Fund Open Source Software Research to Enhance ICT for Development (ICT4D) and ICT for Dollars (ICT4$) – Liberian Daily Observer

I owe part of my IT education to the Open Source community. I enhanced my programming skills using Open Source programming languages; I garnered a better understanding of operating systems through my study and research of the Linux kernel; I understood the inner workings of software by having access to their code; and in college, I used learning materials from computer science classes made available by MIT Open Courseware. But this article is not about how I benefited from open source software. I only mentioned my experience with Open Source Software (OSS) to stress the plethora of opportunities that it provides and the impact it can have on our ICT sector, and the country as a whole. Hence, the subsequent paragraphs provide insights into the positive impact that Open Source Software can have on a developing country like Liberia. The article is also a call to both the public and private sectors to invest in Open Source Software or OSS in order to enhance Information and Communications Technology for Development (ICT4D) and Information and Communications Technology for Dollars (ICT4$).

Liberias ICT sector has achieved a lot since the end of the civil war. The creation of a liberal market that favors all players, the advent and deployment of the ACE subsea cable and several other achievements have been factors that have driven Liberia ICT revolution.

Before going further into this discussion, please indulge me while I attempt to inform you of the two types or categories of software in the field of ICT: Proprietary Software and Open Source Software. Proprietary software is software that is generally licensed for a fee and its source code is kept secret. It is often developed by software firms or companies such as Microsoft. Open Source Software or OSS is software whose source code is openly published, made available at no charge, and can freely be modified and distributed. Since the focus of this article is on the impact of OSS on development, I shall not expound further on Proprietary Software. Investing in OSS for development can be done in several ways: as a research program in institutions of learning, or through IT experts and firms in Liberia. Such an initiative can result in an ecosystem of software that can be used in government, institutions of learning, businesses, etc., to enhance economic growth. It will also lead to the creation of software firms that will hire and train talented Liberian ICT professionals to develop software that can be used and sold both locally and internationally. This initiative has the propensity to yield a rapid uptake in OSS use and expertise in Liberia, with a corresponding blossoming of new projects and new commercial ventures based on them.

Investment in OSS for development is not a new idea. A lot of countries have been doing this for quite some time. For example, in the United States, the Obama Government is known to have been very pro-open source considering its policies and use of open source software (White Houses Web site is built on Drupal and Open Source CMS). In fact, the United States has been supportive of OSS prior to President Obamas ascendency to office.

Through its agency for international development (USAID), the US Government has been funding OSS development abroad since 2007. Its involvement with the Open Source Development 2.0 challenge a few years ago, and the creation of the Global Development Commons and Innovation Development Agency (IDEA) are few initiatives that demonstrate U.S. interest in encouraging open source software development.

The British government is also known to support the use of OSS. Its Gov.uk initiative, a scalable and modular open source platform that supports the needs of citizens across numerous government departments, is evidence of this. France, which has a large market for OSS, has a history of investing in OSS as evidenced by its handing out of 175,000 OSS-equipped memory sticks to high school students in 2007. Through policies and high-profile projects, France has for years been advocating for OSS in government and education.

In Africa, over the years many efforts have been made to promote the adoption and use of OSS within academic institutions, companies and governments. The Free Open Source Software Foundation for Africa (FOSSFA) and Open Source Initiative of West Africa (OSIWA) have been strong advocates of open source software development in Africa. Africa is also known for some major open source projects that have originated from the continent. Some of these projects included, Ubuntu, one of the most widely used Linux distributions and the crisis reporting application from Ushahidi.

Finally, the continual decrease in the prices of broadband internet services due to the presence of the Africa Coast to Europe subsea optical cable in Liberia, I strongly suggest that investors begin funding OSS research. This will help to put software in the hands of many, reduce ICT spending in government and the private sector, allow Liberians to open businesses that will sell locally developed software, increase ICT expertise in Liberia, and help create content needed to leverage the capacity of the ACE subsea cable. It will certainly enhance our ICT4D initiatives as well as provide the medium for ICT4$. More importantly, it will create the path toward a DIGITAL LIBERIA.

HAPPY VALENTINES DAY!!!!!!!!

