls proposed regulations might compel tech companies to provide access to encrypted communications. Thats something Apple cant offer without backing a back door into iOS. Its San Bernardino all over again.

Apparently, Apple argued that if its compelled to create a back door into iPhones, then everyones security is at risk. The company said it provided significant assistance to police agencies during investigations. Apple did the same thing in America, providing user information, the kind of meta data thats still useful for investigations, and which isnt protected by encryption.

Turnbulls government, meanwhile, explicitly said it doesnt want a back door in iOS encryption, or weaker iOS encryption. But it does want Apple, and any other tech company to provide assistance to law enforcement agencies when thats needed.

This proves, yet again, that governments have no viable idea of how to tackle this sensitive problem. For the time being, it appears that you cant have it both ways. Its either end-to-end encryption which comes with the unwanted side effects like protecting communications between criminals or terrorist organizations. Or its weaker encryption, the kind the government can access, and the kind that can be hacked into by anyone with the means to do it.

The Australian government should introduce new encryption laws by the end of the year, and itll be interesting to see how it wants to crack into encrypted iPhones.

As for Apple, the company announced at WWDC 2017 that its going to continue to protect the users privacy when it comes to chats. iMessages synchronized with iCloud will be encrypted with private keys. Currently, Apple could offer law enforcements data from iPhone backups stored in the cloud that arent encrypted with unique keys.

Continued here:
Australia the latest country to have no idea how encryption works ... - BGR

IBM Processor Aims to Blanket Encryption Over Everything – Electronic Design

IBM claims that its new processor can encrypt data on a massive scale, concealing credit card payments, travel site bookings, and government payrolls from the prying eyes of hackers.

On Monday, IBM announced that the new silicon powers its latest line of mainframes, which canautomatically keep entire systems encrypted at all times. The z14 chipdevotes around six billion transistors four times more than previous z13 exclusively to encryption, which encodes messages only decipherable with special keys.

The new encryption chip runs at 5.2 gigahertz to process more than 12 billion transactions every day ranging from ATM withdrawals to flight reservations. Manufactured on the 14 nanometer node, it contains 10 computing cores that can encrypt 13 gigahertz of data per second. The z13 could only process around 2.5 billion transactions every day.

IBM claims that it handles encryption more cheaply and efficiently than rival server systems, which burn through massive amounts of computing power to encrypt and decrypt data. The systems security prowess could be a unique selling point for businesses that typically only encrypt limited lumps of data.

Most corporations have been slow to open their wallets for large scale encryption. Only around 4% of all the data stolen worldwide since 2013 was encrypted, IBM says. And only around 2% of information in corporate servers is encrypted today, as opposed to almost 80% of mobile data, according to consulting firm Solitaire Interglobal.

The vast majority of stolen or leaked data today is open and easy to use because encryption has been difficult and expensive, said Ross Mauri, general manager of IBMs Z mainframe business, in a statement. We created a data protection engine for the cloud era to have an immediate and significant impact on global data security.

To protect encryption keys, IBM created special circuitry that acts like dye packs hidden in bank vaults to foil robberies. When the hardware detects malware or other intruders prying into memory, it can throw out the keys and restore them once the coast is clear again. IBM calls it tamper-responding hardware.

Other companies are selling chips custom hardware to expedite cryptography in cloud servers. Intels newest Xeon Scalable processors, for instance, encrypt and decrypt messages without having to keep the encryption keys in memory, while Advanced Micro Devices added a security subsystem in its Epyc server chips that encrypt data stored within memory.

The mainframe announcement comes at a particularly painful point for IBM. On Tuesday, the company, which has been trying to reorient the business toward cloud computing and data analytics, reported revenues of $19.3 billion in second quarter, down from $20.2 billion the same last year. It is IBMs twenty-first consecutive quarter of revenue decline.

Read more:
IBM Processor Aims to Blanket Encryption Over Everything - Electronic Design

Wire launches e2e encrypted team messaging in beta | TechCrunch – TechCrunch

End-to-end encrypted messaging platform Wire is targeting Slacks territory with a new messaging for teams product, calledTeams.

It announced abetalaunch yesterday, and is offering teams a 30-day free trial with pricing starting at5 per user per month thereafter, or custom pricing for enterprise installations offering extras such as self-hosted servers and an integration API.

Co-founder Alan Duric tells TechCrunch that demand for the team messaging launch is being driven primarily by Wires existing user base.

