How ‘The Source’ Makes a Musical Out of Chelsea Manning and WikiLeaks – Daily Beast

Composer and singer Ted Hearne isnt interested in audience members judging Manning for leaking information, so much as thinking about what they might do in her situation.

Probably the strongest response to the oratorio The Source, which deals with army private Chelsea Manning who gave hundreds of thousands of classified documents to WikiLeaks, says librettist Mark Doten, is complete silence.

I find it interesting how people react to the piece, he said. Sometimes at the conclusion they applaud, but other times theres silence for a minute or two minutes. Just sitting in that silence together like that is probably the most powerful for me in terms of audience response.

With a layered score influenced by jazz, pop, and electronica, video projections, and a libretto drawn from primary sources such as Twitter feeds, cable news interviews, personal chat transcripts, and declassified military reports from Manning, its no wonder some audience members arent sure how to react.

Composer and singer Ted Hearne, who recently collaborated with Erykah Badu and teaches composition at the University of Southern California, says though she is at the heart of The Source, its not about Manning, who was sentenced to 35 years in 2013 on counts of espionage, theft, and computer frauda sentence then-President Barack Obama commuted shortly before the end of his term.

Hearne says hes not interested in audience members judging Manning for leaking the information so much as thinking about what they might do in her situation. He has read good arguments both condemning and praising what she did, Hearne said. But hes not writing an op-ed.

I want to make art to ask those questions, he said. Music can help make the boundaries between right and wrong more porous.

Hearne used a type of vocal processing that mixes the human voice with a tuned voice, which he calls evocative and beautifully glitchy.

It felt like the best way to deal with texts coming from distant lands and a distant experience, he said. It was a way to set Chelseas words and give them a contemporary context and place us in America. For instance, we use a chunk of Smoke Gets In Your Eyes with text about an air evacuation happening, and the smoke is a signal flare. It doesnt mean anything super specific, but it evokes something.

The Source comes to the San Francisco Opera on Feb. 24, after performances in Brooklyn and Los Angeles. Matthew Shilvock, the director of the San Francisco Opera, calls mixing human voices with electronic ones ethereal, and he thinks the use of a collage style in the libretto and the music sampling tells the story in a powerful way.

Its taking the fragmentation of contemporary life, he said. The sound bites of the news cycle and social media create a tapestry that delves into something as contemporary as Chelsea Manning and WikiLeaks.

It can make people uncomfortable, Hearne says, to think about Manning and war.

Our country has been engaging in these wars for a long time, and our taxes pay for them, he said. Some information Chelsea Manning leaked was about actual war crimes covered up by the government, but its not like every document is about a murder or an act of violence. Its a record of war day to day. So asking people to look at content of the leaks is asking them to look at war and what it makes them feel about the war.

Hearne says he was originally interested in Julian Assange, the founder of WikiLeaks. But when Manning, who announced she was transgender after her sentencing, emerged as a public figure, he switched his focus to her.

In her online chats with Adrian Lamo, the hacker who later turned her in, Hearne saw authentic reactions in the midst of an identity crisis.

She was feeling so frustrated, and no one was taking her concern seriously. She felt there were ethical and moral dilemmas in our actions in Iraq and Afghanistan, Hearne said. Its pretty clear from reading the chat logs that her actions were very close to the heart, and she was experiencing a crisis. It felt very real and not distanced, and she seemed to hold herself responsible and to connect her work and personal life. It made me think about what my role is in war when living my bougie artist life in Brooklyn and able to feel distance from it.

Thank You!

You are now subscribed to the Daily Digest and Cheat Sheet. We will not share your email with anyone for any reason

Hearne met Doten, author of the novel, The Infernal, at the MacDowell Colony, an artists retreat. Ted came to me with the idea for project in part because I hadnt written a libretto before, Doten said. He didnt want a traditional approach, so we tried to push on the form.

Doten says some of the language about war, which made its way into the libretto, he found poetic.

They describe for example, a young boy released several pigeons, which can be a signaling device, he said. Its incredibly full of meaning and its a beautiful image, or it could be seen as a potential threat by the people who created that report.

Doten also says he didnt want to judge Manning, but hopes people seeing it will ask themselves questionsabout war and the military and information.

We hope the piece does capture the scope of the leaks and people try and grapple with how our current system of media and technology shapes our lives and the way we interact in the world, he said. Our ability to create these massive documents and the ways we use them shapes the wars themselves, and we wanted to explore what these vast amounts of information mean and what they have to say about wars in Middle East.