See original here:
Fund Open Source Software Research to Enhance ICT for Development (ICT4D) and ICT for Dollars (ICT4$) - Liberian Daily Observer

BlackBerry teams up with ISARA to work on quantum resistant cryptography – CrackBerry.com


CrackBerry.com
BlackBerry teams up with ISARA to work on quantum resistant cryptography
CrackBerry.com
Over the past few months, BlackBerry has been adding to their catalog of partners and today, have added another to the list. As announced on the Inside BlackBerry Blog, BlackBerry has now announced a new partnership with ISARA Corporation, the ...
RSA Security Conference: ISARA and InfoSec Global Partner to ...Yahoo Finance
RSA Security Conference: ISARA Launches Security Solution Suite to Prepare Businesses and Governments for ...EconoTimes
BlackBerry Ltd.: BlackBerry Partners with ISARA to Secure the Quantum FutureThe Wall Street Transcript
BetaKit
all 6 news articles »

Link:
BlackBerry teams up with ISARA to work on quantum resistant cryptography - CrackBerry.com

Four Questions For: Jean-Philippe Aumasson – WebWorkerDaily

Long term, who wins: the cryptographers or the code breakers?

Nobody breaks codes anymore, strictly speaking. When you hear about broken crypto, its most of the time about bugs in the implementation or about the use of insecure algorithms. For example, the DROWN attack that just won the Pwnie Award of the Best Cryptographic Attack at Black Hat USA exploits weaknesses in: 1) a protocol already known to be shaky, and 2) an algorithm already known to be insecure. So weve got unbreakable crypto, we just need to learn how to use it.

What innovations in cybersecurity should companies implement today?

The hot topic in my field is end-to-end encryption, or encryption all the way from the senders device to the recipients device. This is therefore the strongest form of encryption. WhatsApp and Facebook recently integrated end-to-end encryption in their messaging platforms for the benefit of their users privacy. Enterprise encryption software lags behind, however, with encryption solutions that often expose the unencrypted data to an intermediate server. Thats acceptable, for example, for compliance or controllability reasons, but otherwise you should make sure that you use end-to-end encryption to protect sensitive information, such as VoIP phone calls (telecommunication standards, including the latest LTE, are not end-to-end encrypted).

What are the implications of mobile technology and wearables in personal security?

Companies creating those products often neglect security and privacy concerns to save cost (or through ignorance) while security experts tend to exaggerate these concerns. Well have to find a middle ground between the needs and expectations of users and regulations. Meanwhile, the lack of security in IoT systems creates great opportunities for conference talks and marketing FUD.

In the Internet of things, is everything hackable, and if so, will someone hack all the pacemakers some day and turn them off?

The everything is hackable mantra is actually less scary than it sounds. Literally everything is hackable: from your refrigerators micro controller to your mobile phone, as long as you put enough effort in it. One shouldnt think in terms of mere possibility but instead in terms of risk and economic interests: if I spend X days and Y dollars to hack a pacemaker, will my profit be worth the X-day and $Y investment? A secure pacemaker is obviously better than an insecure one, but the scenario you describe is unlikely to happen; it would just make a great movie plot.

Jean-Philippe (JP) Aumasson is Principal Cryptographer at Kudelski Security, and holds a PhD in applied cryptography from EPFL. Switzerland. He has talked at top-tier information security conferences such as Black Hat, DEFCON, and RSA about applications of cryptography and quantum technologies. He designed the popular cryptographic algorithms BLAKE2 and SipHash, and organized the Password Hashing Competition project. He wrote the 2015 book The Hash Function BLAKE, and is currently writing a book on modern cryptography for a general audience. JP tweets as @veorq.

Tags cryptography Cybersecurity Encryption end-to-end encryption enterprise encryption Hackers jean-philippe aumasson

See more here:
Four Questions For: Jean-Philippe Aumasson - WebWorkerDaily

Intertrust Announces whiteCryption Swift Support for Application Security Solutions – Yahoo Finance

SUNNYVALE, Calif.--(BUSINESS WIRE)--

Intertrust Technologies Corporation, the worlds leading provider of secure and trusted distributed computing products and services, today announced the companys whiteCryption product line will support Swift programming language as part of its suite of enhancedapplicationsecurity solutions.

