Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption – Video


Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
To get this project in ONLINE or through TRAINING Sessions, Contact:JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai -83. Landmark: Next to Kotak Mahendra Bank.

By: jpinfotechprojects

Read more here:
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption - Video

Hacker Lexicon: What Is Homomorphic Encryption?

The problem with encrypting data is that sooner or later, you have to decrypt it. Keep your cloud files cryptographically scrambled using a secret key that only you possess, and its likely no hacker will have the codebreaking resources necessary to crack them. But as soon as you want to actually do something with those filesanything from editing a word document or querying a database of financial datayou have to unlock the data and leave it vulnerable. Homomorphic encryption, a still-mostly-theoretical advancement in the science of keeping secrets, could change that.

A homomorphic encryption scheme is a crypto system that allows computations to be performed on data without decrypting it. A homomorphically encrypted search engine, for instance, could take in encrypted search terms and compare them with an encrypted index of the web. Or a homomorphically encrypted financial database stored in the cloud would allow users to ask how much money an employee earned in the second quarter of 2013. But it would accept an encrypted employee name and output an encrypted answer, avoiding the privacy problems that usually plague online services that deal with such sensitive data.

Plenty of encryption schemes allow partial homomorphic encryption; That is, they let users perform some mathematical functions on encrypted data, but not others. In 2009, however, IBM researcher Craig Gentry came up with the first fully homomorphic encryption scheme. He compared the system to one of those boxes with the gloves that are used to handle toxic chemicalsAll the manipulation happens inside the box, and the chemicals are never exposed to the outside world.

Unfortunately, Gentrys method also adds immense computational requirements to computational tasks that would be simple with unencrypted data. With his original scheme, a Google search would take about a trillion times longer using his process. He estimated that it would be a decade or more before the scheme became practically usable.

But that scheme has been slowly improving. Gentry now says that it with recent tweaks to his method, fully homomorphic encryption would multiply the computing time necessary for a function by roughly a millionhalf as many zeroes as five years ago. That puts him more or less on track with his 2009 road map. And last month, Gentry was awarded the MacArthur genius grant for his crypto research. With $625,000 in Gentrys pockets and users clamoring for better encryption in online services, practical homomorphic encryption could be unlocked in the not-so-distant future.

Hacker Lexicon is WIREDs explainer series that seeks to de-mystify the jargon of information security, surveillance and privacy.

More here:
Hacker Lexicon: What Is Homomorphic Encryption?

Revealed: the secret guide to encryption, hacking, and surveillance for governments

There is now great interest in the level of governmental interference that takes place into online activity. Edward Snowden told the world about what the NSA was up to and there are now numerous websites dealing with the revelation that he made. One such site is The Intercept, and it has just published the secret manuals that are supplied to governments who want to use a suite of specialist tools to monitor web users' activities.

Sub-titled "the hacking suite for governmental interception", RCS 9 (or Remote Control System) is a suite of tools from Hacking Team. The Italian security and surveillance company is responsible for providing hacking and monitoring guides and software to a list of countries including Colombia, Korea, Mexico, Nigeria, and Saudi Arabia. RCS itself is "a solution designed to evade encryption" -- the sort of encryption put in place by Google.

RCS 9 -- which goes by the name of Galileo -- is itself no secret. Hacking Team advertizes it on its web site, and there's even a suitably hackery and threatening sounding video explaining what it does. But there is a problem; RCS need to be "installed on the device to monitor". Not to worry -- there's a guide to building a software agent in the manual and details of how to deploy it via USB, email or by force. Once in place, "evidence collection on monitored devices is stealth and transmission of collected data from the device to the RCS server is encrypted and untraceable".

While, at the moment, it seems that RCS is only sold to governments and agencies in certain parts of the world, it's certainly the sort of things that the US and the UK would be interested in. The Intercept reports that Hacking Team has made appearance at homeland security trade shows and conferences. If you like the idea of getting your hands on what amounts to commercial spyware, you're out of luck:

We also understand the potential for abuse of the surveillance technologies that we produce, and so we take a number of precautions to limit the potential for that abuse. We provide our software only to governments or government agencies. We do not sell products to individuals or private businesses.

But as we've seen from the activities of the NSA, there is great potential for governments to abuse such tools, never mind individuals. It's interesting to take a look through the RCS documentation. Despite the terrifying power of the tool, the manual has been written very much with computer novices in mind. There are even instructions about how to close a window by clicking X. But once set up, the tool can be used to record Skype calls, take screenshots, browse through calendars and contacts, record key strokes, and much more.

All readily available to a government near you, to do with just about whatever they want.

Photo credit: Naypong/ Shutterstock

More here:
Revealed: the secret guide to encryption, hacking, and surveillance for governments

GENIVI Alliance Receives Supplier Innovation Award From BMW Group

By PR Newswire

Article Rating:

Reads:

-- Special "Innovation Partnership" Award Presented for Delivery of First Open Source Infotainment Platform

SAN RAMON, California, Oct. 28, 2014 /PRNewswire/ --The GENIVI Alliance, an automotive and consumer electronics industry association driving the development and adoption of open source In-vehicle Infotainment (IVI) software has received the Supplier Innovation Award in the category of Innovation Partnership from the BMW Group.

Presented during its third BMW Supplier Innovation Awards event in Amsterdam, the award recognizes BMW's most innovative suppliers as key partners in making decisive contributions to the success of the company.

In November 2013, BMW introduced its first generation GENIVI Linux head unit product, which is now featured in many BMW Group models. The head unit, which is the central component for in-car communications, navigation and entertainment, leveraged the open source software developed in GENIVI for the non-differentiating functionality required by IVI systems.

CIO, CTO & Developer Resources

"With the delivery of our first Linux head unit, BMW has proven the benefit of an open source development approach," said Sajjad Khan, senior vice president, Infotainment and Connected Drive, BMW Group. "Our suppliers are now providing a GENIVI Compliant platform as default because they believe it's the best way to build a quality IVI product."

BMW has launched a second GENIVI development project that will reuse code from its first program, and benefit from new code added to the GENIVI platform since their first program was completed.

See the original post here:
GENIVI Alliance Receives Supplier Innovation Award From BMW Group

Julian Assange – Google Is Not What It Seems

Google Is Not What It Seems

by Julian Assange

In this extract from his new book When Google Met Wikileaks, WikiLeaks' publisher Julian Assange describes the special relationship between Google, Hillary Clinton and the State Department -- and what that means for the future of the internet. WikiLeaks readers can obtain a 20 percent discount on the cover price when ordering from the OR Books website by using the coupon code "WIKILEAKS".

* * *

E

ric Schmidt is an influential figure, even among the parade of powerful characters with whom I have had to cross paths since I founded WikiLeaks. In mid-May 2011 I was under house arrest in rural Norfolk, about three hours drive northeast of London. The crackdown against our work was in full swing and every wasted moment seemed like an eternity. It was hard to get my attention. But when my colleague Joseph Farrell told me the executive chairman of Google wanted to make an appointment with me, I was listening.

I was intrigued that the mountain would come to Muhammad. But it was not until well after Schmidt and his companions had been and gone that I came to understand who had really visited me.

* * *

See original here:
Julian Assange - Google Is Not What It Seems