Features That Distinguish Bitcoin from the Other Assets – Telemedia Online

Bitcoin has gained worldwide popularity, distinguishing itself as a unique asset class. Institutional bankers and private and public corporations are also adding this digital money into their portfolios. On the other hand, this digital money is significantly different from conventional currency. Here are a few features that differentiate Bitcoin System from traditional assets.

Stocks restate, and fiat currency is controlled to varying degrees by the government. However, this digital money is the first truly decentralized asset. Bitcoins network aims to keep power decentralized. Instead, the networks algorithm determines supply and distribution.

As a result, this electronic money doesnt have a single entity controlling it. Instead, anyone accessing the internet can technically join the Bitcoin network and add the asset to their portfolio. The peer-to-peer structure is Bitcoins core feature and distinguishes it from every other asset class.

Every transaction on this digital money network remains on a block linked to a previous block of transactions. This blockchain technology is immutable, meaning no entity can erase or alter any information on the network. Transactions on this virtual money are verified by network nodes through cryptography and recorded in the blockchain. More so, a blockchain is a public ledger.

The distinguishing feature of immutability makes the network reliable and trustworthy. It makes it stand out from all other asset classes where a lack of transparency, forgery, or corruption could pose a risk to the investor.

With this electronic money, you cannot tell how much of this virtual money a person can own, but at the same time, it is visible to everyone on the ledger board how much transaction has been made by which user and who are the recipients of the Bitcoin. As a result, Bitcoin transactions are crystal clear to everyone in the ecosystem of Bitcoin. Also, from this mentioned history on the ledger board, on a proper analysis, anyone in the network can know the asset owned by another person if they want. However, network participants can do a lot of things to prevent this.

When comparing this digital money transaction to other banks or other methods of commerce, Bitcoin transactions are exceptionally fast. People can send funds using Bitcoin viahttps://bitcoinprime.software/within a few minutes. On the other hand, when you send such an amount using banks, the transactions will take weeks to go through successfully.

Generally, banks take long documentation and procedures for opening and managing an account, including dealer records and credit checks. Also, they consider legal aspects and implications of their operations when dealing with electronic money. On the other hand, you can make an address in Bitcoin in a few seconds without any need for legal documents. You only need to set a strong password and not forget it because once the password is gone there is no getting it back.

Since the creation of this electronic money, Bitcoin has gradually become a mainstream asset. More so, estimates suggest that there are over 100 million active Bitcoin users worldwide. The popularity of this electronic money makes it more valuable. Also, Bitcoin is considered a legitimate store of value, and many people use it. And this gives it more liquidity and acceptability than most other traditional assets.

All the above features, including censorship resistance, hard-capped, and immutability, are among the many features that make this electronic money stand out from the other assets.

Continue reading here:
Features That Distinguish Bitcoin from the Other Assets - Telemedia Online

Why Passkeys Will Be Simpler and More Secure Than Passwords – TidBITS

Apple has unveiled its version of passkeys, an industry-standard replacement for passwords that offers more security and protection against hijacking while simultaneously being far simpler in nearly every respect.

You never type or manage the contents of a passkey, which is generated when you upgrade a particular website account from a password-only or password and two-factor authentication login. Passkeys overcome numerous notable weaknesses with passwords:

After a test run with developers over the last year, Apple has built passkey support into iOS 16, iPadOS 16, macOS 13 Ventura, and watchOS 9, slated for release in September or October of this year. These operating systems will store passkeys just as they do passwords and other entries in the user keychain, protected by a device password or passcode, Touch ID, or Face ID. Passkeys will also sync securely among your devices using iCloud Keychain, which employs end-to-end encryptionApple never has access to passkeys or other iCloud Keychain data.

Best of all, perhaps, is that Apple built passkeys on top of a broadly supported industry standard, the W3C Web Authentication API or WebAuthn, created by the World Wide Web Consortium and the FIDO Alliance, a group that has spent years developing approaches to reduce the effectiveness of phishing, eliminate hijacking, and increase authentication simplicity for users. Apple, Amazon, Google, Meta (Facebook), and Microsoft are all FIDO board members, as are major financial institutions, credit card networks, and chip and hardware firms.

Many websites and operating systems already support WebAuthn via a hardware key like the popular ones made by Yubico. You visit a website, choose to log in using a security key, insert or tap a button on the hardware key, and the browser, operating system, and hardware key all talk together to complete the login. A passkey migrates the function of that hardware key directly into the operating systemno extra hardware required. Websites that already support hardware-based WebAuthn should be able to support passkeys with little to no effort, according to Apple.

Before we get started, note that Apple writes passkey in lowercase, an attempt to get us to use it alongside password, passcode, and passphrase as a common concept. Google, Microsoft, and other companies will offer compatible technology and may also opt for the generic passkey name. While new terminology can cause confusion, passkey is better than the more technically descriptive multi-device FIDO credentials, which doesnt exactly roll off the tongue.

Lets dig in to how passkeys work.

Passkeys rely on public-key cryptography, something weve been writing about at TidBITS for nearly 30 years. With public-key cryptography, an encryption algorithm generates a secret thats broken into two pieces: a private key, which you must never disclose, and a public key, which you can share in any fashion without risk of exposing the private key. Public-key cryptography underpins secure Web, email, and terminal connections; iMessage; and many other standards and services.

Anyone with a persons public key can use it to encrypt a message that only the party who possesses the private key can decrypt. The party who has the private key can also perform a complementary operation: they can sign a message with the private key that effectively states, I validate that I sent this message. Crucially, anyone with the public key can confirm that only the private keys possessor could have created that signature.