As the open-source Swift community becomes more popular among developers, we received requests from macOS and iOS developers for protecting Swift apps with our world-class app security solution, said Bill Horne, vice president and general manager of Intertrust Secure Systems. As a result, we now offer Swift support for our package of code protection solutions.

The Swift programming language was created for iOS, macOS and tvOS apps and was built on the best of C and Objective-C, without the constraint of C compatibility. According to recent GitHub data, Swift has grown 262 percent in 2016 and hit the top 10 list as one of the most popular programming languages. Swifts rise stems from its unique features that include an adopted safe programming environment, tools that make programming easier, and its flexibility.

whiteCryption products include software application security and white-box cryptography. Using whiteCryption, software developers and distributors can ensure that their applications function as intended, and that the data used by those applications is accessible only to those for whom it is intended.

Gartner has estimated that 26 billion devices will be online by 2020, Horne said. With connected devices come DDoS attacks, hacks, breaches and stolen data. Many of these apps and devices will be used in the healthcare, automotive and mission-critical infrastructure markets. This is not just about protecting data anymore; its about protecting lives. Our solutions offer enhanced protection, security and trust services to protect against a broad spectrum of malicious activities.

whiteCryption products include Code Protection, which consists of a comprehensive toolset for hardening modern software applications, and Secure Key Box, which is a cryptographic library that implements standard cryptographic algorithms in a way that completely hides the keys.

Swift support will be commercially available in the spring 2017. whiteCryption will be showcasing its application security software solutions Feb. 13-16, 2017, at the RSA Conference USA 2017, booth #N4334, Moscone Center, San Francisco, CA.

About Intertrust Technologies Corporation

Intertrust provides trusted computing products and services to leading global corporations from mobile and CE manufacturers and service providers to enterprise software platform companies. Intertrust holds hundreds of patents that are key to Internet security, trust, and privacy management components of operating systems, trusted mobile code and networked operating environments, web services, and cloud computing. The company has been privately held since 2003, and previously, publicly listed on NASDAQ from 1999. whiteCryption offers software code protection, white-box cryptography products and trust services to the world's leading software, hardware and content companies in the entertainment, automotive, IoT, health care and finance industries. For more information, visit http://www.whitecryption.com.

View source version on businesswire.com: http://www.businesswire.com/news/home/20170213005389/en/

View post:
Intertrust Announces whiteCryption Swift Support for Application Security Solutions - Yahoo Finance

Bitcoin investors bet the SEC will approve cryptocurrency ETF a view at odds with analysts – MarketWatch

Despite skepticism from prominent lawyers and Wall Street analysts, bitcoin investors are increasingly confident the Securities and Exchange Commission will approve at least one of the three proposed bitcoin-focused exchange-traded funds currently under consideration.

Pricing in futures contracts traded on BitMEX, a popular exchange that is incorporated in the Republic of Seychelles, as well as the rapidly declining premium for shares of the Grayscale Bitcoin Trust traded on the secondary market suggest that some market participants are bracing for approval, said Spencer Bogart, an analyst at Needham & Co. Bogart is one of the few Wall Street analysts who cover Bitcoin.

The trusts premium over bitcoins net asset value has shrunk from about 42.21% in early January to about 13% in recent trade, according to data provided by Grayscale.

The shrinking premium suggests investors are less willing to pay for shares of the trust because they expect one of the ETFs to be approved in the near future, Bogart said. Shares of a bitcoin ETF would likely trade much closer to the cryptocurrencys net asset value, bitcoin watchers said.

The trading activity is at odds with the likelihood of approval tabulated by Bogart, who places it at less than 25%. Last month, a former lawyer for Gemini Trading, the bitcoin exchange operated by Tyler and Cameron Winklevoss, said he believed the SEC wouldn't approve the creation of a bitcoin exchange-traded fund. The SEC has said it would issue a ruling on the Winklevosss proposed bitcoin ETF, known as the Winklevoss Bitcoin Trust, by March 11.

Read: Final rule on proposed bitcoin ETF to come in March

Read: And 2016s best-performing commodity is ... bitcoin?