The Source is tonight (Weds), Thurs, and Fri at San Francisco Opera. Book tickets here.

Go here to read the rest:
How 'The Source' Makes a Musical Out of Chelsea Manning and WikiLeaks - Daily Beast

Donation drive to aid Chelsea Manning after release hits $100k – RT

Published time: 28 Feb, 2017 10:19Edited time: 1 Mar, 2017 12:28

A fundraising page set up to help Chelsea Manning upon her release from prison later this year has reached its target of $100,000, just three weeks after the donation drive was started.

Over 2,300 people from around the world have contributed to the fundraiser drive, set up by friends and family with the aim of helping Manning start a new life outside prison.

Money raised will be deposited into Mannings bank account.

The 29-year-old transgender former US military intelligence analyst, born Bradley Manning, was jailed for leaking American military and diplomatic correspondence across the world in a cache of more than 700,000 classified files given to WikiLeaks in 2010.

Before leaving office this year, Barack Obama commuted the whistleblowers sentence. Manning, who has served seven years of a 35-year jail term, will now be freed on May 17 instead of her scheduled 2045 release.

READ MORE: Obama commutes much of Chelsea Manning's sentence

For the past seven years, Chelsea has been incarcerated, text from the fundraiser page reads. She survived solitary confinement, systemic denial of health care and years of being separated from her friends and community.

Through it all she has remained a steadfast voice for liberty and justice and an inspiration to so many. We now have a chance to show our appreciation for all that she has given us, the page reads.

READ MORE: Whatevs: Manning responds to Trumps ungrateful traitor tweet

See the original post:
Donation drive to aid Chelsea Manning after release hits $100k - RT

Edward Snowden and Daniel Ellsberg on the State of Security and Freedom Under Trump – KQED

Speaking to a live audience in San Francisco on Sunday, Edward Snowden, the former intelligence officer whoreleased documents about the National Security Agencys surveillance activities in 2013, saidthat the sole qualificationfor whistleblowingis to be a witness to injustice.

You do not have to be the president to make a difference, he said. Whistleblowers are elected by circumstance. Do what you can if you see injustice. Stand up and say something. Its not enough to believe in something. If you want to see a better world, you must do something to achieve it.

Snowden spoke through live-stream video from Russia at a City Arts & Lectures event in San Francisco. He was joined by Daniel Ellsberg,theformer military analyst who leaked classified documents known as the Pentagon Papers. Efforts to discredit Ellsberg in a plan hatched by the White Housefigured into the impeachment proceedings of President Richard Nixon.

Snowden said he wouldnt have done what he did if not for the precedent set by Ellsberg. Snowden now lives under asylum in Russia. Ellsberg remains in the United States after facing a trial that was dismissed in 1973 on grounds of governmental misconduct.

The two spokewith KQEDs Scott Shafer about whistleblowing and the state of privacy and truth under the Trump presidency.

When you look at the situation of this White House, of this administration, their relationship to the press, their policy positions. These are all callbacks to a time when domestically and internationally our lives were fraught with the insecurity and instability that we thought we left behind and shouldve left behind, said Snowden.

When asked about recent memo leaks, including one that led to the resignation of Donald Trumps national security adviser, Michael Flynn, Ellsberg expressed concern over the reaction from the administration.

Leaking, and even illegal classified leaking, has been a big problem in Washington for years. Failing @nytimes (and others) must apologize!

The real scandal here is that classified information is illegally given out by intelligence like candy. Very un-American!

Itll be very interestingto see with these leak investigations that are going on now just exactlywhat Donald J. Trumps people and Jeff Sessions do with the [security] capabilities they just inheritedfrom Barack Obama, Ellsberg said.

There was also a sense ofoptimism about the state of resistance by ordinary people post-election. Ellsberg referredto the recent airport protests denouncing President Trumps ban on refugees worldwide and on travelers from seven predominantly Muslim countries, calling the protests encouraging.

Its been awhile since Ive seen anything like this, he said.

Snowden also referred to post-election protests, the rise in donations to the American Civil Liberties Union and reported swells in newspaper subscriptions after Trumps election.

People are realizing afresh that democracy is not an inheritance, said Snowden. I see the seed being planted and the very first shoots we will see dark days ahead but we will learn again what it means to resist injustice and how to do so effectively.