A passkey is a public/private key pair associated with some metadata, such as the website domain for which it was created. With a passkey, the private key never leaves the device on which it was generated to validate a login, while a website holds only the corresponding public key, stored as part of the users account.

To use a passkey, the first step is to enroll at a website or in an app. Youre likely familiar with this process from any time you signed up for two-factor authentication at a site: you log in with existing credentials, enable 2FA, receive a text message or scan a QR code into an authentication app or your keychain (in iOS 15, iPadOS 15, and Safari 15 for macOS), and then verify your receipt.

With a passkey, the process is different. When you log in to a website offering passkey authentication, you will have an option to upgrade it to a passkey in your accounts security or password section. The website first generates a registration message that Apples operating systems will interpretit happens at a layer you never see. In response, your device creates the public/private key pair, stores it securely and locally, and transmits the public key to the website. The site can then optionally issue a challenge for it and your device can present it to confirm the enrollment.

On subsequent visits, when youre presented with a login, your iPhone or iPad will show the passkey entry in the QuickType bar and Safari in macOS will show it as a pop-up menu. In both cases, thats just like passwords and verification codes today. As with those login aids, youll validate the use of your passkey with Touch ID, Face ID, or your device passcode, depending on your settings.

Behind the scenes, your request to login via a passkey causes the site server to generate a challenge request using the stored public key. Your device then has to build a response using your stored private key. Because you initiate a passkey login by validating your identity, your device has access to your passkeys private key when the challenge request comes in and can respond to the challenge without another authentication step. The server validates your devices response against your stored public key, ensuring that you are authorized for access. If it all checks out, the website logs you in.

A passkey replaces two-factor authentication, and its worth breaking down why, as it seems counter-intuitive: how can a single code held on a device provide distinct aspects of confirmation? The rubric for multiple security factors is usually stated as at least two of something you know, something you have, or something you are. A passkey incorporates at least two of those:

Think for a moment about the advantages here. A passkey:

Apple stores each passkey as just another entry in your keychain. If you have iCloud Keychain enabled, the passkeys sync across all your devices. (iCloud Keychain requires two-factor authentication enabled on your Apple ID; Apple hasnt said if passkeys will replace its internal use of 2FA for its user accounts.)

You can share a passkey with someone else using AirDrop. This means you have to be in proximity to the other person, another element in security. The details are shared through end-to-end encryption, allowing the private key and other data to be passed without risk of interception. Apple hasnt provided much more detail than that AirDrop sharing is an option, so there may be other provisos or security layers.

Because passkeys replace passwords and a second factor, you may be reasonably worried at this point about losing access to your passkeys if youre locked out of your Apple ID account or lose all your registered devices. Apple has several processes in place for recovering Apple ID account access and broad swaths of iCloud-synced data. For an Apple ID account, you can use Apples account recovery process or an account Recovery Key. For iCloud data, if youve enabled the friends-and-family recovery system, iCloud Data Recovery Service, you can use that to re-enable access. After you recover account access, Apple has an additional set of steps that enable you to retrieve iCloud Keychain entries: it involves sending a code via SMS to a registered phone number and entering a device passcode for one of the devices in your iCloud-synced set.

This is all a fabulous reduction in the potential for successful attacks against your Internet-accessible accounts. But theres more: Apple isnt building yet another walled garden. Instead, passkeys are part of a broad industry effort with which Apple says its implementation will be compatible.

Apple built its passkey support on top of the previously mentioned WebAuthn standard, which describes the server side of how to implement a Web-based login with public-key cryptography. FIDO created standards for the client side of that equation and calls the combination of its protocol and WebAuthn FIDO2. Apple developed its own client-side approach thats compatible with standard WebAuthn servers and should be interchangeable with other companies rollouts of passkeys. Google, Microsoft, and Apple made a joint announcement in May 2022committing to this approach, too.

In Apples passkey introduction video for developers, engineer Garrett Davidson emphasized Apples commitment to compatibility, saying:

Weve been working with other platform vendors within the FIDO Alliance to make sure that passkey implementations are compatible cross-platform and can work on as many devices as possible.

He then demonstrated using a passkey on an Apple device to log in to a website on a PC, showing how a QR code could be used to enable a passkey login to one of your accounts on a device or browser thats not connected to your existing devices or ecosystem.

Heres how you might log in to a passkey-enabled account on someone elses PC using your iPhone with your passkey as the authenticator. During the login, you can opt to add a device instead of entering a passkey or other authentication in the browser. The websites server generates a QR code that includes a pair of single-use passwordstheyre generated just for that login and used in the next step for additional validation. (Note that the device with the browser could be any passkey-supporting operating system and device. The authenticating devices might be limited by Apple or other companies to a smaller set, much like you can only use an iPhone to confirm Apple Pay in Safari on a Mac, not a Mac with Touch ID to confirm Apple Pay from an iPhone.)

The PC in our example also starts broadcasting a Bluetooth message that contains the information needed to connect and authenticate directly with the server. Scan that QR code on your iPhone, and the iPhone uses an end-to-end encrypted protocol to create a tunnel with the PCs Web browser using the keys shown in the QR code. (This encrypted connection isnt part of the Bluetooth protocol, by the way, but data tunneled over Bluetooth; Bluetooth doesnt incorporate the necessary encryption strength.)