We found more and more that our consumer offering was being used by businesses, and so we were keen to launch a dedicated business product, with additional features tailored to their needs. These features aredesigned to facilitate collaboration between teams to enhance productivity safely and securely, and include screen sharing, group calls and file transfers. Wire now supports dual personal and business profiles, enabling users to switch between the two, and will soon allow users to off notifications for eitheraccount, he notes.

The demand stemmed from a growing need to protect business communications as digital threats increase and current business communications becoming increasingly susceptible to breaches, he adds, saying most demand is currentlycoming from Europe, followed by the US and Asia.

Demand was such that we onboarded 16 companies even before the beta launch Prior to the beta launch, we conducted interviews with over 300 businesses to really understand their needs. In particular, the fact that were based in Europe, end-to-end encrypted, do not require users to share a phone number and are multi-device really resonated.

Alex, a TC reader and Wire user who tipped us to the beta launch, is one of those existing users with an interest in the new team messaging feature although he says his team wont be signing up until the product exits beta.

Explaining how his team originally started using Wire, Alex says: One of the team was traveling and visited China where we found the firewall was blocking basically everything. Skype would randomly keep crashing / lagging under a VPN, though Wire simply worked there. We decided just to stick with it.

The Wire Teams product supports logging in with multiple accounts, so users can maintain a personal Wire messaging account separate from a Wire work account, for example.

Theres also support for adding guests to projects to allow for collaboration with outsiders who dont have full Wire accounts of their own.

And, in future, Teams users will be able to switch off notifications for different accounts so they could turn off work alerts for the weekend, for example.

More and more businesses and international organizations have started using Wire for work since we launched end-to-end encryption. Teams make it easy to organize work groups and related conversations, it writes in a blog post announcing the beta.

Duric adds that Wire currently expects Teams to be fully launched out of beta in late Q3/early Q4.

While the company started by offering a more general comms app, launched in late 2014 and backed bySkype co-founder Janus Friis, in recent years its shifted emphasis to focus on privacy rolling out end-to-end encryption in March last year perhaps calculating this makes for a better differentiator in the crowded messaging platform space.

When it comes to team messaging, services offering end-to-end encryption are certainly a relative rarity.Slacks data request policy, for example, notes that it will turn over customer data in response to valid and binding compulsory legal process.

In its blog about Teams, Wire includes a comparison graphic across a range of team comms products and messaging apps, such as Slack, Skype for business, WhatsApp and Signal, which shows its commercial positioning and marketing at work.

As well as flagging as a plus its use of e2e encryption which extends to securing features such as group calls, screen-sharing and file sharing other differentiating advantages its claiming include its business having a European base (specifically its based in Switzerland, which has a legal regime thats generally perceived as offering some of the most robust data protection and privacy laws in Europe); and its code being open sourced (unlike, for example, the Facebook-owned WhatsApp messaging platform).

Wire also suggests e2e encryption for team messaging could be a way for companies to ensure compliance with incoming European privacy legislation. The General Data Protection Regulation, which ramps up fines for data breaches, is due to come into force in May next year.

Businesses affected by the EUs upcoming GDPR rules benefit from end-to-end encryption, as it automatically protects the data they share with the team from third party access, Wire claims.

Earlier this year the companypublished an external audit of its e2e encryption. Thisuncovered some flaws and issues but generally found the reviewed components to have a high security.

Although a third layer of security review to consider Wires complete solution in the round remained outstanding at that point.

At the time Wire published the auditit committed to ongoing security reviews of every major development of its product.

So presumably that should include one for the Teams addition when it launches.

Wire hosts its open sourced code on GitHub.

This post was updated with additional comment from Wires co-founder

Read the original post:
Wire launches e2e encrypted team messaging in beta | TechCrunch - TechCrunch

Software wet wipes, Sonatype advocates supply chain hygiene – ComputerWeekly.com (blog)

Supply chain automation company Sonatype produces what it calls itsSoftware Supply Chain Report every year (now in its third) in an attempt tohighlights alleged risks lurking within open source software components.

Access the latest thinking in AI and machine learning, and look at how these technologies could help your IT department

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

The firm gets quite puritanical and says it wants to quantify the empirical benefits of actively managing so-called software supply chain hygiene.

Theres a big claim being made here and it reads as follows organisations that are actively managing the quality of open source components flowing into production applications are realising:

Sonatype specialises in technology areas which includeautomated governance tools within the context of what we now understand to be the DevOps discipline.