Edward Snowden on the silver linings of the Trump administration https://t.co/IGy60wOQgy

Snowden also spoke of living life in anonymity in Russia, and the possibility ofgetting snatched by the CIA.

Its always a possibility. Much earlier on, it was much more realistic.

Snowden said he regularly rides the metro in Russia, and that its relatively easy to go unrecognized except in computer stores.

In my situation, I dont want a lot of my day-to-day to be known, he said. I dont want my persona to follow me home One of the places I used to go very frequently is now much riskier for me, and that would be computer stores.

Asked what he saw looking 20 years into the future, Snowden said everyone wants a happy ending to their life, adding that what happened to him wasnt nearly as important as what happened to the country in terms of preserving liberty and freedom.

When asked if not being able to return to the United States was worth it, Snowdensaid this:

I would do it again, and I would do it sooner.

Ericka Cruz Guevarra is an on-call interactive producer for KQED News. She was an intern with NPR's Code Switch team in Washington, D.C., where she assisted with production for the Code Switch podcast. Ericka was alsoKQED's first Raul Ramirez Diversity Fund intern, and is an alumna ofNPR's Next Generation Radio project at member station KJZZ in Phoenix. She currentlystudies international relations at San Francisco State University. You can follow her on Twitter @erkagvra or email her at ecruzguevarra@kqed.org

Here is the original post:
Edward Snowden and Daniel Ellsberg on the State of Security and Freedom Under Trump - KQED

Database-as-a-service platform introduces encryption-at-rest – BetaNews

While storing data in the cloud is undoubtedly convenient it also introduces risks and encryption is increasingly seen as a way of helping combat them.

Database-as-a-service company mLab is introducing encryption-at-rest as an opt-in data security measure for customers of its most popular plans, at no additional cost.

The mLab platform currently manages nearly 500,000 MongoDB deployments across Amazon Web Services, Google Cloud Platform, and Microsoft Azure. Encryption-at-rest will be available to mLab's Database-as-a-Service customers on Dedicated Standard and High Storage plans, covering deployments across both Amazon Web Services and Google Cloud Platform.

The company already offers customers in-transit encryption via SSL to secure data transmission over networks. Adding encryption-at-rest boosts mLabs commitment to enterprise security by encrypting data on disks and wherever backups are stored. The feature is designed so that there will be minimal performance impact on the database.

"As the cloud services industry matures, many customers, especially enterprises, are developing programs to perform due diligence on their portfolio of service providers," says Jared D Cottrell, CTO of mLab. "Whether an industry regulation or best practice, encryption-at-rest is one of the most commonly-requested security features. Encryption-at-rest provides a layer of protection against unauthorized access to sensitive data, especially attacks directed at the physical devices on which the data is stored. mLab's encryption-at-rest feature gives our customers greater peace of mind."

You can find out more on the mLab website.

Photo credit: faithie / Shutterstock

Continued here:
Database-as-a-service platform introduces encryption-at-rest - BetaNews

After 3 Years, Why Gmail’s End-to-End Encryption Is Still Vapor – WIRED

Slide: 1 / of 1. Caption: Caption: reuseok encrypt security abstract color code privacy fence google Katherine Lubar/Getty Images

Nearly three years have passed since Google announced it would offer an end-to-end encryption add-on for Gmail, a potentially massive shift in the privacy options of a piece of software used by more than a billion people. It still hasnt materialized. And while Google insists its encryptionplugin isnt vaporware, the companys latest move has left critics with the distinct impression that Gmails end-to-end encrypted future looks cloudy at bestif not altogether evaporated.

LastFriday, Google quietly announced that E2EMail, an extension for Chrome that would seamlessly encrypt and decrypt Gmail messages, was no longer a Google effort. Instead, the company has invited the outside developer community to adopt the projects open-source code. Google was careful to emphasize in a blog post describing the change that it hasnt given up work on its email encryption tool. But cryptographers and members of the privacy community see the move as confirmation that Google has officially backburnered a critical privacy and security initiative.

The real message is that theyre not actively developing this as a Google project anymore, says Matthew Green, a cryptographer and computer scientist at Johns Hopkin University who has closely studied tech firms messaging encryption products. Green notes that after close to three years, hes happy to see any code come out of Googles Gmail encryption work. But its hardly the finishedemail-encrypting plugin that Google had promised. Its definitely a bit of a disappointment, given how much hype Google generated around this project at one point, to see that theyre not pursuing this as a core feature of Gmail, Green says.