This Bluetooth connection provides additional security and verification by offering out-of-band elements, or details that the PC isnt presenting to the device thats providing authenticationhere, your iPhone. Because Web pages can be spoofed for phishing attacks, the Bluetooth connection provides a device-to-device backchannel for key details:

This broad device and platform compatibility lets you maintain the same degree of passkey security and simplicity without downgrading to a weaker method for login when accessing your account using other peoples devices. Whenever theres a way to force a weaker login method, malicious parties will exploit that via phishing, social engineering, or other interception techniques. (Providing a second factor via an SMS text message versus a verification code is a prime example of a weaker backup approach that has been exploited.) In fact, until passkeys can be used exclusively, password-based logins will have to remain available, and theyll remain vulnerable.

There might be some usability hiccups as passkeys roll out, but they shouldnt be widespread. Its possible, for instance, that some WebAuthn server components will need to be updated or that Apple will have to add more edge cases to its framework to encompass how things work in the wild.

But imagine a world in which you can securely log in to websites using any current browser on any device running any modern operating system, without having to create, remember, type, and protect passwords. Its relaxing just to think about.

The main question that remains unanswered is how portable passkeys will be among ecosystems: can I use iOS and Android and Windows and share a passkey generated on one among all three? Given that Apple has built an AirDrop-sharing method for passkeys, I hope FIDOs broad compatibility includes sharing passkeys among operating systems, too.

Passwords have provided an uneasy security compromise since their introduction decades ago when multi-user computing systems began to require protection. Passwords are patently imperfect, a relic of an age when physical proximity provided the first level of protection, something rendered moot by the Internet.

In an effort to answer some of the weaknesses in a password system, two-factor authentication was grafted on to require that you had something besides a password, something that required holding or being near an object to validate your right to log into a computer, service, or website. But because 2FA starts with an account password and uses a second method that can be subject to compromise or phishing, it remains a patch applied to a damaged wall.

The passkey is a modern replacement for passwords that rebuilds the security wall protecting standard account logins. Proximityin the form of the device that stores your passkeysis a powerful tool in reducing account hijacking and interception. Passkeys may seem scary and revolutionary, but theyre actually safer and, in some ways, a bit old-fashioned: theyre a bit of a throwback to a time when having access to a terminal provided proof you were authorized to use it.

Read more:
Why Passkeys Will Be Simpler and More Secure Than Passwords - TidBITS

Bureau of Industry and Security

Mass Market (Section 740.17)

Hardware and software items that would otherwise be classified as 5A002 or 5D002 can be classified under 5A992.c and 5D992.c if they meet the criteria listed in Note 3 to Category 5, Part 2 ("the mass market criteria"). In other words, some 5x002 items can become 5x992.c based on the way they are sold. Mass market items are described in 740.17(b)(1) and (b)(3) but not (b)(3)(iii) e.g., digital forensics) of License Exception ENC and have classification and reporting requirements.

Although a 5A992.c and 5D992.c item does not require a license exception to go to most places (because it is only Anti-Terrorism controlled) they are described in License Exception ENC 740.17, which includes the submission requirements that need to be made to BIS. Whether an item is 5x002 or 5x992.c - mass market (per Note 3 to Cat. 5 Part 2), the submission requirements are the same and therefore described in a single place under 740.17(b)(1) (self-classifiable) and (b)(3) (requires classification request to BIS).

The mass market criteria under Note 3 to Cat. 5, Part 2 has two paragraphs:

Paragraph A describes products that are generally available to the public at retail. Mass market products are typically consumer products sold at retail stores or internet locations, but products sold only to businesses can also qualify for mass market. BIS takes into account a range of factors when determining whether something qualifies for mass market including quantity of the item sold, price, technical skill required to use the product, existing sales channels, typical customer, and any exclusionary practices of the supplier.

Paragraph B applies to components of mass market products. In order to qualify for this paragraph:1. It must be a hardware or software component of an existing mass market product, meaning it is:- The same component that is factory installed in the mass market product; or- A functionally equivalent aftermarket replacement that has the same form fit and function.

2. Information Security must not be the primary function of the component;

3. It must not change the cryptographic functionality of an existing mass market item, or add new encryption functionality to the item; and

4. The feature set of the component must be fixed and not designed or modified to customer specifications.

ITEMS NOT Eligible for Mass Market 5x992.c: Items that meet the criteria in 740.17(b)(2) (e.g., network infrastructure) and 740.17(b)(3)(iii) (e.g., digital forensics) are NOT eligible for mass market treatment.

When a mass market 5x992.c item requires a Classification Request to BIS:Mass market items described under 740.17 (b)(3)(e.g., chips, components, SDK) (except for (b)(3)(iii)(e.g., digital forensics), which are not eligible for mass market) require a classification by BIS via SNAP-R before they can be classified as 5x992.c.

When a mass market 5x992.c item can be Self-Classified:Mass market items that are described under in 740.17(b)(1) can be self-classified with an annual self-classification report. If you choose to submit a classification request for a 740.17(b)(1) item, then a self-classification report for that item is not required.

When nothing is required to export a mass market item 5x992.c:The export of Mass market items that are described in the scenarios under in 740.17(a) do not require any submission to BIS.

Continued here:
Bureau of Industry and Security

Should You Use This Encrypted Period Tracking App? – Gizmodo

Screenshot: Lucas Ropek/Stardust

A period-tracking company proclaimed last week that it was dedicated to protecting womens data rather than sharing it with cops in a post-Roe v Wade world. Stardust, a woman-owned period-tracking app, announced that it would be the first company of its kind to roll out end-to-end encryption. E2E limits datas visibility to only the user, keeping personal information safeand is widely considered on of the best privacy protections on the web. Stardust founder and CEO, Rachel Moranis, announced the plans in a video on the apps TikTok account on Friday, claiming the change had already been in the works prior to Roes overturning. What this means is that if we get subpoenaed by the government, we will not be able to hand over any of your period tracking data, she said.

