Making an Example Out of Manning – PKKH

After over three years of solitary confinement, the US judicial system has proven its bias against the right to freedom of speech and information granted to the people of the US in the First Amendment. Manning, who in February of this year said he had a clear conscience I wanted the American public to know that not everyone in Iraq and Afghanistan was a target that needed to be engaged and neutralised but people struggling to live in the pressure cooker of asymmetric warfare

The prosecution rested its case, on 21th August, in the court martial of Bradley Manning, the Army private who had admitted to leaking 700,000 documents exposing US military atrocities and other crimes to the WikiLeaks website in April of 2010.

The prosecutor, Major Ashden Fein, dropped one of the 22 charges against Manning. That charge alleged Manning had leaked intelligence to an enemy whose name is classified.

In charging Manning with aiding the enemy under Article 104 of the Uniform Code of Military Justice, the US government is equating the publication of classified information about its secret and illegal activities with espionage, treason and aiding terrorists. It is doing so on the spurious grounds that such information can end up in the hands of forces considered by the government to be hostile.

In fact, as the Obama administration and the military well know, Manning released the information to inform the American people of war crimes being carried out by the US government in Iraq and Afghanistan and diplomatic intrigues targeting many other countries.

The Baghdad helicopter attack video especially made impact on the American conscience. Manning initially faced up to 90 years in prison for leaking more than 700,000 Iraq and Afghanistan battlefield reports and State Department diplomatic cables in 2010 while working as an intelligence analyst in Iraq. He also leaked video of an U.S. helicopter attack in Baghdad in which at least nine people were killed, including a Reuters news photographer and his driver.

He didnt kill anyone as far as I know, former Fort Meade medic Ken Howland says of U.S. soldier Bradley Manning.

But the Pentagon has come up with perhaps a more excruciating punishment for him. After 3 years of trial Manning has suddenly come up with a confession of being Chelsea instead of Bradley; its a wonder what solitary confinements and torture can bring out of a person!

Inside a tiny cell in the bases prison block languishes the object of their mission a slightly-built, fresh-faced young man called Bradley Manning, held in conditions that have been compared to those at the notorious detention camps Guantanamo Bay and Abu Ghraib. His cell does not have a window and on the rare occasions he is allowed out, the clanking of the chains that shackle his hands and feet tend to drown out other sounds.

The US military has a history of getting out of torture allegations on technicalities. Its spokespeople would doubtless claim that keeping Manning in solitary confinement under strip lighting for 23 hours a day, forcing him to sleep naked and depriving him of all rights, strained at the definition of torture but did not snap it. Yet it was within the US militarys power to treat Manning as a human being. It chose instead to torment him in a tiny cell and seemed remarkably relaxed about who knew it. The message to everybody else is clear.

And they are tracing his mentally disturbed life right from his mothers fetus.

Pte First Class Bradley Manning, 25, showed signs of foetal alcohol syndrome, said Capt David Moulton, a clinical psychiatrist, who testified in court that day. Moulton described Mannings facial features that characterised the syndrome, such as his smooth, thin upper lip, and looked over at him in the courtroom.

Recently Mannings gender-identity struggle a sense of being a woman in a mans body was brought up by the defense at the court-martial.

George Wright, an Army spokesman at the Pentagon, said the Army does not provide such treatment or sex-reassignment surgery. He said soldiers behind bars are given access to psychiatrists and other mental health professionals.

Mannings case appeared to be the first time the therapy had come up for a military prisoner, It can be also argued that Manning might be gaining sympathy in front of court after such brutal torture.

Bradley Manning is no doubt being made an example for aspiring whistleblowers to think before they come up with the idea of saving the humanity again..

Link:
Making an Example Out of Manning - PKKH

Former GCHQ boss backs end-to-end encryption – The Register

Former GCHQ director Robert Hannigan has spoken out against building backdoors into end-to-end encryption (e2) schemes as a means to intercept communications by terrorists and other ne'er do wells.

UK Home Secretary Amber Rudd has criticised mobile messaging services such as WhatsApp, that offer end-to-end encryption in the wake of recent terror outages, such as the Westminster Bridge attack, arguing that there should be no place for terrorists to hide.

Hannigan, who led GCHQ between November 2014 and January 2017, struck a different tone in an interview with BBC Radio 4 flagship news programme Today on Monday morning, arguing there's no simple answer on the national security challenges posed by encryption.