When Google first announced in June of 2014 that it would build an encryption tool for Gmailthen known as End-to-Endthe move was seen as part of Googles dramaticresponse to the NSA surveillance revealed by leaker Edward Snowden. But the projects failure to emerge from a research phaseeven as communications like Apples iMessage, Facebook Messenger, Facebook-owned WhatsApp, and even Viber offer end-to-end encryption to their hundreds of millions or billions of usershas disillusioned the privacy community. Commenters on the projects Github page have asked for more than a year if Google has abandoned the encryption extension.

Googles decision to hand E2Email over to open-source developers only cements that perception. If I had to place a bet, Id say its a telltale sign the project isnt going anywhere, says web security researcher Jeremiah Grossman, chief of security strategy at security firm Sentinel One. This is a way for them to get their work out there but to absolve themselves of future obligations.

Green, who has spoken to Google engineers about the project, says the End-to-End initiative never received the staffing necessary to push it forward. Today, he says, the total attention Google devotes to the project equates to a fraction of a single full-time staffer. The upshot is that Google wont be doing much more on end-to-end encryption, Green says.

Googles own security engineers, meanwhile, say that theyve hardly abandoned their encryption push. But making email encryption easy, argues Google privacy and security product manager Stephan Somogyi, isfar harder than it might seem to the public. Unlike WhatsApp or Facebook Messenger, GmailsEnd-to-Endproject sought to bolt encryption onto email, an old protocol that still has to interoperate with billions of clients outside of Googles control. And Somogyipoints out that his engineers have also had to build and refine an entirely new library of crypto code in javascript, a necessary stepping stone for secure web-based encryption tools, and one widely believed to be unworkable a few years ago.

More recently, he says, the team has focused on the larger problem of key managementthe tricky task of securely distributing, tracking, and looking up the unique encryption keys that allow users to decrypt encrypted messages and prove their identities. That problem has for decades dogged PGP, the encryption scheme Google bases its Gmail encryption project on. Googles engineers are now working to solve it with a project called Key Transparency, along with researchers at Princeton, Yahoo, and Open Whisper Systems.

The magic needs to happen in key distribution and key discovery, and weve been quiet for so long because weve been working on that hard stuff, says Somogyi. But hemakes no promises that more rigorous approach will produce actual, working encryption tools for Gmail any time soon. Even once Key Transparency is out the door, theres other hard stuff to work on.

The decision to open-source the Gmail encryption plug-in project, Somogyi says, was a recognition that outside developers might want to put out a quicker fix rather than solve the underlying problems his engineers have focused on. Were very much playing the long game, Somogyi says. The reason we want to put this into the open source community is precisely because everyone cares about this so much. We dont want everyone waiting for Google to get something done.

Despite those efforts, however, Google hasnt kept up with its competitors onend-to-end encrypted messaging. Its only serious effort in the last year was to offer opt-in end-to-end encryption in its Allo messenger, a new service with an infinitesimal fraction of the user base of existing chat platforms like Google Hangouts and Gchat.

As Gmails long-awaited end-to-end encryption features have failed to appear, critics have speculated about Googles motives. Does it want to avoid the clashes with the US government that WhatsApp and Apple faced down when their encryption has stymied law enforcement? Or does a company so focused on big data analysis not want to relinquish its ability to mine emails in the service of highly targeted ads and services? The Allo voice assistant, for instance, doesnt function when users haveencryption enabled. The entire notion of end-to-end encryption, after all, is that no one but the people communicating can decrypt messages, noteventhe service hosting those communications.

Googles Somogyi argues that advertising doesnt figure into his teams encryption decisions. But he concedes that for services like Gmails spam and malware filtering, end-to-end encryption makes data mining far more difficult. He describes the balance Google seeks diplomatically: Where we can provide added value to the user by having machine-based systems look at the data, were absolutely going to do that, Somogyi said. At every opportunity that we have to protect users data from unauthorized access we absolutely, vigorously pursue that.

Ideally, the tradeoffs between services that mine someones communications and their privacy should be left to the users themselves, says Somogyi. Whats important ultimately is that the user has a choice, he says.

That choice, for Gmail users, has been a long time coming. Until the E2Email project comes to fruitionif it ever doesthe existing decision for users is starker: Share your secrets over Gmail, or send them over one of the many end-to-end encrypted messaging services thats far better engineeredto protect them.