Stardust didnt stop there, though. In a series of tweets, the company went on to state that it hopes to implement a host of new privacy protections, including a way for users to completely opt out of providing any personal identifiable information (no account generation) and use the app fully anonymously, as well as full local data storage. Following the announcements, Stardust saw a huge surge in interestbecoming the second most downloaded app in the U.S., as of Saturday.

Then the company had to do some cleanup. It wiped any mention of end-to-end encryption from its website. It admitted toand pledged to stopsharing data with at least one third-party marketing firm. And it changed its privacy policy to remove language about providing info to cops without any warrant.

The Supreme Courts recent decision to overturn Roe v. Wade and end nearly half a century of constitutional abortion rights in America has already begun to bear ugly results. In a bevy of states, draconian trigger laws have materialized, effectively criminalizing most if not all instances of the medical procedureand more laws are expected in the coming weeks. In this brave new world, civil liberties advocates have expressed concern for the ways in which womens data could be used by law enforcement to monitor for digital evidence of pregnancies. Critics have worried about the data on period tracking apps in particular, which they say could be used to prosecute women who have sought abortions via data on pregnancies that end.

As with anything that sounds potentially too good to be true, critics were quick to point out some problematic elements of Stardusts plans. Questions have swirled about whether the companys new privacy measures will be as effective as they sound. Other critics have wondered whether, in this day and age, it even makes sense to use a period tracking app at all. Its a good questionand worth considering given whats at stake right now.

G/O Media may get a commission

If they want to survive, all of these period tracker apps out there need to really get their house in order and be building up user trust, said Riana Pfefferkorn, a scholar at the Stanford Internet Observatory.

Probably the most problematic thing about Stardusts claims is that they seem to have changed over time. TechCrunch reported Monday that what the company was offering didnt really sound like ironclad end-to-end encryption. The outlet wrote:

Stardust founder [Rachel] Moranis told TechCrunch that all traffic to our servers is through standard SSL (hosted on AWS) and subsequent data storage on AWS RDS utilizing their built-in AES-256 encryption implementation. Although this describes the use of encryption to protect data while in transit and while its stored on Amazons servers, its not clear if this implementation would be considered true end-to-end encryption.

Following the interview with TechCrunch, Stardust apparently scrubbed its website of any mentioning of end-to-end encryption, essentially watering down what it had originally offered to users.

Even more problematically, further analysis of the companys platform appeared to reveal that the firm was occasionally sharing individual users phone numbers with a third-party analytics firm called MixPanel. This kind of information sharing could quite easily lead to the identification of individual userswhich is something the company has promised not to allow. After being confronted with this issue, Moranis told TechCrunch that the current (old) version of Stardust leverages several data collection mechanisms of Mixpanel that we have disabled/removed in the new version. In addition to not sending [personally identifiable information] to Mixpanel, we have also disabled IP tracking for our users to protect from that metadata being used to identify our users.

Meanwhile, Vice News was quick to point out that Stardusts privacy policy left something to be desired. In a story published Monday, the news outlet pointed out that the apps policy acknowledged that it would share information with police whether or not legally required. The policy clarifies that Stardust may...

...share aggregated, anonymized or de-identified, encrypted information, which cannot reasonably be used to identify you, including with our partners or research institutions.

When reached for comment by Gizmodo, a company spokesperson said that Vices story was based on an outdated privacy policy. A visit to Stardusts website on Monday revealed that the language in its privacy policy had been changed. The spokesperson also provided us with a statement from Moranis, Stardusts Founder and CEO, who again reiterated that the new feature was designed to avoid a digital subpoena.

With the update set to go live...Wednesday, June 29th on all iOS devices and Android, users login information will not be associated with their cycle tracking data, and therefore their data will not be a subpoena risk, she said.

We also asked for better information about the apps plans for encryption, but have not heard back yet. We will update this story if we get a response.

Its no surprise that companies like Stardust are now seeking to implement new privacy protections. In fact, such protections might be something of an industry imperative for period trackers, given the full-blown panic about digital health data that now exists afterRoe.

Stanfords Pfefferkorn said that, when properly applied, encryption could be used to protect against the harsh laws currently being passed across the country.

The Dobbs decision [which overturned Roe] underscores the importance of adding strong encryption, by default, wherever it doesnt currently exist already, Pfefferkorn told Gizmodo. She added that companies like Stardust are suddenly under a lot of scrutiny and that their business model is under threat from the public panic spurred by the recent Supreme Court decision. She said, That means being more transparent about the kinds of data that the apps collect and instituting better protections to prevent the data from falling into the wrong hands.

Pfefferkorn also recommended that women invest in existing privacy applications. One of the simplest ways to protect your online communications is to use an encrypted chat platform. For that, one of the best options is to download Signal, a chat app that offers true end-to-end encryption. Its free, easy to use, and should ensure that your conversations stay private. That might be the best place to start.

Follow this link:
Should You Use This Encrypted Period Tracking App? - Gizmodo

Another Issue With Internet Antitrust Bills: Sloppy Drafting Could Lead To Problems For Encryption – Techdirt

from the not-good,-not-good-at-all dept

As the big push is on to approve two internet-focused antitrust bills, the American Innovation and Choice Online Act (AICOA) and the Open App Markets Act, weve been calling out that while the overall intentions of both may be good, there are real concerns with the language of both and how it could impact content moderation debates. Indeed, it seems pretty clear that the only reason these bills have strong support from Republicans is because they know the bills can be abused to attack editorial discretion.