"Encryption is overwhelmingly a good thing," Hannigan said. "It keeps us all safe and secure. Throughout the Cold War and up until 15 years ago it was something only governments could do at scale."

The former spy agency boss described the availability of e2e encryption in smartphone apps available to everyone is, broadly, a good thing.

"The challenge for governments is how do you stop the abuse of that encryption by the tiny amount of people who want to do bad things, like terrorists and criminals," Hannigan said.

"You can't un-invent end-to-end encryption you can't legislate it away," he added.

The former head of GCHQ favours co-operation between government agencies and private (tech) companies "to find a way around it" rather than passing laws that oblige tech providers to weaken the encryption of their technology or install backdoors.

"I don't advocate building in backdoors," Hannigan said. "It's not a good idea to weaken security for everybody in order to tackle a minority.

The best solution is to "target the people who are abusing" encryption systems and go after the smartphone or laptops they are using.

"Trying to weaken the system, trying to build in backdoors won't work and is technically difficult," Hannigan reiterated.

e2e schemes are a subset of encryption in general but present a tougher challenge for law enforcement and government because service provides don't hold the private keys needed to decipher data.

Not all encryption works end to end. As well as malware implants on end point devices, encryption schemes can be broken through protocol weakness and implementation flaws.

Hannigan referenced the 1980s Clipper Chip debacle in saying he doesn't think legislation to weaken crypto would work now either. "The Americans tried that in the 1990s under the Clinton Administration and it didn't work. I can't see, particularly since most of these companies are US based, that legislation is the answer."

The co-operation Hanningan advocates with tech firms is more difficult after the revelations from former NSA sysadmin Edward Snowden. This is not just because of pressure from consumers for tech firms to offer technologies more resistant against government snooping but because firms, such as Google, who co-operate with the US government in handing over data under schemes such as PRISM were angered to discover that the NSA was pulling other tricks such as hacking into links between their data centre too.

Telcos, in particular, co-operated with law enforcement agencies across the world in lawful interception schemes for years before smartphones and endpoint devices rather than telecom switches became the necessary focus of surveillance efforts as the result of advances in technology such as the rise of mobile messaging and apps such as WhatsApp, Apple iMessage and Telegram, among others.

The former GCHQ boss - who started off his tenure criticising tech giants for acting as a "command and control" networks of choice for terrorists and criminals back in November 2014 - underwent something of a conversion in attitudes as a spy agency boss.

By March 2016 he was had softened his stance and begun advocating co-operation with tech giants, such as Google and Apple, a line he expanded and updated during his interview on Monday morning, which is well worth a listen.

Hanningan also wants technology firms to get together and apply their "engineering brilliance" to tackle the abuse of the internet as a vehicle for spreading terrorist propaganda and radicalisation. "Legislation is a blunt last resort," he said.

Lastly, in a wide-ranging interview, Hanningan said Russia as a country was responsible for a "disproportionate amount of mayhem in cyberspace" such as attacks on democratic institutions as well as the activities of cyber-criminal groups. He praised the creation of the UK's National Cyber Security Centre (NCSC) in improving defences ("the private sector needs to get better") as well as French President Emmanuel Macron's public condemnation as positive moves in combating the problem. Hanningan went on to suggest that sanctions and other measures against Russia over cyber espionage might be necessary to set "red lines" while acknowledging much online malfeasance comes from cybercrime elements.

"There is an overlap of crime and state and a deeply corrupt system that allows crime to flourish. But the Russian state could do a lot to stop that and it can certainly rein in its own activity," Hanningan concluded.

Read more here:
Former GCHQ boss backs end-to-end encryption - The Register

Turnbull handballs encryption problem to tech companies – iTnews

Prime Minister Malcolm Turnbull has put the onus on the technology companies providing end-to-end encryption to work out ways law enforcement can access the communications of criminals and terrorists.

In a speech in London overnight, Turnbull said companies should not be able to build end-to-end encryption tools that meant nobody - including courts and law enforcement - could access the content of communications.

The Australian government - along with its G20 counterparts - is looking at ways it can legally gain access to encrypted messages.

