Krypt.co scores a $1.2M seed round to simplify developer encryption … – TechCrunch

Krypt.co, a new security startup foundedby two former MIT students and one of their professors, is launching today with a free product called Kryptonite, designed to help developers protect their private encryption keys, using an app on their smartphones.

Itsa big day for the fledgling company as it also announced a $1.2 million seed round led by Rough Draft Ventures/General Catalyst with participation from Slow Ventures, SV Angel and Akamai Labs. Thats a solid rosterof backers for their first swing at funding.

The company came out of research by two former MIT students, Alex Grinman and Kevin King, who shared a common passion for encryption. The two friendsbelieved that they had found a better way to protect encryption keys and they approached their professor David Gifford, who thought it was a good idea and helped them launch the company.

Kryptonite takes advantage oftypical public/private key encryption using the Secure Socket Shell (SSH) protocol used by developers to log onto networks remotely. Typically, they store their private keys on a laptop, but the founders saw this as inherently insecure because apps arent sandboxed and separated from one another as they are on a smartphone.

They believed that by moving the process to the phone, it would make it more convenient and safer. You simply download the free Kryptonite app, pair it with your computer and use SSH in the normal fashion. As you try to log onto remote services like Github to commit your code, youll see a notification on your phone. If it wasnt you who made that request, your keys might be compromised and you can reject access and revoke the keys.If it is you, you can sign in and continue.

Photo: Krypt.co

While they acknowledge that people could lose their phones, they say that you could cut off access to services using your privatekey, and render the key essentially useless to the person who found (or stole) your phone.

While the initial product is free, the company sees this offering as a way to build relationships in the developer community, and eventually add services on top of that free product they can charge for.

The founders are still working on the administrative architecture, but they are envisioning a team administrator, who will have access to a central dashboard to set device policies and view the public keys for all of the developers on the team.

Down the road, they could apply this technology to code signing to avoid fraudulent commits, oreven possibly at some point, simplify the use ofencrypted emails for all users, not just developers.

For now, they have the money from this seed round to add some more employees and begin to build beyond the free product and see where this takes them.

Originally posted here:
Krypt.co scores a $1.2M seed round to simplify developer encryption ... - TechCrunch

Theresa May’s repeated calls to ban encryption still won’t work – New Scientist

Theresa May making a statement following Saturdays attack in London

Chris Ratcliffe/Bloomberg via Getty Images

By Timothy Revell

In the wake of Saturdays terrorist attack in London, the Prime Minister Theresa May has again called for new laws to regulate the internet, demanding that internet companies do more to stamp out spaces where terrorists can communicate freely.

We cannot allow this ideology the safe space it needs to breed, she said. Yet that is precisely what the internet and the big companies that provide internet-based services provide.

Her comments echo those made in March by the home secretary, Amber Rudd. Speaking after the previous terrorist attack in London, Rudd said thatend-to-end encryption in apps like WhatsApp is completely unacceptableand that there should be no hiding place for terrorists.

Yet most experts agree that these repeated calls to be tougher on technology are poorly thought through. Undermining cryptography simply could not work.

The arguments against banning encryption are well rehearsed, but worth repeating. Encryption is not just a tool used by terrorists. Anyone who uses the internet uses encryption. Messaging apps, online banking, e-commerce, government websites, or your local hospital all use encryption.

A ban on encryption would make it impossible to do anything online that relies on keeping things private, like sending your credit card details or messaging your doctor.

Even if governments were willing to sacrifice their citizens online privacy, any sort of ban would be futile anyway. Anyone with a little technical know-how could write their own code to encrypt and decrypt data. In fact, the code to do so is so smallit easily fits on a t-shirt.

Another way to get rid of Mays safe spaces that has been mooted is to give security services special access to encrypted messages, so-called back doors. Again this is impractical.

If a master key was created that allowed security services to bypass encryption it would immediately become a target for hackers. Anyone feeling hostile could focus their efforts on cracking the master key, and in doing so would not just get access to one persons data, but everyones.

Whats more, despite members of the government once again insisting on the need to ban or bypass encryption, we still have no details on how they plan to achieve it.

Theresa Mays response is predictable but disappointing, saysPaul Bernalat the University of East Anglia, UK. If you stop safe places for terrorists, you stop safe places for everyone, and we rely on those safe places for a great deal of our lives.