There have been some other claims made about problems with these bills, though some of them seem overblown to me (for example, the claims that the Open App Markets bill would magically undermine security on mobile phones). However, Bruce Schneier now points out another potential issue with both bills that seems like a legitimate concern. They both could be backdoors to pressuring companies into blocking encryption apps. He starts by highlighting how it might work with AICOA:

Lets start with S. 2992. Sec. 3(c)(7)(A)(iii) would allow a company to deny access to apps installed by users, where those app makers have been identified [by the Federal Government] as national security, intelligence, or law enforcement risks. That language is far too broad. It would allow Apple to deny access to an encryption service provider that provides encrypted cloud backups to the cloud (which Apple does not currently offer). All Apple would need to do is point to any number of FBI materials decrying the security risks with warrant proof encryption.

Sec. 3(c)(7)(A)(vi) states that there shall be no liability for a platform solely because it offers end-to-end encryption. This language is too narrow. The word solely suggests that offering end-to-end encryption could be a factor in determining liability, provided that it is not the only reason. This is very similar to one of the problems with the encryption carve-out in the EARN IT Act. The section also doesnt mention any other important privacy-protective features and policies, which also shouldnt be the basis for creating liability for a covered platform under Sec. 3(a).

It gets worse:

In Sec. 2(a)(2), the definition of business user excludes any person who is a clear national security risk. This term is undefined, and as such far too broad. It can easily be interpreted to cover any company that offers an end-to-end encrypted alternative, or a service offered in a country whose privacy laws forbid disclosing data in response to US court-ordered surveillance. Again, the FBIs repeated statements about end-to-end encryption could serve as support.

Finally, under Sec. 3(b)(2)(B), platforms have an affirmative defense for conduct that would otherwise violate the Act if they do so in order to protect safety, user privacy, the security of nonpublic data, or the security of the covered platform. This language is too vague, and could be used to deny users the ability to use competing services that offer better security/privacy than the incumbent platformparticularly where the platform offers subpar security in the name of public safety. For example, today Apple only offers unencrypted iCloud backups, which it can then turn over governments who claim this is necessary for public safety. Apple can raise this defense to justify its blocking third-party services from offering competing, end-to-end encrypted backups of iMessage and other sensitive data stored on an iPhone.

And the Open App Markets bill has similar issues:

S. 2710 has similar problems. Sec 7. (6)(B) contains language specifying that the bill does not require a covered company to interoperate or share data with persons or business users thathave been identified by the Federal Government as national security, intelligence, or law enforcement risks. This would mean that Apple could ignore the prohibition against private APIs, and deny access to otherwise private APIs, for developers of encryption products that have been publicly identified by the FBI. That is, end-to-end encryption products.

Some might push back on this by pointing out that Apple has strongly supported encryption over the years, but these bills open up some potential problems, and, at the very least, might allow companies like Apple to block third party encryption apps even as the stated purpose of the bill is the opposite.

As Schneier notes, he likes both bills in general, but this sloppy drafting is a problem.

The same is true of the language that could impact content moderation. In both cases, it seems that this is messy drafting (though in the content moderation case, it seems that Republicans have jumped on it and have now made it the main reason they support these bills, beyond general anger towards big tech for populist reasons).

Once again, the underlying thinking behind both bills seems mostly sound, but these problems again suggest that these bills are, at best, half-baked, and could do with some careful revisions. Unfortunately, the only revisions weve seen so far are those that carved out a few powerful industries.

Filed Under: aicoa, amy klobuchar, antitrust, bruce schneier, encryption, open app markets

Continued here:
Another Issue With Internet Antitrust Bills: Sloppy Drafting Could Lead To Problems For Encryption - Techdirt

SSH Communications Security (SSH) has received the first significant order relating to the contract for the delivery of encryption products and…

SSH Communications Security (SSH) has received the first significant order relating to the contract for the delivery of encryption products and servicesThe order announced today is worth EUR 2.1 million and will be recognized over a three-year period. SSH delivers the solution as a subscription. The order consists of cryptographic products, product-related maintenance, and support services. This order relates to the major multi-year contract for the delivery of cryptographic products and services signed and announced in December 2020. If fully exercised, the total value of the agreement is approximately EUR 20 million.

A reliable and trusted supplier of encryption productsSSH's solution for the transmission of classified information has received TL III-level security certification (equal to EU/NATO CONFIDENTIAL) in May 2022. The certification enables the solution to be used to secure transportation of critical data.

"This is a significant order for SSH, and it grows our subscription-based revenue in major customers. The order is a recognition of our futureproof solutions, and it significantly strengthens our position as a strategic partner for large customers for defensive cybersecurity solutions delivered as a service", says Dr. Teemu Tunkelo, CEO of SSH.

SSH COMMUNICATIONS SECURITY OYJ

Teemu Tunkelo

CEO

For further information, please contact:

Teemu Tunkelo, CEO, tel. +358 40 5499605 / teemu.tunkelo@ssh.com

Niklas Nordstrm, CFO, tel. +358 50 5410543 / niklas.nordstrom@ssh.com

Distribution:

Nasdaq Helsinki Oy

Major media

http://www.ssh.com

About SSH

SSH helps organizations safeguard their mission-critical digital assets at rest, in transit, and in use. We have 5,000+ customers worldwide, including 40 percent of Fortune 500 companies, and major organizations in Finance, Government, Retail, and Industrial segment.We are committed to helping our customers secure their business in the age ofhybrid cloudand distributed IT and OT solutions. Our Zero Trust solutions offer safe electronic communications, secure access to servers and between servers. Our teams in North America, Europe, Asia along with a global network of certified partners ensure customer success. The companys shares (SSH1V) are listed on Nasdaq Helsinki.www.ssh.com.