The government has repeatedly denied it is asking for backdoors to be built into encrypted messaging products, however technology companiesand security experts say encrypted communications - for which individual users hold the decryption keys - cannot be accessed without doing so.

Attorney-General George Brandislast month saidthe government would try to secure co-operation from technology companies and internet service providers through an agreed set of protocols, rather than legal requirements.

He also hinted at a potential tweaking of warrant exchanges between Australian and Five Eyes law enforcement to more easily access data in those jurisdictions.

"What we need is to develop, and what well be asking the device makers and the ISPs to agree to, is a series of protocols as to the circumstances in which they will be able to provide voluntary assistance to law enforcement," Brandis said.

"There is also, of course, the capacity which exists now in the United Kingdom and in New Zealand under their legislation for coercive powers, but we dont want to resort to that. We want to engage with the private sector to achieve a set of voluntary solutions."

Turnbull overnight told technology companies "the ball is in your court" when it comes to finding a solution to the problem.

"... just as a locked bank vault or filing cabinet cannot resist a court order to produce a document, why should the owners of encrypted messaging platforms like Whatsapp or Telegram or Signal be able to establish end to end encryption in such a way that nobody, not the owners and not the courts have the ability to find out what is being communicated," Turnbull said.

"[We are saying to Sillicon Valley] youhave created messaging applications which are encrypted end to end, they are being used by terrorists and criminals to hide their murderous plans.

"You must ensure that these dark places can be illuminated by the law so that the freedoms you hold dear will not be stripped away by criminals your technologies have made undetectable."

Turnbull conceded it would be a "difficult conversation" but argued the best defence against terrorists was "good intelligence".

"We have in the last few years disrupted 12 major terrorists plots, including several that would have resulted in large mass casualty attacks," he said.

"How many more can we disrupt if every communication, by every conspirator, is encrypted end to end and cannot be read despite every lawful right, indeed duty, so to do?"

The prime minister reiterated that the government would not pursue backdoors or access to technology companies' source code.

More here:
Turnbull handballs encryption problem to tech companies - iTnews

Former Head Of GCHQ Says Don’t Backdoor End-To-End Encryption, Attack The End Points – Techdirt

When he was head of GCHQ, Robert Hannigan said some pretty clueless things about the Internet and encryption. For example, in 2014, he accused tech companies of 'facilitating murder', and joined in the general demonization of strong crypto. Last year, he called for technical experts to work more closely with governments to come up with some unspecified way around encryption. Nobody really knew what he meant when he said:

"I am not in favor of banning encryption. Nor am I asking for mandatory back doors. Not everything is a back door, still less a door which can be exploited outside a legal framework."

Now, speaking to the BBC, he has clarified those remarks, and revealed how he thinks governments should be dealing with the issue of end-to-end encryption. As he admits:

"You can't uninvent end-to-end encryption, which is the thing that has particularly annoyed people, and rightly, in recent months. You can't just do away it, you can't legislate it away. The best that you can do with end-to-end encryption is work with the companies in a cooperative way, to find ways around it frankly."

He emphasized that backdoors are not the answer:

"I absolutely don't advocate that. Building in backdoors is a threat to everybody, and it's not a good idea to weaken security for everybody in order to tackle a minority."

So what is the solution? This:

"It's cooperation to target the people who are using it. So obviously the way around encryption is to get to the end point -- a smartphone, or a laptop -- that somebody who is abusing encryption is using. That's the way to do it."

As Techdirt reported earlier this year, this is very much the approach advocated by top security experts Bruce Schneier and Orin Kerr. They published a paper describing ways to circumvent even the strongest encryption. It seems that Hannigan has got the message that methods other than crypto backdoors exist, some of which require cooperation from tech companies, which may or may not be forthcoming. It's a pity that he's no longer head of GCHQ -- he left for "personal reasons" at the beginning of this year. But maybe that has given him a new freedom to speak out against stupid approaches. We just need to hope the UK government still listens to him.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Read the rest here:
Former Head Of GCHQ Says Don't Backdoor End-To-End Encryption, Attack The End Points - Techdirt

The Military Will Start Encrypting Emails. Here’s What That Means … – Task & Purpose

In a letter to a watchdog lawmaker last week, the Department of Defense confirmed that it will finally, in 2018, join the 21st century and use a popular basic encryption tool to help make emails to and from .mil addresses more secure. What does that mean for your badass joe.schmuckatelli@centcom.mil account? Lets break it down.