Last month New Scientist called fora greater understanding of technology among politicians. Until that happens, having a reasonable conversation about how best to tackle extremism online will remain out of reach.

The internet is a convenient scapegoat and a distraction from the awkward questions that might otherwise be asked about things like foreign policy and arms sales, says Bernal.

Read more:

Why breaking encryption is a bad idea that could never work

How 2016s war on encryption will change your way of life

WhatsApp enables encryption and ramps up for government fight

More on these topics:

More here:
Theresa May's repeated calls to ban encryption still won't work - New Scientist

Blaming the Internet For Terrorism Misses The Point – WIRED

Slide: 1 / of 1. Caption: Caption: Prime Minister Theresa May makes a statement in Downing Street after chairing a meeting of the Government's emergency Cobra committee following the June 4th 2017 terrorist incident in London.Andrew Matthews/AP

British Prime Minister Theresa May has found somethingto blame for Saturday nights terror attack in London: the internet.

May, responding to the attack by three young men who killed seven people and injured scores more, called for an end to the safe spaces that the internet provides, and for measures to regulate cyberspace.

We cannot allow this ideology the safe space it needs to breed. Yet that is precisely what the internetand the big companies that provide internet-based servicesprovide, Maysaid Sunday night outside 10 Downing Street. The statement, which appears on her official Facebook page, is among four solutions she offered for fighting terrorism. We need to work with allied, democratic governments to reach international agreements that regulate cyberspace to prevent the spread of extremism and terrorist planning.

What May suggests will not work.As WIREDand others have explained timeand timeagain, undermining encryptionwhich is what May is calling for hereso the good guys can see what the bad guys are up to jeopardizes everyones safety. Simply put, weakened encryption makes everything fromworld banking to travel and healthcare riskier.

When May and other politicians call for encryption-busting protocols, what they really hope to do is turn back the clock to a time when the internet didntconnecting everyone and everything and underpin howthe world works. They need to realize that time is past. Regulation, fines, pleadingnothing will return the world to the pre-internet era.

ABritish proverb applies well here: If wishes were horses, beggars would ride. May might wish for some way of securelydisruptingonline cryptography so it can be used only for good, but wishing cant make it so. Instead, May and her ilk must learn to focus on solutionsthat can make a difference. The British prime minister made four suggestionsfor combating terrorism. Here, we offer four that experts agree make more sense.

Though the internet helpsterrorists communicate (and celebratetheir actions), experts agree it does not causeterrorism, or even do much to radicalize. The internet is often oversold in terms of radicalization, says Colin Clarke, a counterterrorism expert at RAND. Despite what youve heard, he says, most conversations among extremists occurface to face.

Though the internet does play a role in helping terrorists communicate, it is not the cause of terrorism. Not by a long shot.

Traditionally the way [UK extremist group] Al-Muhajiroun have worked is that most of their radicalization has occurred offline, saysMichael Kenney of the University of Pittsburgh who has extensively studied the Al-Muhajiroun extremist group that one of the London attackers has been reportedly linked to. It occurs in small group settings. Its a group of guys. They gather, they talk, they indoctrinate each other, he says.Expanding online surveillance, eliminating full encryption, and even preventing the spread of violent videos cant eradicatethat.

Terrorism researchers note that violence inEurope and the UK followsa familiar pattern, one thatcan teach governments how to counter the problem if they expendmoney and resources where they can do the most good. MostEuropean jihadis are young Muslims, usuallymen, living in poor neighborhoods withhigh unemployment. They often are second- or third-generation immigrants from countries they have never lived in, they are not well-integrated into society, and they are unemployed or poorly educated. Their lives lack meaning and purpose.

Scapegoating the internet as the root of the problemrisks ignoring the underlying problems: avast swath of youth that have left behind, bullied, or ignored. Thesedisaffectedteenagers and young adults also often are angeredby what they consider bad foreign policies. They kind of exist in this netherworld that makes them vulnerable to radicalization, says Clarke.

Instead, Clarke, Kenney, and experts like Thomas Hegghammer of the Norwegian Defence Research Establishment say the focus must be on offline solutions. Namely, education. Clarke advocates for a really broad expansive overhaul of education in immigrant areas, and an emphasis on youth work. Hegghammer has called this a Marshall Plan for improved education in immigrant-heavy areas.