Updated 2/28/2017 1:10pm EST to clarify that while Gmail does use some forms of encryption, it doesnt offer end-to-end encryption that ensures only the people communicating can decrypt messages.

Read the original here:
After 3 Years, Why Gmail's End-to-End Encryption Is Still Vapor - WIRED

How the Politics of Encryption Affects Government Adoption – Freedom to Tinker

I wrote yesterday about reports thatpeople in the White House are using encrypted communication apps more often, and why that might be. Today I want to follow up by talking about how the politics of encryption might affect government agencies choices about how to secure their information. Ill do this by telling the stories of the CIOs of three hypothetical Federal agencies.

Alice is CIO of Agency A. Her agencys leader has said in speechesthat encryption is a tool of criminals andterrorists, andthat encryption is used mostly to hide bad or embarrassing acts. Alice knows that if she adopts encryption for the agency, her boss could face criticism for hypocrisy, for using the very technology that he criticizes. Even if there is evidence thatencryption will make Agency Amore secure, there is a natural tendency for Alice tolook for other places to try to improve security instead.

Bob is CIO of Agency B. His agencysleader has taken a more balanced view, painting encryption as a tool with broad value forhonest people, and which happens to be used by bad people as well. Bob willbe in a better position than Alice to adopt encryption if hethinks it will improve his agencys security. But he might hesitate a bit to do so if Agencies A and B need to work together on other issues, or if the two agency heads are friendsespecially if encryption seems more important to the head of Agency A than it does to the head of Bobs own agency.

Charlie is CIO of Agency C. His agencys leader hasnt taken a public position on encryption, but the leader is known to be impulsive, thin-skinned, and resistant to advice from domain experts. Charlie worries that if he starts deploying encryption in his agency, and then the leader impulsivelytakes a strong position against encryption without consulting his team, the resulting accusationsof hypocrisy could anger the leader. That might cost Charlie his job, or seriously undermine the authority he needsto properly manageagency IT. The safe thing for Charlie to do is to avoid deploying encryptionnot only to preserve his job but also to protect the rest of the agencys IT agenda. If Charlie doesnt change the agencys practice, then criticism of the practice can be deflected onto the previous leaderand of course well be upgradingto the better practicesoon. Here the uncertainty created by the leaders management style deters Charlie from changing encryption practice.

Lets recap. Alice, Bob, and Charlie are operating in different environments, but in all three cases, the politics of encryption are deterring them, at least a little, from deploying encryption. Their decision to deploy it or not will depend not only on their best judgment as to whether it will improve the agencys security, but also on political factors that raise the cost of adopting encryption. And so their agencies may not make enough use of encryption.

This is yet another reason we need a serious and specific discussion about encryption policy.

Link:
How the Politics of Encryption Affects Government Adoption - Freedom to Tinker

Encryption patent that roiled Newegg is dead on appeal | Ars Technica – Ars Technica

Enlarge / A figure from the patent that has been asserted against Intel, Google, and hundreds of other companies providing SSL and TLS on their websites.

Patent-holding company TQP Developmentmade millions claiming that itowned a breakthrough in Web encryption, even though most encryption experts had never heard of the companyuntil itstarted a massive campaign of lawsuits.Yesterday, thecompany's litigation campaign was brought to an end when a panel of appeals judges refused (PDF) togive TQP a second chance tocollect on a jury verdict against Newegg.

The TQPpatentwas invented by Michael Jones, whose company Telequip briefly sold a kind of encrypted modem. The companysold about 30 models before the modem business went bust. Famed patentenforcer Erich Spangenbergbought the TQP patent in 2008 and beganfiling lawsuits, saying that the Jones patent actually entitled him to royalties on a basic form of SSL Internet encryption. Spangenberg and Jonesultimately made more than $45 million from the patent.

TQP appealedits case, and oral arguments were heard at the US Court of Appeals for the Federal Circuit on February 8. Yesterday, thethree-judge panel found in Newegg's favor, issuing a short two-pageorder that did not explain its reasoning. While TQP could theoretically still appeal to the full Federal Circuit or to the Supreme Court, it's far from clear there's anylegal issue in the case that would compel either of those bodies to take the case.

Newegg and its former chief legal officer, Lee Cheng, have long taken an uncompromising view on the necessity offighting what they term "patent trolls" in court. The TQP Development trial, in which Cheng faced off against Spangenberg, may end up being Newegg's last high-profile patent trial. In October, Cheng left Newegg for Nashville-based guitar maker Gibson Brands.