The Defense Information Systems Agency confirmed to Democratic Sen. Ron Wyden of Oregon, a Senate intelligence committee member, that by next year, the Pentagons .mil email will implement STARTTLS for enhanced email encryption a longstanding application that Wyden has called a basic, widely used, easily-enabled cybersecurity technology.

The move came after years of poking around by the reporters at Vice and some tough talk from Wyden questioning how the militarys 4.5 million-user cloud-based email service had never implemented STARTTLS before.

I cant think of a single technical reason why they wouldnt use it, one former U.S. Special Operations Command IT whiz told Vice. A hacker and former Marine similarly told the outlet: The military should not be sending any email that isnt encrypted, period. Everything should get encrypted, absolutely everything. Theres no excuse.

Vices Motherboard blog has a nice breakdown of STARTTLS, which is whats called an opportunistic encryption app. Basically, when your email server and a recipients email server hook up to exchange info, STARTTLS sets up the exchange on the fly as an encrypted transaction. When your emails are sent out into the world without encryption, opportunistic or otherwise, they are as readable as postcards, per Vice:

When your email provider doesnt support STARTTLS, your email might be encrypted going from your computer to your provider, but it will then travel across the internet in the clear (unless you used end-to-end encryption.) When your email provider, and the email provider of the person youre sending the email to, both support STARTTLS, then the email is protected as it travels across.

Kinda, yeah, but not super-big. STARTTLS has been around since 2002, and Gmail first implemented it in 2004. Vice points out that Google and your other popular private email and social-media sites including Microsoft, Yahoo, Twitter, and Facebook have already integrated STARTTLS. In the wake of the NSA surveillance disclosures by contractor Edward Snowden, Facebook led a very public charge to get more sites to use STARTTLS to keep the feds from looking at your emails.

So theres nothing new here; DoD is simply catching up to a basic encryption technology thats been around for a decade and a half long enough now that the vast majority of emails you send and receive communicate with another STARTTLS-equipped server. It has some weaknesses, and it aint PGP encryption, but its a good start.

Well, you probably already know from experience that no Pentagon-level IT policy changes overnight. But more than that, keeping mail.mil STARTTLS-free has also given the military a lot more freedom to snoop through your emails a freedom DISA was probably reluctant to give up. In a letter to Wyden in April, DISA deputy director Maj. Gen. Sarah Zabel said the agencys software regularly sweeps incoming soldier email for phishing scams, viruses, and the like.

DISA currently rejects over 85% of all DoD email traffic coming from the Internet on a daily basis due to malicious behavior, Zabel wrote. We also inspect for advanced, persistent threats using detection methods developed using national level intelligence. Many of these detection methods would be rendered ineffective if STARTTLS were enabled.

In fact, top civil liberties groups like the ACLU have long called for government agencies to use encryption not just to protect their sensitive info, but to help establish a broad pro-encryption consensus in America: If the government gets to encrypt its data, then why shouldnt free American citizens get the same right? Such a norm might not sit well with government agencies, like the NSA, CIA, and FBI, who rely on signals surveillance to further intelligence and investigative aims.

Beyond that, if the military has to triage its IT systems for info security, its probably going to tackle unclassified email servers last, after focusing on secure and closed systems like SIPRNET, the National Military Command Center, and Link 16 tactical data transmission networks.

Well, that was DISAs initial suggestion: Using STARTTLS could make it harder for the Pentagon to catch and neutralize viruses in your emails. But its decision to migrate everyones mail.mil accounts to a new STARTTLS gateway by July 2018 suggests whatever kinks the application threw in DISAs surveillance have now been worked out.

In the meantime, the service is still adamant that you shouldnt be passing any sensitive info or clicking any weird links in your nonsecure mail.mil account in the first place, so, you know, keep not doing that.

Yeah: Download less porn. Seriously. Even if its virus-free, that much cant be healthy, man.

Also, remember the cardinal rule of opsec:

WATCH MORE:

Continue reading here:
The Military Will Start Encrypting Emails. Here's What That Means ... - Task & Purpose

How open source took over the world – The INQUIRER

GOING WAY BACK, pretty much all software was effectively open source. That's because it was the preserve of a small number of scientists and engineers who shared and adapted each other's code (or punch cards) to suit their particular area of research. Later, when computing left the lab for the business, commercial powerhouses such as IBM, DEC and Hewlett-Packard sought to lock in their IP by making software proprietary and charging a hefty license fee for its use.