In her approach to improving counterterrorism, May never mentionededucation, though it may offer the best way to, as she says, turn peoples minds away from this violenceand make them understand that our values pluralistic, British valuesare superior to anything offered by the preachers and supporters of hate.

Mays suggestions include longer prison sentences forterrorist-linked activity, something experts agree with. Current sentencing, they say, tends to give extremists and terrorists just enough time to develop new contacts, and perhaps plan attacks. Jail can be a networking event for these guys, says Clarke. Longer sentences could deter that.

Kenney adds another suggestion: empower families and friends to intervene when they see someonebeing radicalized. Teach them how to counter the rhetoric of jihadism. Many young men and women when they radicalize its something that takes place over many months, in some cases even years. And if youre a member of a group like Al-Muhajiroun, youre not quiet, youre trying to recruit others.

This posesits own problems, though. In both the London and Manchester attacks, friends of the attackers reportedly reached out to the authorities, but British law enforcement is overwhelmed by the thousands of people already on government watch lists.

Tech companies and governments can work togetherto combat terrorism. But as US Representative Ro Khanna, who represents Silicon Valley, said Sunday on Fox News, We have to have a factual approach. Rather than attempt to turn theinternet into a world of walled gardens, the government should make smarterinvestments in certain technologies, like usingbiometrics at the border to better track people on watch lists. Orencourage tech companies to adopt technologies like eGlyph, a systemdeveloped by computer scientist Hany Farid, of the Counter Extremism Project, that can help the likes of Facebook, Twitter, and Google identify violent videos and ban them.

Farids team hopes to address the problem of groups gathering online to plan attacksby developing an early warning system that useslinguistic analysis on sites like Facebook or Twitter.Not to say you are bad or you are good but to simply give these companies some ability to monitor content and to say look, theres some bad stuff happening here,' Farid says.

The idea that we are going to somehow eradicate the problem by more closely monitoring the internet and Facebook is unrealistic and not likely to reach those intended outcomes, says Kenney. It also reflects a lack of understanding of how radicalization actually occurs. The sooner May and politicians like her accept that reality, the safer the world will be.

Read more from the original source:
Blaming the Internet For Terrorism Misses The Point - WIRED

Aust takes encryption worries to Five Eyes – News.com.au – NEWS.com.au

Australia will be pushing the United States, UK and its other intelligence allies on the need to crack down on encrypted technology in the fight against terrorism.

The federal government has listed the issue as its priority agenda item for a meeting of the Five Eyes partners in Canada at the end of June.

Attorney-General George Brandis said it had become one of the biggest challenges facing law enforcement and security agencies worldwide.

"If those encrypted communications contain information which is necessary to a prosecution, an intelligence task like keeping a terrorism suspect under appropriate surveillance, then there does need to be a level of co-operation from the carriage services providers," Senator Brandis told Sky News on Tuesday.

Whether it be gaining access through telcos or internet giants Facebook and Google, it was important law enforcement could monitor people of concern.

"There is a corporate social responsibility issue here, there is an evidentiary issue here as well," he said.

It follows comments by Prime Minister Malcolm Turnbull, who believes there is too much tolerance of extremist material online.

He met with telcos, Facebook and others last week in Canberra as part of the federal government's cyber security agenda.

"It is a very high priority of my government," Mr Turnbull told reporters.

Labor leader Bill Shorten on Tuesday joined calls for global internet giants to play a greater role in stamping out terrorist propaganda online.

He said extremism was unacceptable both on Australia's streets and on the internet, which was being used to distribute evil messages.

"We need to make it clear that terrorists have nowhere to hide on our streets, in the air, in their countries and also on the internet," he told reporters in Brisbane.

"It is no good being in a 21st century fight if you are using 20th century weapons."

Facebook, Twitter and Google insist they are taking the issue seriously.

Facebook said it does not allow groups or people who engage in terrorist activity, or posts that express support for terrorism.

"Using a combination of technology and human review, we're working aggressively to remove terrorist content from our platform as soon as we become aware of it," director of policy Simon Milner said in a statement.

"If we become aware of an emergency involving imminent harm to someone's safety, we notify law enforcement."

A YouTube spokeswoman told AAP it, too, has clear policies prohibiting terrorist recruitment and content intending to incite violence, and quickly removes flagged videos in violation.

It also terminates accounts run by terrorist organisations or those that repeatedly breach their rules.

Twitter's UK head of public policy Nick Pickles said terrorist content had no place on Twitter and the company had a systematic approach to removing such material.