Read the original here:
SSH Communications Security (SSH) has received the first significant order relating to the contract for the delivery of encryption products and...

Insights on the Managed Encryption Services Global Market to 2027 – Featuring Accenture, Cisco Systems and Dell Technologies Among Others -…

DUBLIN--(BUSINESS WIRE)--The "Managed Encryption Services Market Research Report by Type, Industry, Deployment, Region - Global Forecast to 2027 - Cumulative Impact of COVID-19" report has been added to ResearchAndMarkets.com's offering.

The Global Managed Encryption Services Market size was estimated at USD 4,876.54 million in 2021, USD 5,544.14 million in 2022, and is projected to grow at a Compound Annual Growth Rate (CAGR) of 13.94% to reach USD 10,672.91 million by 2027.

Competitive Strategic Window:

The Competitive Strategic Window analyses the competitive landscape in terms of markets, applications, and geographies to help the vendor define an alignment or fit between their capabilities and opportunities for future growth prospects. It describes the optimal or favorable fit for the vendors to adopt successive merger and acquisition strategies, geography expansion, research & development, and new product introduction strategies to execute further business expansion and growth during a forecast period.

FPNV Positioning Matrix:

The FPNV Positioning Matrix evaluates and categorizes the vendors in the Managed Encryption Services Market based on Business Strategy (Business Growth, Industry Coverage, Financial Viability, and Channel Support) and Product Satisfaction (Value for Money, Ease of Use, Product Features, and Customer Support) that aids businesses in better decision making and understanding the competitive landscape.

Market Share Analysis:

The Market Share Analysis offers the analysis of vendors considering their contribution to the overall market. It provides the idea of its revenue generation into the overall market compared to other vendors in the space. It provides insights into how vendors are performing in terms of revenue generation and customer base compared to others. Knowing market share offers an idea of the size and competitiveness of the vendors for the base year. It reveals the market characteristics in terms of accumulation, fragmentation, dominance, and amalgamation traits.

The report provides insights on the following pointers:

1. Market Penetration: Provides comprehensive information on the market offered by the key players

2. Market Development: Provides in-depth information about lucrative emerging markets and analyze penetration across mature segments of the markets

3. Market Diversification: Provides detailed information about new product launches, untapped geographies, recent developments, and investments

4. Competitive Assessment & Intelligence: Provides an exhaustive assessment of market shares, strategies, products, certification, regulatory approvals, patent landscape, and manufacturing capabilities of the leading players

5. Product Development & Innovation: Provides intelligent insights on future technologies, R&D activities, and breakthrough product developments

The report answers questions such as:

1. What is the market size and forecast of the Global Managed Encryption Services Market?

2. What are the inhibiting factors and impact of COVID-19 shaping the Global Managed Encryption Services Market during the forecast period?

3. Which are the products/segments/applications/areas to invest in over the forecast period in the Global Managed Encryption Services Market?

4. What is the competitive strategic window for opportunities in the Global Managed Encryption Services Market?

5. What are the technology trends and regulatory frameworks in the Global Managed Encryption Services Market?

6. What is the market share of the leading vendors in the Global Managed Encryption Services Market?

7. What modes and strategic moves are considered suitable for entering the Global Managed Encryption Services Market?

Market Dynamics

Drivers

Restraints

Opportunities

Challenges

Companies Mentioned

For more information about this report visit https://www.researchandmarkets.com/r/9hm7r4

Read this article:
Insights on the Managed Encryption Services Global Market to 2027 - Featuring Accenture, Cisco Systems and Dell Technologies Among Others -...

Trump Appeals Dismissal Of Preposterous Suit Against Twitter For Tortious Deplatforming – Above the Law

(Photo by Win McNamee/Getty Images)

Donald Trump has said that he and Twitter are never, never, never getting back together. He insists that hes perfectly happy to bleat into the ether on his own website, while occasionally truthing on his knock-off Truth Social platform. And yet, hes suing Twitter demanding to have his account reinstated, and has gone so far as to file an appeal after US District Judge James Donato unceremoniously dropkicked his idiotic lawsuit last month.

The theory of Trumps Twitter LOLsuit and its giggling siblings filed against Meta and YouTube is that the social media platforms were acting as government agents when they nixed his accounts. His lawyers actually argued with a straight face that the tech companies were conscripted into government service after Democrats threatened to ditch Section 230 of the Communications Decency Act. (It never gets any less insane, no matter how many times you type it.)

Never mind that conservatives like Senator Josh Hawley have been among the loudest critics of the law which immunizes internet platforms for user-generated content. Now is not the time to get hung up on the fact that Trump himself vetoed the $740 million National Defense Authorization Act in 2020 because Congress refused to nuke Section 230. Thats neither here nor there! Trump insisted that the tech companies were so terrified of Rep. Adam Schiff that they swung into action to censor conservatives, and that this constitutes a grievous violation of his First Amendment rights.

In the event, Judge Donato was singularly unimpressed with the argument, and, frankly with the lawyering, too. Here he is marveling that a federal practitioner can be unaware that the Twiqbal standard requiring that the facts alleged must be actually plausible applies to all federal civil cases.