The Newegg win did not invalidate theTQP patent, which expired in 2012. Nonew cases have been filed since2014.

After the trial against Newegg, the TQP patent was sold, according to former owner Spangenberg. The new entity's ownership is unclear, but it is still represented by the same lawyers from Los Angeles-based Russ, August and Kabat. TQP lead attorney Marc Fenster didn't respond to a request for comment on the appeals court ruling.

"Neweggs e-commerce encryption systems never infringed TQPs patent, which is directed to outdated modem technology from the 1980s," Newegg lawyer Dan Brean told Ars via e-mail. "The differences are clear and fundamental in terms of how and when data is encrypted and transmitted. That is why Judge Gilstrap entered judgment in Neweggs favor despite the jurys verdict, and the Federal Circuit has now affirmed that judgment."

"Im glad that this is finally over," added Newegg lawyer Kent Baldauf. "We have lived with this a long time as it was filed in 2011. This patent troll case was particularly troubling as it not only involved an antiquated technology that has never been used by modern Internet retailers such as Newegg, but it was also asserted to cover the foundational developments of luminaries in the field of encryption such as Ron Rivest and Whit Diffie.We are thankful that Newegg once again stood up to a patent troll and refused to settle based upon a patent that it did not infringe."

Read the rest here:
Encryption patent that roiled Newegg is dead on appeal | Ars Technica - Ars Technica

Research proposes ‘full-journey’ email encryption – The Stack

A group of researchers from Austin, NYU and Cornell universities have developed a scheme for genuine end-to-end email encryption though that term might need to be redefined in the context of their project.

Traditional end-to-end email encryption only provides security in transit between mail servers once on the servers themselves, the emails are processed as plain text, facilitating processes such as spam filters.

The group proposes a system called Pretzel, which develops a cryptographic algorithm that permits two parties to blindly contribute to encryption, and extends the concept to email.

However the researchers admit that providers will need to furnish additional computing resources in order to handle the encryption process.

The benefit of the scheme is the near-impossibility of interception/decryption from emails captured in transit. Gaining control of network nodes is a widespread practice on both sides of the law, with headlines in recent years going to official and malfeasant actors taking control of Tor exit nodes with a view to de-anonymising information.

In practice genuine end-to-end encryption has been available via PGP since the early 1990s, and the functionality is offered by certain of the larger providers notably those who are party to the decrypted emails at the client end, at which point the information can be monetised by targeted advertising.

But the researchers note that the limited availability of PGP has more commercial than governmental imperatives behind it:

A crucial reasonat least the one that is often citedis that encryption appears to be incompatible with value-added functions (such as spam filtering, email search, and predictive personal assistanceand with the functions by which free webmail providers monetize user data (for example, topic extraction)These functions are proprietary; for example, the provider might have invested in training a spam filtering model, and does not want to publicize it (even if a dedicated party can infer itSo it follows that the functions must execute on providers servers with access to plaintext emails.

Pretzels innovation is in following up email decryption (usually provided by public/private keys as in PGP) with a second protocol which operates between the email provider and each mail recipient, called secure two-party computation (2PC). 2PC schemes can process any function in a manner hidden from one or more of the concerned parties.

However the processing needs of full-scale 2PC systems would not be realistic as a transport mechanism, and so the researchers have produced a slimmed-down and more linear throughput, with certain algorithm functionality baked into the procedure.

At the moment the teams implementation of Pretzel permits core commercial operations such as email scanning (i.e. for advertising or spam-identification purposes), and a limited subset of other usual mail server functions. The researchers hope to add the ability to accommodate predictive personal assistance services and virus scanning in the future, as well as the ability to hide metadata some of the most fiercely-sought information among security services and hackers alike.

Ultimately, our goal is just to demonstrate an alternative. We dont claim that Pretzel is an optimal point in the three-way tradeoff among functionality, performance, and privacywe dont yet know what such an optimum would be. We simply claim that it is different from the status quo (which combines rich functionality, superb performance, but no encryption by default) and that it is potentially plausible.

Here is the original post:
Research proposes 'full-journey' email encryption - The Stack

How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability – Security Intelligence (blog)

Organizations are adopting encryption at a rapid and increasingly urgent pace. Why? Because encryption helps organizations support dynamic industry regulations while also protecting sensitive data thats placed in the cloud.