Plus: Bitcoin price falls as Chinese authorities meet with exchanges

BitMEX recently launched a futures contract that allows investors to bet on the odds that the Winklevoss ETF will be approved. It is presently trading around 33.3, indicating that the thinly traded market is pricing in about a 33% chance of approval, which is higher than what Bogart expects. BitMEX couldn't be reached for immediate comment.

A few weeks ago, Grayscale, which launched the Bitcoin Investment Trust in 2013, filed for an initial public offering that would allow its trust to trade as an ETF on the New York Stock Exchange. The Grayscale bitcoin trust is presently one of the few registered investment vehicles available to financial institutions. A company known as SolidX has also filed for a bitcoin ETF.

Bogart believes that if an ETF is approved, more than $300 million of new institutional capital would flood the bitcoin ecosystem during the first week alone. Such an influx would likely cause the price of a single coin to skyrocket. Typically, trading volume in the global bitcoin market measures less than $100 million a day.

Read: Path to Bitcoin ETF still uncertain but may be easier under Trump

Dont miss: Bitcoin could soar if the Winklevoss ETF is approved

Chris Burniske, blockchain products lead at ARK Invest, believes that the decline in the Grayscale bitcoin trusts premium may suggest that investors are taking a wait-and-see approach ahead of the SECs decision. ARK holds shares in the trust.

The Grayscale trust, which is a taxable registered security, may appeal to institutions as well as individuals who want to add bitcoin to their retirement accounts, Burniske said. The fund was first launched in 2013. Only accredited investors can invest directly in the trust; for others, shares are traded on the secondary market. The trusts market capitalization was $205.6 million as of last week, according to company data.

Grayscale, which filed for the funds IPO on Jan. 20, declined to comment further, citing restrictions imposed by federal securities laws.

The price of a single bitcoin US:BTCUSD fell 1% on Monday to $991, in January it briefly traded at $1,100its highest level in more than three years. By comparison, one share of the Grayscale trust GBTC, +0.05% , meanwhile, traded at $105.50.

See the article here:
Bitcoin investors bet the SEC will approve cryptocurrency ETF a view at odds with analysts - MarketWatch

Chelsea Manning: to those who kept me alive all these years, thank … – The Guardian

When the prison tried to break one of us, we all stood up. Photograph: Elijah Nouvelage / Reuters/Reuters

To those who have kept me alive for the past six years: minutes after President Obama announced the commutation of my sentence, the prison quickly moved me out of general population and into the restrictive housing unit where I am now held. I know that we are now physically separated, but we will never be apart and we are not alone. Recently, one of you asked me Will you remember me? I will remember you. How could I possibly forget? You taught me lessons I would have never learned otherwise.

When I was afraid, you taught me how to keep going. When I was lost, you showed me the way. When I was numb, you taught me how to feel. When I was angry, you taught me how to chill out. When I was hateful, you taught me how to be compassionate. When I was distant, you taught me how to be close. When I was selfish, you taught me how to share.

Sometimes, it took me a while to learn many things. Other times, I would forget, and you would remind me.

We were friends in a way few will ever understand. There was no room to be superficial. Instead, we bared it all. We could hide from our families and from the world outside, but we could never hide from each other.

We argued, we bickered and we fought with each other. Sometimes, over absolutely nothing. But, we were always a family. We were always united.

When the prison tried to break one of us, we all stood up. We looked out for each other. When they tried to divide us, and systematically discriminated against us, we embraced our diversity and pushed back. But, I also learned from all of you when to pick my battles. I grew up and grew connected because of the community you provided.

Those outside of prison may not believe that we act like human beings under these conditions. But of course we do. And we build our own networks of survival.

I never would have made it without you. Not only did you teach me these important lessons, but you made sure I felt cared for. You were the people who helped me to deal with the trauma of my regular haircuts. You were the people who checked on me after I tried to end my life. You were the people that played fun games with me. Who wished me a Happy Birthday. We shared the holidays together. You were and will always be family.

For many of you, you are already free and living outside of the prison walls. Many of you will come home soon. Some of you still have many years to go.