The precedent was set and up until five years ago, generally speaking, that was the way things went. Proprietary software ruled the roost and even in the enlightened environs of the INQUIRERoffice mention of open source was invariably accompanied by jibes about sandals and stripy tanktops, basement-dwelling geeks and hairy hippies. But now the hippies are wearing suits, open source is the default choice of business and even the arch nemesis Microsoft has declared its undying love for collaborative coding.

But how did we get to here from there? Join INQas we take a trip along the open source timeline, stopping off at points of interest on the way, and consulting a few folks whose lives or careers were changed by open source software.

The GNU projectThe GNU Project (for GNU's not Unix - a typically in-jokey open source monicker, it's recursive don't you know?) was created by archetypal hairy coder and the man widely regarded as the father of open source Richard Stallman in 1983. GNU aimed to replace the proprietary UNIX operating system with one composed entirely of free software - meaning code that could be used or adapted without having to seek permission.

Stallman also started the Free Software Foundation to support coders, litigate against those such as Cisco who broke the license terms and defend open-source projects against attack from commercial vendors. And in his spare time, Stallman also wrote the GNU General Public License (GNU GPL), a "copyleft" license, which means that derivative work can only be distributed under the same license terms - in 1989. Now on its third iteration GPLv3, it remains the most popular way of licensing open source software. Under the terms of the GPL, code may be used for any purpose, including commercial uses, and even as a tool for creating proprietary software.

PGPPretty Good Privacy (PGP) encryption was created in 1991 by anti-nuclear activist Phil Zimmerman, who was rightly concerned about the security of online bulletin boards where he conversed with fellow protesters. Zimmerman decided to give his invention out for free. Unfortunately for him, it was deployed outside of his native USA, a fact that nearly landed him with a prison sentence, digital encryption being classed as a munition and therefore subject to export regulations. However, the ever-resourceful Mr Zimmerman challenged the case against him by reproducing his source code in the form of a decidedly-undigital hardback book which users could scan using OCR. Common sense eventually won the day and PGP now underpins much modern communications technology including chat, email and VPNs.

"PGP represents the democratisation of privacy," commented Anzen Data CIO and developer of security software, Gary Mawdsley.

LinuxIn 1991 Finnish student and misanthrope Linus Torvalds created a Unix-like kernel based on some educational operating system software called MINIX as a hobby project. He opened up his project so that others could comment. And from that tiny egg, a mighty penguin grew.

Certainly, he could never have never anticipated being elevated to the position of open-source Messiah. Unlike Stallman, Torvalds, who has said many times that he's not a "people person" or a natural collaborator (indeed recent comments have made him seem more like a dictator - albeit a benevolent one), was not driven by a vision or an ideology. Making Linux open source was almost an accident.

"I did not start Linux as a collaborative project, I started it for myself," Torvalds said in a TED talk. "I needed the end result but I also enjoyed programming. I made it publicly available but I had no intention to use the open-source methodology, I just wanted to have comments on the work."

Nevertheless, like Stallman, the Torvalds name is pretty much synonymous with open source and Linux quickly became the server operating system of choice, also providing the basis of Google's Android and Chrome OS.

"Linux was and is an absolute game-changer," says Chris Cooper of compliance software firm KnowNow. "It was the first real evidence that open could be as good as paid for software and it was the death knell of the OS having a value that IT teams would fight over. It also meant that the OS was no longer a key driver of architectural decisions: the application layer is where the computing investment is now made."

Red HatRed Hat, established in 1995, was among the first proper enterprise open source companies. Red Hat went public in 1999 with a highly successful IPO. Because it was willing to bet big on the success of open source at a time when others were not, Red Hat is the most financially buoyant open source vendor, achieving a turnover of $1bn 13 years later. Red Hat's business model revolves around offering services and certification around its own Linux distribution plus middleware and other open source enterprise software.

"Red Hat became successful by making open source stable, reliable and secure for the enterprise," said Jan Wildeboer, open source affairs evangelist at the firm.

