Amazon’s Cloud Keeps Growing Despite Fears of NSA Spying

When former government contractor Edward Snowden revealed that the NSA was conducting digital surveillance on a massive scale, many feared for the future of cloud computing. The Information Technology and Innovation Foundation estimated that Snowdens revelations could cost U.S. cloud companies $22 billion to $35 billion in foreign business over the next three years, and countless pundits predicted that American businesses would flee the cloud as well. People would prefer to run software and store data on their own computers, the argument went, rather than host their operations atop outside services potentially compromised by the NSA.

But it looks like the cloud industry is still growing. And in very big way.

The worlds largest cloud computing services services where you can run software and store data without buying your own hardware are run by Amazon, and according to a new study from independent researcher Huan Liu, Amazons operation grew by a whopping 62 percent over the past two years. Whats more, the study shows that growth has been steady since June 2013, when the Snowden revelations first hit the news. In fact, theres been a surge since December of last year.

Lius research does not look at services from Amazon rivals such as Google, Microsoft, or Rackspace. But Amazon is the best barometer for the market as a whole. Software running on Amazon Web Services may account for as much as 1 percent of North American traffic, according to data collected by DeepField Networks, and about one-third of all North American internet users visit at least one site hosted in the Amazon cloud each day.

Liu, the co-founder of a mobile fitness startup called Jamo, first looked into the size of Amazons cloud during his spare time two years ago. He says he did the study just for fun it feels good to be the first one to discover something, he says but his methodical approach provides a rare glimpse into the size and growth of Amazons empire.

Amazon doesnt disclose how many servers it runs, or how much money the service makes. Even in its quarterly earnings reports, cloud revenue is lumped in with money earned from other sources. But Liu noticed a pattern in the way Amazon organized its internet addresses that revealed which addresses were part of the same rack. Since the company publicly lists all its externally facing IP addresses, Liu could determine the total number of racks in the Amazon cloud. He says his method is limited to racks that actually include active applications, so any additional infrastructure that Amazon has installed but not yet used doesnt show up in the study. Liu was originally trying to measure the size of Amazons flagship Elastic Compute Cloud, but its possible that some of the racks are used by other services as well.

Two years ago, he estimated that Amazon had about 450,000 servers, based on an assumption of 64 servers in a rack. But even if we dont know the number of servers in each rack, knowing the number of racks helps us get a sense of the size of the Amazon cloud and its rate of growth.

Amazon runs data centers in several different geographical locations. Two years ago, Liu that the noticed that the U.S. eastern region was much larger than all other Amazon regions, and thats still true today. But the other regions are now growing faster. Oregon saw the biggest increase, growing from 41 racks to 904 in the same period. But Liu also sees growth outside the U.S. Brazil has been one of the most vocal critics of NSA surveillance, but Sao Paulo was Amazons second fastest growing region, ballooning from 25 racks to 122 between March 2012 and February 2014.

Certainly, there are good reasons for businesses to be wary of putting their software and data on such services either in the U.S. or on foreign soil. Hosting data on Amazon servers in Brazil rather in the states may help protect customers from some types of surveillance from the U.S. government, but it may not prevent all. And American companies operating on foreign soil such as Amazon in Brazil are still bound by the U.S. Patriot Act to hand over data if its requested by the government. People have been grappling with this conundrum for years. But there are also dangers in hosting software with foreign operations or even on your own servers. These cloud issue is hardly cut and dry.

What we can say is that the cloud is still growing despite the NSA.

More here:
Amazon's Cloud Keeps Growing Despite Fears of NSA Spying

How to Change BitLocker® encryption Password for a Drive/Partition In Windows® 8.1 – Video


How to Change BitLocker encryption Password for a Drive/Partition In Windows 8.1
It is advisable to change the BitLocker Encryption password on a frequent basis to ensure sound protection of the drive or partition on your Windows based ...

By: iYogi

More here:
How to Change BitLocker® encryption Password for a Drive/Partition In Windows® 8.1 - Video

how to make RAT , VIRUS undetectable for antivirus تشفير السرفر RAT encryption – Video


how to make RAT , VIRUS undetectable for antivirus RAT encryption
thank you for watching please like and subscribe for more tutorials Advanced BAT to EXE Converter download HERE :http://adf.ly/e3ZVv ,or http://adf.ly njRAT ...

By: TheHacking saga

See the original post:
how to make RAT , VIRUS undetectable for antivirus تشفير السرفر RAT encryption - Video

Security researchers urge tech companies to explain their cryptographic choices

Fourteen prominent security and cryptography experts have signed an open letter to technology companies urging them to take steps to regain users trust following reports over the past year that vendors collaborated with government agencies to undermine consumer security and facilitate mass surveillance.