The trend of adopting public cloud solutions continues to grow, but protecting critical data in the cloud is still a major concern. Its critical to protect data against external breaches and unauthorized access by cloud service providers. Collectively, organizations are diligently working with consultants and suppliers to implement solutions to keep their data safe.

In many specific instances, companies want to prevent their data from being accessible to cloud service providers (CSPs). However, organizations are now facing a new dilemma: What are they supposed to do when they want to permanently delete their data in the cloud?

Regulatory compliance and cloud data protection are two driving reasons for establishing encryption and encryption key management strategies. Furthermore, in the new world of cloud data security, the old concept of a castle has become ineffective; the concept of a curated museum is much more applicable to cloud data security. In this new world, organizations want to share data appropriately with many users and platforms without running the risk that it will be taken, changed, hijacked, destroyed or accessed by unauthorized users.

Learn more about Multi-Cloud Data Encryption

To complicate matters, the value of data can change quickly. As we know, information such as quarterly financial data has high value prior to its disclosure, but the necessity to keep it private significantly declines once the announcement of financial performance is released to the market. However, other data, such as pharmaceutical trial data, HR information from divested organizations and historical notes on litigation proceedings, can quickly become a liability if it is unintentionally disclosed to the wrong party after the collective work on these efforts has been completed.

When you combine the need for privacy, the desire to collaborate using shared data and the trend of leveraging cloud applications and storage, you can see the need to not only protect cloud-based data, but also to manage it throughout its entire life cycle, from creation to destruction. Furthermore, in the case of cloud deployments, this process needs to be managed and controlled in an environment that is not physically under your control. This last requirement raises the following questions:

Encryption has historically been used to protect data against unauthorized use. However, encryption can effectively erase data as well. This is called cryptographic erasure.

The National Institute of Science and Technology (NIST) released Special Publication 800-88, Revision 1: Guidelines for Media Sanitization, which detailed how encryption is part of media and data sanitation.

If strong cryptography is used, the publication stated, sanitization of the target data is reduced to sanitization of the encryption key(s) used to encrypt the target data. In laymens terms, this means that if the data is encrypted and you destroy the keys, the data is erased.

Of course, there are some qualifiers to claiming sanitization by cryptographic erasure. First, you must ensure that you have encrypted the data from the moment it was originally stored. Next, verify that you have exclusive access to all data encryption keys and ensure that all keys are wrapped under one or more wrapping keys. Finally, delete the wrapping keys to render the data encryption keys and data itself unrecoverable. Fortunately, these steps are not difficult to follow if you have the right tools.

For example, if you have a petabyte of data that has been encrypted from the moment it was placed in the cloud and control over the wrapping keys that protect the data encryption keys, then when you delete the wrapping keys, you render data encryption keys and the petabyte of data useless. This happens regardless of where the data is stored or whether you can even access the storage environment. In other words, you can effectively erase a petabyte of data by deleting just a few kilobytes of keys. Thats cryptographic erasure, and its powerful.

Naturally, you may want to recover the petabytes of bits associated with your now-useless data. Why pay to store petabytes of random bits? However, that is secondary to the erasure of the data itself.

The logistics of implementing cryptographic erasure fundamentally requires the system that stores and encrypts the data to be separate from that of encryption key management. Leveraging key life cycle management software packages helps maintain separation of these duties and functions.

Keeping your encryption engine separate from the encryption keys, as well as keeping the keys well-managed, is not just a best practice, but also keeps you on the right side of regulations and helps protect your most precious assets your encryption keys and encrypted data from threat actors. Remember that storage is inexpensive, but data is becoming infinitely more valuable, both as an asset and a liability. Control your data, protect it and ensure that it has a clear life cycle that you control.

The future architecture of data protection is clearly modular. We need to:

Following these practices ensures that your data, protected through encryption, will provide value through its lifetime and can be securely deleted when no longer valuable.

To protect data in a multicloud environment, organizations should still focus on implementing centralized policy management as well as centralized key management.

Guardium for Multi-Cloud Data Encryption offers the ability to encrypt cloud data across multiple clouds. It also integrates with IBM Security Key Lifecycle Manager. This combination of local but highly redundant key management, and the ability to concurrently manage tens of thousands of encrypted file systems or volumes in multiple clouds, gives organization the tools they need to protect and manage the entire life cycle of data regardless of where it resides.