Read the original post:
How open source took over the world - The INQUIRER

Crypto currency guru Amit Bharadwaj launches e-book – Hindu Business Line

Mumbai, July 10:

Crypt currency guru Amit Bharadwaj has launched an e-book Cryptocurrency for Beginners, which seeks to provide context and clarity on cryptocurrencies.

This is his third book in the series, after Cryptocurrency Trading for Beginners and Cryptocurrency Mining for Beginners.

Blockchain and cryptocurrencies are set to transform the world with their efficient solutions. However, the promise and power of cryptocurrencies remain to be unleashed meaningfully - as limited awareness across stakeholder categories, plays spoilsport, Bharadwaj said.

My book has a simple objective - making the readers realise that blockchain is just like the internet or a motorbike - one doesnt need to know the underlying technology to use it. The book empowers readers with requisite knowledge of the concept of blockchain and helps them appreciate its massive potential, he added.

Amit Bharadwaj is founder of Amaze Mining & Research Ltd.

(This article was published on July 10, 2017)

Please enter your email. Thank You.

Newsletter has been successfully subscribed.

Read the original post:
Crypto currency guru Amit Bharadwaj launches e-book - Hindu Business Line

Encryption software – Wikipedia

Encryption software is software that uses cryptography to prevent unauthorized access to digital information.[1][2] Practically speaking, people use cryptography today to protect the digital information on their computers as well as the digital information that is sent to other computers over the Internet.[3] As software that implements secure cryptography is complex to develop and difficult to get right,[4] most computer users make use of the encryption software that already exists rather than writing their own.

As encryption software is an important component in providing protection from cybercrime, there are many, many software products that provide encryption. Because there are so many software products that provide encryption, a good way to begin understanding this topic is classification by categorization.

Software encryption uses a cipher to obscure the content into ciphertext, so one way to classify this type of software is by the type of cipher used. Ciphers can be categorized into two categories: public key ciphers, also known as asymmetric ciphers, and symmetric key ciphers. Thus, encryption software may be said to based on public key or symmetric key encryption.

Another way to classify software encryption is to categorize its purpose. Using this approach, software encryption may be classified into software that encrypts "data in transit" and software that encrypts "data at rest".

As it turns out, these two types of classifications has something in common: that is, data in transit generally uses public key ciphers, and data at rest generally uses symmetric key ciphers.

However, software encryption is not as simple at that.

To begin with, symmetric key ciphers can be further subdivided into stream ciphers and block ciphers. Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encrypt real-time communications, such as audio and video information. The key is used to establish the initial state of a keystream generator, and the output of that generator is used to encrypt the plaintext. Block cipher algorithms split the plaintext into fixed-size blocks and encrypt one block at a time. For example, AES processes 16-byte blocks, while its predecessor DES encrypted blocks of eight bytes.

Also, there is also a well-known case where PKI is used for data in transit of data at rest.

Data in transit is data that is being sent over a network. When the data is between two endpoints, any confidential information may be vulnerable to snooping. To maintain the confidentiality of the transmission, the payload (confidential information) can be encrypted to protect its confidentiality, as well as its integrity and non-repudiation.[5]

Often, the data in transit is between two entities that do not know each other - such as visiting a website. As establishing a relationship and securely sharing an encryption key to secure the information that will be exchanged, a set of roles, policies, and procedures to accomplish this has been developed; it is known as the public key infrastructure, or PKI. Once PKI has established a secure connection, a symmetric key can be shared between endpoints. A symmetric key is preferred to over the private and public keys as a symmetric cipher is much more efficient (uses less CPU cycles) than an asymmetric cipher.[6][7]

Below are some examples of software that provide this type of encryption.

Data at rest refers data that has been saved to persistent storage. Generally speaking, data at rest is encrypted by a symmetric key.

As mentioned previously, there are many, many software products that provide encryption. This Wikipedia article lists and compares the these software products by providing several tables that demonstrate their features. While these products are all listed under "disk" encryption, this may be a bit misleading.

In looking at this table that compares whether the encryption software works at the disk, partition, file, etc. layer, there just doesn't seem to be enough room to capture all the options. That's because encryption may be applied at different layers in the storage stack. For example, encryption can be configured at the disk layer, on a subset of a disk called a partition, on a volume, which is a combination of disks or partitions, at the layer of a file system, or within userland applications such as database or other applications that run on the host operating system.