"We will never stop working to stay one step ahead and will continue to engage with our partners across industry, government, civil society and academia," he said in a statement.

In the six months to December last year, Twitter suspended 376,890 accounts in relation to the promotion of terrorism.

Nearly three-quarters of those were picked up by the company's spam-fighting tools, while two per cent were done at the request of governments.

Read the original post:
Aust takes encryption worries to Five Eyes - News.com.au - NEWS.com.au

UK Government Renews Calls For Clampdown On End-To-End Encryption – PYMNTS.com

Share

Share

Share

Share

Email

The U.K. government, in the wake of the terrorist attack over the weekend, is increasing its calls for governments around the world to work together to on internet regulation so the web cant be used as a so-called safe space for terrorists to communicate and spread propaganda or messages of hate.

According to a report in TechCrunch, U.K. Prime Minister Theresa May called for a clampdown on end-to-end encryption and said during the weekend that internet companies provide these safe havens to spread their messages. Media reports surfaced saying attackers may have turned to YouTube to access extremist videos.

We cannot allow this ideology the safe space it needs to breed. Yet that is precisely what the internet and the big companies that provide internet-based services provide, May said, according to TechCrunch. We need to work with allied, democratic governments to reach international agreements that regulate cyberspace to prevent the spread of extremism and terrorist planning. And we need to do everything we can at home to reduce the risks of extremism online. We need to deprive the extremists of their safe spaces online.

Meanwhile, Amber Rudd, the U.K. home secretary, said on a Sunday television program that the government in the U.K. wants technology companies to do more to remove extremist content and limit who gets access to end-to-end encryption. In March, right after the Westminster terror attack, Rudd went after the use of encryption. The report noted that the idea that the U.K. will be able to garner the support of other countries to regulate online content across borders seems farfetched given the fact that different governments have different rules governing free speech. For instance, the U.S. has protections on the books for hate speech, while in certain European countries its illegal. On Saturday night three terrorists used a van to run down pedestrians on the London Bridge and then went on a rampage stabbing people in the streets and in bars. Its the third terrorist attack in the U.K. since March.

Share

Share

Share

Share

Email

See original here:
UK Government Renews Calls For Clampdown On End-To-End Encryption - PYMNTS.com

Red Hat Summit And OpenStack Summit: Two Weeks Of Open Source Software In Boston – Forbes


Forbes
Red Hat Summit And OpenStack Summit: Two Weeks Of Open Source Software In Boston
Forbes
Enterprise software comes in two primary varieties: proprietary and open source. Proprietary solutions include things like Oracle databases, Microsoft operating systems and SAP applications. These vendors develop the code and do not allow it to be ...
Red Hat, Inc. - RHT - Stock Price Today - ZacksZacks

all 100 news articles »

Read this article:
Red Hat Summit And OpenStack Summit: Two Weeks Of Open Source Software In Boston - Forbes

Open Source Software and Hardware for the Internet of Things – IoT For All (blog)

The descriptor open source is primarily associated with software, the source code of which is freely accessible for examination, use, and expansion by users other than the developer. The practice started among early academic, corporate and government adopters and hit a major milestone in 1991 when Linus Torvalds released the Linux kernel.

Fast forward to the present and Torvalds open source operating system has been adapted for use in embedded components, routers, access points, devices and data center applications all important aspects of generating, transmitting and receiving the huge amount of data produced by the booming Internet of Things.

One of the most important things to understand about how open source software (and hardware more on that later) is a good fit with IoT is in the approach. Think of open source as a little bit like crowdsourcing information. Take Wikipedia, for example; the idea is that with numerous sets of stakeholders with different experiences, interests, and expertise, all working on the same problem, the outcome will improve.

As IoT products are developed, connectivity experts provide the modem, a focused security firm provides the protocols, a vertical-specific outfit develops the form factor, and so on.

A successful product results from a partner-driven, ecosystem approach just like with open source software. Similarly, from standards to market share, the IoT space is fragmented, so a unified, consortia-type treatment could help the entire IoT value chain better serve the vast addressable market.

IoT services are built on platforms that allows a sensor or other device to connect to a network, to a centralized cloud-computing platform, to an edge processor or some combination of these. The sensor or device can then transmit and/or receive data.

Other platform elements make sure data is secure from the endpoint to the cloud and back, while others manage billing, location, monitoring and other crucial functions.