The researchers pointed out as alarming allegations that RSA, the security division of EMC, made a $10 million deal with the NSA to keep a compromised crypto algorithm the default setting in its security product long after the algorithms faults were revealed. RSA has denied such a deal.

The open letter was signed by well-known computer scientists, cryptographers, developers and security researchers. Among them are Matthew Green, assistant research professor at Johns Hopkins University; Tanja Lange, professor at Eindhoven University of Technology; Bruce Schneier; Roger Dingledine and Nick Mathewson of the Tor Project; Brian Warner and Zooko Wilcox-OHearn of the Tahoe-LAFS Project; Christopher Soghoian, principal technologist at the American Civil Liberties Union and Brendan Eich, CTO of Mozilla Corporation.

The letter was an initiative of the advocacy group Electronic Frontier Foundation and outlines 10 principles, both technical and legal, to which signatories believe technology companies should adhere.

The first principle has to with code integrity and has been expressed by security experts before. Theres no easy way to verify how an open cryptographic algorithm has been implemented in closed-source software, so the letters signatories urged companies to provide public access to source code whenever possible. If companies also distribute pre-compiled binary packages, they should adopt a reproducible build process so users can obtain the same binaries from the source code, the researchers said.

Both open and closed source software should be distributed with verifiable signatures from a trusted party and a path for users to verify that their copy of the software is functionally identical to every other copy (a property known as binary transparency), they said.

The second principle requires companies to be open about their cryptographic choices and to explain why certain algorithms and parameters were used in their software.

Make best efforts to fix or discontinue the use of cryptographic libraries, algorithms, or primitives with known vulnerabilities and disclose to customers immediately when a vulnerability is discovered, the researchers said.

Other principles outlined in the letter include:

This open letter follows another one sent by security and cryptography researchers to the U.S. government in January, deploring the NSAs surveillance activities. In that letter, researchers asked the U.S. government to reject society-wide surveillance and attempts to subvert security systems and instead adopt state-of-the-art privacy-preserving technology.

Read the original here:
Security researchers urge tech companies to explain their cryptographic choices

Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months …

Experts have advised iPhone users to download iOS 7.0.6 as quickly as possible, which was rolled out by Apple on Friday Is thought users of iOS devices could have been at risk to the vulnerability for up to a year-and-a-half but there have been no reports of hacks Johns Hopkins cryptography professor in Baltimore, Maryland said that the bug was 'as bad as you can imagine'

By Sarah Griffiths

PUBLISHED: 09:48 EST, 24 February 2014 | UPDATED: 09:48 EST, 24 February 2014

557 shares

53

View comments

iPhone users have been blissfully unaware that for the past year-and-a half they could have been the victim of 'hi-tech eavesdropping'

iPhone users have been blissfully unaware that for approximately a year-and-a half a software bug could have made them the victims of hi-tech eavesdropping.

Security experts have warned that past iterations of iOS software - dating from as long ago as September 2012 - had a vulnerability that hackers could have exploited to see financial transactions, emails and Facebook activity.

They have advised iPhone users to download iOS 7.0.6 as quickly as possible, which was rolled out by Apple on Friday with a note about the patch.

Continued here:
Was YOUR iPhone at risk of being hacked? Bug in Apple update left mobiles open to identity theft for up to 18 months ...

WikiLeaks’ Julian Assange Has Cost The Met Police £5.3m During Ecuador Embassy Stay

Julian Assange's prolonged stay in the Ecuadorian Embassy has cost the Metropolitan Police 5.3million, in the 18 months since he entered the building in Knightsbridge.

Police are stationed day and night outside the embassy, where the WikiLeaks founder was granted asylum, ready to arrest Assange, who was set to be extradited to face questioning in Sweden on sexual assault allegations.

Assange claimed that Sweden would extradite him to the US over leaking secret documents. In Sweden, he faces potential rape charges from one woman and sexual assault charges from another, stemming from a visit to Stockholm in 2010.

The most recent estimated cost available for the policing operation outside the Ecuador Embassy is for the period to 31st December 2013, according to an Freedom of Information request sent to the Huffington Post UK by the Metropolitan Police.

The estimated total cost of policing the Ecuadorian Embassy between June 2012 and the end of December 2013 is 5.3 million, of which 4.4 million is police officer pay.

Around 900,000 has been paid out in police overtime costs, as a direct result of the deployments at the Ecuadorian Embassy. The cost to the taxpayer has been just under 10,000 every day.

Assange could potentially stay in his Ecuadorian Embassy bolt-hole until 2022 when the statute of limitations on his extradition request expires. This, at current costs, would mean 36.5m is spent on policing.

This month, Swedish MPs called on the prosecutors in the case to travel to question Assange at the Ecuadorian embassy, saying they should accept that Assange will not be leaving the embassy voluntarily.

Read more:
WikiLeaks' Julian Assange Has Cost The Met Police £5.3m During Ecuador Embassy Stay