With full disk encryption, the entire disk is encrypted (except for the bits necessary to boot or access the disk when not using an unencrypted boot/preboot partition).[8] As disks can be partioned into multiple partitions, partition encryption can be used to encrypt individual disk partitions.[9][9] Volumes, created by combinining two or more partitions, can be encrypted using volume encryption.[10] File systems, also composed of one or more partitions, can be encrypted using file system encryption. Directories are referred to as encrypted when the files within the directory are encrypted.[11][12] File encryption encrypts a single file. Database encryption acts on the data to be stored, accepting unencrypted information and writing that information to persistent storage only after it has encrypted the data. Device-level encryption, a somewhat vague term that includes encryption-capable tape drives, can be used to offload the encryption tasks from the CPU.

As demonstrated by this Wikipedia article there are a large number of encryption software products in this space. For that reason it does not seem prudent to attempt to capture all of that information in this article. Instead, it is recommended to look into one or more of these articles.

When there is a need to securely transmit data at rest, without the ability to create a secure connection, userland tools have been developed that support this need. These tools rely upon the receiver publishing their public key, and the sender being able to obtain that public key. The sender is then able to create a symmetric key to encrypt the information, and then use the receivers public key to securely protect the transmission of the information and the symmetric key. This allows secure transmission of information from one party to another.

Below are some examples of software that provide this type of encryption.

Read this article:
Encryption software - Wikipedia

Who needs quantum key distribution? – OUPblog (blog)

Chinese scientists have recently announced the use of a satellite to transfer quantum entangled light particles between two ground stations over 1,000 kilometres apart. This has been heralded as the dawn of a new secure internet.

Should we be impressed? Yes scientific breakthroughs are great things.

Does this revolutionise the future of cyber security? No sadly, almost certainly not.

At the heart of modern cyber security is cryptography, which provides a kit of mathematically-based tools for providing core security services such as confidentiality (restricting who can access data), data integrity (making sure that any unauthorised changes to data are detected), and authentication (identifying the correct source of data). We rely on cryptography every day for securing everything we do in cyberspace, such as banking, mobile phone calls, online shopping, messaging, social media, etc. Since everything is in cyberspace these days, cryptography also underpins the security of the likes of governments, power stations, homes, and cars.

Cryptography relies on secrets, known as keys, which act in a similar role to keys in the physical world. Encryption, for example, is the digital equivalent of locking information inside a box. Only those who have access to the key can open the box to retrieve the contents. Anyone else can shake the box all they like the contents remain inaccessible without access to the key.

A challenge in cryptography is key distribution, which means getting the right cryptographic key to those (and only those) who need it. There are many different techniques for key distribution. For many of our everyday applications key distribution is effortless, since keys come preinstalled on devices that we acquire (for example, mobile SIM cards, bank cards, car key fobs, etc.) In other cases it is straightforward because devices that need to share keys are physically close to one another (for example, you read the key on the label of your Wi-Fi router and type it into devices you permit to connect).

Key distribution is more challenging when the communicating parties are far from one another and do not have any business relationship during which keys could have been distributed. This is typically the case when you buy something from an online store or engage in a WhatsApp message exchange. Key distribution in these situations is tricky, but very solvable, using techniques based on a special set of cryptographic tools known as public-key cryptography. Your devices use such techniques every day to distribute keys, without you even being aware it is happening.

There is yet another way of distributing keys, known as quantum key distribution. This uses a quantum channel such as line of sight or fibre-optic cable to exchange light particles, from which a cryptographic key can eventually be extracted. Distance limitations, poor data rates, and the reliance on specialist equipment have previously made quantum key distribution more of a scientific curiosity than a practical technology. What the Chinese scientists have done is blow the current distance record for quantum key distribution from around 100kms to 1000kms, through the use of a satellite. Thats impressive.

However, the Chinese scientists have not significantly improved the case for using quantum key distribution in the first place. We can happily distribute cryptographic keys today without lasers and satellites, so why would we ever need to? Just because we can?