While there are a lot of platforms around, including proprietary plays like Thread (a group led by a Google subsidiary) or Microsofts Azure, open source platforms have drawn investment from major IoT companies.

Linux Torvalds creation gave rise to The Linux Foundation, a major figure in the open source/IoT world. The group brings together different consortia and alliances into one framework for sharing software and ideas, in-person events, and accessing relevant trainings class and materials, among other activities. Leading corporate members include: AT&T, Qualcomm, Samsung, Cisco, Intel, Microsoft, Oracle and Huawei.

In addition to the broad OCF reference architecture, The Linux Foundation also hosts an open source project designed to bring interoperability to the network edge, where critical field devices are deployed and inputs set off a chain of efficiency-building data analysis insights and actions.

Seeded by some 125,000 lines of code developed by Dell, the EdgeX Foundry launched with the goal of building interoperable edge components in an effort to speed time to market, drive scalability and leverage existing standards to simplify what is inherently a complex, fragmented market.

For industrial IoT applications like defect detection on an assembly line or remote monitoring of equipment, the edge is a very important point of decision making.

If a sensor is deployed in the field to alert technicians at a control center of an equipment malfunction based on various data points, the sensor only needs to send a message if there is a problem. That means an IoT gateway or other edge device has processed the sensor data and determined all conditions are normal.

This is a more efficient process, it saves on cloud computing- and bandwidth-related fees and keeps technicians available to address urgent matters rather than wait for intermittent all-clear messages.

In the data center, where the cloud services live, open source software is present in the majority of high-performance systems. Similarly, the open source approach to software has been adopted by hardware makers who have begun sharing designs and specifications to drive down the cost of data center equipment and increase the efficiency of components like switches, servers, racks and power-related infrastructure.

Founded by Facebook, The Open Compute Project, serves as The Linux Foundation equivalent for hardware. As IoT expands and permeates every level of enterprise, there will be an acute need for data centers to provide the flexible, on-demand, and distributed compute infrastructure the Internet of Things will need.

If you pull the lens back even further, open source underpins one of the most important ongoing efforts in telecom network automation as a function of network functions virtualization (NFV) and software-defined networking (SDN).

As networks evolve to keep up with IoT and the coming 5G New Radio standard, the sheer level of complexity requires automation. AT&T developed its Enhanced Control, Orchestration, Management & Policy (ECOMP) architecture and had virtualized 34% of its network by the end of 2016.

In China, Huawei developed the Open-Orchestrator Project (Open-O) framework for NFV/SDN transformation. Last year those two initiatives merged under the new name Open Network Automation Platform (ONAP), which is managed by, you guessed it, The Linux Foundation.

In May 2017, Sprint stirred the alphabet soup with its own NFV/SDN reference solution dubbed C3PO, Clean CUPS Core for Packet Optimization, with CUPS meaning Control & User Plane Separation.

Sprint COO Gunter Ottendorfer said the new architecture, revolutionizes the network core and its part of our expanded toolbox of solutions to meet the coming wave of data in the years ahead. C3PO is an important part of NFV and SDN initiative, enabling Sprint to adapt more quickly to market demands and scale new services more efficiently and cost-effectively.

So, whats the big picture for network automation and IoT? Network slicing, which will give operators the automated ability to create bespoke, cross-domain data pipes capable of connecting any device to any cloud or edge device or data center with bandwidth provisioned in a way that meets the specific requirement of any enterprise or industrial IoT use case. All made possible with open source.

Last Week in the Future is our weekly newsletter, covering the latest and greatest in IoT, AI, and other tech fields from last week.

See the rest here:
Open Source Software and Hardware for the Internet of Things - IoT For All (blog)

Diversity in Open Source Is Even Worse Than in Tech Overall – WIRED

Skip Article Header. Skip to: Start of Article.

Todays world runs on open source software. The web, smartphones, the Amazon Echo, your careverything high-tech depends on open source these days. Where free, collaborative software projects were once the flags flown by indie developers bucking corporate computing, today even companies like Exxon Mobil, Wal-Mart, and Wells Fargo are releasing their own open source tools.

Still, even though users of the open source software present in countless products and services are now as diverse as the internet itself, the open source development community remains startlingly white and maleeven by the tech industrys dismal standards.