The most important thing that you taught me was how to write and how to speak in my own voice. I used to only know how to write memos. Now, I write like a human being, with dreams, desires and connections. I could not have done it without you.

From where I am now, I still think of all of you. When I leave this place in May, I will still think of all of you. And to anyone who finds themselves feeling alone behind bars, know that there is a network of us who are thinking of you. You will never be forgotten.

See original here:
Chelsea Manning: to those who kept me alive all these years, thank ... - The Guardian

Contribute to the Chelsea Manning Welcome Home Fund / Boing … – Boing Boing

Chelsea Manning's lawyer Chase Strangio has set up an official Chelsea Manning Welcome Home Fund. Please join those of us who have contributed to help with her living and healthcare expenses. As a reminder of what she's endured:

If you are interested in offering an in-kind donation or other support, please e-mail: CMreleaseneeds@gmail.com.

Chelsea Manning Welcome Home Fund (GoFundMe / Chase Strangio)

report this ad

The FBI has always been hostile to Freedom of Information Act requests: it habitually violates the law by allowing these requests to go more than 30 days without a response, and maintains a lab full of 1980s-vintage computers that it uses to (badly) fulfill public records request, so that it can reject requests on the []

The World Wide Web Consortiums Encrypted Media Extensions (EME) is a DRM system for web video, being pushed by Netflix, movie studios, and a few broadcasters. Its been hugely controversial within the W3C and outside of it, but one argument that DRM defenders have made throughout the debate is that the DRM is optional, and []

In a new paper in Progress, Oxford economist Vuk Vukovic argues that the key to re-election in local politics is to be just corrupt enough: giving lucrative contracts and other benefits to special interests wholl fund your next campaign, but not so much that the people refuse to vote for you.

Covering your download tracks isnt the only reason to invest in a VPN servicehigh-profile hacks and data dumps in recent years have shone a brighter light on online security issues than ever before. Its not just public figures who are at risk, and VPNs have increased in popularity even for casual browsing due to reported []

Many people have converted to vaporizers for a healthier alternative to carcinogenic, combusted smoking solutions. But finding the right vape for you can be tricky: cheap units may be dangerous, and higher prices dont necessarily mean superior quality. Youve got to find a happy medium. I just so happen to have done the legwork for []

Its a dog eat dog workforce and the more you can offer a potential employer, the more likely you are to get a competitive job. Fortunately, in the internet age, you dont have to shell over big money or take out loans to gain an educational edge. Right now, you can take 70% off all []

report this ad

Continued here:
Contribute to the Chelsea Manning Welcome Home Fund / Boing ... - Boing Boing

Adam Schiff drops bombshell: Michael Flynn may have used encryption to hide Russia talks from US – Raw Story

Rep. Adam Schiff (D-CA) revealed allegations on Monday that President Donald Trumps national security adviser, Michael Flynn, may have tried to hide his unofficial discussions with Russia by using encryption technology.

Speaking to CNNs Wolf Blitzer, Schiff explained that the Trump administration was not labeling allegations against Flynn as fake news because U.S. intelligence agencies may have audio recordings of him speaking to Russian officials while President Barack Obama was still in office.

They know that if there is a transcript, if there are recordings, that cant be dismissed, Schiff said. The fact that they would mislead the country about this is inexplicable.

What I think is interesting here, there are allegations again, as yet unproven that they may have also used encrypted communications, he added. Since Flynn was talking with the Russians, if he was using encrypted communications, it wasnt to conceal it from the Russians. Then you have to ask, who were they concealing conversations from?

According to Schiff, the allegations suggest that Flynn engaged in encrypted communications in addition to the un-encrypted discussions that were reportedly recorded by U.S. intelligence agencies.

This is something that I think we need to determine as part of an investigation, he said. But if there were then the question is, why were those being used? Who were those conversations to be concealed from, why was it necessary to go to that if you were simply talking about Christmas greetings as Sean Spicer apparently misrepresented to the country?

Watch the video below from CNN, broadcast Feb. 13, 2017.

Originally posted here:
Adam Schiff drops bombshell: Michael Flynn may have used encryption to hide Russia talks from US - Raw Story

Rubrik software adds Windows Server support, encryption – TechTarget

Data protection startup Rubrik will add support for physical Windows servers, software-based encryption and customized reporting in the next version of its Cloud Data Management platform.