Learn more about Multi-Cloud Data Encryption

Visit link:
How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability - Security Intelligence (blog)

Set up VMware VM Encryption for hypervisor-level security – TechTarget

The new VM Encryption tool in vSphere 6.5 goes beyond standard VM-level security by performing the encryption at...

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

the hypervisor level.

Doing the encryption at the hypervisor level instead of in the virtual machine makes encryption agnostic, as well as policy-driven -- VMware VM Encryption is managed via storage policy. While the main purpose of the tool is to enhance security, it means encryption is no longer an all-or-nothing proposal; encryption of the storage area network or underlying storage are no longer the only options.

There is a small overhead for VM Encryption, though this is to be expected in any encryption system. For what it's worth, I hardly noticed the overhead during my experimentation with ESXi encryption.

Implementing VM Encryption is quite simple. You can easily set up a basic proof of concept (POC) implementation for the encryption infrastructure, as VMware has designed the underlying cryptographic system to use third-party plugins. VMware's current list of approved vendors includes RSA and Symantec, as well as several others. There is currently no VMware implementation.

Before implementing the encryption system, it's important to understand how VM Encryption works. Put simply, the encryption is handed from the encryption VM to its client, the vCenter.

Setting up the cryptographic back end is straightforward. Most vendors will ship a VM appliance that can be installed, powered on and configured. Since configuring the cryptography for each of the vendor plugins is beyond the scope of this guide, I simply used the modified POC encryption manager that VMware released to beta testers.

This test version only keeps encryption keys for the duration of the machine's uptime. This is just a demonstration system and the encryption key will be lost upon reboot, so don't encrypt any machines you actually use. The best way to avoid running into trouble is to create a couple of test VMs.

Before implementing the encryption system, it's important to understand how VM Encryption works. Put simply, the encryption is handed from the encryption VM to its client, the vCenter. The vCenter then provides keys as needed to the ESXi hosts. These are stored in a secure manner to enable you to unlock the VM. The keys are never written to the disk on the ESXi host. However, the intermediate keys for locking and unlocking the VMs are stored in a secure encryption enclave.

To set up the encryption server, you need to set up a Linux host with Docker. Once you've done this, pull down the Docker image and run the instance with the following command:

sudo docker pull lamw/vmwkmip

sudo docker run --rm -it -p 5696:5696 lamw/vmwkmip

At this point the Docker image should be running on port 5696.

Now that we've covered how encryption is applied, let's look at how to set up the infrastructure. First, add the Key Management Service (KMS) server to the vCenter by going to the top level of the vCenter configuration menu and selecting Key Management Servers from the hyperlink on the left.

This will bring up a dialog box that allows you to enter KMS server details. The exact details will vary, and some KMS server configurations may require a username and password. We don't need to use one in this instance. The server address should be that of the Ubuntu server. The port used for this example is 5696.

Once you've submitted the KMS details, you'll be prompted to accept a certificate; accept this, and KMS will be set to the default.

At this point, the cryptographic configuration is complete. However, a single KMS is a single point of failure, therefore, I recommend configuring a minimum of two. Do not encrypt the vCenter or it will prevent vCenter from booting. You need to avoid this because vCenter is a key component of the cryptographic infrastructure.

The next step is to create an encryption storage policy. If you navigate to VM Storage Policies, you'll see a new storage policy titled VM Encryption Policy. There are several options that you can modify if necessary.

At this point, you can encrypt the VM. It's best practice to only encrypt the disks; it's possible to encrypt other items, but it's unadvisable unless you have an overriding reason to do so.

From here on out, encrypting the VM is clear-cut. Before encrypting a device, you must first power it off. Navigate to the VM you plan on encrypting and right-click to edit its setting and expand the disks to encrypt. Select the VM Encryption Policy from the VM storage policy drop-down menu.

Disabling VM Encryption is as easy as changing the policy to the default data store policy. Again, you must power off the VM to perform the necessary actions.

There are a few caveats to using VM Encryption. For one, it does not support exporting encrypted VMs to open virtualization format. The use of cryptography on a per VM basis is dependent on the business and security requirements of the company in question. Exercise caution when implementing the encryption and make sure you fully understand and recognize the ramifications and functionality of encryption.

NSX leads the pack for VMware security

Explore ESXi hypervisor security features

What's next in the world of cryptography?

Read this article:
Set up VMware VM Encryption for hypervisor-level security - TechTarget