With the above fact (and perhaps a pinch of salt) in mind then, we can learn that analysis of more than 17,000 applications reveals that applications built by teams utilising automated governance tools reduced the percentage of defective components by 63%.

Companies are no longer building software applications from scratch, they are manufacturing them as fast as they can using an infinite supply of open source component parts. However, many still rely on manual and time consuming governance and security practices instead of embracing DevOps-native automation. Our research continues to show that development teams managing trusted software supply chains are dramatically improving quality and productivity, said Wayne Jackson, CEO, Sonatype.

The wider claims here (from Sonatype) include suggestions that even when vulnerabilities are known, open source software projects are slow to remediate if they do so at all. Only 15.8 percent of OSS projects actively fix vulnerabilities, and even then the mean time to remediation was 233 days.

This says the firm puts the onus on DevOps organisations to actively govern which opens source OSS projects they work with, and which components they ultimately consume.

The full report is available here.

Originally posted here:
Software wet wipes, Sonatype advocates supply chain hygiene - ComputerWeekly.com (blog)

GMO Internet Launches Blockchain OSS to Enable Widespread DLT Adoption – newsBTC

The Japanese internet company has announced the launch of Blockchain SS, an open source software initiative in the blockchain sector. Read more...

Distributed Ledger Technology (DLT) is one of the hottest technology platforms these days. Businesses across various industries are currently exploring the implementation of blockchain solutions into their applications. Catering to these rising requirements, few companies are involved in the development of proprietary solutions.

As the technology progresses, the Japanese internet giant, GMO Internet Inc., has decided to make development and implementation of blockchain solutions easier by creating an open source software project. The company recently announced the official launch of the GMO Blockchain Open Source Software Project, which allows developers to build, modify and implement the projects for free.

According to reports, the GMO Blockchain OSS has already created an open source medical record sharing system, which was launched during the first week of July 2017. The company has issued a statement about its latest project, where it says,

As the first initiative, we have now created a Medical Record Sharing System based on Z.com Cloud Semi-Public Blockchain and started providing open source from today. We will continue to publish open source programs that meet various needs in the future.

Blockchain was introduced by Bitcoin, which by itself was an open source cryptocurrency protocol. Since its introduction, different blockchain protocols have emerged, some of which are open source and others proprietary. The Blockchain OSS initiative of GMO Internet will not only make readily deployable cryptocurrency ledger solutions available to the masses for virtually no cost, but it will also accelerate new developments by harnessing the power of the crowd. The advantages and success of open source projects have already been demonstrated in conventional computing by the likes of Linux.

GMO Internet already has a considerable footprint in the cryptocurrency sector. The GMO Wallet Co. Ltd., Z.com Cloud blockchain and ConoHa blockchain for dApps development are some of the initiatives the company has already undertaken.

Japan is one of the leading cryptocurrency markets in the world, where the adoption of Bitcoin, altcoins and even blockchain solutions is high. With the new Blockchain OSS, more businesses and individuals will be soon able to implement and operate blockchain based platforms on their own, while contributing to further development of the entire decentralized ledger ecosystem.

More here:
GMO Internet Launches Blockchain OSS to Enable Widespread DLT Adoption - newsBTC

A brief history of Alice & Bob, cryptography’s first couple / Boing Boing – Boing Boing

Alice and Bob are the hypothetical communicants in every cryptographic example or explainer, two people trying to talk with one another without being thwarted or overheard by Eve, Mallory and their legion of nefarious friends.

Alice and Bob's first known appearance was in Rivest, Shamir, and Adleman's 1978 Communications in the ACM paper, A Method for Obtaining Digital Signatures and Public-key Cryptosystems." Since then, they have enjoyed many adventures.

The potted history of Alice and Bob at Cryptocouple is a delightful way to explore the history of crypto and the way we think about secrecy and privacy.

Alice and Bob are the worlds most famous cryptographic couple. Since their invention in 1978, they have at once been called inseparable, and have been the subject of numerous divorces, travels, and torments. In the ensuing years, other characters have joined their cryptographic family. Theres Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.

While Alice, Bob, and their extended family were originally used to explain how public key cryptography works, they have since become widely used across other science and engineering domains. Their influence continues to grow outside of academia as well: Alice and Bob are now a part of geek lore, and subject to narratives and visual depictions that combine pedagogy with in-jokes, often reflecting of the sexist and heteronormative environments in which they were born and continue to be used. More than just the worlds most famous cryptographic couple, Alice and Bob have become an archetype of digital exchange, and a lens through which to view broader digital culture.