Plaintiffs make the odd assertion that these pleading standards apply only in antitrust conspiracy actions. Dkt. No. 145 at 6 n.7. Twombly and Iqbal expressed no such limitation, and their standards have been applied to a myriad of Rule 12(b)(6) motions in non-antitrust actions in every federal district and circuit court. A scant minute of online research makes this abundantly clear.

But Trump isnt going to take this lying down! Today he noticed an appeal to the Ninth Circuit of the dismissal of his case. Those activist liberal judges cant cancel culture Donald Trump! The mans got rubes to fleece with claims that hes raising cash for his legal defense, and hes not letting some trial judge from the land of fruit and nuts get in his way.

Next stop San Francisco, and then its on to SCOTUS. Shit, you can get five justices to bite on anything these days, right?

Trump v. Twitter [Docket via Court Listener]

Elizabeth Dye lives in Baltimore where she writes about law and politics.

See more here:

Trump Appeals Dismissal Of Preposterous Suit Against Twitter For Tortious Deplatforming - Above the Law

Loud music and take-out alcohol. Here are all the new Florida laws going into effect – WKMG News 6 & ClickOrlando

Starting July 1, the Sunshine State will have new laws that could affect a host of different issues from what Floridians learn in school to how loudly they can play music in their vehicles.

HB 1557 - Parental Rights in Education AKA Dont Say Gay bill

This law will require district school boards to notify students parents of involvement in critical decisions affecting the students mental, emotional or physical well-being.

The law also prohibits classroom discussion about sexual orientation or gender identity in certain grade levels and for school districts to notify parents of healthcare services.

For more information, visit.

[RELATED: Heres what Floridas Stop WOKE law could mean for your childs education]

Ad

HB 5001 - General Appropriation Act

The bill will provide a minimum wage increase to state employees and law enforcement while also providing tax suspensions on gas, diapers and school supplies.

It will also provide money for buildings and other improvements in state agencies.

For more information, visit.

HB 577 - Tenant Safety, Miyas Law

This law will require the apartment operators to provide tenants with a reasonable notice for repairs in dwelling units.

It will also enforce stricter background checks and the use of master keys.

For more information, visit.

[TRENDING: Florida expands Bright Futures scholarship eligibility. Heres whats new | No smoking on the beach? Daytona Beach Shores considers ban | Become a News 6 Insider (its free!)]

Ad

Florida statue 316.3045 - Loud Music in Vehicles

This law will allow law enforcement officers to give tickets to drivers playing music too loudly in their cars.

Drivers will be unable to play music from a vehicle that is at a distance of 25 feet or more.

The law will also allow officers to ticket drivers for playing music too loudly in areas around churches, schools or hospitals.

For more information, visit.

HB 5 - Reducing Fetal and Infant Mortality AKA 15 Weeks Abortion Ban

This law prohibits a physician from performing an abortion if the fetus is past 15 weeks, rendering late-term abortion services illegal.

The law provides some exceptions in cases of rape, incest or human trafficking.

Ad

For more information, visit.

HB 1421 - School Safety

This law requires school to create a plan to reunify families in case of school evacuations and to have law enforcement officers ready to respond to emergencies like school shootings and to be present in shooting drills.

It also will require schools to provide annual incident reports that are easily digestible to readers.

Lastly, it also requires school officers to take mental health intervention training and school districts to train its staff in youth mental health awareness.

For more information, visit.

HB 105 - Regulation of Smoking by Counties and Municipalities

The Florida Clean Indoor Air Act will regulate vaping and tobacco smoking in public places in Florida.

Ad

The laws goal is to protect the public from the health hazards of secondhand tobacco smoke.

Smoking will be restricted in public beaches and parks. The law will also allow school districts to regulate smoking on school property and local governments to restrict the use of vapes.

For more information, visit.

SB 1054 - Financial Literacy Instruction in Public Schools

This law requires that students starting in grade 9 must earn one-half credit in personal financial literacy and money management to receive their high school diplomas.

For more information, visit.

HB 7065 - Child Welfare

This law will create programs to provide guidance and resources for fathers to inspire them to have positive involvement with their children.

Ad

It will also provide mentorship for fatherless children and funding to help children in the foster care and juvenile justice system.

Lastly, this bill declares the month of June as Responsible Fatherhood Month.

For more information, visit.

HB 7 - Individual Freedom

This law prohibits the indoctrination of students in systematic racism or to a particular point of view inconsistent with the principles of individual freedom.

According to this law, the principles of individual freedoms mean that all individuals are equal before the law and have inalienable rights.

This bill also restricts how race-related instruction in workplace.

For more information, visit.

HB 7061 - Taxation

This law will provide tax reliefs for back-to-school season, recreation and disaster preparedness.

Ad

It will also give a tax breaks to companies who hire interns and create affordable housing.

HB 7061 will provide tax credit to companies that give to charities providing counseling for families.

For more information, visit.

SB 7072 - Social Media Platforms

This law will prohibit a social media platform from de-platforming a candidate for political office or journalistic enterprise.

The Florida Elections Commission is going to fine media platforms $250,000 per day for suspending the accounts of candidates for statewide office and $25,000 per day for any other candidate.

For more information, visit.

SB 1890 - Campaign Financing

This law puts a $3,000 contribution limit on political committees.

Ad

It also prohibits a candidate from donating surplus campaign funds to a charitable organization in which he or she is employed.

For more information, visit.