GitHub, the worlds leading repository of open-source code, surveyed 5,500 open source users and developers from around the world on a range of topics. It also asked for demographic information. And it was informative. Of that randomly selected cohort, a full 95 percent of respondents were male. Only three percent identified as female and one percent as non-binary. According to Bureau of Labor Statistics, about 22.6 percent of professional computer programmers are female. About 16 percent of respondents said they belonged to ethnic or national groups that are in the minority in the country they live in. Black, Asian, and Latino programmers account for a total of about 34 percent of programmers in the US, according to the bureau.

The survey-conducted by GitHub in concert with partners in academia, business, and the open source community-wasnt all bad news for inclusion. About 7 percent of the survey respondents identify as lesbian, gay, bisexual, asexual, or another minority sexual orientation. According to Gallup, about 4.1 percent of the US population identifies as LGBTQ. But its clear that open source has work to do.

Beyond the consequences for open source projects themselves, the communitys diversity problem could actually make the larger tech industrys entrenched imbalances worse. According to the survey, about half of respondents said that their open source contributions were an important part of landing their current jobs. If women and people of color arent contributing to open source, these already under-represented groups could find themselves frozen out of the high-tech job market.

Open sources diversity problem has long been obvious to anyone whos ever been to an open source software related conference or meetup. But the broad ranging surveywhich isnt limited to just GitHub usersdoesnt just quantify the problemit points to some of its causes and potential solutions. In appropriate open source fashion, the researchers have released the data under an open license so other researchers can mine it for insights.

Frannie Zlotnick, the GitHub data scientist who lead this research project, says one important thing companies can do to ensure more diversity in open source is to make sure that all of their employees have a chance to contribute to open source on the job. About 70 percent of the survey respondents were employed full or part time. Of these, 65 percent contribute to open source in some way as part of their job.

Open source has a reputation for being aggressive. We collected, finally, some hard data on that.

Theres also plenty that the managers of open source projects can do. One thing many respondents said drives them away from open source projects are negative interactions such as rudeness, name-calling, stereotyping, andat the more extreme end of the spectrumstalking and outright harassment.

Open source has a reputation for being aggressive, Zlotnick says. We collected, finally, some hard data on that.

About 18 percent of respondents had experienced negative interactions with other open source users. Zlotnick says thats similar to what youd expect to see in other communities. But these interactions dont just affect the people involved in them. Around 50 percent of respondents had witnessed bad behavior in open source, and they said thats often enough to keep them away from a particular project or community.

Creating clear guidelines for behavior, such as a code of conduct, is one important way to address this issue. Women in particular were more likely to contribute to projects that have such codes, the survey found. Nadia Eghbal, who works for GitHubs open source team, says that community leaders should make it a point to call out bad behavior when they see it, to let people know thats not normal or acceptable behavior. Giving people the tools to block or hide problem users instead of having to wait for moderators to step in also helps.

Open source teams can work too on fostering more positive interactionsone of open sources true strengths: Eghbal points out that nearly half respondents had given or received help from a stranger.

See more here:
Diversity in Open Source Is Even Worse Than in Tech Overall - WIRED

The Past, Present and Future of the GPL in Open Source Software – The VAR Guy

The GNU General Public License, or GPL, played a key role in the development of free and open source software. Today, however, many programmers and companies are passing on the GPL in favor of alternative open source licenses. Are they relegating the GPL to the past?

The GPL is designed to ensure that the source code of a program will always be available. It also requires that programmers who make changes to a GPL-licesned program and release that program publicly share the source code of their modifications.

When it originated in the 1980s, the GPL was a huge innovation. It wasn't the first software license that protected source code, but it was the first to do it in a legally sophisticated way.

The GPL also said nothing about preventing programmers from charging money for software. That was important because many other early free software licenses -- such as the one that protected the trn program, and the original license of the Linux kernel -- required that developers not attempt to profit from a program.

By allowing programmers to charge money if they wished yet requiring them to keep source code open, the GPL laid the foundations for the thriving commercial open source channel that exists today.

Along with closely related licenses, like the Lesser General Public License (LGPL) and Affero General Public License (AGPL), the GPL became the legal tool that helped major free and open source software projects to thrive in the 1980s and 1990s. It protected most of the utilities that comprised the GNU operating system, including tools that were widely used outside the GNU project, such as GNU compilers.

Linus Torvalds adopted the GPL in the fall of 1991 to protect the Linux kernel, which had been governed for the first few months of its existence by a crude license Torvalds had written himself.