Due to the features of most modern backup software which include snapshot management, DR elements, cloud support, VM protection backups can do so much more than simply restoring data in the event of a storage or server failure. Download this guide and not only discover the latest upgrades to today's top enterprise backup vendors, but also learn where backup software works best in your computing environment.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Version 3.1 of Rubrik's Cloud Data Management platform will mark the seventh product upgrade since the Palo Alto, Calif., company started shipping products in 2015. The Rubrik software is due to ship before the end of March.

Rubrik's Cloud Data Management combines backup, recovery, replication, Google-like search, analytics, archival and copy data management. The Rubrik software can run on premises, in a commodity hardware appliance that the vendor sells with flash and hard disk drives, and in clouds such as Amazon Web Services or Microsoft Azure. Last year, Rubrik also began making available a software-only version designed for remote and branch offices.

One of the main new features in the upcoming 3.1 release is the extension of support to physical Windows servers. Rubrik added support for physical Microsoft SQL servers and physical Linux servers in the 3.0 product release that became generally available in November.

Rubrik founder and CTO Arvind Nithrakashyap said prior versions focused primarily on VMware virtualized workloads. But, as the product gained wider adoption, enterprise customers wanted the Rubrik software to protect data running on physical servers as well, he said. Future releases will add support for additional platforms based on customer demand, according to Nithrakashyap.

Davies Ward Phillips & Vineberg LLP, a law firm with offices in Montreal, Toronto and New York, became a Rubrik customer in November. Evans Vogas, a Montreal-based network operations analyst at the firm, said 97% of the company's workloads run on VMware virtual servers. But, the company still uses legacy Windows servers in production and needs to back them up.

Vogas said the firm uses Commvault backup software to protect the physical Windows boxes, but he looks forward to the day when he can back up all of his virtual and physical servers from the same Rubrik console. He said he encountered problems in the past with software vendors blaming hardware vendors for problems, or vice versa.

"There's no finger-pointing anymore. It's one box, one throat to choke, one number to call. It's their software running on their appliance," Vogas said.

Another important new feature for Vogas is software-based encryption. The law firm's cloud-based archival data is already encrypted, but the in-house data is not. Prior to the 3.1 release, Rubrik previously offered hardware-based, Federal Information Processing Standard 140-2-certified encryption through self-encrypting drives. Vogas said he asked for software-based encryption before buying a Rubrik appliance, and the vendor assured him it would add that feature.

Vogas said software-based encryption will save the law firm a significant amount of money, because hardware-based encryption requires special servers and more expensive storage drives.

"If I had $7 million to spend, I'd probably prefer everything be hardware-based encryption, because it's very hard to break," Vogas said. "But software-based encryption accomplishes the encryption requirement. For myself, this will be sufficient."

Rubrik's Nithrakashyap said another capability many enterprise customers require is rich, customized reports to manage capacity, track data protection tasks, and comply with service-level agreements for backups and archives.

Rubrik previously included a set of reports with the product. But Nithrakashyap said the new Rubrik Envision feature, due in the 3.1 release, will allow enterprises to create customized reports. Envision can also deliver HTML5-based reports via email, he said.

The fast rise of the company's revenue and ability to get into large enterprises early on has been impressive. Dave Russellvice president and distinguished analyst of storage technologies, Gartner

The Rubrik Cloud Data Management 3.1 update will be free to all existing customers, according to Nithrakashyap. Rubrik claims it is approaching an annual bookings run rate of $100 million, with a customer growth rate of seven times in 2016.

"The fast rise of the company's revenue and ability to get into large enterprises early on has been impressive," Dave Russell, a Gartner vice president and distinguished analyst of storage technologies, wrote in an email. "This year will be very telling. Can Rubrik maintain, or even increase, the same level of growth and expanded deployment? That will be very interesting to watch."

Russell said he sees Rubrik going up against Veritas NetBackup, the Dell EMC Data Protection Suite -- Avamar or NetWorker -- with Data Domain, and Commvault. He added that startup Cohesity is generating market buzz as well.