Well, theres a glimmer of a case. For the likes of banking and mobile phones, it seems unlikely we will ever need quantum key distribution. However, for applications which currently rely on public-key cryptography, there is a problem brewing. If anyone gets around to building a practical quantum computer (and were not talking tomorrow), then current public-key cryptographic techniques will become insecure. This is because a quantum computer will efficiently solve the hard mathematical problems on which todays public-key cryptography relies. Cryptographers today are thus developing new types of public-key cryptography that will resist quantum computers. I am confident they will succeed. When they do, we will be able to continue distributing keys in similar ways to today.in other words, without quantum key distribution.

Who needs quantum key distribution then? Frankly, its hard to make a case, but lets try. One possible advantage of quantum key distribution is that it enables the use of a highly secure form of encryption known as the one-time pad. One reason almost nobody uses the one-time pad is that its a complete hassle to distribute its keys. Quantum key distribution would solve this. More importantly, however, nobody uses the one-time pad today because modern encryption techniques are so strong. If you dont believe me, look how frustrated some government agencies are that we are using them. We dont use the one-time pad because we dont need to. The same argument applies to quantum key distribution itself.

Finally, lets just suppose that there is an application which somehow merits the use of the one-time pad. Do the one-time pad and quantum key distribution provide the ultimate security that physicists often claim? Heres the really bad news. We have just been discussing all the wrong things. Cyber security rarely fails due to problems with encryption algorithms or the ways that cryptographic keys are distributed. Much more common are failures in the systems and processes surrounding cryptography. These include poor implementations and misuse. For example, one-time pads and quantum key distribution dont protect data after it is decrypted, or if a key is accidentally used twice, or if someone forgets to turn encryption on, etc. We already have good encryption and key distribution techniques. We need to get much better at building secure systems.

So, Im very impressed that a cryptographic key can be distributed via satellite. Thats great but I dont think this will revolutionise cryptography. And I certainly dont feel any more secure as a result.

Featured image credit: Virus by geralt. CC0 public domain via Pixabay.

Here is the original post:
Who needs quantum key distribution? - OUPblog (blog)

Ethereum ICO: people invested thousands of dollars in "Useless … – Quartz

The initial coin offering (ICO) craze is getting ridiculous. The latest evidence: A cryptotoken called Useless Ethereum Token has raised over $40,000 in just under three days.

Heres its pitch: UET is a standard ERC20 token, so you can hold it and transfer it. Other than that nothing. Absolutely nothing. And the offering still has four days to go before it closes.

Useless Ethereum Token is part caustic satire, part artistic intervention. Its anonymous creator, who goes by UET CEO, told the New York Observer: I realized that people didnt really care about the product. They cared about spending a little bit of money, watching a chart and then withdrawing a little bit more money. So why not have an ICO without a product, and do so completely transparently just to see what happened?

Indeed, token offerings have already raised $327 million in the first half of the year, according to research by trade publication CoinDesk. That doesnt account for monster raises in the interim, like the EOS offering, which attracted over $200 million worth of ether in about two weeks, according to research firm Smith and Crown.

UET is not the only gag cryptocoin. Another newly launched one is FOMO Coin, which promises a remedy to speculators with a fear of missing out on the next hot ICO. Get in before its too late! its website exhorts readers. Weve been working on FOMO Coin for at least two hours. FOMO Coin has only attracted $6.50 in ether so far.

FOMO Coins creator, a software developer in Ireland named Jamie Farrelly, told Quartz he had indeed only worked on it for a couple of hours. Its a real token, I had a few hours to spare, he said. Plus the current ICO situation is nuts. Had to make people think a bit more about it.

Joke coins have a history of taking on a life of their own in the cryptocurrency world. Just look at dogecoin, the granddaddy of humor-based cryptocurrencies. The doge in question is a Shiba Inu dog named Kabosu who was photographed looking askance at the camera, an image that then transmogrified into a viral meme. In 2014, as bitcoin was becoming exposed to the mainstream for the first time, a community sprung up online to create a cryptocurrency inspired by the meme. It raised $30,000 for the Jamaican bobsled team to compete in the winter Olympics.

But that wasnt the end of it. Since then, dogecoins value has risen about 20-fold, to a high of over $400 million for all the dogecoin in circulation in Juneand thats despite the fact that no one has touched its code for about two years. Joke coin investors are laughing all the way to the bank.

Read next: The new cryptocurrency gold rush: digital tokens that raise millions in minutes

Excerpt from:
Ethereum ICO: people invested thousands of dollars in "Useless ... - Quartz