The GPL also protects software like GNOME, a widely used desktop environment for Linux-based computers, and MediaWiki, the software engine that powers Wikipedia. Even Android phones contain a fair amount of GPL-licensed software, particularly because part of the Android codebase is derived from Linux.

Today, three decades after its birth, the GPL is proving much less popular.

While the GPL or closely related licenses continue to govern important GNU utilities and the Linux kernel, the developers of most major open source projects that have emerged in recent years have opted for other licenses.

Hadoop is licensed under an Apache 2.0 license. So is Apache Spark and most of the other big-name big data projects.

Most parts of Docker's software for creating application containers are licensed under Apache and MIT licenses. All of the major container orchestrators -- Swarm, Kubernetes and Mesos Marathon -- are Apache-licensed as well.

The key difference between the GPL and Apache and MIT licenses is that the latter licenses are more liberal. They generally allow programmers or companies to make modifications to an open source program without having to share the source code of the updated version.

There are two main explanations for why the GPL is no longer as popular as it once was.

The need for commercial support

The trend away from the GPL is especially salient among open source platforms that are commercially important. Smaller projects, or those with little commercial promise, are more likely to use the GPL.

This suggests that business calculations are behind the move away from the GPL. Developers (or companies that employ them) who want to benefit from the support and momentum of commercial investment in their open source projects stand a better chance of getting that investment if their code is licensed under a liberal open source license, rather than the GPL.

This doesn't mean the GPL is not good for business. The commercial success of Linux proves that that is not the case. But perceptions may not align with realities in this respect: Developers or employers think the GPL doesn't work for commercial platforms, so they shy away from it.

The desire to be "open," without GPL baggage

Also important is a shift in thinking about open source -- and openness in general -- within the software world. In the GPL's heyday, open source code remained the exception. It was still proving itself.

But today, being "open" is just the thing you're supposed to do. If you want to succeed in the tech world, it's important to cultivate an aura of openness in some way or another.

Some companies are projects do this by making their APIs open, or complying with community standards. They stop short of open-sourcing their code.

But in cases where companies want to commit to fully open source code, licenses like Apache 2 allow them to do so without the political and ideological baggage that is associated with the GPL. They get to call themselves open, but they don't have to handle the perceived constraints imposed by the GPL.

Whatever the reasons behind the change, the GPL's heyday appears to have passed. The GPL is not going anywhere -- there is no reason to think the licensing of projects like Linux will change -- but it is unlikely to play as important a role in the future of free and open source software as it has in the past.

Link:
The Past, Present and Future of the GPL in Open Source Software - The VAR Guy

Infineon future-proofs cryptography – Electronics Weekly – Electronics Weekly

The phantom of the quantum computer is keeping academia and the IT industry on high alert, says Infineons Thomas Pppelmann (pictured).

Quantum computer attacks on todays cryptography are expected to become reality within the next 15 to 20 years, says Infineon.

Once available, quantum computers could solve certain calculations much faster than todays computers, threatening even best currently known security algorithms such as RSA and ECC.

Various internet standards like Transport Layer Security (TLS), S/MIME or PGP/ GPG use cryptography based on RSA or ECC to protect data communication with smart cards, computers, servers or industrial control systems. Online banking on https sites or instant messaging encryption on mobile phones are well-known examples.

Infineon implemented a post-quantum key exchange scheme on a commercially available contactless smart card chip. Key exchange schemes are used to establish an encrypted channel between two parties. The deployed algorithm is a variant of New Hope, a quantum-resistant cryptosystem also explored successfully by Google on a development version of the Chrome browser.

In a world of quantum computers, PQC (post-quantum cryptography) should provide a level of security that is comparable with what RSA and ECC provide today in the classical computing world, says Infineon.

However, to withstand quantum calculation power, key lengths need to be longer than the usual 2048 bits of RSA or the 256 bits of ECC. Nevertheless, the researchers at Infineon were able to implement New Hope on a commercially available security chip without requiring additional memory space and hence a larger chip size.

Standardization bodies are expected to agree on one or multiple PQC algorithms within the next few years before governments and industries mandate the migration. Infineon is actively participating in the development and standardization process in order to enable a smooth transition and to address security challenges that may arise in the advent of quantum computers.

Read the rest here:
Infineon future-proofs cryptography - Electronics Weekly - Electronics Weekly