"Rubrik's ease of deployment and management, scale-out architecture and overall cost structure are the reasons I see customers interested in Rubrik, and this release should help sustain that -- not that any of those other vendors are standing still by any means," Russell wrote.

Phil Goodwin, a storage systems and software research director at IDC, said Rubrik's market share remains small. He said even Veeam, ranked higher at fifth in the market, has a single-digit market share in the range of 4% to 5%.

"A lot of [Rubrik's] capabilities are wrapped around the ability to fundamentally integrate with the cloud," Goodwin said. "If you look at the way most typical products are architected, they have an on-premise solution, and they add cloud into it. Rubrik has really been designed from the ground up to include a cloud-based component to their solution."

Goodwin said he views the Rubrik software update as a significant one. He said the Windows Server support is important because enterprises virtualize only about 75% of their workloads and still run roughly a quarter on dedicated physical servers. He said encryption has become a must-have for most organizations, and Rubrik Envision represents a key expansion into data management, a trend that IDC has noted.

New options for backup and recovery planning

Backup appliances do more than just backup

Latest wave of data protection products

See the article here:
Rubrik software adds Windows Server support, encryption - TechTarget

US Secret Service Prefers Belt Sanders And Third-Party Vendors To Cell Phone Encryption Backdoors – Techdirt

The Christian Science Monitor has posted an interesting article detailing some (but certainly not all) of the ways the US Secret Service can obtain data from locked phones. In all the cases discussed in the article, the data itself wasn't encrypted, but was otherwise inaccessible without the password.

In addition to using third-party forensic software and hardware (like that of recently-hacked Cellebrite), the Secret Service also engages in a lot of manual labor to recover phone data. In one instance, the Secret Service was able to pull out the phone's flash memory and grab data from it -- although this process took it nearly a week.

A Huawei phone obtained by the agency called for a very unique brute force approach.

In another case, involving a password-locked Huawei H883G phone, agents bought multiple copies of the same model and practiced carefully polishing off material from the back of the device with an automated sander.

Often, agents can apply heat to phones to open them up. But Huawei built this particular model in a way that applying too much heat could damage its memory. So, agents sanded off material from the back of the Huawei H883G device to excise sexually explicit images for a case involving a different New Hampshire man.

What's not contained in the article are complaints about encryption. Either the Secret Service doesn't encounter that much of it, or it just doesn't find it to be that much of an obstacle when it does. Dave Aitel, a former NSA research scientist, is the only person quoted in the article who says anything about encryption -- and even he believes the Secret Service's combination of hardware and software is a better approach than giving government agencies encryption backdoors.

Watering down encryption on phones is "not a good path," says Dave Aitel, a former National Security Agency research scientist who currently runs the cybersecurity firm Immunity. "The path of hacking is much nicer from a policy perspective."

[...]

"If a device is using encryption at rest ... that could be problematic, especially if the implementation of the encryption is good, he said.

It could be problematic, but encryption keeps bad guys out the same way it keeps the good guys out. And there's nothing covered here that suggests the Secret Service is as opposed to encryption as FBI Director James Comey is. Granted, the Secret Service probably runs into fewer encrypted phones than the FBI does, but even in its more-limited selection, it seems to be making the progress it needs without suggesting the government force companies to give them all-access backdoor keys.

One other somewhat surprising revelation contained in the piece is the fact that small phone manufacturers might (inadvertently) be making more secure phones than the Apples and Samsungs of the world. Why? Because the limited market draws less interest from government contractors who develop cell phone-cracking tools. If there are fewer government buyers interested in cracking Brand X, no company is going to expend research resources trying to find a way around the phone's built-in protections.

"A cheaper phone that might be less popular, it seems like it'd be easier for the vendors to get into it," says [James] Darnell of the Secret Service phone lab. "But it's actually quite the opposite."

What's covered here indicates James Comey's "sky is falling darkening" proclamations are pretty much his alone. Law enforcement at large isn't demanding encryption backdoors. It's just the same handful of holdouts, albeit ones with inordinately-large soapboxes.

See the original post:
US Secret Service Prefers Belt Sanders And Third-Party Vendors To Cell Phone Encryption Backdoors - Techdirt