Alice & Bob A History of The Worlds Most Famous Cryptographic Couple [Cryptocouple]

The Awakening by Henry Mayer is considered one of the finest pieces of political art of the 20th-century and is often mentioned as the most beautiful of the suffrage maps. American women earned the vote from west to east before the right became federal law.

From Business Insider; mostly unappetizing. Pictured here is the 17th century watermelon, as cropped from Giovanni Stanchis c. 1650s painting. They look rough, but would have tasted great. The watermelon originally came from Africa, but after domestication it thrived in hot climates in the Middle East and southern Europe. It probably became common in European []

Sasha Trubetskoy always makes great maps, like this cool imagining of the Roman Empire road system in the style of a public transit system.

Although fully autonomous vehicles arent yet allowed on public streets, they are poised to dominate the roads in the not-too-distant future. But before that happens, Apple, Google, Uber, and other companies now investing in self-driving tech are going to need talented developers that can account for the dizzying array of factors at play when a []

The PiCar-V learning kit comes with everything you need to build a Python-powered robot, and its currently being offered in the Boing Boing Store.

New business ideas are a dime a dozen; everyone and their cousin has a concept for a new app or service that may or may not revolutionize a small slice of the world. Whether its novel ways of ordering food, or time savers that only apathetic wealthy people would pay for, coming up with your []

View post:
A brief history of Alice & Bob, cryptography's first couple / Boing Boing - Boing Boing

Global Quantum Cryptography Strategic Business Report 2017 – Major Growth Drivers, Trends & Issues 2016-2024 … – Business Wire (press release)

DUBLIN--(BUSINESS WIRE)--The "Quantum Cryptography - Global Strategic Business Report" report has been added to Research and Markets' offering.

The report provides separate comprehensive analytics for the US, Europe, Asia-Pacific, and Rest of World. Annual estimates and forecasts are provided for the period 2016 through 2024. Market data and analytics are derived from primary and secondary research.

This report analyzes the worldwide markets for Quantum Cryptography in US$ Million. Company profiles are primarily based on public domain information including company URLs.

The report profiles 27 companies including many key and niche players such as:

Key Topics Covered:

1. Industry Overview

2. Major Growth Drivers, Trends & Issues

3. Quantum Computers

4. Cryptography

5. Quantum Cryptography

6. Research/Innovations In Quantum Cryptography

7. Recent Industry Activity

8. Product Launches

9. Focus On Select Global Market Participants

10. Global Market Perspective

For more information about this report visit https://www.researchandmarkets.com/research/b7j2bq/quantum

Read more:
Global Quantum Cryptography Strategic Business Report 2017 - Major Growth Drivers, Trends & Issues 2016-2024 ... - Business Wire (press release)

Cryptocurrency explainer: Everything you need to know

If youve ever had a company or friend offer to pay you with Bitcoins or another type of digital money, youve encountered cryptocurrency, also called crypto-money or cryptoassets.

Cryptocurrency is a digital currency that is created through the use of encryption software. This approach is a solution to security and control issues that prevented a purely digital currency from being successfully developed in the past. If you hear someone talking about one of these currencies, its almost certainly in a cryptocurrency format. This type of digitally created and secured money is currently in a period of very cool experimentation, so lets take a look at how it work, why its popular, and where cryptocurrency is heading in the future.

How does a currency exist in a totally digital format? What is it based on? While the process varies a little between different cryptocurrencies, they all follow the same general system.

First, cryptocurrency chooses a base unit and how much that particular unit is worth when compared to other currencies (often, the U.S. dollar is used as a baseline). Some cryptocurrencies are more imaginative than others at this point. They try to represent debt registries, contracts, or the act of currency exchange itself. It can get a little weird, but ultimately the unitin some way relates to the value of other currency, as is true of all currencies in the world.

Units of cryptocurrency are then created, typically when a transaction occurs. The units are carefully formed and preserved through algorithmic encryption, then linked together in vast chains of data, where the currency can be tracked and exchanged.

However, at this point, cryptocurrency is still too vulnerable and too easy to fake. The currency units need to be timestamped and processed to make them more concrete and harder to copy. A third party developer can do this, but most cryptocurrencies prefer to crowdsource the process to those with the right hardware and software to mine the currency.

Mining uses algorithms to go through each transaction, encrypt the cryptocurrency, and add it to a digital ledger, essentially verifying it and cementing its position online. This process may also be referred to as consensus protocols orconsensus platforms, depending on the currency. This process is meant to make the currency impossible to duplicate, though whether its successful is up for some debate.