HB 7045 - School Choice

This law expands the eligibility for K-12 scholarships for students to attend private schools.

This will allow students with disabilities to have scholarships that will allow them to choose public or private schools.

Also, it will allow low-income students to attend schools that their parents otherwise could not afford.

Lastly, it also expands program eligibility to include students who are dependents of a member of the U.S. Armed Forces and adopted children.

For more information, visit.

HB 529 - Moments of Silence in Public Schools

Ad

This law will require a moment of silence to be set aside for students during the first-period classroom in all grades.

It will require teachers to set aside two minutes daily in which students may not interfere with other students participation.

For more information, visit.

HB 5 - Civic Education Curriculum

This law requires the Department of Education to develop or approve an integrated civic education curriculum for grades K - 12.

The curriculum should help students development of civic responsibility and knowledge, according to the legislation.

For more information, visit.

HB 233 - Postsecondary Education

This law prohibits the State Board of Education from shielding students, staff or faculty from certain speech.

Ad

It will require the Board of Education to perform annual surveys on freedom and viewpoint diversity.

For more information, visit.

SB 1028 - Education

This law creates the Fairness in Womens Sports Act, which provides female athletes with opportunities to demonstrate their skills when participating in athletic endeavors.

The bill specifies athletic teams or sports designated for females, women or girls may not be open to students of the male sex. Officials will take a students biological sex as established on their birth certificate as their actual sex when considering who should participate in the athletic events.

For more information, visit.

SB 88 - Farming Operations

This law protects reasonable agricultural activities conducted on farm land from inconvenient lawsuits.

Ad

It will protect farm operations including, but not limited to, noise, smoke, odors, dust, fumes, particle emissions or vibration.

For more information, visit.

SB 148 - Beverage Law

This law allows certain food service establishments to sell or deliver alcoholic beverages off-location under certain circumstances.

It will allow customers to take alcohol out of the restaurant and it will revised the requirements for the sale of alcoholic beverages by certain vendors.

For more information, visit.

Originally posted here:

Loud music and take-out alcohol. Here are all the new Florida laws going into effect - WKMG News 6 & ClickOrlando

Study suggests identity advancement plays a key role in the downplaying of Trump’s unethical behaviors – PsyPost

Donald Trumps presidency included many transgressive behaviors which were rationalized by his followers. A study published in the Journal of Applied Social Psychology explores the roles of group prototypicality and identity advancement in how supporters downplayed and accepted Trumps harmful behaviors.

People in political leadership have a lot of power and have the potential to greatly affect the social, economic, and social state of the country and even the entire world. When leaders partake in transgressive behavior that violates social, moral, or legal norms, the consequences can be grave. Unfortunately, leaders like Donald Trump can maintain support from their base despite their harmful behaviors.

Previous research supports this and shows leniency from their followers. This study seeks to further this research by understanding the roles of identity advancement and group prototypicality in this leniency.

Identity advancement refers to the belief that a politician stands up for Americans, acts as a champion for Americans, promotes the interests of Americans, and has the best interests of Americans at heart. Group prototypicality, on the other hand, refers to the belief that a politician represents what is characteristic of Americans, is typical of Americans, and stands for what Americans have in common.

Researcher Ben Davies and his colleagues utilized a longitudinal study that employed 3 waves. Wave 1 occurred a week before the 2020 election, wave 2 occurred 2 days after the initial wave, and wave 3 occurred the day after Joe Bidens inauguration. Wave 1 included 200 Republicans, wave 2 retained 175 participants, and wave 3 retained 102 participants. Wave 1 assessed initial perceptions of Trump, demographics, prototypicality, and identity advancement. Wave 2 assessed the perceived ethicalness of transgressive behavior when committed by Trump or not committed by Trump. Wave 3 assessed prototypicality and identity advancement following Trump leaving office and being replaced by Biden.

Results showed that Republicans downplayed Trumps unethical behavior, but this was related to his identity advancement and not related to his group prototypicality. Trump losing the election did not increase his followers beliefs that he behaved unethically or decrease their perception of his group prototypicality or identity advancement. Additionally, participants did perceive Trumps behavior as less unethical than the same behaviors in a neutral subject. This was significant for all 3 behaviors studied including nepotism, sharing of false information, and abuse of power.

The extent to which group members downplay the transgressive behavior of their leader has worrying implications for leadership, the researchers said. Ultimately, it appears that devout followers are willing to explain away even the most serious breaches of law and morality by their leaders. As the US Capitol riots illustrate, the rationalization of a leaders transgressive behavior and continued support for them can culminate in serious attacks on democracy and social order.

This study made important progress in understanding how base followers justify and interpret transgressive behavior. Despite this, it has limitations. This study focuses solely on Donald Trump, a very controversial politician. Arguably, there has never been a more divisive president in the United States. These results would potentially not generalize using a different politician. Additionally, very salient events occurred between waves 2 and 3, including the Capitol riots and attempt to overturn the election, which is difficult to control for.

As well as addressing these limitations, future studies should also explore how to mitigate the support of transgressive leaders, and how their behavior can be reframed in a way that minimizes its downplaying among supporters, the researchers said. One potential avenue is to explore how de-platforming such transgressive leaders limits their ability to reframe their behavior in a desired light.

The study, Donald Trump and the rationalization of transgressive behavior: The role of group prototypicality and identity advancement, was authored by Ben Davies, Carola Leicht, and Dominic Abrams.

Link:

Study suggests identity advancement plays a key role in the downplaying of Trump's unethical behaviors - PsyPost