Some cryptocurrencies are highly centralized, with someone usually the organization that created the process/software making decisions about how much currency is created and how it is used. Other types are very decentralized, controlled only by how and where people are willing to use them.

Go here to see the original:
Cryptocurrency explainer: Everything you need to know

Morgan Stanley Ex-CEO to Launch Cryptocurrency Game-Changer – Investopedia

While the movement from traditional banking and financial institutions to cryptocurrency investments has been slow for some, others have been biding their time and waiting for the appropriate moment to make the switch. According to a recent report by Coin Telegraph, John Mack, the former Chief Executive Officer for Morgan Stanley, is in the latter category. Mack is reportedly preparing to enter the cryptocurrency game and is looking to launch an ICO at some point later in the year. Why would Mack be interested in joining cryptocurrency investors in the hottest new trend?

Mack's project at this time is Omega One, a platform which he says "is going to be transformative because it benefits the entire ecosystem--making crypto assets cheaper and easier to access," according to the report. Mack claims that he has been following and investing in digital currencies for several years, and he feels that Omega One is uniquely prepared to transform the industry. His investments in the startup were reportedly made via Venture One, a portfolio company which he backs privately. The goal of Omega One seems to be to push digital currencies into broader public view, making them more available and attractive to potential investors. Mack is currently the sole investor in this project, although his status as a finance legend will likely draw in other interest as time goes on.

According to Alex Gordon-Brander of Omega One, his company provides "the bridge between traditional capital markets and the crypto markets." Omega One, he says, "will provide everything from balance sheet intermediation and a trusted counterparty." He points to the "very first signs of institutional adoption of crypto markets" as a sign that his company has an interested and eager audience, as well as room in which to make an impact.

Analysts at Coin Telegraph suggest that Mack's move into the cryptocurrency space has been strategically timed, as the cryptocurrency market itself has grown and matured significantly over the past year and a half. With a clear sign that institutional investors are interested in entering the field, there remains a bit of mystery as to how these investors could best make use of their assets. This is where a company like Omega One could come in, or at least that's what Mack and the company's leaders hope. Regulation and education regarding the digital currency world are some of the largest barriers at this point. Experienced financial professionals like Mack may hope that their background in trading securities and assets of all kinds will allow them the benefit of being able to learn about and improve upon the way that cryptocurrencies are bought and sold, too.

Omega One will reportedly offer clients the opportunity to hold native tokens. It aims to launch via an ICO at some point later this year, after August and before December.

See the article here:
Morgan Stanley Ex-CEO to Launch Cryptocurrency Game-Changer - Investopedia

Korean Lawmaker Calls for Consumer Protection in Cryptocurrency Bill – CoinDesk

South Korea's national legislature was the site of a public hearing on Tuesday in which recently proposed cryptocurrency regulation saw new discussion.

According tolocal media reports,Korean lawmaker Park Yong-jin used the forum, over which he presided, to call for consumer protections to be added to the bill.Aimed at laying the groundwork for regulation in South Korea, the public hearingcomestwo weeks afterPark first unveiled the plan, which would capture cryptocurrencies such as bitcoin and ether.

Panelists in the hearing includes lawyers, professors, an official from South Korea's top financial regulator (the Financial Services Commission), as well as a victim of a cryptocurrency-related Ponzi scam.

As such, much of the focus of the talk was on strengthening consumer protections for industry startups and technologists.

Park, in particular, voiced concerns that trader protection is a difficult task without a legal basis, stating:

"Without a legal framework, we can neither regulate, nurture, nor support the cryptocurrency-related industries. Also, the legal vacuum prevents those who committed virtual currency-related crimes from being punished."

Still, there were positive remarks as well. Jung Sun-seop, a professor of law at Seoul National University and director of its Center for Financial Law, argued thatthelaw should legalize cryptocurrencies as a means of payment.

Lee Dae-ki, a researcher at the Korea Institute of Finance, argued that the trading and brokering of cryptocurrency should be regulated prior to the currency itself, due to their potential for criminal abuse.

Likewise, Chae Won-hee, a representative of a group of Ponzi scheme victims, said the punishment on cryptocurrency-related criminals should be toughened to prevent financial scams.

Kim Yeon-june, representing the FSC, said the government had yet to decide whether a cryptocurrency should be brought under financial regulations.

Korean national assembly building via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

See original here:
Korean Lawmaker Calls for Consumer Protection in Cryptocurrency Bill - CoinDesk